Searched refs:rounds (Results 1 - 25 of 42) sorted by relevance

12

/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
H A DRC5ParameterSpecTest.java38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method
45 int rounds = 5;
50 new RC5ParameterSpec(version, rounds, wordSize, null);
57 new RC5ParameterSpec(version, rounds, wordSize+8, iv);
64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3});
70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds,
79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int
86 int rounds = 5;
92 new RC5ParameterSpec(version, rounds, wordSize, null, offset);
99 new RC5ParameterSpec(version, rounds, wordSiz
[all...]
/external/openssl/crypto/evp/
H A De_rc5.c75 int rounds; /* number of rounds */ member in struct:__anon9824
92 data(c)->rounds = RC5_12_ROUNDS;
96 *(int *)ptr = data(c)->rounds;
105 data(c)->rounds = arg;
122 key,data(ctx)->rounds);
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-alg-fst.h26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
H A Drijndael-alg-fst.c237 * Encrypt only a certain number of rounds.
240 int rijndaelEncryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { argument
244 /* make number of rounds sane */
245 if (rounds > ROUNDS) {
246 rounds = ROUNDS;
254 for (r = 1; (r <= rounds) && (r < ROUNDS); r++) {
276 if (rounds == ROUNDS) {
403 * Decrypt only a certain number of rounds.
409 int rijndaelDecryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { argument
413 /* make number of rounds san
[all...]
H A Drijndael-api-fst.c453 * Encrypts/Decrypts exactly one full block a specified number of rounds.
461 BYTE *input, int inputLen, BYTE *outBuffer, int rounds) {
476 rijndaelEncryptRound(block, key->keySched, key->ROUNDS, rounds);
480 rijndaelDecryptRound(block, key->keySched, key->ROUNDS, rounds);
460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument
/external/openssl/crypto/aes/asm/
H A Daes-armv4.pl51 $rounds="r12";
172 mov $rounds,r0 @ inp
176 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
177 ldrb $t1,[$rounds,#2] @ manner...
178 ldrb $t2,[$rounds,#1]
179 ldrb $t3,[$rounds,#0]
181 ldrb $s1,[$rounds,#7]
183 ldrb $t1,[$rounds,#6]
185 ldrb $t2,[$rounds,#5]
186 ldrb $t3,[$rounds,#
[all...]
H A Daesni-x86.pl61 $rounds="ecx";
65 $rounds_="ebx"; # backup copy for $rounds
109 &dec ($rounds);
125 &cmp ($rounds,11);
169 &mov ($rounds,&DWP(240,$key));
185 &mov ($rounds,&DWP(240,$key));
213 &shr ($rounds,1);
224 &dec ($rounds);
253 &shr ($rounds,1);
264 &dec ($rounds);
[all...]
H A Daes-sparcv9.pl70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
193 ld [$key+240],$rounds
197 srl $rounds,1,$rounds
260 subcc $rounds,1,$rounds !
263 add $tbl,2048,$rounds
437 ldub [$rounds+$acc0],$acc0
440 ldub [$rounds+$acc1],$acc1
443 ldub [$rounds
[all...]
H A Daesni-x86_64.pl73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times
97 # calculated as latency times number of rounds, 10 for 128-bit key,
183 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!!
191 $rnds_="%r10d"; # backup copy for $rounds
211 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout));
229 dec $rounds
246 mov 240($key),$rounds # key->rounds
248 &aesni_generate1("enc",$key,$rounds);
259 mov 240($key),$rounds # ke
[all...]
H A Daes-parisc.pl63 $rounds="%r29";
188 ldw 240($key),$rounds
192 _srm $rounds,1,$rounds
235 addib,= -1,$rounds,L\$enc_last
350 ldo 1024($tbl),$rounds
387 ldbx $acc0($rounds),$acc0
389 ldbx $acc1($rounds),$acc1
392 ldbx $acc2($rounds),$acc2
393 ldbx $acc3($rounds),
[all...]
H A Daes-s390x.pl45 # at the moment of key schedule setup, which is denoted in key->rounds.
113 $rounds="%r13";
288 l $rounds,240($key)
290 aghi $rounds,-1
360 brct $rounds,.Lenc_loop
614 l $rounds,240($key)
616 aghi $rounds,-1
686 brct $rounds,.Ldec_loop
867 lghi $rounds,10
868 st $rounds,24
[all...]
H A Daesni-sha1-x86_64.pl168 my $rounds="${ivp}d";
172 mov 240($key),$rounds
227 cmp \$11,$rounds
484 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
505 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds
530 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
687 my $rounds="${ivp}d";
691 mov 240($key),$rounds
744 cmp \$11,$rounds
/external/qemu/
H A Daes.h9 int rounds; member in struct:aes_key_st
H A Daes.c746 key->rounds = 10;
748 key->rounds = 12;
750 key->rounds = 14;
847 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
854 for (i = 1; i < (key->rounds); i++) {
951 if (key->rounds > 10) {
962 if (key->rounds > 12) {
975 rk += key->rounds << 2;
978 * Nr - 1 full rounds:
980 r = key->rounds >>
[all...]
/external/dropbear/libtomcrypt/src/ciphers/safer/
H A Dsaferp.c212 @param num_rounds The number of rounds desired (0 for default)
220 static const int rounds[3] = { 8, 12, 16 }; local
230 /* Is the number of rounds valid? Either use zero for default or
231 * 8,12,16 rounds for 16,24,32 byte keys
233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) {
265 skey->saferp.rounds = 8;
292 skey->saferp.rounds = 12;
319 skey->saferp.rounds = 16;
343 /* do eight rounds */
356 if (skey->saferp.rounds >
[all...]
/external/openssh/
H A Dauth2-jpake.c223 long long rounds; local
237 rounds = strtonum(rounds_s, 1, 1<<31, NULL);
246 rounds = MAX(rounds, 7250);
247 rounds = MIN(rounds, (1<<24) - 1);
249 pw_encode64(rounds), pw_encode64(rounds >> 6),
250 pw_encode64(rounds >> 12), pw_encode64(rounds >> 1
[all...]
/external/dropbear/libtomcrypt/src/ciphers/
H A Drc5.c49 @param num_rounds The number of rounds desired (0 for default)
78 skey->rc5.rounds = num_rounds;
146 if ((skey->rc5.rounds & 1) == 0) {
147 for (r = 0; r < skey->rc5.rounds; r += 2) {
155 for (r = 0; r < skey->rc5.rounds; r++) {
197 K = skey->rc5.K + (skey->rc5.rounds << 1);
199 if ((skey->rc5.rounds & 1) == 0) {
201 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) {
209 for (r = skey->rc5.rounds - 1; r >= 0; r--) {
/external/chromium/crypto/
H A Dsymmetric_key_unittest.cc72 unsigned int rounds; member in struct:PBKDF2TestVector
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
96 test_data.rounds, test_data.key_size_in_bits));
/external/openssl/crypto/aes/
H A Daes.h82 int rounds; member in struct:aes_key_st
H A Daes_core.c643 key->rounds = 10;
645 key->rounds = 12;
647 key->rounds = 14;
744 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
751 for (i = 1; i < (key->rounds); i++) {
847 if (key->rounds > 10) {
858 if (key->rounds > 12) {
871 rk += key->rounds << 2;
874 * Nr - 1 full rounds:
876 r = key->rounds >>
[all...]
/external/openssl/include/openssl/
H A Daes.h82 int rounds; member in struct:aes_key_st
/external/openssl/crypto/sha/asm/
H A Dsha512-s390x.pl82 $rounds=80;
96 $rounds=64;
285 lghi $t0,`($rounds-16)*$SZ`
H A Dsha512-x86_64.pl67 $rounds=80;
79 $rounds=64;
231 cmp \$$rounds,$round
H A Dsha512-mips.pl91 $rounds=80;
105 $rounds=64;
355 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
H A DKnownHosts.java885 int rounds = (raw.length / 2) + 1;
889 for (int i = 0; i < rounds; i++)
891 if (((i + 1) < rounds) || ((raw.length) % 2 != 0))
897 if ((i + 1) < rounds)

Completed in 2429 milliseconds

12