/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | RC5ParameterSpecTest.java | 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method 45 int rounds = 5; 50 new RC5ParameterSpec(version, rounds, wordSize, null); 57 new RC5ParameterSpec(version, rounds, wordSize+8, iv); 64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3}); 70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds, 79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int 86 int rounds = 5; 92 new RC5ParameterSpec(version, rounds, wordSize, null, offset); 99 new RC5ParameterSpec(version, rounds, wordSiz [all...] |
/external/openssl/crypto/evp/ |
H A D | e_rc5.c | 75 int rounds; /* number of rounds */ member in struct:__anon9824 92 data(c)->rounds = RC5_12_ROUNDS; 96 *(int *)ptr = data(c)->rounds; 105 data(c)->rounds = arg; 122 key,data(ctx)->rounds);
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.h | 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds); 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
|
H A D | rijndael-alg-fst.c | 237 * Encrypt only a certain number of rounds. 240 int rijndaelEncryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { argument 244 /* make number of rounds sane */ 245 if (rounds > ROUNDS) { 246 rounds = ROUNDS; 254 for (r = 1; (r <= rounds) && (r < ROUNDS); r++) { 276 if (rounds == ROUNDS) { 403 * Decrypt only a certain number of rounds. 409 int rijndaelDecryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { argument 413 /* make number of rounds san [all...] |
H A D | rijndael-api-fst.c | 453 * Encrypts/Decrypts exactly one full block a specified number of rounds. 461 BYTE *input, int inputLen, BYTE *outBuffer, int rounds) { 476 rijndaelEncryptRound(block, key->keySched, key->ROUNDS, rounds); 480 rijndaelDecryptRound(block, key->keySched, key->ROUNDS, rounds); 460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument
|
/external/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 51 $rounds="r12"; 172 mov $rounds,r0 @ inp 176 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 177 ldrb $t1,[$rounds,#2] @ manner... 178 ldrb $t2,[$rounds,#1] 179 ldrb $t3,[$rounds,#0] 181 ldrb $s1,[$rounds,#7] 183 ldrb $t1,[$rounds,#6] 185 ldrb $t2,[$rounds,#5] 186 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 61 $rounds="ecx"; 65 $rounds_="ebx"; # backup copy for $rounds 109 &dec ($rounds); 125 &cmp ($rounds,11); 169 &mov ($rounds,&DWP(240,$key)); 185 &mov ($rounds,&DWP(240,$key)); 213 &shr ($rounds,1); 224 &dec ($rounds); 253 &shr ($rounds,1); 264 &dec ($rounds); [all...] |
H A D | aes-sparcv9.pl | 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 193 ld [$key+240],$rounds 197 srl $rounds,1,$rounds 260 subcc $rounds,1,$rounds ! 263 add $tbl,2048,$rounds 437 ldub [$rounds+$acc0],$acc0 440 ldub [$rounds+$acc1],$acc1 443 ldub [$rounds [all...] |
H A D | aesni-x86_64.pl | 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 97 # calculated as latency times number of rounds, 10 for 128-bit key, 183 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 191 $rnds_="%r10d"; # backup copy for $rounds 211 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 229 dec $rounds 246 mov 240($key),$rounds # key->rounds 248 &aesni_generate1("enc",$key,$rounds); 259 mov 240($key),$rounds # ke [all...] |
H A D | aes-parisc.pl | 63 $rounds="%r29"; 188 ldw 240($key),$rounds 192 _srm $rounds,1,$rounds 235 addib,= -1,$rounds,L\$enc_last 350 ldo 1024($tbl),$rounds 387 ldbx $acc0($rounds),$acc0 389 ldbx $acc1($rounds),$acc1 392 ldbx $acc2($rounds),$acc2 393 ldbx $acc3($rounds), [all...] |
H A D | aes-s390x.pl | 45 # at the moment of key schedule setup, which is denoted in key->rounds. 113 $rounds="%r13"; 288 l $rounds,240($key) 290 aghi $rounds,-1 360 brct $rounds,.Lenc_loop 614 l $rounds,240($key) 616 aghi $rounds,-1 686 brct $rounds,.Ldec_loop 867 lghi $rounds,10 868 st $rounds,24 [all...] |
H A D | aesni-sha1-x86_64.pl | 168 my $rounds="${ivp}d"; 172 mov 240($key),$rounds 227 cmp \$11,$rounds 484 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds 505 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds 530 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds 687 my $rounds="${ivp}d"; 691 mov 240($key),$rounds 744 cmp \$11,$rounds
|
/external/qemu/ |
H A D | aes.h | 9 int rounds; member in struct:aes_key_st
|
H A D | aes.c | 746 key->rounds = 10; 748 key->rounds = 12; 750 key->rounds = 14; 847 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 854 for (i = 1; i < (key->rounds); i++) { 951 if (key->rounds > 10) { 962 if (key->rounds > 12) { 975 rk += key->rounds << 2; 978 * Nr - 1 full rounds: 980 r = key->rounds >> [all...] |
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
H A D | saferp.c | 212 @param num_rounds The number of rounds desired (0 for default) 220 static const int rounds[3] = { 8, 12, 16 }; local 230 /* Is the number of rounds valid? Either use zero for default or 231 * 8,12,16 rounds for 16,24,32 byte keys 233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) { 265 skey->saferp.rounds = 8; 292 skey->saferp.rounds = 12; 319 skey->saferp.rounds = 16; 343 /* do eight rounds */ 356 if (skey->saferp.rounds > [all...] |
/external/openssh/ |
H A D | auth2-jpake.c | 223 long long rounds; local 237 rounds = strtonum(rounds_s, 1, 1<<31, NULL); 246 rounds = MAX(rounds, 7250); 247 rounds = MIN(rounds, (1<<24) - 1); 249 pw_encode64(rounds), pw_encode64(rounds >> 6), 250 pw_encode64(rounds >> 12), pw_encode64(rounds >> 1 [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | rc5.c | 49 @param num_rounds The number of rounds desired (0 for default) 78 skey->rc5.rounds = num_rounds; 146 if ((skey->rc5.rounds & 1) == 0) { 147 for (r = 0; r < skey->rc5.rounds; r += 2) { 155 for (r = 0; r < skey->rc5.rounds; r++) { 197 K = skey->rc5.K + (skey->rc5.rounds << 1); 199 if ((skey->rc5.rounds & 1) == 0) { 201 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) { 209 for (r = skey->rc5.rounds - 1; r >= 0; r--) {
|
/external/chromium/crypto/ |
H A D | symmetric_key_unittest.cc | 72 unsigned int rounds; member in struct:PBKDF2TestVector 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 96 test_data.rounds, test_data.key_size_in_bits));
|
/external/openssl/crypto/aes/ |
H A D | aes.h | 82 int rounds; member in struct:aes_key_st
|
H A D | aes_core.c | 643 key->rounds = 10; 645 key->rounds = 12; 647 key->rounds = 14; 744 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 751 for (i = 1; i < (key->rounds); i++) { 847 if (key->rounds > 10) { 858 if (key->rounds > 12) { 871 rk += key->rounds << 2; 874 * Nr - 1 full rounds: 876 r = key->rounds >> [all...] |
/external/openssl/include/openssl/ |
H A D | aes.h | 82 int rounds; member in struct:aes_key_st
|
/external/openssl/crypto/sha/asm/ |
H A D | sha512-s390x.pl | 82 $rounds=80; 96 $rounds=64; 285 lghi $t0,`($rounds-16)*$SZ`
|
H A D | sha512-x86_64.pl | 67 $rounds=80; 79 $rounds=64; 231 cmp \$$rounds,$round
|
H A D | sha512-mips.pl | 91 $rounds=80; 105 $rounds=64; 355 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | KnownHosts.java | 885 int rounds = (raw.length / 2) + 1; 889 for (int i = 0; i < rounds; i++) 891 if (((i + 1) < rounds) || ((raw.length) % 2 != 0)) 897 if ((i + 1) < rounds)
|