/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | RC5ParameterSpecTest.java | 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method 45 int rounds = 5; 50 new RC5ParameterSpec(version, rounds, wordSize, null); 57 new RC5ParameterSpec(version, rounds, wordSize + 8, iv); 64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] { 1, 2, 3 }); 70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds, 79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int 86 int rounds = 5; 92 new RC5ParameterSpec(version, rounds, wordSize, null, offset); 99 new RC5ParameterSpec(version, rounds, wordSiz [all...] |
/external/openssl/crypto/evp/ |
H A D | e_rc5.c | 75 int rounds; /* number of rounds */ member in struct:__anon28302 92 data(c)->rounds = RC5_12_ROUNDS; 96 *(int *)ptr = data(c)->rounds; 105 data(c)->rounds = arg; 122 key,data(ctx)->rounds);
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.h | 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds); 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
|
/external/chromium_org/third_party/boringssl/src/crypto/aes/asm/ |
H A D | aes-armv4.pl | 51 $rounds="r12"; 192 mov $rounds,r0 @ inp 196 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 197 ldrb $t1,[$rounds,#2] @ manner... 198 ldrb $t2,[$rounds,#1] 199 ldrb $t3,[$rounds,#0] 201 ldrb $s1,[$rounds,#7] 203 ldrb $t1,[$rounds,#6] 205 ldrb $t2,[$rounds,#5] 206 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 72 $rounds="ecx"; 76 $rounds_="ebx"; # backup copy for $rounds 120 &dec ($rounds); 136 &cmp ($rounds,11); 180 &mov ($rounds,&DWP(240,$key)); 196 &mov ($rounds,&DWP(240,$key)); 226 &shl ($rounds,4); 231 &lea ($key,&DWP(32,$key,$rounds)); 232 &neg ($rounds); 233 &add ($rounds,1 [all...] |
H A D | bsaes-armv7.pl | 57 my ($key,$rounds,$const)=("r4","r5","r6"); 758 sub $rounds,$rounds,#1 767 subs $rounds,$rounds,#1 855 sub $rounds,$rounds,#1 864 subs $rounds,$rounds,#1 895 my ($out,$inp,$rounds, [all...] |
H A D | aesni-x86_64.pl | 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 97 # calculated as latency times number of rounds, 10 for 128-bit key, 200 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 208 $rnds_="%r10d"; # backup copy for $rounds 228 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 246 dec $rounds 263 mov 240($key),$rounds # key->rounds 265 &aesni_generate1("enc",$key,$rounds); 276 mov 240($key),$rounds # ke [all...] |
/external/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 51 $rounds="r12"; 190 mov $rounds,r0 @ inp 194 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 195 ldrb $t1,[$rounds,#2] @ manner... 196 ldrb $t2,[$rounds,#1] 197 ldrb $t3,[$rounds,#0] 199 ldrb $s1,[$rounds,#7] 201 ldrb $t1,[$rounds,#6] 203 ldrb $t2,[$rounds,#5] 204 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 61 $rounds="ecx"; 65 $rounds_="ebx"; # backup copy for $rounds 109 &dec ($rounds); 125 &cmp ($rounds,11); 169 &mov ($rounds,&DWP(240,$key)); 185 &mov ($rounds,&DWP(240,$key)); 213 &shr ($rounds,1); 224 &dec ($rounds); 253 &shr ($rounds,1); 264 &dec ($rounds); [all...] |
H A D | aes-sparcv9.pl | 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 193 ld [$key+240],$rounds 197 srl $rounds,1,$rounds 260 subcc $rounds,1,$rounds ! 263 add $tbl,2048,$rounds 437 ldub [$rounds+$acc0],$acc0 440 ldub [$rounds+$acc1],$acc1 443 ldub [$rounds [all...] |
H A D | aesni-x86_64.pl | 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 97 # calculated as latency times number of rounds, 10 for 128-bit key, 184 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 192 $rnds_="%r10d"; # backup copy for $rounds 212 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 230 dec $rounds 247 mov 240($key),$rounds # key->rounds 249 &aesni_generate1("enc",$key,$rounds); 260 mov 240($key),$rounds # ke [all...] |
H A D | aesv8-armx.pl | 45 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12"); 129 mov $rounds,#10 163 mov $rounds,#12 171 mov $rounds,#14 206 str $rounds,[$out] 269 my $rounds="w3"; 277 ldr $rounds,[$key,#240] 280 sub $rounds,$rounds,#2 287 subs $rounds, [all...] |
H A D | aes-parisc.pl | 63 $rounds="%r29"; 188 ldw 240($key),$rounds 192 _srm $rounds,1,$rounds 235 addib,= -1,$rounds,L\$enc_last 350 ldo 1024($tbl),$rounds 387 ldbx $acc0($rounds),$acc0 389 ldbx $acc1($rounds),$acc1 392 ldbx $acc2($rounds),$acc2 393 ldbx $acc3($rounds), [all...] |
H A D | bsaes-armv7.pl | 57 my ($key,$rounds,$const)=("r4","r5","r6"); 757 sub $rounds,$rounds,#1 766 subs $rounds,$rounds,#1 854 sub $rounds,$rounds,#1 863 subs $rounds,$rounds,#1 894 my ($out,$inp,$rounds, [all...] |
/external/vixl/benchmarks/ |
H A D | bench-branch.cc | 61 unsigned rounds = instructions / buffer_instruction_count; local 62 for (unsigned i = 0; i < rounds; ++i) {
|
H A D | bench-dataop.cc | 60 unsigned rounds = instructions / buffer_instruction_count; local 61 for (unsigned i = 0; i < rounds; ++i) {
|
/external/qemu/include/qemu/ |
H A D | aes.h | 9 int rounds; member in struct:aes_key_st
|
/external/fio/t/ |
H A D | stest.c | 27 unsigned int size, nr, rounds = 0; local 31 while (rounds++ < LOOPS) {
|
/external/chromium_org/crypto/third_party/nss/ |
H A D | rsawrapr.c | 24 PRUint32 counter, rounds; local 35 rounds = (maskLen + hash->length - 1) / hash->length; 36 for (counter = 0; counter < rounds; counter++) { 49 if (counter != (rounds-1)) {
|
/external/chromium_org/crypto/ |
H A D | symmetric_key_unittest.cc | 72 unsigned int rounds; member in struct:PBKDF2TestVector 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 96 test_data.rounds, test_data.key_size_in_bits));
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | aes.h | 65 /* AES_MAXNR is the maximum number of AES rounds. */ 74 unsigned rounds; member in struct:aes_key_st
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_ss_functions.c | 537 strq->ss_params.fb.rounds = -1; 556 strq->ss_params.fb.rounds = with_strq->ss_params.fb.rounds; 558 strq->ss_params.fb.rounds = -1; 574 if (strq->ss_params.fb.rounds < 0) 575 strq->ss_params.fb.rounds = TAILQ_FIRST(&strq->outqueue)->length; 636 if ((strqt->ss_params.fb.rounds >= 0) && (strq == NULL || 637 strqt->ss_params.fb.rounds < strq->ss_params.fb.rounds)) { 658 subtract = strq->ss_params.fb.rounds; [all...] |
/external/openssl/crypto/aes/ |
H A D | aes.h | 82 int rounds; member in struct:aes_key_st
|
/external/openssl/include/openssl/ |
H A D | aes.h | 82 int rounds; member in struct:aes_key_st
|
/external/chromium_org/third_party/boringssl/linux-arm/crypto/aes/ |
H A D | bsaes-armv7.S | 1081 ldr r10, [r3, #240] @ get # of rounds 1089 mov r5, r10 @ pass # of rounds 1104 mov r5, r10 @ pass # of rounds 1338 ldr r10, [r3, #240] @ get # of rounds 1346 mov r5, r10 @ pass # of rounds 1363 mov r5, r10 @ pass # of rounds 1408 mov r5, r10 @ pass rounds 1571 ldr r1, [r10, #240] @ get # of rounds 1581 mov r5, r1 @ pass # of rounds 1594 mov r5, r1 @ pass # of rounds [all...] |