/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 72 $rounds="r12"; 321 sub $rounds,$rounds,#1 386 subs $rounds,$rounds,#1 571 subs $rounds,$rounds,#1 635 subs $rounds,$rounds,#1 707 subs $rounds,$rounds,#1 824 sub $rounds,$rounds,#1 826 mov $rounds,$rounds,lsl#2 @ (rounds-1)*4 857 subs $rounds,$rounds,#1 1097 sub $rounds,$rounds,#1 [all …]
|
H A D | aes-sparcv9.pl | 205 ld [$key+240],$rounds 209 srl $rounds,1,$rounds 272 subcc $rounds,1,$rounds ! 275 add $tbl,2048,$rounds 449 ldub [$rounds+$acc0],$acc0 452 ldub [$rounds+$acc1],$acc1 455 ldub [$rounds+$acc2],$acc2 751 ld [$key+240],$rounds 756 srl $rounds,1,$rounds 818 subcc $rounds,1,$rounds ! [all …]
|
H A D | aesni-x86.pl | 90 $rounds="ecx"; 137 &dec ($rounds); 153 &cmp ($rounds,11); 248 &shl ($rounds,4); 254 &neg ($rounds); 279 &shl ($rounds,4); 286 &neg ($rounds); 320 &shl ($rounds,4); 327 &neg ($rounds); 373 &neg ($rounds); [all …]
|
H A D | aes-parisc.pl | 73 $rounds="%r29"; 198 ldw 240($key),$rounds 202 _srm $rounds,1,$rounds 360 ldo 1024($tbl),$rounds 397 ldbx $acc0($rounds),$acc0 399 ldbx $acc1($rounds),$acc1 402 ldbx $acc2($rounds),$acc2 403 ldbx $acc3($rounds),$acc3 667 ldw 240($key),$rounds 672 _srm $rounds,1,$rounds [all …]
|
H A D | aesv8-armx.pl | 372 sub $rounds,$rounds,#2 379 subs $rounds,$rounds,#2 565 sub $rounds,$rounds,#6 567 sub $rounds,$rounds,#2 1271 sub $rounds,$rounds,#6 1273 sub $rounds,$rounds,#2 3028 sub $rounds,$rounds,#2 3115 sub $rounds,$rounds,#2 3632 sub $rounds,$rounds,#2 3705 sub $rounds,$rounds,#2 [all …]
|
H A D | aesni-x86_64.pl | 637 mov $rounds,$rnds_ # backup $rounds 660 mov $rnds_,$rounds # restore $rounds 687 mov $rnds_,$rounds # restore $rounds 795 mov $rnds_,$rounds # restore $rounds 825 mov $rnds_,$rounds # restore $rounds 1415 shr \$4,$rounds # restore $rounds 1817 mov $rnds_,$rounds # backup $rounds 2043 mov $rounds,$rnds_ # backup $rounds 2307 mov $rnds_,$rounds # backup $rounds 2530 mov $rounds,$rnds_ # backup $rounds [all …]
|
H A D | bsaes-armv7.pl | 782 sub $rounds,$rounds,#1 791 subs $rounds,$rounds,#1 883 sub $rounds,$rounds,#1 892 subs $rounds,$rounds,#1 974 sub $rounds,$rounds,#1 1001 subs $rounds,$rounds,#1 1199 mov r5, $rounds 1242 mov r5, $rounds 1486 mov r5, $rounds @ pass rounds 1747 mov r5, $rounds @ pass rounds [all …]
|
H A D | aesfx-sparcv9.pl | 59 ld [$key + 240], $rounds 83 sub $rounds, 4, $rounds 99 brnz,a $rounds, .Loop_enc 100 sub $rounds, 2, $rounds 149 ld [$key + 240], $rounds 173 sub $rounds, 4, $rounds 189 brnz,a $rounds, .Loop_dec 190 sub $rounds, 2, $rounds 421 sll $rounds, 4, $rounds 422 add $rounds, $key, $end [all …]
|
H A D | aesp8-ppc.pl | 391 srwi $rounds,$rounds,1 454 srwi $rounds,$rounds,1 457 subi $rounds,$rounds,1 549 srwi $rounds,$rounds,1 551 subi $rounds,$rounds,1 1304 srwi $rounds,$rounds,1 1306 subi $rounds,$rounds,1 1973 srwi $rounds,$rounds,1 1974 subi $rounds,$rounds,1 2017 srwi $rounds,$rounds,1 [all …]
|
H A D | aest4-sparcv9.pl | 128 ld [$key + 240], $rounds 135 srl $rounds, 1, $rounds 137 sub $rounds, 1, $rounds 146 sub $rounds,1,$rounds 151 brnz,pt $rounds, .Lenc 206 ld [$key + 240], $rounds 213 srl $rounds, 1, $rounds 215 sub $rounds, 1, $rounds 224 sub $rounds,1,$rounds 229 brnz,pt $rounds, .Ldec [all …]
|
H A D | aes-s390x.pl | 122 $rounds="%r13"; 301 aghi $rounds,-1 627 aghi $rounds,-1 871 lghi $rounds,10 930 lghi $rounds,12 932 lghi $rounds,8 994 lghi $rounds,14 996 lghi $rounds,7 1097 .Lgo: lgr $rounds,$t0 #llgf $rounds,240($key) 1101 srl $rounds,1 [all …]
|
H A D | aesni-sha256-x86_64.pl | 95 $rounds=64; 433 vmovdqa $TABLE+`$SZ*2*$rounds`(%rip),$t3 749 vmovdqa $TABLE+`$SZ*2*$rounds`(%rip),$t3 1000 add \$`2*$SZ*($rounds-8)`,%rsp 1069 vmovdqa $TABLE+`$SZ*2*$rounds`(%rip),$t3 1182 lea `2*$SZ*($rounds-8)`(%rsp),$Tbl 1241 lea `2*$SZ*($rounds-8)`(%rsp),%rsp 1315 my ($rounds,$Tbl)=("%r11d","%rbx"); 1344 cmp \$11,$rounds 1399 mov 240($key),$rounds [all …]
|
/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 20 int rounds) in RC5_32_set_key() argument 28 if ((rounds != RC5_16_ROUNDS) && in RC5_32_set_key() 29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) in RC5_32_set_key() 30 rounds = RC5_16_ROUNDS; in RC5_32_set_key() 32 key->rounds = rounds; in RC5_32_set_key() 50 t = (rounds + 1) * 2; in RC5_32_set_key()
|
H A D | rc5_enc.c | 112 if (key->rounds == 12) { in RC5_32_encrypt() 117 } else if (key->rounds == 16) { in RC5_32_encrypt() 140 if (key->rounds == 16) { in RC5_32_decrypt() 150 } else if (key->rounds == 12) { in RC5_32_decrypt()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_siphash.txt | 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac 143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac 151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0) 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 174 Title = SIPHASH - explicit rounds 178 Ctrl = c-rounds:2 179 Ctrl = d-rounds:4 185 Title = SIPHASH - non-default values: 4,8 rounds 189 Ctrl = c-rounds:4 [all …]
|
/openssl/doc/man3/ |
H A D | EVP_rc5_32_12_16_cbc.pod | 35 variable key length cipher with an additional "number of rounds" parameter. By 36 default the key length is set to 128 bits and 12 rounds. Alternative key lengths 45 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL) 47 Sets the number of rounds to B<rounds>. This must be one of RC5_8_ROUNDS, 50 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds) 52 Stores the number of rounds currently configured in B<*rounds> where B<*rounds>
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_rc5.c | 88 unsigned int rounds; in rc5_set_ctx_params() local 90 if (!OSSL_PARAM_get_uint(p, &rounds)) { in rc5_set_ctx_params() 94 if (rounds != RC5_8_ROUNDS in rc5_set_ctx_params() 95 && rounds != RC5_12_ROUNDS in rc5_set_ctx_params() 96 && rounds != RC5_16_ROUNDS) { in rc5_set_ctx_params() 100 ctx->rounds = rounds; in rc5_set_ctx_params() 123 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { in OSSL_PARAM_uint() 150 ctx->rounds = RC5_12_ROUNDS; \
|
/openssl/crypto/evp/ |
H A D | e_rc5.c | 32 int rounds; /* number of rounds */ member 47 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl() 51 *(int *)ptr = data(c)->rounds; in rc5_ctrl() 59 data(c)->rounds = arg; in rc5_ctrl() 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
|
/openssl/crypto/bn/ |
H A D | bn_rsa_fips186_4.c | 134 int rounds, in bn_rsa_fips186_4_find_aux_prob_prime() argument 150 tmp = ossl_bn_check_generated_prime(p1, rounds, ctx, cb); in bn_rsa_fips186_4_find_aux_prob_prime() 193 int bitlen, rounds; in ossl_bn_rsa_fips186_4_gen_prob_primes() local 210 rounds = bn_rsa_fips186_5_aux_prime_MR_rounds(nlen); in ossl_bn_rsa_fips186_4_gen_prob_primes() 228 if (!bn_rsa_fips186_4_find_aux_prob_prime(Xp1i, p1i, ctx, rounds, cb) in ossl_bn_rsa_fips186_4_gen_prob_primes() 229 || !bn_rsa_fips186_4_find_aux_prob_prime(Xp2i, p2i, ctx, rounds, cb)) in ossl_bn_rsa_fips186_4_gen_prob_primes() 281 int i, imax, rounds; in ossl_bn_rsa_fips186_4_derive_prime() local 351 rounds = bn_rsa_fips186_5_prime_MR_rounds(nlen); in ossl_bn_rsa_fips186_4_derive_prime() 383 int rv = ossl_bn_check_generated_prime(Y, rounds, ctx, cb); in ossl_bn_rsa_fips186_4_derive_prime()
|
/openssl/crypto/sha/asm/ |
H A D | sha512-ia64.pl | 94 $rounds=80; 108 $rounds=64; 508 { .mib; mov ar.lc=$rounds-17 590 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl 645 .size K256#,$SZ*$rounds 691 .size K512#,$SZ*$rounds
|
/openssl/crypto/aria/ |
H A D | aria.c | 483 Nr = key->rounds; in ossl_aria_encrypt() 556 key->rounds = Nr; in ossl_aria_set_encrypt_key() 1102 xor128(o, o, &keys[rounds]); in do_encrypt() 1135 key->rounds = 12; in ossl_aria_set_encrypt_key() 1143 key->rounds = 14; in ossl_aria_set_encrypt_key() 1152 key->rounds = 16; in ossl_aria_set_encrypt_key() 1180 if (key->rounds > 12) { in ossl_aria_set_encrypt_key() 1184 if (key->rounds > 14) { in ossl_aria_set_encrypt_key() 1200 unsigned int i, rounds = ek.rounds; in ossl_aria_set_decrypt_key() local 1203 key->rounds = rounds; in ossl_aria_set_decrypt_key() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_MAC-Siphash.pod | 44 =item "c-rounds" (B<OSSL_MAC_PARAM_C_ROUNDS>) <unsigned integer> 46 Specifies the number of rounds per message block. By default this is I<2>. 48 =item "d-rounds" (B<OSSL_MAC_PARAM_D_ROUNDS>) <unsigned integer> 50 Specifies the number of finalisation rounds. By default this is I<4>.
|
/openssl/crypto/camellia/asm/ |
H A D | cmllt4-sparcv9.pl | 66 my ($inp,$out,$key,$rounds,$tmp,$mask)=map("%o$_",(0..5)); 98 ld [$key + 272], $rounds ! grandRounds, 3 or 4 109 sub $rounds, 1, $rounds 117 sub $rounds,1,$rounds 132 brnz,pt $rounds, .Lenc 172 ld [$key + 272], $rounds ! grandRounds, 3 or 4 176 sll $rounds, 6, $rounds 177 add $rounds, $key, $key 204 sub $rounds, 64, $rounds 212 sub $rounds, 64, $rounds [all …]
|
/openssl/include/openssl/ |
H A D | rc5.h | 45 int rounds; member 52 int rounds);
|
/openssl/crypto/aes/ |
H A D | aes_core.c | 644 key->rounds = 10; in AES_set_encrypt_key() 646 key->rounds = 12; in AES_set_encrypt_key() 648 key->rounds = 14; in AES_set_encrypt_key() 1294 key->rounds = 10; in AES_set_encrypt_key() 1296 key->rounds = 12; in AES_set_encrypt_key() 1298 key->rounds = 14; in AES_set_encrypt_key() 1528 r = key->rounds >> 1; in AES_encrypt() 1720 r = key->rounds >> 1; in AES_decrypt() 1872 key->rounds = 10; in AES_set_encrypt_key() 1874 key->rounds = 12; in AES_set_encrypt_key() [all …]
|