Searched refs:rounds (Results 1 - 12 of 12) sorted by relevance

/illumos-gate/usr/src/lib/crypt_modules/sha256/
H A Dcrypt_sha.c120 #define ROUNDS "rounds="
124 * get the integer value after rounds= where ever it occurs in the string.
176 int rounds = ROUNDS_DEFAULT; local
193 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX));
263 for (i = 0; i < rounds; i++) {
297 "%s$rounds=%zu$", crypt_alg_magic, rounds);
382 * If the config file has a higher value for rounds= than what
409 "%s$rounds=%d$",
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c44 * REPEAT rounds:
69 * You can have up to 2^31 rounds which should be enough for some
76 #define BCRYPT_MINLOGROUNDS 4 /* we have log2(rounds) in salt */
196 uint32_t rounds, i, k; local
241 rounds = 1U << logr;
243 /* Discard num rounds + "$" identifier */
271 for (k = 0; k < rounds; k++) {
/illumos-gate/usr/src/common/crypto/aes/amd64/
H A Daes_intel.s113 * int rounds;
118 * Number of rounds (aka round count) is at offset 240 of AES_KEY.
125 * Return values for above are 0 on error, number of rounds on success.
143 * Note: ks is the AES key schedule, Nr is number of rounds, pt is plain text,
395 * Return value is 0 on error, number of rounds on success.
441 / AES 256: 14 rounds in encryption key schedule
444 movl %ROUNDS32, 240(%AESKEY) / key.rounds = 14
482 mov $14, %rax / return # rounds = 14
491 / AES 192: 12 rounds in encryption key schedule
494 movl %ROUNDS32, 240(%AESKEY) / key.rounds
[all...]
H A Daes_amd64.s92 * number of rounds (10, 12 or 14):
112 * with rounds except the first and last modified using inv_mix_column()
181 * Note: ks is the AES key schedule, Nr is number of rounds, pt is plain text,
758 / Perform normal forward rounds
868 / Perform normal inverse rounds
/illumos-gate/usr/src/common/crypto/sha2/amd64/
H A Dsha512-x86_64.pl65 my ($code, $func, $TABLE, $SZ, @Sigma0, @Sigma1, @sigma0, @sigma1, $rounds,
94 $rounds=80;
106 $rounds=64;
285 cmp \$$rounds,$round
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c103 * result is assumed to be larger than rounds * MD5_HASH_SIZE.
107 uint_t rand1len, uchar_t *rand2, uint_t rand2len, int rounds,
115 for (i = 0; i < rounds; i++) {
639 int rounds, n = 0; local
748 rounds = howmany(size, MD5_HASH_SIZE);
755 ClientRandomLen, rounds, kb);
106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, int rounds, uchar_t *result) argument
/illumos-gate/usr/src/lib/libumem/common/
H A Dumem.c1889 umem_cpu_reload(umem_cpu_cache_t *ccp, umem_magazine_t *mp, int rounds) argument
1892 (ccp->cc_loaded && ccp->cc_rounds + rounds == ccp->cc_magsize));
1898 ccp->cc_rounds = rounds;
2323 int rounds, prounds, cpu_seqid; local
2333 rounds = ccp->cc_rounds;
2343 umem_magazine_destroy(cp, mp, rounds);
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/
H A Dkmem.c966 #define READMAG_ROUNDS(rounds) { \
971 for (i = 0; i < rounds; i++) { \
1046 * In order to prevent inconsistent dumps, rounds and prounds
1051 short rounds, prounds; local
1054 rounds = ccp->cc_dump_rounds;
1057 rounds = ccp->cc_rounds;
1064 if (rounds > 0 &&
1066 dprintf(("reading %d loaded rounds\n", rounds));
1067 READMAG_ROUNDS(rounds);
[all...]
H A Dgenunix.c2016 short rounds, prounds; local
2019 rounds = ccp->cc_dump_rounds;
2022 rounds = ccp->cc_rounds;
2025 if (rounds > 0)
2026 *avail += rounds;
/illumos-gate/usr/src/uts/common/os/
H A Dkmem.c2232 kmem_cpu_reload(kmem_cpu_cache_t *ccp, kmem_magazine_t *mp, int rounds) argument
2235 (ccp->cc_loaded && ccp->cc_rounds + rounds == ccp->cc_magsize));
2241 ccp->cc_rounds = rounds;
3253 int rounds, prounds, cpu_seqid; local
3265 rounds = ccp->cc_rounds;
3275 kmem_magazine_destroy(cp, mp, rounds);
4711 int n; /* magazine rounds */
/illumos-gate/usr/src/cmd/mdb/common/modules/libumem/
H A Dumem.c883 #define READMAG_ROUNDS(rounds) { \
888 for (i = 0; i < rounds; i++) { \
971 dprintf(("reading %d loaded rounds\n", ccp->cc_rounds));
977 dprintf(("reading %d previously loaded rounds\n",
/illumos-gate/usr/src/common/crypto/des/sun4u/
H A Ddes_crypt_asm.s53 * In this implementation, the 16 rounds of DES are carried out by unrolling
54 * a loop that computes two rounds. For those 2 rounds, the two parts of
3243 or %o2, %o3, %o3 ! of the 16 rounds), go to final perm.

Completed in 272 milliseconds