/illumos-gate/usr/src/lib/crypt_modules/sha256/ |
H A D | crypt_sha.c | 120 #define ROUNDS "rounds=" 124 * get the integer value after rounds= where ever it occurs in the string. 176 int rounds = ROUNDS_DEFAULT; local 193 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); 263 for (i = 0; i < rounds; i++) { 297 "%s$rounds=%zu$", crypt_alg_magic, rounds); 382 * If the config file has a higher value for rounds= than what 409 "%s$rounds=%d$",
|
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 44 * REPEAT rounds: 69 * You can have up to 2^31 rounds which should be enough for some 76 #define BCRYPT_MINLOGROUNDS 4 /* we have log2(rounds) in salt */ 196 uint32_t rounds, i, k; local 241 rounds = 1U << logr; 243 /* Discard num rounds + "$" identifier */ 271 for (k = 0; k < rounds; k++) {
|
/illumos-gate/usr/src/common/crypto/aes/amd64/ |
H A D | aes_intel.s | 113 * int rounds; 118 * Number of rounds (aka round count) is at offset 240 of AES_KEY. 125 * Return values for above are 0 on error, number of rounds on success. 143 * Note: ks is the AES key schedule, Nr is number of rounds, pt is plain text, 395 * Return value is 0 on error, number of rounds on success. 441 / AES 256: 14 rounds in encryption key schedule 444 movl %ROUNDS32, 240(%AESKEY) / key.rounds = 14 482 mov $14, %rax / return # rounds = 14 491 / AES 192: 12 rounds in encryption key schedule 494 movl %ROUNDS32, 240(%AESKEY) / key.rounds [all...] |
H A D | aes_amd64.s | 92 * number of rounds (10, 12 or 14): 112 * with rounds except the first and last modified using inv_mix_column() 181 * Note: ks is the AES key schedule, Nr is number of rounds, pt is plain text, 758 / Perform normal forward rounds 868 / Perform normal inverse rounds
|
/illumos-gate/usr/src/common/crypto/sha2/amd64/ |
H A D | sha512-x86_64.pl | 65 my ($code, $func, $TABLE, $SZ, @Sigma0, @Sigma1, @sigma0, @sigma1, $rounds, 94 $rounds=80; 106 $rounds=64; 285 cmp \$$rounds,$round
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 103 * result is assumed to be larger than rounds * MD5_HASH_SIZE. 107 uint_t rand1len, uchar_t *rand2, uint_t rand2len, int rounds, 115 for (i = 0; i < rounds; i++) { 639 int rounds, n = 0; local 748 rounds = howmany(size, MD5_HASH_SIZE); 755 ClientRandomLen, rounds, kb); 106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, int rounds, uchar_t *result) argument
|
/illumos-gate/usr/src/lib/libumem/common/ |
H A D | umem.c | 1889 umem_cpu_reload(umem_cpu_cache_t *ccp, umem_magazine_t *mp, int rounds) argument 1892 (ccp->cc_loaded && ccp->cc_rounds + rounds == ccp->cc_magsize)); 1898 ccp->cc_rounds = rounds; 2323 int rounds, prounds, cpu_seqid; local 2333 rounds = ccp->cc_rounds; 2343 umem_magazine_destroy(cp, mp, rounds);
|
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/ |
H A D | kmem.c | 966 #define READMAG_ROUNDS(rounds) { \ 971 for (i = 0; i < rounds; i++) { \ 1046 * In order to prevent inconsistent dumps, rounds and prounds 1051 short rounds, prounds; local 1054 rounds = ccp->cc_dump_rounds; 1057 rounds = ccp->cc_rounds; 1064 if (rounds > 0 && 1066 dprintf(("reading %d loaded rounds\n", rounds)); 1067 READMAG_ROUNDS(rounds); [all...] |
H A D | genunix.c | 2016 short rounds, prounds; local 2019 rounds = ccp->cc_dump_rounds; 2022 rounds = ccp->cc_rounds; 2025 if (rounds > 0) 2026 *avail += rounds;
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | kmem.c | 2232 kmem_cpu_reload(kmem_cpu_cache_t *ccp, kmem_magazine_t *mp, int rounds) argument 2235 (ccp->cc_loaded && ccp->cc_rounds + rounds == ccp->cc_magsize)); 2241 ccp->cc_rounds = rounds; 3253 int rounds, prounds, cpu_seqid; local 3265 rounds = ccp->cc_rounds; 3275 kmem_magazine_destroy(cp, mp, rounds); 4711 int n; /* magazine rounds */
|
/illumos-gate/usr/src/cmd/mdb/common/modules/libumem/ |
H A D | umem.c | 883 #define READMAG_ROUNDS(rounds) { \ 888 for (i = 0; i < rounds; i++) { \ 971 dprintf(("reading %d loaded rounds\n", ccp->cc_rounds)); 977 dprintf(("reading %d previously loaded rounds\n",
|
/illumos-gate/usr/src/common/crypto/des/sun4u/ |
H A D | des_crypt_asm.s | 53 * In this implementation, the 16 rounds of DES are carried out by unrolling 54 * a loop that computes two rounds. For those 2 rounds, the two parts of 3243 or %o2, %o3, %o3 ! of the 16 rounds), go to final perm.
|