Searched refs:sbox (Results 1 – 6 of 6) sorted by relevance
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
D | twofish.c | 75 #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) macro 99 static ulong32 sbox(int i, ulong32 x) in _sbox() 136 static ulong32 sbox(int i, ulong32 x) in sbox() function 258 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (6 + offset) + 0]); in h_func() 259 y[1] = (unsigned char)(sbox(0, (ulong32)y[1]) ^ M[4 * (6 + offset) + 1]); in h_func() 260 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (6 + offset) + 2]); in h_func() 261 y[3] = (unsigned char)(sbox(1, (ulong32)y[3]) ^ M[4 * (6 + offset) + 3]); in h_func() 263 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (4 + offset) + 0]); in h_func() 264 y[1] = (unsigned char)(sbox(1, (ulong32)y[1]) ^ M[4 * (4 + offset) + 1]); in h_func() 265 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (4 + offset) + 2]); in h_func() [all …]
|
/external/openssl/crypto/aes/asm/ |
D | aes-x86_64.pl | 60 $sbox="%r14"; 97 mov 0($sbox,$acc0,8),$t0 98 mov 0($sbox,$acc1,8),$t1 99 mov 0($sbox,$acc2,8),$t2 104 xor 3($sbox,$acc0,8),$t0 105 xor 3($sbox,$acc1,8),$t1 106 mov 0($sbox,$acc2,8),$t3 111 xor 3($sbox,$acc0,8),$t2 113 xor 3($sbox,$acc2,8),$t3 122 xor 2($sbox,$acc0,8),$t0 [all …]
|
/external/dropbear/libtomcrypt/notes/etc/ |
D | whirlgen.c | 24 unsigned sbox(unsigned x) in sbox() function 64 gf_mul(sbox(x), cir[y][0]), in main() 65 gf_mul(sbox(x), cir[y][1]), in main() 66 gf_mul(sbox(x), cir[y][2]), in main() 67 gf_mul(sbox(x), cir[y][3]), in main() 68 gf_mul(sbox(x), cir[y][4]), in main() 69 gf_mul(sbox(x), cir[y][5]), in main() 70 gf_mul(sbox(x), cir[y][6]), in main() 71 gf_mul(sbox(x), cir[y][7])); in main() 82 printf("%02x", sbox((8*y + x)&255)); in main()
|
/external/dropbear/libtomcrypt/src/ciphers/ |
D | skipjack.c | 34 static const unsigned char sbox[256] = { variable 117 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func() 118 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func() 119 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func() 120 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func() 129 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func() 130 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func() 131 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func() 132 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func()
|
/external/openssl/crypto/des/asm/ |
D | des_enc.m4 | 126 ! The macro also loads address sbox 1 to 5 to global 1 to 5, address 127 ! sbox 6 to local6, and addres sbox 8 to out3. 129 ! Rotates the halfs 3 left to bring the sbox bits in convenient positions. 173 nop !sethi %hi(DES_SPtrans), global1 ! sbox addr 177 nop !or global1, %lo(DES_SPtrans), global1 ! sbox addr 225 add global1, 1280, local6 ! address sbox 8 228 add global1, 1792, out3 ! address sbox 8 262 ! except that calculations for sbox 1 and sbox 5 begin before 277 ! The bits for each sbox are xor-ed with the key bits for that box. 279 ! the sbox table. Each sbox entry contains the 4 output bits permuted [all …]
|
/external/dropbear/libtomcrypt/ |
D | changes | 634 teams new sbox design (not the original NESSIE one).
|