/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
D | twofish.c | 75 #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) macro 99 static ulong32 sbox(int i, ulong32 x) in _sbox() 136 static ulong32 sbox(int i, ulong32 x) in sbox() function 258 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (6 + offset) + 0]); in h_func() 259 y[1] = (unsigned char)(sbox(0, (ulong32)y[1]) ^ M[4 * (6 + offset) + 1]); in h_func() 260 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (6 + offset) + 2]); in h_func() 261 y[3] = (unsigned char)(sbox(1, (ulong32)y[3]) ^ M[4 * (6 + offset) + 3]); in h_func() 263 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (4 + offset) + 0]); in h_func() 264 y[1] = (unsigned char)(sbox(1, (ulong32)y[1]) ^ M[4 * (4 + offset) + 1]); in h_func() 265 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (4 + offset) + 2]); in h_func() [all …]
|
/external/openssl/crypto/aes/asm/ |
D | aes-x86_64.pl | 61 $sbox="%r14"; 98 mov 0($sbox,$acc0,8),$t0 99 mov 0($sbox,$acc1,8),$t1 100 mov 0($sbox,$acc2,8),$t2 105 xor 3($sbox,$acc0,8),$t0 106 xor 3($sbox,$acc1,8),$t1 107 mov 0($sbox,$acc2,8),$t3 112 xor 3($sbox,$acc0,8),$t2 114 xor 3($sbox,$acc2,8),$t3 123 xor 2($sbox,$acc0,8),$t0 [all …]
|
/external/dropbear/libtomcrypt/notes/etc/ |
D | whirlgen.c | 24 unsigned sbox(unsigned x) in sbox() function 64 gf_mul(sbox(x), cir[y][0]), in main() 65 gf_mul(sbox(x), cir[y][1]), in main() 66 gf_mul(sbox(x), cir[y][2]), in main() 67 gf_mul(sbox(x), cir[y][3]), in main() 68 gf_mul(sbox(x), cir[y][4]), in main() 69 gf_mul(sbox(x), cir[y][5]), in main() 70 gf_mul(sbox(x), cir[y][6]), in main() 71 gf_mul(sbox(x), cir[y][7])); in main() 82 printf("%02x", sbox((8*y + x)&255)); in main()
|
/external/dropbear/libtomcrypt/src/ciphers/ |
D | skipjack.c | 34 static const unsigned char sbox[256] = { variable 117 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func() 118 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func() 119 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func() 120 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func() 129 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func() 130 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func() 131 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func() 132 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func()
|
/external/openssl/crypto/des/asm/ |
D | des_enc.m4 | 126 ! The macro also loads address sbox 1 to 5 to global 1 to 5, address 127 ! sbox 6 to local6, and addres sbox 8 to out3. 129 ! Rotates the halfs 3 left to bring the sbox bits in convenient positions. 173 nop !sethi %hi(DES_SPtrans), global1 ! sbox addr 177 nop !or global1, %lo(DES_SPtrans), global1 ! sbox addr 225 add global1, 1280, local6 ! address sbox 8 228 add global1, 1792, out3 ! address sbox 8 262 ! except that calculations for sbox 1 and sbox 5 begin before 277 ! The bits for each sbox are xor-ed with the key bits for that box. 279 ! the sbox table. Each sbox entry contains the 4 output bits permuted [all …]
|
/external/valgrind/main/VEX/priv/ |
D | guest_amd64_helpers.c | 3309 static const UChar sbox[256] = { // row nr variable 3348 r.w8[i] = sbox[v->w8[i]]; in SubBytes() 3602 r8[0] = sbox[w8[0]]; in SubWord() 3603 r8[1] = sbox[w8[1]]; in SubWord() 3604 r8[2] = sbox[w8[2]]; in SubWord() 3605 r8[3] = sbox[w8[3]]; in SubWord()
|
/external/bluetooth/bluedroid/stack/smp/ |
D | aes.c | 194 static const uint_8t sbox[256] = sb_data(f1); variable 205 #define s_box(x) sbox[(x)]
|
/external/dropbear/libtomcrypt/ |
D | changes | 634 teams new sbox design (not the original NESSIE one).
|