Home
last modified time | relevance | path

Searched refs:sbox (Results 1 – 8 of 8) sorted by relevance

/external/dropbear/libtomcrypt/src/ciphers/twofish/
Dtwofish.c75 #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) macro
99 static ulong32 sbox(int i, ulong32 x) in _sbox()
136 static ulong32 sbox(int i, ulong32 x) in sbox() function
258 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (6 + offset) + 0]); in h_func()
259 y[1] = (unsigned char)(sbox(0, (ulong32)y[1]) ^ M[4 * (6 + offset) + 1]); in h_func()
260 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (6 + offset) + 2]); in h_func()
261 y[3] = (unsigned char)(sbox(1, (ulong32)y[3]) ^ M[4 * (6 + offset) + 3]); in h_func()
263 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (4 + offset) + 0]); in h_func()
264 y[1] = (unsigned char)(sbox(1, (ulong32)y[1]) ^ M[4 * (4 + offset) + 1]); in h_func()
265 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (4 + offset) + 2]); in h_func()
[all …]
/external/openssl/crypto/aes/asm/
Daes-x86_64.pl61 $sbox="%r14";
98 mov 0($sbox,$acc0,8),$t0
99 mov 0($sbox,$acc1,8),$t1
100 mov 0($sbox,$acc2,8),$t2
105 xor 3($sbox,$acc0,8),$t0
106 xor 3($sbox,$acc1,8),$t1
107 mov 0($sbox,$acc2,8),$t3
112 xor 3($sbox,$acc0,8),$t2
114 xor 3($sbox,$acc2,8),$t3
123 xor 2($sbox,$acc0,8),$t0
[all …]
/external/dropbear/libtomcrypt/notes/etc/
Dwhirlgen.c24 unsigned sbox(unsigned x) in sbox() function
64 gf_mul(sbox(x), cir[y][0]), in main()
65 gf_mul(sbox(x), cir[y][1]), in main()
66 gf_mul(sbox(x), cir[y][2]), in main()
67 gf_mul(sbox(x), cir[y][3]), in main()
68 gf_mul(sbox(x), cir[y][4]), in main()
69 gf_mul(sbox(x), cir[y][5]), in main()
70 gf_mul(sbox(x), cir[y][6]), in main()
71 gf_mul(sbox(x), cir[y][7])); in main()
82 printf("%02x", sbox((8*y + x)&255)); in main()
/external/dropbear/libtomcrypt/src/ciphers/
Dskipjack.c34 static const unsigned char sbox[256] = { variable
117 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func()
118 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func()
119 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func()
120 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func()
129 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func()
130 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func()
131 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func()
132 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func()
/external/openssl/crypto/des/asm/
Ddes_enc.m4126 ! The macro also loads address sbox 1 to 5 to global 1 to 5, address
127 ! sbox 6 to local6, and addres sbox 8 to out3.
129 ! Rotates the halfs 3 left to bring the sbox bits in convenient positions.
173 nop !sethi %hi(DES_SPtrans), global1 ! sbox addr
177 nop !or global1, %lo(DES_SPtrans), global1 ! sbox addr
225 add global1, 1280, local6 ! address sbox 8
228 add global1, 1792, out3 ! address sbox 8
262 ! except that calculations for sbox 1 and sbox 5 begin before
277 ! The bits for each sbox are xor-ed with the key bits for that box.
279 ! the sbox table. Each sbox entry contains the 4 output bits permuted
[all …]
/external/valgrind/main/VEX/priv/
Dguest_amd64_helpers.c3309 static const UChar sbox[256] = { // row nr variable
3348 r.w8[i] = sbox[v->w8[i]]; in SubBytes()
3602 r8[0] = sbox[w8[0]]; in SubWord()
3603 r8[1] = sbox[w8[1]]; in SubWord()
3604 r8[2] = sbox[w8[2]]; in SubWord()
3605 r8[3] = sbox[w8[3]]; in SubWord()
/external/bluetooth/bluedroid/stack/smp/
Daes.c194 static const uint_8t sbox[256] = sb_data(f1); variable
205 #define s_box(x) sbox[(x)]
/external/dropbear/libtomcrypt/
Dchanges634 teams new sbox design (not the original NESSIE one).