Searched refs:S (Results 1 – 4 of 4) sorted by relevance
301 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \302 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])313 const u32 *S = bctx->s; in encrypt_block() local348 u32 *S = ctx->s; in blowfish_setkey() local355 S[count] = bf_sbox[count]; in blowfish_setkey()386 S[count] = data[0]; in blowfish_setkey()387 S[count + 1] = data[1]; in blowfish_setkey()
762 const u64 *S = T7; in khazad_setkey() local787 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey()788 T1[(int)S[(int)(K1 >> 48) & 0xff] & 0xff] ^ in khazad_setkey()789 T2[(int)S[(int)(K1 >> 40) & 0xff] & 0xff] ^ in khazad_setkey()790 T3[(int)S[(int)(K1 >> 32) & 0xff] & 0xff] ^ in khazad_setkey()791 T4[(int)S[(int)(K1 >> 24) & 0xff] & 0xff] ^ in khazad_setkey()792 T5[(int)S[(int)(K1 >> 16) & 0xff] & 0xff] ^ in khazad_setkey()793 T6[(int)S[(int)(K1 >> 8) & 0xff] & 0xff] ^ in khazad_setkey()794 T7[(int)S[(int)(K1 ) & 0xff] & 0xff]; in khazad_setkey()
31 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \32 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])42 const u32 *S = ctx->s; in bf_encrypt() local76 const u32 *S = ctx->s; in bf_decrypt() local
305 select CRYPTO_AES # for AES S-box tables1059 8 for decryption), this implementation only uses just two S-boxes of1137 tables or 256 bytes S-boxes.