Home
last modified time | relevance | path

Searched refs:S (Results 1 – 4 of 4) sorted by relevance

/crypto/
Dblowfish_common.c301 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \
302 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])
313 const u32 *S = bctx->s; in encrypt_block() local
348 u32 *S = ctx->s; in blowfish_setkey() local
355 S[count] = bf_sbox[count]; in blowfish_setkey()
386 S[count] = data[0]; in blowfish_setkey()
387 S[count + 1] = data[1]; in blowfish_setkey()
Dkhazad.c762 const u64 *S = T7; in khazad_setkey() local
787 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey()
788 T1[(int)S[(int)(K1 >> 48) & 0xff] & 0xff] ^ in khazad_setkey()
789 T2[(int)S[(int)(K1 >> 40) & 0xff] & 0xff] ^ in khazad_setkey()
790 T3[(int)S[(int)(K1 >> 32) & 0xff] & 0xff] ^ in khazad_setkey()
791 T4[(int)S[(int)(K1 >> 24) & 0xff] & 0xff] ^ in khazad_setkey()
792 T5[(int)S[(int)(K1 >> 16) & 0xff] & 0xff] ^ in khazad_setkey()
793 T6[(int)S[(int)(K1 >> 8) & 0xff] & 0xff] ^ in khazad_setkey()
794 T7[(int)S[(int)(K1 ) & 0xff] & 0xff]; in khazad_setkey()
Dblowfish_generic.c31 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \
32 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])
42 const u32 *S = ctx->s; in bf_encrypt() local
76 const u32 *S = ctx->s; in bf_decrypt() local
DKconfig305 select CRYPTO_AES # for AES S-box tables
1059 8 for decryption), this implementation only uses just two S-boxes of
1137 tables or 256 bytes S-boxes.