Home
last modified time | relevance | path

Searched refs:S (Results 1 – 5 of 5) sorted by relevance

/crypto/
Dblake2b_generic.c40 static void blake2b_increment_counter(struct blake2b_state *S, const u64 inc) in blake2b_increment_counter() argument
42 S->t[0] += inc; in blake2b_increment_counter()
43 S->t[1] += (S->t[0] < inc); in blake2b_increment_counter()
70 static void blake2b_compress_one_generic(struct blake2b_state *S, in blake2b_compress_one_generic() argument
81 v[i] = S->h[i]; in blake2b_compress_one_generic()
87 v[12] = BLAKE2B_IV4 ^ S->t[0]; in blake2b_compress_one_generic()
88 v[13] = BLAKE2B_IV5 ^ S->t[1]; in blake2b_compress_one_generic()
89 v[14] = BLAKE2B_IV6 ^ S->f[0]; in blake2b_compress_one_generic()
90 v[15] = BLAKE2B_IV7 ^ S->f[1]; in blake2b_compress_one_generic()
108 S->h[i] = S->h[i] ^ v[i] ^ v[i + 8]; in blake2b_compress_one_generic()
Dblowfish_common.c301 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \
302 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])
313 const u32 *S = bctx->s; in encrypt_block() local
348 u32 *S = ctx->s; in blowfish_setkey() local
355 S[count] = bf_sbox[count]; in blowfish_setkey()
386 S[count] = data[0]; in blowfish_setkey()
387 S[count + 1] = data[1]; in blowfish_setkey()
Dkhazad.c762 const u64 *S = T7; in khazad_setkey() local
787 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey()
788 T1[(int)S[(int)(K1 >> 48) & 0xff] & 0xff] ^ in khazad_setkey()
789 T2[(int)S[(int)(K1 >> 40) & 0xff] & 0xff] ^ in khazad_setkey()
790 T3[(int)S[(int)(K1 >> 32) & 0xff] & 0xff] ^ in khazad_setkey()
791 T4[(int)S[(int)(K1 >> 24) & 0xff] & 0xff] ^ in khazad_setkey()
792 T5[(int)S[(int)(K1 >> 16) & 0xff] & 0xff] ^ in khazad_setkey()
793 T6[(int)S[(int)(K1 >> 8) & 0xff] & 0xff] ^ in khazad_setkey()
794 T7[(int)S[(int)(K1 ) & 0xff] & 0xff]; in khazad_setkey()
Dblowfish_generic.c31 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \
32 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])
40 const u32 *S = ctx->s; in bf_encrypt() local
72 const u32 *S = ctx->s; in bf_decrypt() local
DKconfig387 select CRYPTO_AES # for AES S-box tables
1150 8 for decryption), this implementation only uses just two S-boxes of
1227 tables or 256 bytes S-boxes.
1661 we can use the AES S-Box to simulate the SM4 S-Box to achieve the
1683 we can use the AES S-Box to simulate the SM4 S-Box to achieve the