Searched refs:sbox (Results 1 – 3 of 3) sorted by relevance
| /optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
| H A D | twofish.c | 64 #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) macro 88 static ulong32 sbox(int i, ulong32 x) in s_sbox() 125 static ulong32 sbox(int i, ulong32 x) in sbox() function 247 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (6 + offset) + 0]); in h_func() 248 y[1] = (unsigned char)(sbox(0, (ulong32)y[1]) ^ M[4 * (6 + offset) + 1]); in h_func() 249 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (6 + offset) + 2]); in h_func() 250 y[3] = (unsigned char)(sbox(1, (ulong32)y[3]) ^ M[4 * (6 + offset) + 3]); in h_func() 253 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (4 + offset) + 0]); in h_func() 254 y[1] = (unsigned char)(sbox(1, (ulong32)y[1]) ^ M[4 * (4 + offset) + 1]); in h_func() 255 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (4 + offset) + 2]); in h_func() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | skipjack.c | 26 static const unsigned char sbox[256] = { variable 109 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func() 110 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func() 111 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; in g_func() 112 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; in g_func() 121 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func() 122 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func() 123 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; in ig_func() 124 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; in ig_func()
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | sm4_armv8a_aese_a64.S | 139 .macro sbox, des, src, tmp1, tmp2 macro 166 sbox TMP1, TMP0, TMP2, TMP3 282 sbox TMP0, TMP8, TMP2, TMP3 494 sbox TMP1, TMP0, TMP2, TMP3
|