Home
last modified time | relevance | path

Searched refs:t1 (Results 1 – 3 of 3) sorted by relevance

/crypto/
A Dseed.c314 t1 ^= t0; \
315 t1 = SS0[byte(t1, 0)] ^ SS1[byte(t1, 1)] ^ \
316 SS2[byte(t1, 2)] ^ SS3[byte(t1, 3)]; \
317 t0 += t1; \
320 t1 += t0; \
321 t1 = SS0[byte(t1, 0)] ^ SS1[byte(t1, 1)] ^ \
322 SS2[byte(t1, 2)] ^ SS3[byte(t1, 3)]; \
323 t0 += t1; \
325 X2 ^= t1
344 *(keyout++) = SS0[byte(t1, 0)] ^ SS1[byte(t1, 1)] ^ in seed_set_key()
[all …]
A Dcamellia_generic.c340 t1 = ir >> 16; \
540 u32 il, ir, t0, t1, w0, w1; in camellia_setup128() local
597 w0, w1, il, ir, t0, t1); in camellia_setup128()
609 w0, w1, il, ir, t0, t1); in camellia_setup128()
718 w0, w1, il, ir, t0, t1); in camellia_setup256()
730 w0, w1, il, ir, t0, t1); in camellia_setup256()
819 t1 = klr; \
821 t1 |= lr; \
822 ll ^= t1; \
876 t0, t1, il, ir); \ in camellia_do_encrypt()
[all …]
A Decc.c1196 u64 t1[ECC_MAX_DIGITS]; in apply_z() local
1198 vli_mod_square_fast(t1, z, curve); /* z^2 */ in apply_z()
1199 vli_mod_mult_fast(x1, x1, t1, curve); /* x1 * z^2 */ in apply_z()
1200 vli_mod_mult_fast(t1, t1, z, curve); /* z^3 */ in apply_z()
1201 vli_mod_mult_fast(y1, y1, t1, curve); /* y1 * z^3 */ in apply_z()

Completed in 13 milliseconds