Home
last modified time | relevance | path

Searched refs:S3 (Results 1 – 6 of 6) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Dblowfish.c293 #define F(x) ((S1[LTC_BYTE(x,3)] + S2[LTC_BYTE(x,2)]) ^ S3[LTC_BYTE(x,1)]) + S4[LTC_BYTE(x,0)]
304 const ulong32 *S1, *S2, *S3, *S4; in s_blowfish_encipher() local
308 S3 = skey->blowfish.S[2]; in s_blowfish_encipher()
524 const ulong32 *S1, *S2, *S3, *S4; in s_blowfish_ecb_decrypt() local
534 S3 = skey->blowfish.S[2]; in s_blowfish_ecb_decrypt()
A Dcast5.c115 static const ulong32 S3[256] = { variable
499 return ((S1[LTC_BYTE(I, 3)] ^ S2[LTC_BYTE(I,2)]) - S3[LTC_BYTE(I,1)]) + S4[LTC_BYTE(I,0)]; in FI()
507 return ((S1[LTC_BYTE(I, 3)] - S2[LTC_BYTE(I,2)]) + S3[LTC_BYTE(I,1)]) ^ S4[LTC_BYTE(I,0)]; in FII()
515 return ((S1[LTC_BYTE(I, 3)] + S2[LTC_BYTE(I,2)]) ^ S3[LTC_BYTE(I,1)]) - S4[LTC_BYTE(I,0)]; in FIII()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c274 #define S3 skey->twofish.S[2] macro
279 #define g_func(x, dum) (S1[LTC_BYTE(x,0)] ^ S2[LTC_BYTE(x,1)] ^ S3[LTC_BYTE(x,2)] ^ S4[LTC_BYTE(x,…
280 #define g1_func(x, dum) (S2[LTC_BYTE(x,0)] ^ S3[LTC_BYTE(x,1)] ^ S4[LTC_BYTE(x,2)] ^ S1[LTC_BYTE(x,…
474 const ulong32 *S1, *S2, *S3, *S4; in s_twofish_ecb_encrypt() local
484 S3 = skey->twofish.S[2]; in s_twofish_ecb_encrypt()
548 const ulong32 *S1, *S2, *S3, *S4; in s_twofish_ecb_decrypt() local
558 S3 = skey->twofish.S[2]; in s_twofish_ecb_decrypt()
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk.c106 #define S3(r0, r1, r2, r3, r4) do { \ macro
222 #define SKS3 SKS(S3, 0, 1, 2, 3, 1, 2, 3, 4) in sosemanuk_setup()
392 FSS(12, S3, 0, 4, 1, 3, 2, 4, 1, 3, 2); in sosemanuk_setiv()
400 FSS(44, S3, 4, 3, 1, 0, 2, 3, 1, 0, 2); in sosemanuk_setiv()
418 FSS(76, S3, 3, 0, 1, 4, 2, 0, 1, 4, 2); in sosemanuk_setiv()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dsha512.c220 #define S3(x) (ROTR(x,14) ^ ROTR(x,18) ^ ROTR(x,41)) in mbedtls_internal_sha512_process() macro
228 local.temp1 = (h) + S3(e) + F1((e),(f),(g)) + (K) + (x); \ in mbedtls_internal_sha512_process()
A Dsha256.c154 #define S3(x) (ROTR(x, 6) ^ ROTR(x,11) ^ ROTR(x,25)) macro
168 local.temp1 = (h) + S3(e) + F1((e),(f),(g)) + (K) + (x); \

Completed in 17 milliseconds