Home
last modified time | relevance | path

Searched refs:S4 (Results 1 – 4 of 4) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Dblowfish.c293 #define F(x) ((S1[LTC_BYTE(x,3)] + S2[LTC_BYTE(x,2)]) ^ S3[LTC_BYTE(x,1)]) + S4[LTC_BYTE(x,0)]
304 const ulong32 *S1, *S2, *S3, *S4; in s_blowfish_encipher() local
309 S4 = skey->blowfish.S[3]; in s_blowfish_encipher()
524 const ulong32 *S1, *S2, *S3, *S4; in s_blowfish_ecb_decrypt() local
535 S4 = skey->blowfish.S[3]; in s_blowfish_ecb_decrypt()
A Dcast5.c160 static const ulong32 S4[256] = { variable
499 return ((S1[LTC_BYTE(I, 3)] ^ S2[LTC_BYTE(I,2)]) - S3[LTC_BYTE(I,1)]) + S4[LTC_BYTE(I,0)]; in FI()
507 return ((S1[LTC_BYTE(I, 3)] - S2[LTC_BYTE(I,2)]) + S3[LTC_BYTE(I,1)]) ^ S4[LTC_BYTE(I,0)]; in FII()
515 return ((S1[LTC_BYTE(I, 3)] + S2[LTC_BYTE(I,2)]) ^ S3[LTC_BYTE(I,1)]) - S4[LTC_BYTE(I,0)]; in FIII()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c275 #define S4 skey->twofish.S[3] macro
279 #define g_func(x, dum) (S1[LTC_BYTE(x,0)] ^ S2[LTC_BYTE(x,1)] ^ S3[LTC_BYTE(x,2)] ^ S4[LTC_BYTE(x,…
280 #define g1_func(x, dum) (S2[LTC_BYTE(x,0)] ^ S3[LTC_BYTE(x,1)] ^ S4[LTC_BYTE(x,2)] ^ S1[LTC_BYTE(x,…
474 const ulong32 *S1, *S2, *S3, *S4; in s_twofish_ecb_encrypt() local
485 S4 = skey->twofish.S[3]; in s_twofish_ecb_encrypt()
548 const ulong32 *S1, *S2, *S3, *S4; in s_twofish_ecb_decrypt() local
559 S4 = skey->twofish.S[3]; in s_twofish_ecb_decrypt()
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk.c119 #define S4(r0, r1, r2, r3, r4) do { \ macro
223 #define SKS4 SKS(S4, 4, 5, 6, 7, 1, 4, 0, 3) in sosemanuk_setup()
393 FSS(16, S4, 4, 1, 3, 2, 0, 1, 0, 4, 2); in sosemanuk_setiv()
406 FSS(48, S4, 3, 1, 0, 2, 4, 1, 4, 3, 2); in sosemanuk_setiv()
419 FSS(80, S4, 0, 1, 4, 2, 3, 1, 3, 0, 2); in sosemanuk_setiv()

Completed in 8 milliseconds