Home
last modified time | relevance | path

Searched refs:S4 (Results 1 – 4 of 4) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/ciphers/
A Dblowfish.c377 #define F(x) ((S1[LTC_BYTE(x,3)] + S2[LTC_BYTE(x,2)]) ^ S3[LTC_BYTE(x,1)]) + S4[LTC_BYTE(x,0)]
398 const ulong32 *S1, *S2, *S3, *S4; in _blowfish_ecb_encrypt() local
409 S4 = skey->blowfish.S[3]; in _blowfish_ecb_encrypt()
460 const ulong32 *S1, *S2, *S3, *S4; in _blowfish_ecb_decrypt() local
471 S4 = skey->blowfish.S[3]; in _blowfish_ecb_decrypt()
A Dcast5.c167 static const ulong32 S4[256] = { variable
512 return ((S1[LTC_BYTE(I, 3)] ^ S2[LTC_BYTE(I,2)]) - S3[LTC_BYTE(I,1)]) + S4[LTC_BYTE(I,0)]; in FI()
520 return ((S1[LTC_BYTE(I, 3)] - S2[LTC_BYTE(I,2)]) + S3[LTC_BYTE(I,1)]) ^ S4[LTC_BYTE(I,0)]; in FII()
528 return ((S1[LTC_BYTE(I, 3)] + S2[LTC_BYTE(I,2)]) ^ S3[LTC_BYTE(I,1)]) - S4[LTC_BYTE(I,0)]; in FIII()
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c282 #define S4 skey->twofish.S[3] macro
286 #define g_func(x, dum) (S1[LTC_BYTE(x,0)] ^ S2[LTC_BYTE(x,1)] ^ S3[LTC_BYTE(x,2)] ^ S4[LTC_BYTE(x,…
287 #define g1_func(x, dum) (S2[LTC_BYTE(x,0)] ^ S3[LTC_BYTE(x,1)] ^ S4[LTC_BYTE(x,2)] ^ S1[LTC_BYTE(x,…
481 const ulong32 *S1, *S2, *S3, *S4; in _twofish_ecb_encrypt() local
492 S4 = skey->twofish.S[3]; in _twofish_ecb_encrypt()
555 const ulong32 *S1, *S2, *S3, *S4; in _twofish_ecb_decrypt() local
566 S4 = skey->twofish.S[3]; in _twofish_ecb_decrypt()
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk.c126 #define S4(r0, r1, r2, r3, r4) do { \ macro
230 #define SKS4 SKS(S4, 4, 5, 6, 7, 1, 4, 0, 3) in sosemanuk_setup()
400 FSS(16, S4, 4, 1, 3, 2, 0, 1, 0, 4, 2); in sosemanuk_setiv()
413 FSS(48, S4, 3, 1, 0, 2, 4, 1, 4, 3, 2); in sosemanuk_setiv()
426 FSS(80, S4, 0, 1, 4, 2, 3, 1, 3, 0, 2); in sosemanuk_setiv()

Completed in 12 milliseconds