HomeSort by relevance Sort by last modified time
    Searched full:sbox (Results 1 - 14 of 14) sorted by null

  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/params/
ParametersWithSBox.java 9 private byte[] sBox;
13 byte[] sBox)
16 this.sBox = sBox;
21 return sBox;
  /external/dropbear/libtomcrypt/notes/etc/
whirlgen.c 24 unsigned sbox(unsigned x) function
45 // for (x = 0; x < 16; x++) printf("%2x ", sbox(x));
61 printf("static const ulong64 sbox%d[] = {\n", y);
64 gf_mul(sbox(x), cir[y][0]),
65 gf_mul(sbox(x), cir[y][1]),
66 gf_mul(sbox(x), cir[y][2]),
67 gf_mul(sbox(x), cir[y][3]),
68 gf_mul(sbox(x), cir[y][4]),
69 gf_mul(sbox(x), cir[y][5]),
70 gf_mul(sbox(x), cir[y][6])
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/twofish/
twofish.c 63 /* sbox usage orderings */
75 #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) macro
99 static ulong32 sbox(int i, ulong32 x)
136 static ulong32 sbox(int i, ulong32 x) function
258 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (6 + offset) + 0]);
259 y[1] = (unsigned char)(sbox(0, (ulong32)y[1]) ^ M[4 * (6 + offset) + 1]);
260 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (6 + offset) + 2]);
261 y[3] = (unsigned char)(sbox(1, (ulong32)y[3]) ^ M[4 * (6 + offset) + 3]);
263 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (4 + offset) + 0])
    [all...]
twofish_tab.c 19 static const unsigned char SBOX[2][256] = {
    [all...]
  /external/openssl/crypto/aes/asm/
aes-x86_64.pl 47 $sbox="%r14";
82 mov 0($sbox,$acc0,8),$t0
83 mov 0($sbox,$acc1,8),$t1
84 mov 0($sbox,$acc2,8),$t2
89 xor 3($sbox,$acc0,8),$t0
90 xor 3($sbox,$acc1,8),$t1
91 mov 0($sbox,$acc2,8),$t3
96 xor 3($sbox,$acc0,8),$t2
98 xor 3($sbox,$acc2,8),$t3
107 xor 2($sbox,$acc0,8),$t
    [all...]
  /external/openssl/crypto/des/asm/
des_enc.m4 126 ! The macro also loads address sbox 1 to 5 to global 1 to 5, address
127 ! sbox 6 to local6, and addres sbox 8 to out3.
129 ! Rotates the halfs 3 left to bring the sbox bits in convenient positions.
173 nop !sethi %hi(DES_SPtrans), global1 ! sbox addr
177 nop !or global1, %lo(DES_SPtrans), global1 ! sbox addr
225 add global1, 1280, local6 ! address sbox 8
228 add global1, 1792, out3 ! address sbox 8
262 ! except that calculations for sbox 1 and sbox 5 begin befor
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/
skipjack.c 34 static const unsigned char sbox[256] = { variable
117 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp];
118 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp];
119 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp];
120 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp];
129 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]];
130 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]];
131 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]];
132 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]];
  /external/dropbear/libtomcrypt/src/prngs/
sober128tab.c 76 /* Sbox for SOBER-128 */
80 * 8->32 Sbox generated by Millan et. al. at Queensland University of
93 static const ulong32 Sbox[256] = {
sober128.c 90 t ^= Sbox[(t >> 24) & 0xFF]; \
93 t ^= Sbox[(t >> 24) & 0xFF]; \
  /external/openssl/crypto/rc2/
rrc2.doc 66 sBox[ i ] = ( beale[ i ] mod 256 ) ^ pad[ i ]
70 to skip the Beale Cipher expansion and store the sBox table directly.
84 s[ j ] = sBox[ ( S[ j-length ] + S[ j-1 ] ) mod 256 ];
94 S[ 0 ] = sBox[ S[ 0 ] ]
  /external/webkit/SunSpider/tests/sunspider-0.9/
crypto-aes.js 39 function SubBytes(s, Nb) { // apply SBox to state S [§5.1.1]
41 for (var c=0; c<Nb; c++) s[r][c] = Sbox[s[r][c]];
111 function SubWord(w) { // apply SBox to 4-byte word w
112 for (var i=0; i<4; i++) w[i] = Sbox[w[i]];
123 // Sbox is pre-computed multiplicative inverse in GF(2^8) used in SubBytes and KeyExpansion [§5.1.1]
124 var Sbox = [0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
  /external/webkit/SunSpider/tests/sunspider-0.9.1/
crypto-aes.js 39 function SubBytes(s, Nb) { // apply SBox to state S [§5.1.1]
41 for (var c=0; c<Nb; c++) s[r][c] = Sbox[s[r][c]];
111 function SubWord(w) { // apply SBox to 4-byte word w
112 for (var i=0; i<4; i++) w[i] = Sbox[w[i]];
123 // Sbox is pre-computed multiplicative inverse in GF(2^8) used in SubBytes and KeyExpansion [§5.1.1]
124 var Sbox = [0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
  /external/dropbear/libtomcrypt/src/hashes/whirl/
whirl.c 14 WHIRLPOOL (using their new sbox) hash function by Tom St Denis
  /external/dropbear/libtomcrypt/
changes     [all...]

Completed in 144 milliseconds