/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/params/ |
ParametersWithSBox.java | 9 private byte[] sBox; 13 byte[] sBox) 16 this.sBox = sBox; 21 return sBox;
|
/external/dropbear/libtomcrypt/notes/etc/ |
whirlgen.c | 24 unsigned sbox(unsigned x) function 45 // for (x = 0; x < 16; x++) printf("%2x ", sbox(x)); 61 printf("static const ulong64 sbox%d[] = {\n", y); 64 gf_mul(sbox(x), cir[y][0]), 65 gf_mul(sbox(x), cir[y][1]), 66 gf_mul(sbox(x), cir[y][2]), 67 gf_mul(sbox(x), cir[y][3]), 68 gf_mul(sbox(x), cir[y][4]), 69 gf_mul(sbox(x), cir[y][5]), 70 gf_mul(sbox(x), cir[y][6]) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 63 /* sbox usage orderings */ 75 #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) macro 99 static ulong32 sbox(int i, ulong32 x) 136 static ulong32 sbox(int i, ulong32 x) function 258 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (6 + offset) + 0]); 259 y[1] = (unsigned char)(sbox(0, (ulong32)y[1]) ^ M[4 * (6 + offset) + 1]); 260 y[2] = (unsigned char)(sbox(0, (ulong32)y[2]) ^ M[4 * (6 + offset) + 2]); 261 y[3] = (unsigned char)(sbox(1, (ulong32)y[3]) ^ M[4 * (6 + offset) + 3]); 263 y[0] = (unsigned char)(sbox(1, (ulong32)y[0]) ^ M[4 * (4 + offset) + 0]) [all...] |
twofish_tab.c | 19 static const unsigned char SBOX[2][256] = { [all...] |
/external/openssl/crypto/aes/asm/ |
aes-x86_64.pl | 47 $sbox="%r14"; 82 mov 0($sbox,$acc0,8),$t0 83 mov 0($sbox,$acc1,8),$t1 84 mov 0($sbox,$acc2,8),$t2 89 xor 3($sbox,$acc0,8),$t0 90 xor 3($sbox,$acc1,8),$t1 91 mov 0($sbox,$acc2,8),$t3 96 xor 3($sbox,$acc0,8),$t2 98 xor 3($sbox,$acc2,8),$t3 107 xor 2($sbox,$acc0,8),$t [all...] |
/external/openssl/crypto/des/asm/ |
des_enc.m4 | 126 ! The macro also loads address sbox 1 to 5 to global 1 to 5, address 127 ! sbox 6 to local6, and addres sbox 8 to out3. 129 ! Rotates the halfs 3 left to bring the sbox bits in convenient positions. 173 nop !sethi %hi(DES_SPtrans), global1 ! sbox addr 177 nop !or global1, %lo(DES_SPtrans), global1 ! sbox addr 225 add global1, 1280, local6 ! address sbox 8 228 add global1, 1792, out3 ! address sbox 8 262 ! except that calculations for sbox 1 and sbox 5 begin befor [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
skipjack.c | 34 static const unsigned char sbox[256] = { variable 117 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; 118 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; 119 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; 120 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp]; 129 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; 130 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]]; 131 *kp = ikeystep[*kp]; g2 ^= sbox[g1^key[*kp]]; 132 *kp = ikeystep[*kp]; g1 ^= sbox[g2^key[*kp]];
|
/external/dropbear/libtomcrypt/src/prngs/ |
sober128tab.c | 76 /* Sbox for SOBER-128 */ 80 * 8->32 Sbox generated by Millan et. al. at Queensland University of 93 static const ulong32 Sbox[256] = {
|
sober128.c | 90 t ^= Sbox[(t >> 24) & 0xFF]; \ 93 t ^= Sbox[(t >> 24) & 0xFF]; \
|
/external/openssl/crypto/rc2/ |
rrc2.doc | 66 sBox[ i ] = ( beale[ i ] mod 256 ) ^ pad[ i ] 70 to skip the Beale Cipher expansion and store the sBox table directly. 84 s[ j ] = sBox[ ( S[ j-length ] + S[ j-1 ] ) mod 256 ]; 94 S[ 0 ] = sBox[ S[ 0 ] ]
|
/external/webkit/SunSpider/tests/sunspider-0.9/ |
crypto-aes.js | 39 function SubBytes(s, Nb) { // apply SBox to state S [§5.1.1] 41 for (var c=0; c<Nb; c++) s[r][c] = Sbox[s[r][c]]; 111 function SubWord(w) { // apply SBox to 4-byte word w 112 for (var i=0; i<4; i++) w[i] = Sbox[w[i]]; 123 // Sbox is pre-computed multiplicative inverse in GF(2^8) used in SubBytes and KeyExpansion [§5.1.1] 124 var Sbox = [0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
|
/external/webkit/SunSpider/tests/sunspider-0.9.1/ |
crypto-aes.js | 39 function SubBytes(s, Nb) { // apply SBox to state S [§5.1.1] 41 for (var c=0; c<Nb; c++) s[r][c] = Sbox[s[r][c]]; 111 function SubWord(w) { // apply SBox to 4-byte word w 112 for (var i=0; i<4; i++) w[i] = Sbox[w[i]]; 123 // Sbox is pre-computed multiplicative inverse in GF(2^8) used in SubBytes and KeyExpansion [§5.1.1] 124 var Sbox = [0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
|
/external/dropbear/libtomcrypt/src/hashes/whirl/ |
whirl.c | 14 WHIRLPOOL (using their new sbox) hash function by Tom St Denis
|
/external/dropbear/libtomcrypt/ |
changes | [all...] |