Home | History | Annotate | Download | only in cipher

Lines Matching defs:U1

52  * the tables U0, U1, U2, and U4 to compute its inverse
399 static uint32_t U1[256] = {
937 static uint32_t U1[256] = {
1520 * mixColumn is implemented by using the tables U0, U1, U2, U3,
1531 U1[T4[(tmp >> 16) & 0xff] & 0xff] ^
1538 U1[T4[(tmp >> 16) & 0xff] & 0xff] ^
1545 U1[T4[(tmp >> 16) & 0xff] & 0xff] ^
1552 U1[T4[(tmp >> 16) & 0xff] & 0xff] ^
1560 ^ U1[aes_sbox[expanded_key->round[i].v8[1]]]
1565 ^ U1[aes_sbox[expanded_key->round[i].v8[5]]]
1570 ^ U1[aes_sbox[expanded_key->round[i].v8[9]]]
1575 ^ U1[aes_sbox[expanded_key->round[i].v8[13]]]
1625 of state, using the tables U0, U1, U2, U3 */
1627 column0 = U0[state->v8[0]] ^ U1[state->v8[13]]
1630 column1 = U0[state->v8[4]] ^ U1[state->v8[1]]
1633 column2 = U0[state->v8[8]] ^ U1[state->v8[5]]
1636 column3 = U0[state->v8[12]] ^ U1[state->v8[9]]
1765 of state, using the tables U0, U1, U2, U3 */
1769 column0 = U0[state->v32[0] >> 24] ^ U1[(state->v32[3] >> 16) & 0xff]
1772 column1 = U0[state->v32[1] >> 24] ^ U1[(state->v32[0] >> 16) & 0xff]
1775 column2 = U0[state->v32[2] >> 24] ^ U1[(state->v32[1] >> 16) & 0xff]
1778 column3 = U0[state->v32[3] >> 24] ^ U1[(state->v32[2] >> 16) & 0xff]
1781 column0 = U0[state->v32[0] & 0xff] ^ U1[(state->v32[1] >> 8) & 0xff]
1784 column1 = U0[state->v32[1] & 0xff] ^ U1[(state->v32[2] >> 8) & 0xff]
1787 column2 = U0[state->v32[2] & 0xff] ^ U1[(state->v32[3] >> 8) & 0xff]
1790 column3 = U0[state->v32[3] & 0xff] ^ U1[(state->v32[0] >> 8) & 0xff]
1905 of state, using the tables U0, U1, U2, U3 */
1907 column0 = U0[state->v8[0]] ^ U1[state->v8[5]]
1910 column1 = U0[state->v8[4]] ^ U1[state->v8[9]]
1913 column2 = U0[state->v8[8]] ^ U1[state->v8[13]]
1916 column3 = U0[state->v8[12]] ^ U1[state->v8[1]]