Home | History | Annotate | Download | only in cipher

Lines Matching defs:U2

52  * the tables U0, U1, U2, and U4 to compute its inverse
466 static uint32_t U2[256] = {
1004 static uint32_t U2[256] = {
1433 * mixColumn is implemented by using the tables U0, U1, U2, U3,
1445 U2[T4[(tmp >> 8) & 0xff] & 0xff] ^
1452 U2[T4[(tmp >> 8) & 0xff] & 0xff] ^
1459 U2[T4[(tmp >> 8) & 0xff] & 0xff] ^
1466 U2[T4[(tmp >> 8) & 0xff] & 0xff] ^
1474 ^ U2[aes_sbox[expanded_key[i].v8[2]]]
1479 ^ U2[aes_sbox[expanded_key[i].v8[6]]]
1484 ^ U2[aes_sbox[expanded_key[i].v8[10]]]
1489 ^ U2[aes_sbox[expanded_key[i].v8[14]]]
1536 of state, using the tables U0, U1, U2, U3 */
1539 ^ U2[state->v8[10]] ^ U3[state->v8[7]];
1542 ^ U2[state->v8[14]] ^ U3[state->v8[11]];
1545 ^ U2[state->v8[2]] ^ U3[state->v8[15]];
1548 ^ U2[state->v8[6]] ^ U3[state->v8[3]];
1676 of state, using the tables U0, U1, U2, U3 */
1681 ^ U2[(state->v32[2] >> 8) & 0xff] ^ U3[state->v32[1] & 0xff];
1684 ^ U2[(state->v32[3] >> 8) & 0xff] ^ U3[state->v32[2] & 0xff];
1687 ^ U2[(state->v32[0] >> 8) & 0xff] ^ U3[state->v32[3] & 0xff];
1690 ^ U2[(state->v32[1] >> 8) & 0xff] ^ U3[state->v32[0] & 0xff];
1693 ^ U2[(state->v32[2] >> 16) & 0xff] ^ U3[state->v32[3] >> 24];
1696 ^ U2[(state->v32[3] >> 16) & 0xff] ^ U3[state->v32[0] >> 24];
1699 ^ U2[(state->v32[0] >> 16) & 0xff] ^ U3[state->v32[1] >> 24];
1702 ^ U2[(state->v32[1] >> 16) & 0xff] ^ U3[state->v32[2] >> 24];
1816 of state, using the tables U0, U1, U2, U3 */
1819 ^ U2[state->v8[10]] ^ U3[state->v8[15]];
1822 ^ U2[state->v8[14]] ^ U3[state->v8[3]];
1825 ^ U2[state->v8[2]] ^ U3[state->v8[7]];
1828 ^ U2[state->v8[6]] ^ U3[state->v8[11]];