Home | History | Annotate | Download | only in cipher

Lines Matching refs:T3

51  * we use the tables T0, T1, T2, T3, and T4 to compute AES, and 
265 static uint32_t T3[256] = {
803 static uint32_t T3[256] = {
1509 of state, using the tables T0, T1, T2, T3 */
1512 ^ T2[state->v8[10]] ^ T3[state->v8[15]];
1515 ^ T2[state->v8[14]] ^ T3[state->v8[3]];
1518 ^ T2[state->v8[2]] ^ T3[state->v8[7]];
1521 ^ T2[state->v8[6]] ^ T3[state->v8[11]];
1637 of state, using the tables T0, T1, T2, T3 */
1640 ^ T2[(state->v32[2] >> 8) & 0xff] ^ T3[state->v32[3] & 0xff];
1643 ^ T2[(state->v32[3] >> 8) & 0xff] ^ T3[state->v32[0] & 0xff];
1646 ^ T2[(state->v32[0] >> 8) & 0xff] ^ T3[state->v32[1] & 0xff];
1649 ^ T2[(state->v32[1] >> 8) & 0xff] ^ T3[state->v32[2] & 0xff];
1652 ^ T2[(state->v32[2] >> 16) & 0xff] ^ T3[state->v32[3] >> 24];
1655 ^ T2[(state->v32[3] >> 16) & 0xff] ^ T3[state->v32[0] >> 24];
1658 ^ T2[(state->v32[0] >> 16) & 0xff] ^ T3[state->v32[1] >> 24];
1661 ^ T2[(state->v32[1] >> 16) & 0xff] ^ T3[state->v32[2] >> 24];
1789 of state, using the tables T0, T1, T2, T3 */
1792 ^ T2[state->v8[10]] ^ T3[state->v8[15]];
1795 ^ T2[state->v8[14]] ^ T3[state->v8[3]];
1798 ^ T2[state->v8[2]] ^ T3[state->v8[7]];
1801 ^ T2[state->v8[6]] ^ T3[state->v8[11]];