Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for sbox1 (0.04 sec)

  1. src/crypto/aes/block.go

    	s0 = uint32(sbox1[t0>>24])<<24 | uint32(sbox1[t3>>16&0xff])<<16 | uint32(sbox1[t2>>8&0xff])<<8 | uint32(sbox1[t1&0xff])
    	s1 = uint32(sbox1[t1>>24])<<24 | uint32(sbox1[t0>>16&0xff])<<16 | uint32(sbox1[t3>>8&0xff])<<8 | uint32(sbox1[t2&0xff])
    	s2 = uint32(sbox1[t2>>24])<<24 | uint32(sbox1[t1>>16&0xff])<<16 | uint32(sbox1[t0>>8&0xff])<<8 | uint32(sbox1[t3&0xff])
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  2. src/crypto/aes/aes_test.go

    	for i := 0; i < 256; i++ {
    		if j := sbox0[sbox1[i]]; j != byte(i) {
    			t.Errorf("sbox0[sbox1[%#x]] = %#x", i, j)
    		}
    		if j := sbox1[sbox0[i]]; j != byte(i) {
    			t.Errorf("sbox1[sbox0[%#x]] = %#x", i, j)
    		}
    	}
    }
    
    // Test that encryption tables are correct.
    // (Can adapt this code to generate them too.)
    func TestTe(t *testing.T) {
    	for i := 0; i < 256; i++ {
    		s := uint32(sbox0[i])
    		s2 := mul(s, 2)
    		s3 := mul(s, 3)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 25 14:58:19 UTC 2024
    - 12.5K bytes
    - Viewed (0)
  3. src/crypto/aes/const.go

    	0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16,
    }
    
    // FIPS-197 Figure 14.  Inverse S-box substitution values in hexadecimal format.
    var sbox1 = [256]byte{
    	0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb,
    	0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 01 21:52:00 UTC 2018
    - 29.3K bytes
    - Viewed (0)
  4. test/escape_param.go

    	leakParam(box.pair)
    }
    
    func selfAssignmentAndUnrelated(box1, box2 *BoxedPair) { // ERROR "leaking param content: box2" "box1 does not escape"
    	box1.pair.p1 = box1.pair.p2 // ERROR "ignoring self-assignment in box1.pair.p1 = box1.pair.p2"
    	leakParam(box2.pair.p2)
    }
    
    func notSelfAssignment1(box1, box2 *BoxedPair) { // ERROR "leaking param content: box2" "box1 does not escape"
    	box1.pair.p1 = box2.pair.p1
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 26 23:50:32 UTC 2021
    - 8.9K bytes
    - Viewed (0)
  5. test/codegen/bitfield.go

    }
    
    func sbfiz8(x int32) int64 {
    	return int64(x+1) << 40 // arm64:"SBFIZ\t[$]40, R[0-9]+, [$]24",-"LSL"
    }
    
    // sbfx
    // merge shifts into sbfx: (x << lc) >> rc && lc <= rc.
    func sbfx1(x int64) int64 {
    	return (x << 3) >> 4 // arm64:"SBFX\t[$]1, R[0-9]+, [$]60",-"LSL",-"ASR"
    }
    
    func sbfx2(x int64) int64 {
    	return (x << 60) >> 60 // arm64:"SBFX\t[$]0, R[0-9]+, [$]4",-"LSL",-"ASR"
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 23 06:11:32 UTC 2022
    - 9.6K bytes
    - Viewed (0)
  6. src/crypto/aes/asm_arm64.s

    	STPW.P	(R4, R5), 8(R10)
    	STPW.P	(R6, R7), 8(R10)
    	MOVW	$0x1b, R14
    ks128Loop:
    		VMOV	R7, V2.S[0]
    		WORD	$0x4E030042       // TBL V3.B16, [V2.B16], V2.B16
    		AESE	V0.B16, V2.B16    // Use AES to compute the SBOX
    		EORW	R13, R4
    		LSLW	$1, R13           // Compute next Rcon
    		ANDSW	$0x100, R13, ZR
    		CSELW	NE, R14, R13, R13 // Fake modulo
    		SUBS	$1, R8
    		VMOV	V2.S[0], R0
    		EORW	R0, R4
    		EORW	R4, R5
    		EORW	R5, R6
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 6.9K bytes
    - Viewed (0)
Back to top