Lines Matching +full:1 +full:q
29 br_aes_ct64_bitslice_Sbox(uint64_t *q) in br_aes_ct64_bitslice_Sbox() argument
56 x0 = q[7]; in br_aes_ct64_bitslice_Sbox()
57 x1 = q[6]; in br_aes_ct64_bitslice_Sbox()
58 x2 = q[5]; in br_aes_ct64_bitslice_Sbox()
59 x3 = q[4]; in br_aes_ct64_bitslice_Sbox()
60 x4 = q[3]; in br_aes_ct64_bitslice_Sbox()
61 x5 = q[2]; in br_aes_ct64_bitslice_Sbox()
62 x6 = q[1]; in br_aes_ct64_bitslice_Sbox()
63 x7 = q[0]; in br_aes_ct64_bitslice_Sbox()
194 q[7] = s0; in br_aes_ct64_bitslice_Sbox()
195 q[6] = s1; in br_aes_ct64_bitslice_Sbox()
196 q[5] = s2; in br_aes_ct64_bitslice_Sbox()
197 q[4] = s3; in br_aes_ct64_bitslice_Sbox()
198 q[3] = s4; in br_aes_ct64_bitslice_Sbox()
199 q[2] = s5; in br_aes_ct64_bitslice_Sbox()
200 q[1] = s6; in br_aes_ct64_bitslice_Sbox()
201 q[0] = s7; in br_aes_ct64_bitslice_Sbox()
206 br_aes_ct64_ortho(uint64_t *q) in br_aes_ct64_ortho() argument
216 #define SWAP2(x, y) SWAPN(0x5555555555555555, 0xAAAAAAAAAAAAAAAA, 1, x, y) in br_aes_ct64_ortho()
220 SWAP2(q[0], q[1]); in br_aes_ct64_ortho()
221 SWAP2(q[2], q[3]); in br_aes_ct64_ortho()
222 SWAP2(q[4], q[5]); in br_aes_ct64_ortho()
223 SWAP2(q[6], q[7]); in br_aes_ct64_ortho()
225 SWAP4(q[0], q[2]); in br_aes_ct64_ortho()
226 SWAP4(q[1], q[3]); in br_aes_ct64_ortho()
227 SWAP4(q[4], q[6]); in br_aes_ct64_ortho()
228 SWAP4(q[5], q[7]); in br_aes_ct64_ortho()
230 SWAP8(q[0], q[4]); in br_aes_ct64_ortho()
231 SWAP8(q[1], q[5]); in br_aes_ct64_ortho()
232 SWAP8(q[2], q[6]); in br_aes_ct64_ortho()
233 SWAP8(q[3], q[7]); in br_aes_ct64_ortho()
243 x1 = w[1]; in br_aes_ct64_interleave_in()
285 w[1] = (uint32_t)x1 | (uint32_t)(x1 >> 16); in br_aes_ct64_interleave_out()
297 uint64_t q[8]; in sub_word() local
299 memset(q, 0, sizeof q); in sub_word()
300 q[0] = x; in sub_word()
301 br_aes_ct64_ortho(q); in sub_word()
302 br_aes_ct64_bitslice_Sbox(q); in sub_word()
303 br_aes_ct64_ortho(q); in sub_word()
304 return (uint32_t)q[0]; in sub_word()
331 nkf = (int)((num_rounds + 1) << 2); in br_aes_ct64_keysched()
333 tmp = skey[(key_len >> 2) - 1]; in br_aes_ct64_keysched()
350 uint64_t q[8]; in br_aes_ct64_keysched() local
352 br_aes_ct64_interleave_in(&q[0], &q[4], skey + i); in br_aes_ct64_keysched()
353 q[1] = q[0]; in br_aes_ct64_keysched()
354 q[2] = q[0]; in br_aes_ct64_keysched()
355 q[3] = q[0]; in br_aes_ct64_keysched()
356 q[5] = q[4]; in br_aes_ct64_keysched()
357 q[6] = q[4]; in br_aes_ct64_keysched()
358 q[7] = q[4]; in br_aes_ct64_keysched()
359 br_aes_ct64_ortho(q); in br_aes_ct64_keysched()
361 (q[0] & (uint64_t)0x1111111111111111) in br_aes_ct64_keysched()
362 | (q[1] & (uint64_t)0x2222222222222222) in br_aes_ct64_keysched()
363 | (q[2] & (uint64_t)0x4444444444444444) in br_aes_ct64_keysched()
364 | (q[3] & (uint64_t)0x8888888888888888); in br_aes_ct64_keysched()
365 comp_skey[j + 1] = in br_aes_ct64_keysched()
366 (q[4] & (uint64_t)0x1111111111111111) in br_aes_ct64_keysched()
367 | (q[5] & (uint64_t)0x2222222222222222) in br_aes_ct64_keysched()
368 | (q[6] & (uint64_t)0x4444444444444444) in br_aes_ct64_keysched()
369 | (q[7] & (uint64_t)0x8888888888888888); in br_aes_ct64_keysched()
381 n = (num_rounds + 1) << 1; in br_aes_ct64_skey_expand()
390 x1 >>= 1; in br_aes_ct64_skey_expand()
394 skey[v + 1] = (x1 << 4) - x1; in br_aes_ct64_skey_expand()