Lines Matching refs:and

7  * The free distribution and use of this software is allowed (with or without
11 * list of conditions and the following disclaimer;
14 * of conditions and the following disclaimer in their documentation;
23 * and/or fitness for purpose.
27 * This file contains the compilation options for AES (Rijndael) and code
28 * that is common across encryption, key scheduling and table generation.
33 * Joan Daemen and Vincent Rijmen. This version is designed for the standard
34 * block size of 16 bytes and for key sizes of 128, 192 and 256 bits (16, 24
35 * and 32 bytes).
37 * This version is designed for flexibility and speed using operations on
50 * 1. Added __cplusplus and _AESTAB_H header guards
51 * 2. Added header files sys/types.h and aes_impl.h
52 * 3. Added defines for AES_ENCRYPT, AES_DECRYPT, AES_REV_DKS, and ASM_AMD64_C
55 * 5. Undefined VIA_ACE_POSSIBLE and ASSUME_VIA_ACE_PRESENT
56 * 6. Changed uint_8t and uint_32t to uint8_t and uint32_t
58 * 8. Cstyled and hdrchk code
111 * input, output and key input are all enumerated arrays of bytes in which
112 * bytes are numbered starting at zero and increasing to one less than the
114 * for naming bytes and does not imply any adjacency or order relationship
115 * from one byte to another. When these inputs and outputs are considered
127 * in words have the highest numeric significance and little-endian if the
160 * inline assembler instructions and is only implemented for the Microsoft,
161 * Intel and GCC compilers. If VIA ACE is known to be present, then defining
164 * it is detected (both present and enabled) but the normal AES code will
191 * assembler code routines for encryption, decryption and key scheduling
195 * encryption and decryption and but with key scheduling in C
197 * encryption, decryption and key scheduling
199 * encryption and decryption and but with key scheduling in C
201 * encryption and decryption and but with key scheduling in C
220 #error Assembler code is only available for x86 and AMD64 systems
227 * bytes in the input and output arrays to and from the internal 32-bit
235 * (especially so if care is taken to align the input and output byte
247 * The code for encryption and decryption cycles through a number of rounds
254 * to be set independently for encryption and decryption
357 * how much speed is required. Encryption and decryption round functions
358 * are different and the last encryption and decryption round functions are
362 * 1. Normal encryption and decryption rounds can each use either 0, 1
363 * or 4 tables and table spaces of 0, 1024 or 4096 bytes each.
364 * 2. The last encryption and decryption rounds can also use either 0, 1
365 * or 4 tables and table spaces of 0, 1024 or 4096 bytes each.
418 /* VIA ACE support is only available for VC++ and GCC */
449 * processor registers. The following define maps a variable name x and
465 * and for setting the three key lengths (separately) for encryption
466 * and decryption. Since not all functions are needed, masks are set
544 * unsigned variables and with shift counts that are compile
585 /* the finite field modular polynomial and elements */
719 * Perform forward and inverse column mix operation on four bytes in long word