Lines Matching +full:4 +full:d

17 #define ctx       4  /* Twofish context structure */
20 #define b_offset 4
64 * d input register containing d (already rol $1)
67 #define encrypt_round(a,b,c,d,round)\ argument
68 push d ## D;\
70 mov s1(%ebp,%edi,4),d ## D;\
72 mov s2(%ebp,%edi,4),%esi;\
74 ror $16, b ## D;\
75 xor s2(%ebp,%edi,4),d ## D;\
77 ror $16, a ## D;\
78 xor s3(%ebp,%edi,4),%esi;\
80 xor s3(%ebp,%edi,4),d ## D;\
82 xor (%ebp,%edi,4), %esi;\
84 ror $15, b ## D;\
85 xor (%ebp,%edi,4), d ## D;\
87 xor s1(%ebp,%edi,4),%esi;\
89 add d ## D, %esi;\
90 add %esi, d ## D;\
92 xor %esi, c ## D;\
93 rol $15, c ## D;\
94 add k+4+round(%ebp),d ## D;\
95 xor %edi, d ## D;
101 * d input register containing d (already rol $1)
105 #define encrypt_last_round(a,b,c,d,round)\ argument
106 push d ## D;\
108 mov s1(%ebp,%edi,4),d ## D;\
110 mov s2(%ebp,%edi,4),%esi;\
112 ror $16, b ## D;\
113 xor s2(%ebp,%edi,4),d ## D;\
115 ror $16, a ## D;\
116 xor s3(%ebp,%edi,4),%esi;\
118 xor s3(%ebp,%edi,4),d ## D;\
120 xor (%ebp,%edi,4), %esi;\
122 ror $16, b ## D;\
123 xor (%ebp,%edi,4), d ## D;\
125 xor s1(%ebp,%edi,4),%esi;\
127 add d ## D, %esi;\
128 add %esi, d ## D;\
130 xor %esi, c ## D;\
131 ror $1, c ## D;\
132 add k+4+round(%ebp),d ## D;\
133 xor %edi, d ## D;
139 * d input register containing d (already rol $1)
142 #define decrypt_round(a,b,c,d,round)\ argument
143 push c ## D;\
145 mov (%ebp,%edi,4), c ## D;\
147 mov s3(%ebp,%edi,4),%esi;\
149 ror $16, a ## D;\
150 xor s1(%ebp,%edi,4),c ## D;\
152 ror $16, b ## D;\
153 xor (%ebp,%edi,4), %esi;\
155 xor s2(%ebp,%edi,4),c ## D;\
157 xor s1(%ebp,%edi,4),%esi;\
159 ror $15, a ## D;\
160 xor s3(%ebp,%edi,4),c ## D;\
162 xor s2(%ebp,%edi,4),%esi;\
164 add %esi, c ## D;\
165 add c ## D, %esi;\
166 add k+round(%ebp), c ## D;\
167 xor %edi, c ## D;\
168 add k+4+round(%ebp),%esi;\
169 xor %esi, d ## D;\
170 rol $15, d ## D;
176 * d input register containing d (already rol $1)
180 #define decrypt_last_round(a,b,c,d,round)\ argument
181 push c ## D;\
183 mov (%ebp,%edi,4), c ## D;\
185 mov s3(%ebp,%edi,4),%esi;\
187 ror $16, a ## D;\
188 xor s1(%ebp,%edi,4),c ## D;\
190 ror $16, b ## D;\
191 xor (%ebp,%edi,4), %esi;\
193 xor s2(%ebp,%edi,4),c ## D;\
195 xor s1(%ebp,%edi,4),%esi;\
197 ror $16, a ## D;\
198 xor s3(%ebp,%edi,4),c ## D;\
200 xor s2(%ebp,%edi,4),%esi;\
202 add %esi, c ## D;\
203 add c ## D, %esi;\
204 add k+round(%ebp), c ## D;\
205 xor %edi, c ## D;\
206 add k+4+round(%ebp),%esi;\
207 xor %esi, d ## D;\
208 ror $1, d ## D;
235 encrypt_round(R0,R1,R2,R3,4*8);
299 decrypt_round(R2,R3,R0,R1,4*8);