Home
last modified time | relevance | path

Searched refs:Chi (Results 1 – 6 of 6) sorted by relevance

/openssl/crypto/sha/asm/
H A Dsha512-c64xplus.pl37 ($Ahi,$Actxhi,$Bhi,$Bctxhi,$Chi,$Cctxhi,$Dhi,$Dctxhi,
115 LDW *${CTXA}[4^.LITTLE_ENDIAN],$Chi
138 || MV $Chi,$Cctxhi
199 || AND $Chi,$MAJhi,$MAJhi
209 || ROTL $Chi,0,$Dhi
217 || ROTL $Bhi,0,$Chi
332 ADD $Chi,$Cctxhi,$Chi
343 || ADD $Cctxlo,$Chi,$Chi
350 ||[!A0] STW $Chi,*${CTXA}[4^.LITTLE_ENDIAN]
H A Dkeccak1600-mmx.pl186 sub Chi() { ######### regular Chi step subroutine
215 &Chi (0, 3);
255 &Rho (3); &Chi (1, 1);
256 &Rho (1); &Chi (2, 4);
257 &Rho (4); &Chi (3, 2);
H A Dsha512-parisc.pl373 @V=( $Ahi, $Alo, $Bhi, $Blo, $Chi, $Clo, $Dhi, $Dlo,
513 ldw `4*4`($ctx),$Chi
636 addc $a1,$Chi,$Chi
653 stw $Chi,`4*4`($ctx)
H A Dsha512-586.pl74 $Clo=&DWP(24,"esp"); $Chi=&DWP(24+4,"esp");
277 &and ("edx",$Chi);
/openssl/crypto/sha/
H A Dkeccak1600.c214 static void Chi(uint64_t A[5][5]) in Chi() function
248 Chi(A); in KeccakF1600()
/openssl/
H A DCHANGES.md10075 Thanks to Andrew Chi, BBN Technologies, for discovering the flaw

Completed in 58 milliseconds