Lines Matching refs:round

94  * lo: | input key (round 0)  |  / each round is four 32-bit words
95 * | encryption round 1 |
96 * | encryption round 2 |
98 * | encryption round N-1 |
99 * hi: | encryption round N |
105 * lo: | decryption round 0 | = | encryption round N |
106 * | decryption round 1 | = INV_MIX_COL[ | encryption round N-1 | ]
107 * | decryption round 2 | = INV_MIX_COL[ | encryption round N-2 | ]
109 * | decryption round N-1 | = INV_MIX_COL[ | encryption round 1 | ]
110 * hi: | decryption round N | = | input key (round 0) |
117 * lo: | decryption round 0 | = | input key (round 0) |
118 * | decryption round 1 | = INV_MIX_COL[ | encryption round 1 | ]
119 * | decryption round 2 | = INV_MIX_COL[ | encryption round 2 | ]
121 * | decryption round N-1 | = INV_MIX_COL[ | encryption round N-1 | ]
122 * hi: | decryption round N | = | encryption round N |
331 #define ff_rnd(p1, p2, p3, p4, round) /* normal forward round */ \
332 mov fk_ref(round,0), p1; \
333 mov fk_ref(round,1), p2; \
334 mov fk_ref(round,2), p3; \
335 mov fk_ref(round,3), p4; \
384 #define fl_rnd(p1, p2, p3, p4, round) /* last forward round */ \
386 mov fk_ref(round,0), p1; \
387 mov fk_ref(round,1), p2; \
388 mov fk_ref(round,2), p3; \
389 mov fk_ref(round,3), p4; \
433 #define fl_rnd(p1, p2, p3, p4, round) /* last forward round */ \
434 mov fk_ref(round,0), p1; \
435 mov fk_ref(round,1), p2; \
436 mov fk_ref(round,2), p3; \
437 mov fk_ref(round,3), p4; \
509 #define ii_rnd(p1, p2, p3, p4, round) /* normal inverse round */ \
510 mov ik_ref(round,0), p1; \
511 mov ik_ref(round,1), p2; \
512 mov ik_ref(round,2), p3; \
513 mov ik_ref(round,3), p4; \
562 #define il_rnd(p1, p2, p3, p4, round) /* last inverse round */ \
564 mov ik_ref(round,0), p1; \
565 mov ik_ref(round,1), p2; \
566 mov ik_ref(round,2), p3; \
567 mov ik_ref(round,3), p4; \
611 #define il_rnd(p1, p2, p3, p4, round) /* last inverse round */ \
612 mov ik_ref(round,0), p1; \
613 mov ik_ref(round,1), p2; \
614 mov ik_ref(round,2), p3; \
615 mov ik_ref(round,3), p4; \