Lines Matching refs:F_ENCRYPT
221 * This is a 16 round Feistel network with permutation F_ENCRYPT
223 #define F_ENCRYPT(R, L, sched) \
242 F_ENCRYPT(X.r, X.l, ctx->sched[0x0]);
243 F_ENCRYPT(X.l, X.r, ctx->sched[0x1]);
244 F_ENCRYPT(X.r, X.l, ctx->sched[0x2]);
245 F_ENCRYPT(X.l, X.r, ctx->sched[0x3]);
246 F_ENCRYPT(X.r, X.l, ctx->sched[0x4]);
247 F_ENCRYPT(X.l, X.r, ctx->sched[0x5]);
248 F_ENCRYPT(X.r, X.l, ctx->sched[0x6]);
249 F_ENCRYPT(X.l, X.r, ctx->sched[0x7]);
250 F_ENCRYPT(X.r, X.l, ctx->sched[0x8]);
251 F_ENCRYPT(X.l, X.r, ctx->sched[0x9]);
252 F_ENCRYPT(X.r, X.l, ctx->sched[0xa]);
253 F_ENCRYPT(X.l, X.r, ctx->sched[0xb]);
254 F_ENCRYPT(X.r, X.l, ctx->sched[0xc]);
255 F_ENCRYPT(X.l, X.r, ctx->sched[0xd]);
256 F_ENCRYPT(X.r, X.l, ctx->sched[0xe]);
257 F_ENCRYPT(X.l, X.r, ctx->sched[0xf]);
274 F_ENCRYPT(X.l, X.r, ctx->sched[0xf]);
275 F_ENCRYPT(X.r, X.l, ctx->sched[0xe]);
276 F_ENCRYPT(X.l, X.r, ctx->sched[0xd]);
277 F_ENCRYPT(X.r, X.l, ctx->sched[0xc]);
278 F_ENCRYPT(X.l, X.r, ctx->sched[0xb]);
279 F_ENCRYPT(X.r, X.l, ctx->sched[0xa]);
280 F_ENCRYPT(X.l, X.r, ctx->sched[0x9]);
281 F_ENCRYPT(X.r, X.l, ctx->sched[0x8]);
282 F_ENCRYPT(X.l, X.r, ctx->sched[0x7]);
283 F_ENCRYPT(X.r, X.l, ctx->sched[0x6]);
284 F_ENCRYPT(X.l, X.r, ctx->sched[0x5]);
285 F_ENCRYPT(X.r, X.l, ctx->sched[0x4]);
286 F_ENCRYPT(X.l, X.r, ctx->sched[0x3]);
287 F_ENCRYPT(X.r, X.l, ctx->sched[0x2]);
288 F_ENCRYPT(X.l, X.r, ctx->sched[0x1]);
289 F_ENCRYPT(X.r, X.l, ctx->sched[0x0]);