Searched refs:CALC_K (Results 1 - 3 of 3) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Dtwofish.c528 * CALC_K computes a pair of subkeys for 128-bit Twofish, by calling CALC_K_2
536 * key byte to use. CALC_K256 is identical to CALC_K but for using the
545 #define CALC_K(a, j, k, l, m, n) \
576 /* Temporaries for CALC_K. */
686 CALC_K (w, 0, 0xA9, 0x75, 0x67, 0xF3);
687 CALC_K (w, 2, 0xB3, 0xC6, 0xE8, 0xF4);
688 CALC_K (w, 4, 0x04, 0xDB, 0xFD, 0x7B);
689 CALC_K (w, 6, 0xA3, 0xFB, 0x76, 0xC8);
690 CALC_K (k, 0, 0x9A, 0x4A, 0x92, 0xD3);
691 CALC_K (
541 #define CALC_K macro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dtwofish.c528 * CALC_K computes a pair of subkeys for 128-bit Twofish, by calling CALC_K_2
536 * key byte to use. CALC_K256 is identical to CALC_K but for using the
545 #define CALC_K(a, j, k, l, m, n) \
576 /* Temporaries for CALC_K. */
686 CALC_K (w, 0, 0xA9, 0x75, 0x67, 0xF3);
687 CALC_K (w, 2, 0xB3, 0xC6, 0xE8, 0xF4);
688 CALC_K (w, 4, 0x04, 0xDB, 0xFD, 0x7B);
689 CALC_K (w, 6, 0xA3, 0xFB, 0x76, 0xC8);
690 CALC_K (k, 0, 0x9A, 0x4A, 0x92, 0xD3);
691 CALC_K (
541 #define CALC_K macro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dtwofish_common.c525 * CALC_K computes a pair of subkeys for 128-bit Twofish, by calling CALC_K_2
535 * CALC_K192 is identical to CALC_K but for using the CALC_K192_2 macro
540 * key byte to use. CALC_K256 is identical to CALC_K but for using the
549 #define CALC_K(a, j, k, l, m, n) \ macro
591 /* Temporaries for CALC_K. */
658 /* CALC_K256/CALC_K192/CALC_K loops were unrolled.
665 * CALC_K: ~70 insns
695 CALC_K (w, i, q0[i], q1[i], q0[i+1], q1[i+1]);
698 CALC_K (k, i, q0[i+8], q1[i+8], q0[i+9], q1[i+9]);

Completed in 171 milliseconds