Searched refs:CALC_K256 (Results 1 - 3 of 3) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Dtwofish.c536 * key byte to use. CALC_K256 is identical to CALC_K but for using the
558 #define CALC_K256(a, j, k, l, m, n) \
655 CALC_K256 (w, 0, 0xA9, 0x75, 0x67, 0xF3);
656 CALC_K256 (w, 2, 0xB3, 0xC6, 0xE8, 0xF4);
657 CALC_K256 (w, 4, 0x04, 0xDB, 0xFD, 0x7B);
658 CALC_K256 (w, 6, 0xA3, 0xFB, 0x76, 0xC8);
659 CALC_K256 (k, 0, 0x9A, 0x4A, 0x92, 0xD3);
660 CALC_K256 (k, 2, 0x80, 0xE6, 0x78, 0x6B);
661 CALC_K256 (k, 4, 0xE4, 0x45, 0xDD, 0x7D);
662 CALC_K256 (
554 #define CALC_K256 macro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dtwofish.c536 * key byte to use. CALC_K256 is identical to CALC_K but for using the
558 #define CALC_K256(a, j, k, l, m, n) \
655 CALC_K256 (w, 0, 0xA9, 0x75, 0x67, 0xF3);
656 CALC_K256 (w, 2, 0xB3, 0xC6, 0xE8, 0xF4);
657 CALC_K256 (w, 4, 0x04, 0xDB, 0xFD, 0x7B);
658 CALC_K256 (w, 6, 0xA3, 0xFB, 0x76, 0xC8);
659 CALC_K256 (k, 0, 0x9A, 0x4A, 0x92, 0xD3);
660 CALC_K256 (k, 2, 0x80, 0xE6, 0x78, 0x6B);
661 CALC_K256 (k, 4, 0xE4, 0x45, 0xDD, 0x7D);
662 CALC_K256 (
554 #define CALC_K256 macro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dtwofish_common.c540 * key byte to use. CALC_K256 is identical to CALC_K but for using the
575 #define CALC_K256(a, j, k, l, m, n) \ macro
658 /* CALC_K256/CALC_K192/CALC_K loops were unrolled.
663 * CALC_K256: ~100 insns each
669 CALC_K256 (w, i, q0[i], q1[i], q0[i+1], q1[i+1]);
672 CALC_K256 (k, i, q0[i+8], q1[i+8], q0[i+9], q1[i+9]);

Completed in 101 milliseconds