Searched refs:CALC_K (Results 1 - 3 of 3) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | twofish.c | 528 * CALC_K computes a pair of subkeys for 128-bit Twofish, by calling CALC_K_2 536 * key byte to use. CALC_K256 is identical to CALC_K but for using the 545 #define CALC_K(a, j, k, l, m, n) \ 576 /* Temporaries for CALC_K. */ 686 CALC_K (w, 0, 0xA9, 0x75, 0x67, 0xF3); 687 CALC_K (w, 2, 0xB3, 0xC6, 0xE8, 0xF4); 688 CALC_K (w, 4, 0x04, 0xDB, 0xFD, 0x7B); 689 CALC_K (w, 6, 0xA3, 0xFB, 0x76, 0xC8); 690 CALC_K (k, 0, 0x9A, 0x4A, 0x92, 0xD3); 691 CALC_K ( 541 #define CALC_K macro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | twofish.c | 528 * CALC_K computes a pair of subkeys for 128-bit Twofish, by calling CALC_K_2 536 * key byte to use. CALC_K256 is identical to CALC_K but for using the 545 #define CALC_K(a, j, k, l, m, n) \ 576 /* Temporaries for CALC_K. */ 686 CALC_K (w, 0, 0xA9, 0x75, 0x67, 0xF3); 687 CALC_K (w, 2, 0xB3, 0xC6, 0xE8, 0xF4); 688 CALC_K (w, 4, 0x04, 0xDB, 0xFD, 0x7B); 689 CALC_K (w, 6, 0xA3, 0xFB, 0x76, 0xC8); 690 CALC_K (k, 0, 0x9A, 0x4A, 0x92, 0xD3); 691 CALC_K ( 541 #define CALC_K macro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | twofish_common.c | 525 * CALC_K computes a pair of subkeys for 128-bit Twofish, by calling CALC_K_2 535 * CALC_K192 is identical to CALC_K but for using the CALC_K192_2 macro 540 * key byte to use. CALC_K256 is identical to CALC_K but for using the 549 #define CALC_K(a, j, k, l, m, n) \ macro 591 /* Temporaries for CALC_K. */ 658 /* CALC_K256/CALC_K192/CALC_K loops were unrolled. 665 * CALC_K: ~70 insns 695 CALC_K (w, i, q0[i], q1[i], q0[i+1], q1[i+1]); 698 CALC_K (k, i, q0[i+8], q1[i+8], q0[i+9], q1[i+9]);
|
Completed in 146 milliseconds