Searched refs:CALC_K256 (Results 1 - 3 of 3) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | twofish.c | 536 * key byte to use. CALC_K256 is identical to CALC_K but for using the 558 #define CALC_K256(a, j, k, l, m, n) \ 655 CALC_K256 (w, 0, 0xA9, 0x75, 0x67, 0xF3); 656 CALC_K256 (w, 2, 0xB3, 0xC6, 0xE8, 0xF4); 657 CALC_K256 (w, 4, 0x04, 0xDB, 0xFD, 0x7B); 658 CALC_K256 (w, 6, 0xA3, 0xFB, 0x76, 0xC8); 659 CALC_K256 (k, 0, 0x9A, 0x4A, 0x92, 0xD3); 660 CALC_K256 (k, 2, 0x80, 0xE6, 0x78, 0x6B); 661 CALC_K256 (k, 4, 0xE4, 0x45, 0xDD, 0x7D); 662 CALC_K256 ( 554 #define CALC_K256 macro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | twofish.c | 536 * key byte to use. CALC_K256 is identical to CALC_K but for using the 558 #define CALC_K256(a, j, k, l, m, n) \ 655 CALC_K256 (w, 0, 0xA9, 0x75, 0x67, 0xF3); 656 CALC_K256 (w, 2, 0xB3, 0xC6, 0xE8, 0xF4); 657 CALC_K256 (w, 4, 0x04, 0xDB, 0xFD, 0x7B); 658 CALC_K256 (w, 6, 0xA3, 0xFB, 0x76, 0xC8); 659 CALC_K256 (k, 0, 0x9A, 0x4A, 0x92, 0xD3); 660 CALC_K256 (k, 2, 0x80, 0xE6, 0x78, 0x6B); 661 CALC_K256 (k, 4, 0xE4, 0x45, 0xDD, 0x7D); 662 CALC_K256 ( 554 #define CALC_K256 macro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | twofish_common.c | 540 * key byte to use. CALC_K256 is identical to CALC_K but for using the 575 #define CALC_K256(a, j, k, l, m, n) \ macro 658 /* CALC_K256/CALC_K192/CALC_K loops were unrolled. 663 * CALC_K256: ~100 insns each 669 CALC_K256 (w, i, q0[i], q1[i], q0[i+1], q1[i+1]); 672 CALC_K256 (k, i, q0[i+8], q1[i+8], q0[i+9], q1[i+9]);
|
Completed in 48 milliseconds