Searched refs:G (Results 1 – 3 of 3) sorted by relevance
| /crypto/ |
| A D | blake2b_generic.c | 46 #define G(r,i,a,b,c,d) \ macro 60 G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \ 61 G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \ 62 G(r,2,v[ 2],v[ 6],v[10],v[14]); \ 63 G(r,3,v[ 3],v[ 7],v[11],v[15]); \ 64 G(r,4,v[ 0],v[ 5],v[10],v[15]); \ 65 G(r,5,v[ 1],v[ 6],v[11],v[12]); \ 66 G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \ 67 G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \ 111 #undef G
|
| A D | md4.c | 53 static inline u32 G(u32 x, u32 y, u32 z) in G() function 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s))
|
| A D | Kconfig | 1088 by G. Castagnoli, S. Braeuer and M. Herrman in "Optimization of Cyclic
|
Completed in 6 milliseconds