Lines Matching refs:expand
157 #define expand(W,i) ( W[ i & 15 ] = ROTL( 1, ( W[ i & 15 ] ^ W[ (i - 14) & 15 ] ^ \ macro
238 subRound( E, A, B, C, D, f1, K1, expand( eData, 16 ) ); in SHATransform()
239 subRound( D, E, A, B, C, f1, K1, expand( eData, 17 ) ); in SHATransform()
240 subRound( C, D, E, A, B, f1, K1, expand( eData, 18 ) ); in SHATransform()
241 subRound( B, C, D, E, A, f1, K1, expand( eData, 19 ) ); in SHATransform()
243 subRound( A, B, C, D, E, f2, K2, expand( eData, 20 ) ); in SHATransform()
244 subRound( E, A, B, C, D, f2, K2, expand( eData, 21 ) ); in SHATransform()
245 subRound( D, E, A, B, C, f2, K2, expand( eData, 22 ) ); in SHATransform()
246 subRound( C, D, E, A, B, f2, K2, expand( eData, 23 ) ); in SHATransform()
247 subRound( B, C, D, E, A, f2, K2, expand( eData, 24 ) ); in SHATransform()
248 subRound( A, B, C, D, E, f2, K2, expand( eData, 25 ) ); in SHATransform()
249 subRound( E, A, B, C, D, f2, K2, expand( eData, 26 ) ); in SHATransform()
250 subRound( D, E, A, B, C, f2, K2, expand( eData, 27 ) ); in SHATransform()
251 subRound( C, D, E, A, B, f2, K2, expand( eData, 28 ) ); in SHATransform()
252 subRound( B, C, D, E, A, f2, K2, expand( eData, 29 ) ); in SHATransform()
253 subRound( A, B, C, D, E, f2, K2, expand( eData, 30 ) ); in SHATransform()
254 subRound( E, A, B, C, D, f2, K2, expand( eData, 31 ) ); in SHATransform()
255 subRound( D, E, A, B, C, f2, K2, expand( eData, 32 ) ); in SHATransform()
256 subRound( C, D, E, A, B, f2, K2, expand( eData, 33 ) ); in SHATransform()
257 subRound( B, C, D, E, A, f2, K2, expand( eData, 34 ) ); in SHATransform()
258 subRound( A, B, C, D, E, f2, K2, expand( eData, 35 ) ); in SHATransform()
259 subRound( E, A, B, C, D, f2, K2, expand( eData, 36 ) ); in SHATransform()
260 subRound( D, E, A, B, C, f2, K2, expand( eData, 37 ) ); in SHATransform()
261 subRound( C, D, E, A, B, f2, K2, expand( eData, 38 ) ); in SHATransform()
262 subRound( B, C, D, E, A, f2, K2, expand( eData, 39 ) ); in SHATransform()
264 subRound( A, B, C, D, E, f3, K3, expand( eData, 40 ) ); in SHATransform()
265 subRound( E, A, B, C, D, f3, K3, expand( eData, 41 ) ); in SHATransform()
266 subRound( D, E, A, B, C, f3, K3, expand( eData, 42 ) ); in SHATransform()
267 subRound( C, D, E, A, B, f3, K3, expand( eData, 43 ) ); in SHATransform()
268 subRound( B, C, D, E, A, f3, K3, expand( eData, 44 ) ); in SHATransform()
269 subRound( A, B, C, D, E, f3, K3, expand( eData, 45 ) ); in SHATransform()
270 subRound( E, A, B, C, D, f3, K3, expand( eData, 46 ) ); in SHATransform()
271 subRound( D, E, A, B, C, f3, K3, expand( eData, 47 ) ); in SHATransform()
272 subRound( C, D, E, A, B, f3, K3, expand( eData, 48 ) ); in SHATransform()
273 subRound( B, C, D, E, A, f3, K3, expand( eData, 49 ) ); in SHATransform()
274 subRound( A, B, C, D, E, f3, K3, expand( eData, 50 ) ); in SHATransform()
275 subRound( E, A, B, C, D, f3, K3, expand( eData, 51 ) ); in SHATransform()
276 subRound( D, E, A, B, C, f3, K3, expand( eData, 52 ) ); in SHATransform()
277 subRound( C, D, E, A, B, f3, K3, expand( eData, 53 ) ); in SHATransform()
278 subRound( B, C, D, E, A, f3, K3, expand( eData, 54 ) ); in SHATransform()
279 subRound( A, B, C, D, E, f3, K3, expand( eData, 55 ) ); in SHATransform()
280 subRound( E, A, B, C, D, f3, K3, expand( eData, 56 ) ); in SHATransform()
281 subRound( D, E, A, B, C, f3, K3, expand( eData, 57 ) ); in SHATransform()
282 subRound( C, D, E, A, B, f3, K3, expand( eData, 58 ) ); in SHATransform()
283 subRound( B, C, D, E, A, f3, K3, expand( eData, 59 ) ); in SHATransform()
285 subRound( A, B, C, D, E, f4, K4, expand( eData, 60 ) ); in SHATransform()
286 subRound( E, A, B, C, D, f4, K4, expand( eData, 61 ) ); in SHATransform()
287 subRound( D, E, A, B, C, f4, K4, expand( eData, 62 ) ); in SHATransform()
288 subRound( C, D, E, A, B, f4, K4, expand( eData, 63 ) ); in SHATransform()
289 subRound( B, C, D, E, A, f4, K4, expand( eData, 64 ) ); in SHATransform()
290 subRound( A, B, C, D, E, f4, K4, expand( eData, 65 ) ); in SHATransform()
291 subRound( E, A, B, C, D, f4, K4, expand( eData, 66 ) ); in SHATransform()
292 subRound( D, E, A, B, C, f4, K4, expand( eData, 67 ) ); in SHATransform()
293 subRound( C, D, E, A, B, f4, K4, expand( eData, 68 ) ); in SHATransform()
294 subRound( B, C, D, E, A, f4, K4, expand( eData, 69 ) ); in SHATransform()
295 subRound( A, B, C, D, E, f4, K4, expand( eData, 70 ) ); in SHATransform()
296 subRound( E, A, B, C, D, f4, K4, expand( eData, 71 ) ); in SHATransform()
297 subRound( D, E, A, B, C, f4, K4, expand( eData, 72 ) ); in SHATransform()
298 subRound( C, D, E, A, B, f4, K4, expand( eData, 73 ) ); in SHATransform()
299 subRound( B, C, D, E, A, f4, K4, expand( eData, 74 ) ); in SHATransform()
300 subRound( A, B, C, D, E, f4, K4, expand( eData, 75 ) ); in SHATransform()
301 subRound( E, A, B, C, D, f4, K4, expand( eData, 76 ) ); in SHATransform()
302 subRound( D, E, A, B, C, f4, K4, expand( eData, 77 ) ); in SHATransform()
303 subRound( C, D, E, A, B, f4, K4, expand( eData, 78 ) ); in SHATransform()
304 subRound( B, C, D, E, A, f4, K4, expand( eData, 79 ) ); in SHATransform()