corrected behaviour of key generations when using more than 32 rounds
commiteb2ac5da15b669d45180ce5eddd6eae503d6f603
authortiftof <tiftof@49921240-e1b6-4d8d-af3b-5ae6c3d9e7c1>
Thu, 9 Oct 2008 15:14:23 +0000 (9 15:14 +0000)
committertiftof <tiftof@49921240-e1b6-4d8d-af3b-5ae6c3d9e7c1>
Thu, 9 Oct 2008 15:14:23 +0000 (9 15:14 +0000)
treeb390685b0666ad43eb7883ea37227fc7e0b52c71
parent17733c31a87d1722bd01d7f950ced857a98ea5a8
corrected behaviour of key generations when using more than 32 rounds

XOR in salt step should also only be done on max 5 bits of the key when
using 80 bit keys

git-svn-id: svn+ssh://devel.yobi.be/home/svn/CryptoPlus/trunk@72 49921240-e1b6-4d8d-af3b-5ae6c3d9e7c1
src/CryptoPlus/Cipher/pypresent.py