Lines Matching refs:cast5
447 …skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, … in _cast5_setup()
448 …skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, … in _cast5_setup()
449 …skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, … in _cast5_setup()
450 …skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, … in _cast5_setup()
456 …skey->cast5.K[i++] = S5[GB(x, 0x3)] ^ S6[GB(x, 0x2)] ^ S7[GB(x, 0xc)] ^ S8[GB(x, 0xd)] ^ S5[GB(x, … in _cast5_setup()
457 …skey->cast5.K[i++] = S5[GB(x, 0x1)] ^ S6[GB(x, 0x0)] ^ S7[GB(x, 0xe)] ^ S8[GB(x, 0xf)] ^ S6[GB(x, … in _cast5_setup()
458 …skey->cast5.K[i++] = S5[GB(x, 0x7)] ^ S6[GB(x, 0x6)] ^ S7[GB(x, 0x8)] ^ S8[GB(x, 0x9)] ^ S7[GB(x, … in _cast5_setup()
459 …skey->cast5.K[i++] = S5[GB(x, 0x5)] ^ S6[GB(x, 0x4)] ^ S7[GB(x, 0xa)] ^ S8[GB(x, 0xb)] ^ S8[GB(x, … in _cast5_setup()
466 …skey->cast5.K[i++] = S5[GB(z, 0x3)] ^ S6[GB(z, 0x2)] ^ S7[GB(z, 0xc)] ^ S8[GB(z, 0xd)] ^ S5[GB(z, … in _cast5_setup()
467 …skey->cast5.K[i++] = S5[GB(z, 0x1)] ^ S6[GB(z, 0x0)] ^ S7[GB(z, 0xe)] ^ S8[GB(z, 0xf)] ^ S6[GB(z, … in _cast5_setup()
468 …skey->cast5.K[i++] = S5[GB(z, 0x7)] ^ S6[GB(z, 0x6)] ^ S7[GB(z, 0x8)] ^ S8[GB(z, 0x9)] ^ S7[GB(z, … in _cast5_setup()
469 …skey->cast5.K[i++] = S5[GB(z, 0x5)] ^ S6[GB(z, 0x4)] ^ S7[GB(z, 0xa)] ^ S8[GB(z, 0xb)] ^ S8[GB(z, … in _cast5_setup()
475 …skey->cast5.K[i++] = S5[GB(x, 0x8)] ^ S6[GB(x, 0x9)] ^ S7[GB(x, 0x7)] ^ S8[GB(x, 0x6)] ^ S5[GB(x, … in _cast5_setup()
476 …skey->cast5.K[i++] = S5[GB(x, 0xa)] ^ S6[GB(x, 0xb)] ^ S7[GB(x, 0x5)] ^ S8[GB(x, 0x4)] ^ S6[GB(x, … in _cast5_setup()
477 …skey->cast5.K[i++] = S5[GB(x, 0xc)] ^ S6[GB(x, 0xd)] ^ S7[GB(x, 0x3)] ^ S8[GB(x, 0x2)] ^ S7[GB(x, … in _cast5_setup()
478 …skey->cast5.K[i++] = S5[GB(x, 0xe)] ^ S6[GB(x, 0xf)] ^ S7[GB(x, 0x1)] ^ S8[GB(x, 0x0)] ^ S8[GB(x, … in _cast5_setup()
481 skey->cast5.keylen = keylen; in _cast5_setup()
552 L ^= FI(R, skey->cast5.K[0], skey->cast5.K[16]); in _cast5_ecb_encrypt()
553 R ^= FII(L, skey->cast5.K[1], skey->cast5.K[17]); in _cast5_ecb_encrypt()
554 L ^= FIII(R, skey->cast5.K[2], skey->cast5.K[18]); in _cast5_ecb_encrypt()
555 R ^= FI(L, skey->cast5.K[3], skey->cast5.K[19]); in _cast5_ecb_encrypt()
556 L ^= FII(R, skey->cast5.K[4], skey->cast5.K[20]); in _cast5_ecb_encrypt()
557 R ^= FIII(L, skey->cast5.K[5], skey->cast5.K[21]); in _cast5_ecb_encrypt()
558 L ^= FI(R, skey->cast5.K[6], skey->cast5.K[22]); in _cast5_ecb_encrypt()
559 R ^= FII(L, skey->cast5.K[7], skey->cast5.K[23]); in _cast5_ecb_encrypt()
560 L ^= FIII(R, skey->cast5.K[8], skey->cast5.K[24]); in _cast5_ecb_encrypt()
561 R ^= FI(L, skey->cast5.K[9], skey->cast5.K[25]); in _cast5_ecb_encrypt()
562 L ^= FII(R, skey->cast5.K[10], skey->cast5.K[26]); in _cast5_ecb_encrypt()
563 R ^= FIII(L, skey->cast5.K[11], skey->cast5.K[27]); in _cast5_ecb_encrypt()
564 if (skey->cast5.keylen > 10) { in _cast5_ecb_encrypt()
565 L ^= FI(R, skey->cast5.K[12], skey->cast5.K[28]); in _cast5_ecb_encrypt()
566 R ^= FII(L, skey->cast5.K[13], skey->cast5.K[29]); in _cast5_ecb_encrypt()
567 L ^= FIII(R, skey->cast5.K[14], skey->cast5.K[30]); in _cast5_ecb_encrypt()
568 R ^= FI(L, skey->cast5.K[15], skey->cast5.K[31]); in _cast5_ecb_encrypt()
605 if (skey->cast5.keylen > 10) { in _cast5_ecb_decrypt()
606 R ^= FI(L, skey->cast5.K[15], skey->cast5.K[31]); in _cast5_ecb_decrypt()
607 L ^= FIII(R, skey->cast5.K[14], skey->cast5.K[30]); in _cast5_ecb_decrypt()
608 R ^= FII(L, skey->cast5.K[13], skey->cast5.K[29]); in _cast5_ecb_decrypt()
609 L ^= FI(R, skey->cast5.K[12], skey->cast5.K[28]); in _cast5_ecb_decrypt()
611 R ^= FIII(L, skey->cast5.K[11], skey->cast5.K[27]); in _cast5_ecb_decrypt()
612 L ^= FII(R, skey->cast5.K[10], skey->cast5.K[26]); in _cast5_ecb_decrypt()
613 R ^= FI(L, skey->cast5.K[9], skey->cast5.K[25]); in _cast5_ecb_decrypt()
614 L ^= FIII(R, skey->cast5.K[8], skey->cast5.K[24]); in _cast5_ecb_decrypt()
615 R ^= FII(L, skey->cast5.K[7], skey->cast5.K[23]); in _cast5_ecb_decrypt()
616 L ^= FI(R, skey->cast5.K[6], skey->cast5.K[22]); in _cast5_ecb_decrypt()
617 R ^= FIII(L, skey->cast5.K[5], skey->cast5.K[21]); in _cast5_ecb_decrypt()
618 L ^= FII(R, skey->cast5.K[4], skey->cast5.K[20]); in _cast5_ecb_decrypt()
619 R ^= FI(L, skey->cast5.K[3], skey->cast5.K[19]); in _cast5_ecb_decrypt()
620 L ^= FIII(R, skey->cast5.K[2], skey->cast5.K[18]); in _cast5_ecb_decrypt()
621 R ^= FII(L, skey->cast5.K[1], skey->cast5.K[17]); in _cast5_ecb_decrypt()
622 L ^= FI(R, skey->cast5.K[0], skey->cast5.K[16]); in _cast5_ecb_decrypt()