Lines Matching refs:F2
574 #define F2(D,m,r) ( (I = ((m) ^ (D))), (I=rol32(I,(r))), \ macro
609 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in cast5_encrypt()
612 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in cast5_encrypt()
615 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in cast5_encrypt()
618 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in cast5_encrypt()
621 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in cast5_encrypt()
626 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in cast5_encrypt()
629 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in cast5_encrypt()
632 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in cast5_encrypt()
635 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in cast5_encrypt()
664 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in cast5_decrypt()
667 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in cast5_decrypt()
670 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in cast5_decrypt()
673 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in cast5_decrypt()
676 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in cast5_decrypt()
680 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in cast5_decrypt()
683 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in cast5_decrypt()
686 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in cast5_decrypt()
689 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in cast5_decrypt()