Lines Matching refs:r
302 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
304 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
306 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
314 u32 l, r, t; in __cast5_encrypt() local
326 r = be32_to_cpu(src[1]); in __cast5_encrypt()
336 t = l; l = r; r = t ^ F1(r, Km[0], Kr[0]); in __cast5_encrypt()
337 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in __cast5_encrypt()
338 t = l; l = r; r = t ^ F3(r, Km[2], Kr[2]); in __cast5_encrypt()
339 t = l; l = r; r = t ^ F1(r, Km[3], Kr[3]); in __cast5_encrypt()
340 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in __cast5_encrypt()
341 t = l; l = r; r = t ^ F3(r, Km[5], Kr[5]); in __cast5_encrypt()
342 t = l; l = r; r = t ^ F1(r, Km[6], Kr[6]); in __cast5_encrypt()
343 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in __cast5_encrypt()
344 t = l; l = r; r = t ^ F3(r, Km[8], Kr[8]); in __cast5_encrypt()
345 t = l; l = r; r = t ^ F1(r, Km[9], Kr[9]); in __cast5_encrypt()
346 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in __cast5_encrypt()
347 t = l; l = r; r = t ^ F3(r, Km[11], Kr[11]); in __cast5_encrypt()
349 t = l; l = r; r = t ^ F1(r, Km[12], Kr[12]); in __cast5_encrypt()
350 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in __cast5_encrypt()
351 t = l; l = r; r = t ^ F3(r, Km[14], Kr[14]); in __cast5_encrypt()
352 t = l; l = r; r = t ^ F1(r, Km[15], Kr[15]); in __cast5_encrypt()
357 dst[0] = cpu_to_be32(r); in __cast5_encrypt()
371 u32 l, r, t; in __cast5_decrypt() local
380 r = be32_to_cpu(src[1]); in __cast5_decrypt()
383 t = l; l = r; r = t ^ F1(r, Km[15], Kr[15]); in __cast5_decrypt()
384 t = l; l = r; r = t ^ F3(r, Km[14], Kr[14]); in __cast5_decrypt()
385 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in __cast5_decrypt()
386 t = l; l = r; r = t ^ F1(r, Km[12], Kr[12]); in __cast5_decrypt()
388 t = l; l = r; r = t ^ F3(r, Km[11], Kr[11]); in __cast5_decrypt()
389 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in __cast5_decrypt()
390 t = l; l = r; r = t ^ F1(r, Km[9], Kr[9]); in __cast5_decrypt()
391 t = l; l = r; r = t ^ F3(r, Km[8], Kr[8]); in __cast5_decrypt()
392 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in __cast5_decrypt()
393 t = l; l = r; r = t ^ F1(r, Km[6], Kr[6]); in __cast5_decrypt()
394 t = l; l = r; r = t ^ F3(r, Km[5], Kr[5]); in __cast5_decrypt()
395 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in __cast5_decrypt()
396 t = l; l = r; r = t ^ F1(r, Km[3], Kr[3]); in __cast5_decrypt()
397 t = l; l = r; r = t ^ F3(r, Km[2], Kr[2]); in __cast5_decrypt()
398 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in __cast5_decrypt()
399 t = l; l = r; r = t ^ F1(r, Km[0], Kr[0]); in __cast5_decrypt()
401 dst[0] = cpu_to_be32(r); in __cast5_decrypt()