Lines Matching refs:F

175 static ulong64 F(ulong64 x)  in F()  function
253 B ^= F(A ^ key_sigma[0]); in camellia_setup()
254 A ^= F(B ^ key_sigma[1]); in camellia_setup()
262 B ^= F(A ^ key_sigma[2]); in camellia_setup()
263 A ^= F(B ^ key_sigma[3]); in camellia_setup()
339 B ^= F(A ^ key_sigma[4]); in camellia_setup()
340 A ^= F(B ^ key_sigma[5]); in camellia_setup()
443 R ^= F(L ^ skey->camellia.k[0]); in camellia_ecb_encrypt()
444 L ^= F(R ^ skey->camellia.k[1]); in camellia_ecb_encrypt()
445 R ^= F(L ^ skey->camellia.k[2]); in camellia_ecb_encrypt()
446 L ^= F(R ^ skey->camellia.k[3]); in camellia_ecb_encrypt()
447 R ^= F(L ^ skey->camellia.k[4]); in camellia_ecb_encrypt()
448 L ^= F(R ^ skey->camellia.k[5]); in camellia_ecb_encrypt()
465 R ^= F(L ^ skey->camellia.k[6]); in camellia_ecb_encrypt()
466 L ^= F(R ^ skey->camellia.k[7]); in camellia_ecb_encrypt()
467 R ^= F(L ^ skey->camellia.k[8]); in camellia_ecb_encrypt()
468 L ^= F(R ^ skey->camellia.k[9]); in camellia_ecb_encrypt()
469 R ^= F(L ^ skey->camellia.k[10]); in camellia_ecb_encrypt()
470 L ^= F(R ^ skey->camellia.k[11]); in camellia_ecb_encrypt()
487 R ^= F(L ^ skey->camellia.k[12]); in camellia_ecb_encrypt()
488 L ^= F(R ^ skey->camellia.k[13]); in camellia_ecb_encrypt()
489 R ^= F(L ^ skey->camellia.k[14]); in camellia_ecb_encrypt()
490 L ^= F(R ^ skey->camellia.k[15]); in camellia_ecb_encrypt()
491 R ^= F(L ^ skey->camellia.k[16]); in camellia_ecb_encrypt()
492 L ^= F(R ^ skey->camellia.k[17]); in camellia_ecb_encrypt()
511 R ^= F(L ^ skey->camellia.k[18]); in camellia_ecb_encrypt()
512 L ^= F(R ^ skey->camellia.k[19]); in camellia_ecb_encrypt()
513 R ^= F(L ^ skey->camellia.k[20]); in camellia_ecb_encrypt()
514 L ^= F(R ^ skey->camellia.k[21]); in camellia_ecb_encrypt()
515 R ^= F(L ^ skey->camellia.k[22]); in camellia_ecb_encrypt()
516 L ^= F(R ^ skey->camellia.k[23]); in camellia_ecb_encrypt()
539 L ^= F(R ^ skey->camellia.k[23]); in camellia_ecb_decrypt()
540 R ^= F(L ^ skey->camellia.k[22]); in camellia_ecb_decrypt()
541 L ^= F(R ^ skey->camellia.k[21]); in camellia_ecb_decrypt()
542 R ^= F(L ^ skey->camellia.k[20]); in camellia_ecb_decrypt()
543 L ^= F(R ^ skey->camellia.k[19]); in camellia_ecb_decrypt()
544 R ^= F(L ^ skey->camellia.k[18]); in camellia_ecb_decrypt()
563 L ^= F(R ^ skey->camellia.k[17]); in camellia_ecb_decrypt()
564 R ^= F(L ^ skey->camellia.k[16]); in camellia_ecb_decrypt()
565 L ^= F(R ^ skey->camellia.k[15]); in camellia_ecb_decrypt()
566 R ^= F(L ^ skey->camellia.k[14]); in camellia_ecb_decrypt()
567 L ^= F(R ^ skey->camellia.k[13]); in camellia_ecb_decrypt()
568 R ^= F(L ^ skey->camellia.k[12]); in camellia_ecb_decrypt()
585 L ^= F(R ^ skey->camellia.k[11]); in camellia_ecb_decrypt()
586 R ^= F(L ^ skey->camellia.k[10]); in camellia_ecb_decrypt()
587 L ^= F(R ^ skey->camellia.k[9]); in camellia_ecb_decrypt()
588 R ^= F(L ^ skey->camellia.k[8]); in camellia_ecb_decrypt()
589 L ^= F(R ^ skey->camellia.k[7]); in camellia_ecb_decrypt()
590 R ^= F(L ^ skey->camellia.k[6]); in camellia_ecb_decrypt()
607 L ^= F(R ^ skey->camellia.k[5]); in camellia_ecb_decrypt()
608 R ^= F(L ^ skey->camellia.k[4]); in camellia_ecb_decrypt()
609 L ^= F(R ^ skey->camellia.k[3]); in camellia_ecb_decrypt()
610 R ^= F(L ^ skey->camellia.k[2]); in camellia_ecb_decrypt()
611 L ^= F(R ^ skey->camellia.k[1]); in camellia_ecb_decrypt()
612 R ^= F(L ^ skey->camellia.k[0]); in camellia_ecb_decrypt()