Lines Matching refs:L

435    ulong64 L, R;  in camellia_ecb_encrypt()  local
438 LOAD64H(L, pt+0); LOAD64H(R, pt+8); in camellia_ecb_encrypt()
439 L ^= skey->camellia.kw[0]; in camellia_ecb_encrypt()
443 R ^= F(L ^ skey->camellia.k[0]); in camellia_ecb_encrypt()
444 L ^= F(R ^ skey->camellia.k[1]); in camellia_ecb_encrypt()
445 R ^= F(L ^ skey->camellia.k[2]); in camellia_ecb_encrypt()
446 L ^= F(R ^ skey->camellia.k[3]); in camellia_ecb_encrypt()
447 R ^= F(L ^ skey->camellia.k[4]); in camellia_ecb_encrypt()
448 L ^= F(R ^ skey->camellia.k[5]); in camellia_ecb_encrypt()
451 a = (ulong32)(L >> 32); in camellia_ecb_encrypt()
452 b = (ulong32)(L & 0xFFFFFFFFUL); in camellia_ecb_encrypt()
455 L = (((ulong64)a) << 32) | b; in camellia_ecb_encrypt()
465 R ^= F(L ^ skey->camellia.k[6]); in camellia_ecb_encrypt()
466 L ^= F(R ^ skey->camellia.k[7]); in camellia_ecb_encrypt()
467 R ^= F(L ^ skey->camellia.k[8]); in camellia_ecb_encrypt()
468 L ^= F(R ^ skey->camellia.k[9]); in camellia_ecb_encrypt()
469 R ^= F(L ^ skey->camellia.k[10]); in camellia_ecb_encrypt()
470 L ^= F(R ^ skey->camellia.k[11]); in camellia_ecb_encrypt()
473 a = (ulong32)(L >> 32); in camellia_ecb_encrypt()
474 b = (ulong32)(L & 0xFFFFFFFFUL); in camellia_ecb_encrypt()
477 L = (((ulong64)a) << 32) | b; in camellia_ecb_encrypt()
487 R ^= F(L ^ skey->camellia.k[12]); in camellia_ecb_encrypt()
488 L ^= F(R ^ skey->camellia.k[13]); in camellia_ecb_encrypt()
489 R ^= F(L ^ skey->camellia.k[14]); in camellia_ecb_encrypt()
490 L ^= F(R ^ skey->camellia.k[15]); in camellia_ecb_encrypt()
491 R ^= F(L ^ skey->camellia.k[16]); in camellia_ecb_encrypt()
492 L ^= F(R ^ skey->camellia.k[17]); in camellia_ecb_encrypt()
497 a = (ulong32)(L >> 32); in camellia_ecb_encrypt()
498 b = (ulong32)(L & 0xFFFFFFFFUL); in camellia_ecb_encrypt()
501 L = (((ulong64)a) << 32) | b; in camellia_ecb_encrypt()
511 R ^= F(L ^ skey->camellia.k[18]); in camellia_ecb_encrypt()
512 L ^= F(R ^ skey->camellia.k[19]); in camellia_ecb_encrypt()
513 R ^= F(L ^ skey->camellia.k[20]); in camellia_ecb_encrypt()
514 L ^= F(R ^ skey->camellia.k[21]); in camellia_ecb_encrypt()
515 R ^= F(L ^ skey->camellia.k[22]); in camellia_ecb_encrypt()
516 L ^= F(R ^ skey->camellia.k[23]); in camellia_ecb_encrypt()
519 L ^= skey->camellia.kw[3]; in camellia_ecb_encrypt()
522 STORE64H(R, ct+0); STORE64H(L, ct+8); in camellia_ecb_encrypt()
529 ulong64 L, R; in camellia_ecb_decrypt() local
532 LOAD64H(R, ct+0); LOAD64H(L, ct+8); in camellia_ecb_decrypt()
533 L ^= skey->camellia.kw[3]; in camellia_ecb_decrypt()
539 L ^= F(R ^ skey->camellia.k[23]); in camellia_ecb_decrypt()
540 R ^= F(L ^ skey->camellia.k[22]); in camellia_ecb_decrypt()
541 L ^= F(R ^ skey->camellia.k[21]); in camellia_ecb_decrypt()
542 R ^= F(L ^ skey->camellia.k[20]); in camellia_ecb_decrypt()
543 L ^= F(R ^ skey->camellia.k[19]); in camellia_ecb_decrypt()
544 R ^= F(L ^ skey->camellia.k[18]); in camellia_ecb_decrypt()
547 a = (ulong32)(L >> 32); in camellia_ecb_decrypt()
548 b = (ulong32)(L & 0xFFFFFFFFUL); in camellia_ecb_decrypt()
551 L = (((ulong64)a) << 32) | b; in camellia_ecb_decrypt()
563 L ^= F(R ^ skey->camellia.k[17]); in camellia_ecb_decrypt()
564 R ^= F(L ^ skey->camellia.k[16]); in camellia_ecb_decrypt()
565 L ^= F(R ^ skey->camellia.k[15]); in camellia_ecb_decrypt()
566 R ^= F(L ^ skey->camellia.k[14]); in camellia_ecb_decrypt()
567 L ^= F(R ^ skey->camellia.k[13]); in camellia_ecb_decrypt()
568 R ^= F(L ^ skey->camellia.k[12]); in camellia_ecb_decrypt()
571 a = (ulong32)(L >> 32); in camellia_ecb_decrypt()
572 b = (ulong32)(L & 0xFFFFFFFFUL); in camellia_ecb_decrypt()
575 L = (((ulong64)a) << 32) | b; in camellia_ecb_decrypt()
585 L ^= F(R ^ skey->camellia.k[11]); in camellia_ecb_decrypt()
586 R ^= F(L ^ skey->camellia.k[10]); in camellia_ecb_decrypt()
587 L ^= F(R ^ skey->camellia.k[9]); in camellia_ecb_decrypt()
588 R ^= F(L ^ skey->camellia.k[8]); in camellia_ecb_decrypt()
589 L ^= F(R ^ skey->camellia.k[7]); in camellia_ecb_decrypt()
590 R ^= F(L ^ skey->camellia.k[6]); in camellia_ecb_decrypt()
593 a = (ulong32)(L >> 32); in camellia_ecb_decrypt()
594 b = (ulong32)(L & 0xFFFFFFFFUL); in camellia_ecb_decrypt()
597 L = (((ulong64)a) << 32) | b; in camellia_ecb_decrypt()
607 L ^= F(R ^ skey->camellia.k[5]); in camellia_ecb_decrypt()
608 R ^= F(L ^ skey->camellia.k[4]); in camellia_ecb_decrypt()
609 L ^= F(R ^ skey->camellia.k[3]); in camellia_ecb_decrypt()
610 R ^= F(L ^ skey->camellia.k[2]); in camellia_ecb_decrypt()
611 L ^= F(R ^ skey->camellia.k[1]); in camellia_ecb_decrypt()
612 R ^= F(L ^ skey->camellia.k[0]); in camellia_ecb_decrypt()
615 L ^= skey->camellia.kw[0]; in camellia_ecb_decrypt()
617 STORE64H(R, pt+8); STORE64H(L, pt+0); in camellia_ecb_decrypt()