F2                609 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]);
F2                612 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]);
F2                615 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]);
F2                618 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]);
F2                621 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]);
F2                626 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]);
F2                629 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]);
F2                632 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]);
F2                635 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]);
F2                664 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]);
F2                667 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]);
F2                670 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]);
F2                673 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]);
F2                676 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]);
F2                680 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]);
F2                683 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]);
F2                686 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]);
F2                689 crypto/cast5.c 		t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]);
F2                375 crypto/cast6.c 	key[5] ^= F2(key[6], Tr[i % 4][1], Tm[i][1]);
F2                378 crypto/cast6.c 	key[2] ^= F2(key[3], Tr[i % 4][4], Tm[i][4]);
F2                381 crypto/cast6.c 	key[7] ^= F2(key[0], Tr[i % 4][7], Tm[i][7]);
F2                434 crypto/cast6.c 	block[1] ^= F2(block[2], Kr[1], Km[1]);
F2                444 crypto/cast6.c         block[1] ^= F2(block[2], Kr[1], Km[1]);
F2                 70 crypto/md5.c   	MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
F2                 71 crypto/md5.c   	MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
F2                 72 crypto/md5.c   	MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
F2                 73 crypto/md5.c   	MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
F2                 74 crypto/md5.c   	MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
F2                 75 crypto/md5.c   	MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
F2                 76 crypto/md5.c   	MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
F2                 77 crypto/md5.c   	MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
F2                 78 crypto/md5.c   	MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
F2                 79 crypto/md5.c   	MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
F2                 80 crypto/md5.c   	MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
F2                 81 crypto/md5.c   	MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
F2                 82 crypto/md5.c   	MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
F2                 83 crypto/md5.c   	MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
F2                 84 crypto/md5.c   	MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
F2                 85 crypto/md5.c   	MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
F2                 86 crypto/rmd128.c 	ROUND(aa, bb, cc, dd, F2, K2, in[7],   7);
F2                 87 crypto/rmd128.c 	ROUND(dd, aa, bb, cc, F2, K2, in[4],   6);
F2                 88 crypto/rmd128.c 	ROUND(cc, dd, aa, bb, F2, K2, in[13],  8);
F2                 89 crypto/rmd128.c 	ROUND(bb, cc, dd, aa, F2, K2, in[1],  13);
F2                 90 crypto/rmd128.c 	ROUND(aa, bb, cc, dd, F2, K2, in[10], 11);
F2                 91 crypto/rmd128.c 	ROUND(dd, aa, bb, cc, F2, K2, in[6],   9);
F2                 92 crypto/rmd128.c 	ROUND(cc, dd, aa, bb, F2, K2, in[15],  7);
F2                 93 crypto/rmd128.c 	ROUND(bb, cc, dd, aa, F2, K2, in[3],  15);
F2                 94 crypto/rmd128.c 	ROUND(aa, bb, cc, dd, F2, K2, in[12],  7);
F2                 95 crypto/rmd128.c 	ROUND(dd, aa, bb, cc, F2, K2, in[0],  12);
F2                 96 crypto/rmd128.c 	ROUND(cc, dd, aa, bb, F2, K2, in[9],  15);
F2                 97 crypto/rmd128.c 	ROUND(bb, cc, dd, aa, F2, K2, in[5],   9);
F2                 98 crypto/rmd128.c 	ROUND(aa, bb, cc, dd, F2, K2, in[2],  11);
F2                 99 crypto/rmd128.c 	ROUND(dd, aa, bb, cc, F2, K2, in[14],  7);
F2                100 crypto/rmd128.c 	ROUND(cc, dd, aa, bb, F2, K2, in[11], 13);
F2                101 crypto/rmd128.c 	ROUND(bb, cc, dd, aa, F2, K2, in[8],  12);
F2                176 crypto/rmd128.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[15],  9);
F2                177 crypto/rmd128.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[5],   7);
F2                178 crypto/rmd128.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[1],  15);
F2                179 crypto/rmd128.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[3],  11);
F2                180 crypto/rmd128.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[7],   8);
F2                181 crypto/rmd128.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[14],  6);
F2                182 crypto/rmd128.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[6],   6);
F2                183 crypto/rmd128.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[9],  14);
F2                184 crypto/rmd128.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[11], 12);
F2                185 crypto/rmd128.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[8],  13);
F2                186 crypto/rmd128.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[12],  5);
F2                187 crypto/rmd128.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[2],  14);
F2                188 crypto/rmd128.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[10], 13);
F2                189 crypto/rmd128.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[0],  13);
F2                190 crypto/rmd128.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[4],   7);
F2                191 crypto/rmd128.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[13],  5);
F2                 92 crypto/rmd160.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[7],   7);
F2                 93 crypto/rmd160.c 	ROUND(dd, ee, aa, bb, cc, F2, K2, in[4],   6);
F2                 94 crypto/rmd160.c 	ROUND(cc, dd, ee, aa, bb, F2, K2, in[13],  8);
F2                 95 crypto/rmd160.c 	ROUND(bb, cc, dd, ee, aa, F2, K2, in[1],  13);
F2                 96 crypto/rmd160.c 	ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11);
F2                 97 crypto/rmd160.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[6],   9);
F2                 98 crypto/rmd160.c 	ROUND(dd, ee, aa, bb, cc, F2, K2, in[15],  7);
F2                 99 crypto/rmd160.c 	ROUND(cc, dd, ee, aa, bb, F2, K2, in[3],  15);
F2                100 crypto/rmd160.c 	ROUND(bb, cc, dd, ee, aa, F2, K2, in[12],  7);
F2                101 crypto/rmd160.c 	ROUND(aa, bb, cc, dd, ee, F2, K2, in[0],  12);
F2                102 crypto/rmd160.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[9],  15);
F2                103 crypto/rmd160.c 	ROUND(dd, ee, aa, bb, cc, F2, K2, in[5],   9);
F2                104 crypto/rmd160.c 	ROUND(cc, dd, ee, aa, bb, F2, K2, in[2],  11);
F2                105 crypto/rmd160.c 	ROUND(bb, cc, dd, ee, aa, F2, K2, in[14],  7);
F2                106 crypto/rmd160.c 	ROUND(aa, bb, cc, dd, ee, F2, K2, in[11], 13);
F2                107 crypto/rmd160.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[8],  12);
F2                218 crypto/rmd160.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[8],  15);
F2                219 crypto/rmd160.c 	ROUND(bbb, ccc, ddd, eee, aaa, F2, KK4, in[6],   5);
F2                220 crypto/rmd160.c 	ROUND(aaa, bbb, ccc, ddd, eee, F2, KK4, in[4],   8);
F2                221 crypto/rmd160.c 	ROUND(eee, aaa, bbb, ccc, ddd, F2, KK4, in[1],  11);
F2                222 crypto/rmd160.c 	ROUND(ddd, eee, aaa, bbb, ccc, F2, KK4, in[3],  14);
F2                223 crypto/rmd160.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[11], 14);
F2                224 crypto/rmd160.c 	ROUND(bbb, ccc, ddd, eee, aaa, F2, KK4, in[15],  6);
F2                225 crypto/rmd160.c 	ROUND(aaa, bbb, ccc, ddd, eee, F2, KK4, in[0],  14);
F2                226 crypto/rmd160.c 	ROUND(eee, aaa, bbb, ccc, ddd, F2, KK4, in[5],   6);
F2                227 crypto/rmd160.c 	ROUND(ddd, eee, aaa, bbb, ccc, F2, KK4, in[12],  9);
F2                228 crypto/rmd160.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[2],  12);
F2                229 crypto/rmd160.c 	ROUND(bbb, ccc, ddd, eee, aaa, F2, KK4, in[13],  9);
F2                230 crypto/rmd160.c 	ROUND(aaa, bbb, ccc, ddd, eee, F2, KK4, in[9],  12);
F2                231 crypto/rmd160.c 	ROUND(eee, aaa, bbb, ccc, ddd, F2, KK4, in[7],   5);
F2                232 crypto/rmd160.c 	ROUND(ddd, eee, aaa, bbb, ccc, F2, KK4, in[10], 15);
F2                233 crypto/rmd160.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[14],  8);
F2                107 crypto/rmd256.c 	ROUND(aa, bb, cc, dd, F2, K2, in[7],   7);
F2                108 crypto/rmd256.c 	ROUND(dd, aa, bb, cc, F2, K2, in[4],   6);
F2                109 crypto/rmd256.c 	ROUND(cc, dd, aa, bb, F2, K2, in[13],  8);
F2                110 crypto/rmd256.c 	ROUND(bb, cc, dd, aa, F2, K2, in[1],  13);
F2                111 crypto/rmd256.c 	ROUND(aa, bb, cc, dd, F2, K2, in[10], 11);
F2                112 crypto/rmd256.c 	ROUND(dd, aa, bb, cc, F2, K2, in[6],   9);
F2                113 crypto/rmd256.c 	ROUND(cc, dd, aa, bb, F2, K2, in[15],  7);
F2                114 crypto/rmd256.c 	ROUND(bb, cc, dd, aa, F2, K2, in[3],  15);
F2                115 crypto/rmd256.c 	ROUND(aa, bb, cc, dd, F2, K2, in[12],  7);
F2                116 crypto/rmd256.c 	ROUND(dd, aa, bb, cc, F2, K2, in[0],  12);
F2                117 crypto/rmd256.c 	ROUND(cc, dd, aa, bb, F2, K2, in[9],  15);
F2                118 crypto/rmd256.c 	ROUND(bb, cc, dd, aa, F2, K2, in[5],   9);
F2                119 crypto/rmd256.c 	ROUND(aa, bb, cc, dd, F2, K2, in[2],  11);
F2                120 crypto/rmd256.c 	ROUND(dd, aa, bb, cc, F2, K2, in[14],  7);
F2                121 crypto/rmd256.c 	ROUND(cc, dd, aa, bb, F2, K2, in[11], 13);
F2                122 crypto/rmd256.c 	ROUND(bb, cc, dd, aa, F2, K2, in[8],  12);
F2                164 crypto/rmd256.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[15],  9);
F2                165 crypto/rmd256.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[5],   7);
F2                166 crypto/rmd256.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[1],  15);
F2                167 crypto/rmd256.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[3],  11);
F2                168 crypto/rmd256.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[7],   8);
F2                169 crypto/rmd256.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[14],  6);
F2                170 crypto/rmd256.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[6],   6);
F2                171 crypto/rmd256.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[9],  14);
F2                172 crypto/rmd256.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[11], 12);
F2                173 crypto/rmd256.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[8],  13);
F2                174 crypto/rmd256.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[12],  5);
F2                175 crypto/rmd256.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[2],  14);
F2                176 crypto/rmd256.c 	ROUND(aaa, bbb, ccc, ddd, F2, KK3, in[10], 13);
F2                177 crypto/rmd256.c 	ROUND(ddd, aaa, bbb, ccc, F2, KK3, in[0],  13);
F2                178 crypto/rmd256.c 	ROUND(ccc, ddd, aaa, bbb, F2, KK3, in[4],   7);
F2                179 crypto/rmd256.c 	ROUND(bbb, ccc, ddd, aaa, F2, KK3, in[13],  5);
F2                113 crypto/rmd320.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[7],   7);
F2                114 crypto/rmd320.c 	ROUND(dd, ee, aa, bb, cc, F2, K2, in[4],   6);
F2                115 crypto/rmd320.c 	ROUND(cc, dd, ee, aa, bb, F2, K2, in[13],  8);
F2                116 crypto/rmd320.c 	ROUND(bb, cc, dd, ee, aa, F2, K2, in[1],  13);
F2                117 crypto/rmd320.c 	ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11);
F2                118 crypto/rmd320.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[6],   9);
F2                119 crypto/rmd320.c 	ROUND(dd, ee, aa, bb, cc, F2, K2, in[15],  7);
F2                120 crypto/rmd320.c 	ROUND(cc, dd, ee, aa, bb, F2, K2, in[3],  15);
F2                121 crypto/rmd320.c 	ROUND(bb, cc, dd, ee, aa, F2, K2, in[12],  7);
F2                122 crypto/rmd320.c 	ROUND(aa, bb, cc, dd, ee, F2, K2, in[0],  12);
F2                123 crypto/rmd320.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[9],  15);
F2                124 crypto/rmd320.c 	ROUND(dd, ee, aa, bb, cc, F2, K2, in[5],   9);
F2                125 crypto/rmd320.c 	ROUND(cc, dd, ee, aa, bb, F2, K2, in[2],  11);
F2                126 crypto/rmd320.c 	ROUND(bb, cc, dd, ee, aa, F2, K2, in[14],  7);
F2                127 crypto/rmd320.c 	ROUND(aa, bb, cc, dd, ee, F2, K2, in[11], 13);
F2                128 crypto/rmd320.c 	ROUND(ee, aa, bb, cc, dd, F2, K2, in[8],  12);
F2                209 crypto/rmd320.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[8],  15);
F2                210 crypto/rmd320.c 	ROUND(bbb, ccc, ddd, eee, aaa, F2, KK4, in[6],   5);
F2                211 crypto/rmd320.c 	ROUND(aaa, bbb, ccc, ddd, eee, F2, KK4, in[4],   8);
F2                212 crypto/rmd320.c 	ROUND(eee, aaa, bbb, ccc, ddd, F2, KK4, in[1],  11);
F2                213 crypto/rmd320.c 	ROUND(ddd, eee, aaa, bbb, ccc, F2, KK4, in[3],  14);
F2                214 crypto/rmd320.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[11], 14);
F2                215 crypto/rmd320.c 	ROUND(bbb, ccc, ddd, eee, aaa, F2, KK4, in[15],  6);
F2                216 crypto/rmd320.c 	ROUND(aaa, bbb, ccc, ddd, eee, F2, KK4, in[0],  14);
F2                217 crypto/rmd320.c 	ROUND(eee, aaa, bbb, ccc, ddd, F2, KK4, in[5],   6);
F2                218 crypto/rmd320.c 	ROUND(ddd, eee, aaa, bbb, ccc, F2, KK4, in[12],  9);
F2                219 crypto/rmd320.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[2],  12);
F2                220 crypto/rmd320.c 	ROUND(bbb, ccc, ddd, eee, aaa, F2, KK4, in[13],  9);
F2                221 crypto/rmd320.c 	ROUND(aaa, bbb, ccc, ddd, eee, F2, KK4, in[9],  12);
F2                222 crypto/rmd320.c 	ROUND(eee, aaa, bbb, ccc, ddd, F2, KK4, in[7],   5);
F2                223 crypto/rmd320.c 	ROUND(ddd, eee, aaa, bbb, ccc, F2, KK4, in[10], 15);
F2                224 crypto/rmd320.c 	ROUND(ccc, ddd, eee, aaa, bbb, F2, KK4, in[14],  8);
F2                198 fs/cifs/md5.c  	MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
F2                199 fs/cifs/md5.c  	MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
F2                200 fs/cifs/md5.c  	MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
F2                201 fs/cifs/md5.c  	MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
F2                202 fs/cifs/md5.c  	MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
F2                203 fs/cifs/md5.c  	MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
F2                204 fs/cifs/md5.c  	MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
F2                205 fs/cifs/md5.c  	MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
F2                206 fs/cifs/md5.c  	MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
F2                207 fs/cifs/md5.c  	MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
F2                208 fs/cifs/md5.c  	MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
F2                209 fs/cifs/md5.c  	MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
F2                210 fs/cifs/md5.c  	MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
F2                211 fs/cifs/md5.c  	MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
F2                212 fs/cifs/md5.c  	MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
F2                213 fs/cifs/md5.c  	MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);