K2 494 crypto/anubis.c u32 K0, K1, K2, K3; K2 500 crypto/anubis.c K2 = T4[(kappa[N - 1] >> 8) & 0xff]; K2 513 crypto/anubis.c K2 = T4[(kappa[i] >> 8) & 0xff] ^ K2 514 crypto/anubis.c (T5[(K2 >> 24) ] & 0xff000000U) ^ K2 515 crypto/anubis.c (T5[(K2 >> 16) & 0xff] & 0x00ff0000U) ^ K2 516 crypto/anubis.c (T5[(K2 >> 8) & 0xff] & 0x0000ff00U) ^ K2 517 crypto/anubis.c (T5[(K2 ) & 0xff] & 0x000000ffU); K2 527 crypto/anubis.c ctx->E[r][2] = K2; K2 763 crypto/khazad.c u64 K2, K1; K2 766 crypto/khazad.c K2 = ((u64)be32_to_cpu(key[0]) << 32) | be32_to_cpu(key[1]); K2 779 crypto/khazad.c c[r] ^ K2; K2 780 crypto/khazad.c K2 = K1; K2 86 crypto/rmd128.c ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); K2 87 crypto/rmd128.c ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); K2 88 crypto/rmd128.c ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); K2 89 crypto/rmd128.c ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); K2 90 crypto/rmd128.c ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); K2 91 crypto/rmd128.c ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); K2 92 crypto/rmd128.c ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); K2 93 crypto/rmd128.c ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); K2 94 crypto/rmd128.c ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); K2 95 crypto/rmd128.c ROUND(dd, aa, bb, cc, F2, K2, in[0], 12); K2 96 crypto/rmd128.c ROUND(cc, dd, aa, bb, F2, K2, in[9], 15); K2 97 crypto/rmd128.c ROUND(bb, cc, dd, aa, F2, K2, in[5], 9); K2 98 crypto/rmd128.c ROUND(aa, bb, cc, dd, F2, K2, in[2], 11); K2 99 crypto/rmd128.c ROUND(dd, aa, bb, cc, F2, K2, in[14], 7); K2 100 crypto/rmd128.c ROUND(cc, dd, aa, bb, F2, K2, in[11], 13); K2 101 crypto/rmd128.c ROUND(bb, cc, dd, aa, F2, K2, in[8], 12); K2 92 crypto/rmd160.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); K2 93 crypto/rmd160.c ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); K2 94 crypto/rmd160.c ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); K2 95 crypto/rmd160.c ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); K2 96 crypto/rmd160.c ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); K2 97 crypto/rmd160.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); K2 98 crypto/rmd160.c ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); K2 99 crypto/rmd160.c ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); K2 100 crypto/rmd160.c ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); K2 101 crypto/rmd160.c ROUND(aa, bb, cc, dd, ee, F2, K2, in[0], 12); K2 102 crypto/rmd160.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[9], 15); K2 103 crypto/rmd160.c ROUND(dd, ee, aa, bb, cc, F2, K2, in[5], 9); K2 104 crypto/rmd160.c ROUND(cc, dd, ee, aa, bb, F2, K2, in[2], 11); K2 105 crypto/rmd160.c ROUND(bb, cc, dd, ee, aa, F2, K2, in[14], 7); K2 106 crypto/rmd160.c ROUND(aa, bb, cc, dd, ee, F2, K2, in[11], 13); K2 107 crypto/rmd160.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[8], 12); K2 107 crypto/rmd256.c ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); K2 108 crypto/rmd256.c ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); K2 109 crypto/rmd256.c ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); K2 110 crypto/rmd256.c ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); K2 111 crypto/rmd256.c ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); K2 112 crypto/rmd256.c ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); K2 113 crypto/rmd256.c ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); K2 114 crypto/rmd256.c ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); K2 115 crypto/rmd256.c ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); K2 116 crypto/rmd256.c ROUND(dd, aa, bb, cc, F2, K2, in[0], 12); K2 117 crypto/rmd256.c ROUND(cc, dd, aa, bb, F2, K2, in[9], 15); K2 118 crypto/rmd256.c ROUND(bb, cc, dd, aa, F2, K2, in[5], 9); K2 119 crypto/rmd256.c ROUND(aa, bb, cc, dd, F2, K2, in[2], 11); K2 120 crypto/rmd256.c ROUND(dd, aa, bb, cc, F2, K2, in[14], 7); K2 121 crypto/rmd256.c ROUND(cc, dd, aa, bb, F2, K2, in[11], 13); K2 122 crypto/rmd256.c ROUND(bb, cc, dd, aa, F2, K2, in[8], 12); K2 113 crypto/rmd320.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); K2 114 crypto/rmd320.c ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); K2 115 crypto/rmd320.c ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); K2 116 crypto/rmd320.c ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); K2 117 crypto/rmd320.c ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); K2 118 crypto/rmd320.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); K2 119 crypto/rmd320.c ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); K2 120 crypto/rmd320.c ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); K2 121 crypto/rmd320.c ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); K2 122 crypto/rmd320.c ROUND(aa, bb, cc, dd, ee, F2, K2, in[0], 12); K2 123 crypto/rmd320.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[9], 15); K2 124 crypto/rmd320.c ROUND(dd, ee, aa, bb, cc, F2, K2, in[5], 9); K2 125 crypto/rmd320.c ROUND(cc, dd, ee, aa, bb, F2, K2, in[2], 11); K2 126 crypto/rmd320.c ROUND(bb, cc, dd, ee, aa, F2, K2, in[14], 7); K2 127 crypto/rmd320.c ROUND(aa, bb, cc, dd, ee, F2, K2, in[11], 13); K2 128 crypto/rmd320.c ROUND(ee, aa, bb, cc, dd, F2, K2, in[8], 12); K2 40 lib/halfmd4.c ROUND(G, a, b, c, d, in[1] + K2, 3); K2 41 lib/halfmd4.c ROUND(G, d, a, b, c, in[3] + K2, 5); K2 42 lib/halfmd4.c ROUND(G, c, d, a, b, in[5] + K2, 9); K2 43 lib/halfmd4.c ROUND(G, b, c, d, a, in[7] + K2, 13); K2 44 lib/halfmd4.c ROUND(G, a, b, c, d, in[0] + K2, 3); K2 45 lib/halfmd4.c ROUND(G, d, a, b, c, in[2] + K2, 5); K2 46 lib/halfmd4.c ROUND(G, c, d, a, b, in[4] + K2, 9); K2 47 lib/halfmd4.c ROUND(G, b, c, d, a, in[6] + K2, 13); K2 61 lib/sha1.c t = f2(b, c, d) + K2 + rol32(a, 5) + e + W[i];