U_INT8_Ta 26 crypto/cast.c l ^= ((cast_sbox1[U_INT8_Ta(t)] ^ cast_sbox2[U_INT8_Tb(t)]) - \ U_INT8_Ta 30 crypto/cast.c l ^= ((cast_sbox1[U_INT8_Ta(t)] - cast_sbox2[U_INT8_Tb(t)]) + \ U_INT8_Ta 34 crypto/cast.c l ^= ((cast_sbox1[U_INT8_Ta(t)] + cast_sbox2[U_INT8_Tb(t)]) ^ \ U_INT8_Ta 71 crypto/cast.c outblock[0] = U_INT8_Ta(r); U_INT8_Ta 75 crypto/cast.c outblock[4] = U_INT8_Ta(l); U_INT8_Ta 117 crypto/cast.c outblock[0] = U_INT8_Ta(l); U_INT8_Ta 121 crypto/cast.c outblock[4] = U_INT8_Ta(r); U_INT8_Ta 155 crypto/cast.c cast_sbox7[U_INT8_Ta(x[3])] ^ U_INT8_Ta 157 crypto/cast.c cast_sbox7[U_INT8_Ta(x[2])]; U_INT8_Ta 158 crypto/cast.c t[1] = z[1] = x[2] ^ cast_sbox5[U_INT8_Ta(z[0])] ^ U_INT8_Ta 166 crypto/cast.c cast_sbox8[U_INT8_Ta(z[1])] ^ U_INT8_Ta 171 crypto/cast.c cast_sbox8[U_INT8_Ta(z[2])] ^ U_INT8_Ta 177 crypto/cast.c cast_sbox7[U_INT8_Ta(z[1])] ^ U_INT8_Ta 179 crypto/cast.c cast_sbox7[U_INT8_Ta(z[0])]; U_INT8_Ta 180 crypto/cast.c t[1] = x[1] = z[0] ^ cast_sbox5[U_INT8_Ta(x[0])] ^ U_INT8_Ta 188 crypto/cast.c cast_sbox8[U_INT8_Ta(x[1])] ^ U_INT8_Ta 193 crypto/cast.c cast_sbox8[U_INT8_Ta(x[2])] ^ U_INT8_Ta 200 crypto/cast.c key->xkey[i+0] = cast_sbox5[U_INT8_Ta(t[2])] ^ U_INT8_Ta 207 crypto/cast.c cast_sbox8[U_INT8_Ta(t[1])]; U_INT8_Ta 208 crypto/cast.c key->xkey[i+2] = cast_sbox5[U_INT8_Ta(t[3])] ^ U_INT8_Ta 215 crypto/cast.c cast_sbox8[U_INT8_Ta(t[0])]; U_INT8_Ta 221 crypto/cast.c cast_sbox7[U_INT8_Ta(t[3])] ^ U_INT8_Ta 224 crypto/cast.c cast_sbox6[U_INT8_Ta(t[0])] ^ U_INT8_Ta 229 crypto/cast.c cast_sbox7[U_INT8_Ta(t[2])] ^ U_INT8_Ta 232 crypto/cast.c cast_sbox6[U_INT8_Ta(t[1])] ^ U_INT8_Ta 242 crypto/cast.c key->xkey[i+3] ^= cast_sbox8[U_INT8_Ta(z[3])]; U_INT8_Ta 245 crypto/cast.c key->xkey[i+0] ^= cast_sbox5[U_INT8_Ta(x[2])]; U_INT8_Ta 252 crypto/cast.c key->xkey[i+1] ^= cast_sbox6[U_INT8_Ta(z[3])]; U_INT8_Ta 259 crypto/cast.c key->xkey[i+2] ^= cast_sbox7[U_INT8_Ta(x[2])];