U_INT8_Tb 26 crypto/cast.c l ^= ((cast_sbox1[U_INT8_Ta(t)] ^ cast_sbox2[U_INT8_Tb(t)]) - \ U_INT8_Tb 30 crypto/cast.c l ^= ((cast_sbox1[U_INT8_Ta(t)] - cast_sbox2[U_INT8_Tb(t)]) + \ U_INT8_Tb 34 crypto/cast.c l ^= ((cast_sbox1[U_INT8_Ta(t)] + cast_sbox2[U_INT8_Tb(t)]) ^ \ U_INT8_Tb 72 crypto/cast.c outblock[1] = U_INT8_Tb(r); U_INT8_Tb 76 crypto/cast.c outblock[5] = U_INT8_Tb(l); U_INT8_Tb 118 crypto/cast.c outblock[1] = U_INT8_Tb(l); U_INT8_Tb 122 crypto/cast.c outblock[5] = U_INT8_Tb(r); U_INT8_Tb 153 crypto/cast.c t[0] = z[0] = x[0] ^ cast_sbox5[U_INT8_Tb(x[3])] ^ U_INT8_Tb 160 crypto/cast.c cast_sbox7[U_INT8_Tb(z[0])] ^ U_INT8_Tb 165 crypto/cast.c cast_sbox7[U_INT8_Tb(z[1])] ^ U_INT8_Tb 167 crypto/cast.c cast_sbox5[U_INT8_Tb(x[2])]; U_INT8_Tb 169 crypto/cast.c cast_sbox6[U_INT8_Tb(z[2])] ^ U_INT8_Tb 175 crypto/cast.c t[0] = x[0] = z[2] ^ cast_sbox5[U_INT8_Tb(z[1])] ^ U_INT8_Tb 182 crypto/cast.c cast_sbox7[U_INT8_Tb(x[0])] ^ U_INT8_Tb 187 crypto/cast.c cast_sbox7[U_INT8_Tb(x[1])] ^ U_INT8_Tb 189 crypto/cast.c cast_sbox5[U_INT8_Tb(z[0])]; U_INT8_Tb 191 crypto/cast.c cast_sbox6[U_INT8_Tb(x[2])] ^ U_INT8_Tb 201 crypto/cast.c cast_sbox6[U_INT8_Tb(t[2])] ^ U_INT8_Tb 206 crypto/cast.c cast_sbox7[U_INT8_Tb(t[1])] ^ U_INT8_Tb 209 crypto/cast.c cast_sbox6[U_INT8_Tb(t[3])] ^ U_INT8_Tb 214 crypto/cast.c cast_sbox7[U_INT8_Tb(t[0])] ^ U_INT8_Tb 222 crypto/cast.c cast_sbox8[U_INT8_Tb(t[3])]; U_INT8_Tb 223 crypto/cast.c key->xkey[i+1] = cast_sbox5[U_INT8_Tb(t[0])] ^ U_INT8_Tb 230 crypto/cast.c cast_sbox8[U_INT8_Tb(t[2])]; U_INT8_Tb 231 crypto/cast.c key->xkey[i+3] = cast_sbox5[U_INT8_Tb(t[1])] ^ U_INT8_Tb 241 crypto/cast.c key->xkey[i+2] ^= cast_sbox7[U_INT8_Tb(z[2])]; U_INT8_Tb 246 crypto/cast.c key->xkey[i+1] ^= cast_sbox6[U_INT8_Tb(x[3])]; U_INT8_Tb 251 crypto/cast.c key->xkey[i+0] ^= cast_sbox5[U_INT8_Tb(z[2])]; U_INT8_Tb 260 crypto/cast.c key->xkey[i+3] ^= cast_sbox8[U_INT8_Tb(x[3])];