k3
u64 k3[DES_EXPKEY_WORDS / 2];
des_sparc64_key_expand((const u32 *)key, k3);
&k3[0], sizeof(k3));
encrypt_to_decrypt(&dctx->decrypt_expkey[0], &k3[0]);
z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3);
u32 k0, k1, k2, k3;
k3 = ctx->KEY[3];
z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3);
u32 k0, k1, k2, k3;
k3 = ctx->KEY[3];
u32 k3 = swab32(in[3]);
k3 = inv_mix_columns(k3);
out[0] = be ? k0 : k3;
out[3] = be ? k3 : k0;
#define SOF_LINK_ORDER(k1, k2, k3, k4, k5, k6, k7) \
(((k3) & SOF_LINK_ORDER_MASK) << (SOF_LINK_ORDER_SHIFT * 2)) | \
#define SOF_LINK_IDS(k1, k2, k3, k4, k5, k6, k7) \
(((k3) & SOF_LINK_IDS_MASK) << (SOF_LINK_IDS_SHIFT * 2)) | \
long k1 = -1, k2 = -1, k3 = -1;
k3 = n->key;
if (k1 != 0 || k2 != 2 || k3 != 4)