Symbol: K1
crypto/anubis.c
490
u32 K0, K1, K2, K3;
crypto/anubis.c
495
K1 = T4[(kappa[N - 1] >> 16) & 0xff];
crypto/anubis.c
504
K1 = T4[(kappa[i] >> 16) & 0xff] ^
crypto/anubis.c
505
(T5[(K1 >> 24) ] & 0xff000000U) ^
crypto/anubis.c
506
(T5[(K1 >> 16) & 0xff] & 0x00ff0000U) ^
crypto/anubis.c
507
(T5[(K1 >> 8) & 0xff] & 0x0000ff00U) ^
crypto/anubis.c
508
(T5[(K1 ) & 0xff] & 0x000000ffU);
crypto/anubis.c
522
ctx->E[r][1] = K1;
crypto/khazad.c
762
u64 K2, K1;
crypto/khazad.c
765
K1 = get_unaligned_be64(&in_key[8]);
crypto/khazad.c
769
ctx->E[r] = T0[(int)(K1 >> 56) ] ^
crypto/khazad.c
770
T1[(int)(K1 >> 48) & 0xff] ^
crypto/khazad.c
771
T2[(int)(K1 >> 40) & 0xff] ^
crypto/khazad.c
772
T3[(int)(K1 >> 32) & 0xff] ^
crypto/khazad.c
773
T4[(int)(K1 >> 24) & 0xff] ^
crypto/khazad.c
774
T5[(int)(K1 >> 16) & 0xff] ^
crypto/khazad.c
775
T6[(int)(K1 >> 8) & 0xff] ^
crypto/khazad.c
776
T7[(int)(K1 ) & 0xff] ^
crypto/khazad.c
778
K2 = K1;
crypto/khazad.c
779
K1 = ctx->E[r];
crypto/khazad.c
784
K1 = ctx->E[KHAZAD_ROUNDS - r];
crypto/khazad.c
785
ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^
crypto/khazad.c
786
T1[(int)S[(int)(K1 >> 48) & 0xff] & 0xff] ^
crypto/khazad.c
787
T2[(int)S[(int)(K1 >> 40) & 0xff] & 0xff] ^
crypto/khazad.c
788
T3[(int)S[(int)(K1 >> 32) & 0xff] & 0xff] ^
crypto/khazad.c
789
T4[(int)S[(int)(K1 >> 24) & 0xff] & 0xff] ^
crypto/khazad.c
790
T5[(int)S[(int)(K1 >> 16) & 0xff] & 0xff] ^
crypto/khazad.c
791
T6[(int)S[(int)(K1 >> 8) & 0xff] & 0xff] ^
crypto/khazad.c
792
T7[(int)S[(int)(K1 ) & 0xff] & 0xff];
crypto/krb5/rfc8009_aes2.c
100
memcpy(result->data, K1.data, result->len);
crypto/krb5/rfc8009_aes2.c
37
struct krb5_buffer K1, data;
crypto/krb5/rfc8009_aes2.c
92
K1.len = crypto_shash_digestsize(shash);
crypto/krb5/rfc8009_aes2.c
93
K1.data = buffer +
crypto/krb5/rfc8009_aes2.c
96
ret = crypto_shash_finup(desc, data.data, data.len, K1.data);
crypto/rmd160.c
64
ROUND(aa, bb, cc, dd, ee, F1, K1, in[0], 11);
crypto/rmd160.c
65
ROUND(ee, aa, bb, cc, dd, F1, K1, in[1], 14);
crypto/rmd160.c
66
ROUND(dd, ee, aa, bb, cc, F1, K1, in[2], 15);
crypto/rmd160.c
67
ROUND(cc, dd, ee, aa, bb, F1, K1, in[3], 12);
crypto/rmd160.c
68
ROUND(bb, cc, dd, ee, aa, F1, K1, in[4], 5);
crypto/rmd160.c
69
ROUND(aa, bb, cc, dd, ee, F1, K1, in[5], 8);
crypto/rmd160.c
70
ROUND(ee, aa, bb, cc, dd, F1, K1, in[6], 7);
crypto/rmd160.c
71
ROUND(dd, ee, aa, bb, cc, F1, K1, in[7], 9);
crypto/rmd160.c
72
ROUND(cc, dd, ee, aa, bb, F1, K1, in[8], 11);
crypto/rmd160.c
73
ROUND(bb, cc, dd, ee, aa, F1, K1, in[9], 13);
crypto/rmd160.c
74
ROUND(aa, bb, cc, dd, ee, F1, K1, in[10], 14);
crypto/rmd160.c
75
ROUND(ee, aa, bb, cc, dd, F1, K1, in[11], 15);
crypto/rmd160.c
76
ROUND(dd, ee, aa, bb, cc, F1, K1, in[12], 6);
crypto/rmd160.c
77
ROUND(cc, dd, ee, aa, bb, F1, K1, in[13], 7);
crypto/rmd160.c
78
ROUND(bb, cc, dd, ee, aa, F1, K1, in[14], 9);
crypto/rmd160.c
79
ROUND(aa, bb, cc, dd, ee, F1, K1, in[15], 8);
drivers/gpu/drm/nouveau/dispnv50/headc37d.c
141
NVVAL(NVC37D, HEAD_SET_CONTROL_CURSOR_COMPOSITION, K1, 0xff) |
drivers/gpu/drm/nouveau/dispnv50/headc37d.c
143
K1) |
drivers/gpu/drm/nouveau/dispnv50/headca7d.c
159
NVVAL(NVCA7D, HEAD_SET_CONTROL_CURSOR_COMPOSITION, K1, 0xff) |
drivers/gpu/drm/nouveau/dispnv50/headca7d.c
161
K1) |
drivers/gpu/drm/nouveau/dispnv50/wndwc37e.c
109
NVVAL(NVC37E, SET_COMPOSITION_CONSTANT_ALPHA, K1, asyw->blend.k1) |
drivers/gpu/drm/tegra/dc.c
310
value = K2(255) | K1(255) | WINDOW_LAYER_DEPTH(255 - window->zpos);
drivers/gpu/drm/tegra/hub.c
582
value = K2(255) | K1(255) | WINDOW_LAYER_DEPTH(255 - zpos);
drivers/staging/rtl8723bs/core/rtw_security.c
136
pmicdata->R = pmicdata->K1;
drivers/staging/rtl8723bs/core/rtw_security.c
145
pmicdata->K1 = get_unaligned_le32(key + 4);
drivers/staging/rtl8723bs/include/rtw_security.h
234
u32 K0, K1; /* Key */
fs/ext4/hash.c
58
ROUND(F, a, b, c, d, in[0] + K1, 3);
fs/ext4/hash.c
59
ROUND(F, d, a, b, c, in[1] + K1, 7);
fs/ext4/hash.c
60
ROUND(F, c, d, a, b, in[2] + K1, 11);
fs/ext4/hash.c
61
ROUND(F, b, c, d, a, in[3] + K1, 19);
fs/ext4/hash.c
62
ROUND(F, a, b, c, d, in[4] + K1, 3);
fs/ext4/hash.c
63
ROUND(F, d, a, b, c, in[5] + K1, 7);
fs/ext4/hash.c
64
ROUND(F, c, d, a, b, in[6] + K1, 11);
fs/ext4/hash.c
65
ROUND(F, b, c, d, a, in[7] + K1, 19);
net/sunrpc/auth_gss/gss_krb5_keys.c
445
u32 outlen, struct xdr_netobj *K1)
net/sunrpc/auth_gss/gss_krb5_keys.c
469
ret = crypto_shash_final(desc, K1->data);
net/sunrpc/auth_gss/gss_krb5_keys.c
507
struct xdr_netobj K1 = {
net/sunrpc/auth_gss/gss_krb5_keys.c
527
K1.len = crypto_shash_digestsize(tfm);
net/sunrpc/auth_gss/gss_krb5_keys.c
528
K1.data = kmalloc(K1.len, gfp_mask);
net/sunrpc/auth_gss/gss_krb5_keys.c
529
if (!K1.data) {
net/sunrpc/auth_gss/gss_krb5_keys.c
534
ret = krb5_hmac_K1(tfm, label, outkey->len, &K1);
net/sunrpc/auth_gss/gss_krb5_keys.c
539
memcpy(outkey->data, K1.data, outkey->len);
net/sunrpc/auth_gss/gss_krb5_keys.c
542
kfree_sensitive(K1.data);