K
return (PT(K,10));
#define PAIRSIZE(K,D) (2*sizeof(u_int16_t) + (K)->size + (D)->size)
#define KEYSIZE(K) (4*sizeof(u_int16_t) + (K)->size);
#define PAIRFITS(P,K,D) \
(PAIRSIZE((K),(D)) + OVFLSIZE) <= FREESPACE((P)))
CAST_LONG l, *K;
K = &k[0];
K[0] = S4[z[ 8]]^S5[z[ 9]]^S6[z[ 7]]^S7[z[ 6]]^S4[z[ 2]];
K[1] = S4[z[10]]^S5[z[11]]^S6[z[ 5]]^S7[z[ 4]]^S5[z[ 6]];
K[2] = S4[z[12]]^S5[z[13]]^S6[z[ 3]]^S7[z[ 2]]^S6[z[ 9]];
K[3] = S4[z[14]]^S5[z[15]]^S6[z[ 1]]^S7[z[ 0]]^S7[z[12]];
K[4] = S4[x[ 3]]^S5[x[ 2]]^S6[x[12]]^S7[x[13]]^S4[x[ 8]];
K[5] = S4[x[ 1]]^S5[x[ 0]]^S6[x[14]]^S7[x[15]]^S5[x[13]];
K[6] = S4[x[ 7]]^S5[x[ 6]]^S6[x[ 8]]^S7[x[ 9]]^S6[x[ 3]];
K[7] = S4[x[ 5]]^S5[x[ 4]]^S6[x[10]]^S7[x[11]]^S7[x[ 7]];
K[8] = S4[z[ 3]]^S5[z[ 2]]^S6[z[12]]^S7[z[13]]^S4[z[ 9]];
K[9] = S4[z[ 1]]^S5[z[ 0]]^S6[z[14]]^S7[z[15]]^S5[z[12]];
K[10] = S4[z[ 7]]^S5[z[ 6]]^S6[z[ 8]]^S7[z[ 9]]^S6[z[ 2]];
K[11] = S4[z[ 5]]^S5[z[ 4]]^S6[z[10]]^S7[z[11]]^S7[z[ 6]];
K[12] = S4[x[ 8]]^S5[x[ 9]]^S6[x[ 7]]^S7[x[ 6]]^S4[x[ 3]];
K[13] = S4[x[10]]^S5[x[11]]^S6[x[ 5]]^S7[x[ 4]]^S5[x[ 7]];
K[14] = S4[x[12]]^S5[x[13]]^S6[x[ 3]]^S7[x[ 2]]^S6[x[ 8]];
K[15] = S4[x[14]]^S5[x[15]]^S6[x[ 1]]^S7[x[ 0]]^S7[x[13]];
if (K != k)
K += 16;
#define RIP2(a,b,c,d,e,w,s,K) { \
a+=F2(b,c,d)+w+K; \
#define RIP3(a,b,c,d,e,w,s,K) { \
a+=F3(b,c,d)+w+K; \
#define RIP4(a,b,c,d,e,w,s,K) { \
a+=F4(b,c,d)+w+K; \
#define RIP5(a,b,c,d,e,w,s,K) { \
a+=F5(b,c,d)+w+K; \
uint32_t K[4];
K[0] = crypto_load_be32toh(&key[0 * 4]) ^ SM4_FK[0];
K[1] = crypto_load_be32toh(&key[1 * 4]) ^ SM4_FK[1];
K[2] = crypto_load_be32toh(&key[2 * 4]) ^ SM4_FK[2];
K[3] = crypto_load_be32toh(&key[3 * 4]) ^ SM4_FK[3];
X = K[(i + 1) % 4] ^ K[(i + 2) % 4] ^ K[(i + 3) % 4] ^ SM4_CK[i];
K[i % 4] ^= t;
ks->rk[i] = K[i % 4];
b->oval = K(b->s.k);
v = K(s->k);
v = K(s->k);
val[A_ATOM] = K(s->k);
val[A_ATOM] = K(s->k);
fold_op(s, val[A_ATOM], K(s->k));
val[A_ATOM] = K(s->k);
val[A_ATOM] = F(s->code, val[A_ATOM], K(s->k));
val[A_ATOM] = K(s->k);
F(s->code, val[A_ATOM], K(s->k));
vstore(s, &val[A_ATOM], K(s->k), alter);
.K = {
.K = {
.K = {
.K = {
.K = {0},
.K = {0},
.K = {
.K = {
.K = {
.K = {
.K = {0},
.K = {0},
.K = {
.K = {
const uint8_t K[128];
.K = {
.K = {
.K = {0},
.K = {0},
.K = {0},
AES_set_encrypt_key(tv->K, tv->K_len * 8, &key);
.K = {0},
XOR(K, ctx->M_last);
if (K[0] & 0x80) {
LSHIFT(K, K);
K[15] ^= 0x87;
LSHIFT(K, K);
XOR(K, ctx->M_last);
explicit_bzero(K, sizeof K);
u_int8_t K[16];
memset(K, 0, sizeof K);
AES_Encrypt(&ctx->aesctx, K, K);
if (K[0] & 0x80) {
LSHIFT(K, K);
K[15] ^= 0x87;
LSHIFT(K, K);
AES_Setkey(&ctx->K, key, klen - AESCTR_NONCESIZE);
AES_Encrypt(&ctx->K, ctx->ghash.H, ctx->ghash.H);
AES_Encrypt(&ctx->K, ctx->J, keystream);
AES_CTX K;
aes_key_wrap_set_key(aes_key_wrap_ctx *ctx, const u_int8_t *K, size_t K_len)
AES_Setkey(&ctx->ctx, K, K_len);
aes_key_wrap_set_key_wrap_only(aes_key_wrap_ctx *ctx, const u_int8_t *K,
AES_Setkey(&ctx->ctx, K, K_len);
dte_tables->K = cpu_to_be32(table_size);
uint32_t K;
dte_tables->K = cpu_to_be32(table_size);
uint32_t K;
#define C_PRIME256(p) (((p->C - p->J) * p->K) + (p->J * 256))
#define M_PRIME256(p) (p->K * p->M)
params.K = VESAGTF_K;
unsigned K; /* blanking formula scaling factor */
d = (T - 10 * K + L + 14) + K * a + b / 4. - L * y;
grehdr->K = 1;
K:1,
K:1,
grehdr->C == 0 && grehdr->R == 0 && grehdr->K != 0 &&
(grehdr->K != 0)? "K" : "", (grehdr->S != 0)? "S" : "",