/freebsd/tools/regression/ccd/layout/ |
H A D | ccd0.sh | 16 foo 128k 128k 128k 128k 0 0 17 foo 128k 128k 128k 128k 0 4 18 foo 128k 128k 128k 128k 4 0 19 foo 128k 128k 128k 128k 4 2 20 foo 128k 128k 128k 128k 4 4 22 foo 256k 128k 128k 128k 0 0 23 foo 256k 128k 128k 128k 0 4 24 foo 256k 128k 128k 128k 4 0 25 foo 256k 128k 128k 128k 4 2 26 foo 256k 128k 128k 128k 4 4 [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
H A D | send-cpL_varied_recsize.ksh | 35 # | 128k | | 128k | 128k | 128k | 128k | 36 # | 128k | -c | Fails | Fails | 128k | 128k | 37 # | 128k | -p | 128k | 128k | 128k | 128k | 38 # | 128k | -L | 128k | 128k | 128k | 128k | 39 # | 128k | -cp | Fails | Fails | 128k | 128k | 40 # | 128k | -cL | Fails | Fails | 128k | 128k | 41 # | 128k | -pL | 128k | 128k | 128k | 128k | 42 # | 128k | -cpL | Fails | Fails | 128k | 128k | 43 # | 1m | | Fails | Fails | 128k | 128k | 44 # | 1m | -c | Fails | Fails | 128k | 128k | [all …]
|
H A D | send_encrypted_truncated_files.ksh | 31 # 4. Truncate one of the files from 32M to 128k 32 # 5. Truncate one of the files from 512k to 384k 33 # 6. Truncate one of the files from 512k to 0 to 384k via reallocation 34 # 7. Truncate one of the files from 1k to 0 to 512b via reallocation 56 sort -k 2 | awk '{ print $1 }' | xxh128digest 71 # this value being 128k. This is currently same as the default recordsize. 72 log_must zfs set recordsize=128k $TESTPOOL/$TESTFS2 99 bs=128k count=3 iflag=fullblock
|
H A D | send_hole_birth.ksh | 78 log_must zfs create -o recordsize=4k $sendfs 81 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=4k count=11264 seek=1152 85 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=4k count=152 seek=384 \ 87 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=4k count=10 seek=1408 \ 98 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=128k count=1 seek=1 101 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=128k count=1 102 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=128k count=1 seek=3 113 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=512 count=128k conv=notrunc 117 log_must dd if=/dev/urandom of=/$sendfs/file1 bs=512 count=1 seek=96k \
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | milenage.c | 27 * @opc: OPc = 128-bit value derived from OP and K 28 * @k: K = 128-bit subscriber key 29 * @_rand: RAND = 128-bit random challenge 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1() 64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1() 78 * @opc: OPc = 128-bit value derived from OP and K 79 * @k: K = 128-bit subscriber key 80 * @_rand: RAND = 128-bit random challenge 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL [all …]
|
H A D | sha512.c | 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha512_vector() 42 /* if key is longer than 128 bytes reset it to key = SHA512(key) */ in hmac_sha512_vector() 43 if (key_len > 128) { in hmac_sha512_vector() 52 * SHA512(K XOR opad, SHA512(K XOR ipad, text)) in hmac_sha512_vector() 54 * where K is an n byte key in hmac_sha512_vector() 55 * ipad is the byte 0x36 repeated 128 times in hmac_sha512_vector() 56 * opad is the byte 0x5c repeated 128 times in hmac_sha512_vector() 63 for (i = 0; i < 128; i++) in hmac_sha512_vector() 68 _len[0] = 128; in hmac_sha512_vector() 79 for (i = 0; i < 128; i++) in hmac_sha512_vector() [all …]
|
H A D | sha384.c | 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha384_vector() 42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */ in hmac_sha384_vector() 43 if (key_len > 128) { in hmac_sha384_vector() 52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector() 54 * where K is an n byte key in hmac_sha384_vector() 55 * ipad is the byte 0x36 repeated 128 times in hmac_sha384_vector() 56 * opad is the byte 0x5c repeated 128 times in hmac_sha384_vector() 63 for (i = 0; i < 128; i++) in hmac_sha384_vector() 68 _len[0] = 128; in hmac_sha384_vector() 79 for (i = 0; i < 128; i++) in hmac_sha384_vector() [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/slog/ |
H A D | slog_replay_volume.ksh | 87 log_must zfs create -V 128M $TESTPOOL/$TESTVOL 117 log_must dd if=/dev/urandom of=$MNTPNT/latency-8k bs=8k count=1 oflag=sync 118 log_must dd if=/dev/urandom of=$MNTPNT/latency-128k bs=128k count=1 oflag=sync 122 log_must dd if=/dev/urandom of=$MNTPNT/throughput-8k bs=8k count=1 123 log_must dd if=/dev/urandom of=$MNTPNT/throughput-128k bs=128k count=1 126 log_must dd if=/dev/urandom of=$MNTPNT/holes bs=128k count=8 127 log_must dd if=/dev/zero of=$MNTPNT/holes bs=128k count=2 seek=2 conv=notrunc 134 log_must dd if=/dev/urandom of=$MNTPNT/discard bs=128k count=16 135 log_must fallocate --punch-hole -l 128K -o 512K $MNTPNT/discard 136 log_must fallocate --punch-hole -l 512K -o 1M $MNTPNT/discard
|
H A D | slog_replay_fs_001.ksh | 86 oflag=sync,direct bs=4k count=1 120 oflag=sync bs=1k count=8 125 oflag=sync bs=1k count=1 144 log_must mkfile 4k /$TESTPOOL/$TESTFS/truncated_file 149 oflag=sync bs=128k count=64 153 oflag=sync,direct bs=4k count=1 157 oflag=sync bs=128k count=8 159 oflag=sync bs=128k count=2 162 oflag=sync bs=128k count=8 164 oflag=sync bs=128k count=2 seek=2 [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-enc.1 | 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' 99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' 100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' 101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' 102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' 156 [\fB\-k\fR \fIpassword\fR] 158 [\fB\-K\fR \fIkey\fR] 229 .IP "\fB\-k\fR \fIpassword\fR" 4 230 .IX Item "-k password" [all …]
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | der_length.c | 48 last_val_gt_128 = (val >= 128); in _heim_len_unsigned() 66 last_val_gt_128 = (val >= 128); in _heim_len_int() 88 if(q >= 128) in len_oid() 97 if(q < 128) in len_oid() 115 if(q >= 128) in der_length_len() 124 if(q < 128) in der_length_tag() 141 u /= 128; in der_length_unsigned() 150 if (len < 128) in der_length_general_string() 170 tag /= 128; in der_length_ia5_string() 249 der_length_octet_string (const heim_octet_string *k) 192 der_length_octet_string(const heim_octet_string * k) der_length_octet_string() argument 198 der_length_heim_integer(const heim_integer * k) der_length_heim_integer() argument 209 der_length_oid(const heim_oid * k) der_length_oid() argument 217 heim_octet_string k; der_length_generalized_time() local 229 heim_octet_string k; der_length_utctime() local 239 der_length_boolean(const int * k) der_length_boolean() argument 245 der_length_bit_string(const heim_bit_string * k) der_length_bit_string() argument [all...] |
H A D | der_put.c | 61 if(p[1] >= 128) { in der_put_unsigned() 93 if(p[1] >= 128) { in der_put_integer() 124 if(p[1] >= 128) { in der_put_length() 139 if(p[1] < 128) { in der_put_length() 164 if(p[1] >= 128) { in der_put_general_string() 179 if(p[1] < 128) { 197 if (val < 128) { in der_put_bmp_string() 349 if (p[1] < 128) { in der_put_oid() 360 if (p[1] >= 128) { in der_put_oid() 377 heim_octet_string k; in der_put_tag() 305 heim_octet_string k; der_put_generalized_time() local 325 heim_octet_string k; der_put_utctime() local [all...] |
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_CIPHER-AES.7 | 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' 99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' 100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' 101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' 102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' 150 .IX Item "AES-128-CBC, AES-192-CBC and AES-256-CBC" 154 .IX Item "AES-128-CBC-CTS, AES-192-CBC-CTS and AES-256-CBC-CTS" 157 .IX Item "AES-128-CFB, AES-192-CFB, AES-256-CFB, AES-128-CFB1, AES-192-CFB1, AES-256-CFB1, AES-128-… 160 .IX Item "AES-128-CTR, AES-192-CTR and AES-256-CTR" [all …]
|
H A D | EVP_CIPHER-ARIA.7 | 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' 99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' 100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' 101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' 102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' 149 .IX Item "ARIA-128-CBC, ARIA-192-CBC and ARIA-256-CBC" 153 .IX Item "ARIA-128-CFB, ARIA-192-CFB, ARIA-256-CFB, ARIA-128-CFB1, ARIA-192-CFB1, ARIA-256-CFB1, AR… 156 .IX Item "ARIA-128-CTR, ARIA-192-CTR and ARIA-256-CTR" 159 .IX Item "ARIA-128-ECB, ARIA-192-ECB and ARIA-256-ECB" [all …]
|
H A D | EVP_CIPHER-CAMELLIA.7 | 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' 99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' 100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' 101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' 102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' 149 .IX Item "CAMELLIA-128-CBC, CAMELLIA-192-CBC and CAMELLIA-256-CBC" 153 .IX Item "CAMELLIA-128-CBC-CTS, CAMELLIA-192-CBC-CTS and CAMELLIA-256-CBC-CTS" 156 .IX Item "CAMELLIA-128-CFB, CAMELLIA-192-CFB, CAMELLIA-256-CFB, CAMELLIA-128-CFB1, CAMELLIA-192-CFB… 159 .IX Item "CAMELLIA-128-CTR, CAMELLIA-192-CTR and CAMELLIA-256-CTR" [all …]
|
H A D | EVP_MD-SHAKE.7 | 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' 99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' 100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' 101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' 102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' 153 .IP "\s-1KECCAK\-KMAC\-128\s0" 4 154 .IX Item "KECCAK-KMAC-128" 155 Known names are \*(L"\s-1KECCAK\-KMAC\-128\*(R"\s0 and \*(L"\s-1KECCAK\-KMAC128\*(R"\s0 161 .IP "\s-1SHAKE\-128\s0" 4 [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_auth/hmacsha512/ |
H A D | auth_hmacsha512.c | 31 crypto_auth_hmacsha512_keygen(unsigned char k[crypto_auth_hmacsha512_KEYBYTES]) in crypto_auth_hmacsha512_keygen() 33 randombytes_buf(k, crypto_auth_hmacsha512_KEYBYTES); in crypto_auth_hmacsha512_keygen() 40 unsigned char pad[128]; in crypto_auth_hmacsha512_init() 44 if (keylen > 128) { in crypto_auth_hmacsha512_init() 52 memset(pad, 0x36, 128); in crypto_auth_hmacsha512_init() 56 crypto_hash_sha512_update(&state->ictx, pad, 128); in crypto_auth_hmacsha512_init() 59 memset(pad, 0x5c, 128); in crypto_auth_hmacsha512_init() 63 crypto_hash_sha512_update(&state->octx, pad, 128); in crypto_auth_hmacsha512_init() 97 unsigned long long inlen, const unsigned char *k) in crypto_auth_hmacsha512() argument 101 crypto_auth_hmacsha512_init(&state, k, crypto_auth_hmacsha512_KEYBYTES); in crypto_auth_hmacsha512() [all …]
|
/freebsd/contrib/llvm-project/clang/lib/Headers/ |
H A D | avxneconvertintrin.h | 23 __min_vector_width__(128))) 46 /// A 128-bit vector of [4 x float]. 54 /// dst[MAX:128] := 0 112 /// A 128-bit vector of [4 x float]. 120 /// dst[MAX:128] := 0 174 /// A pointer to a 128-bit memory location containing 8 consecutive 177 /// A 128-bit vector of [4 x float]. 181 /// k := j*2 182 /// i := k*16 186 /// dst[MAX:128] := 0 [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Target/X86/ |
H A D | X86SchedSapphireRapids.td | 602 "^V(ADD|SUB)PSZ128rm((b|k|bk|kz)?)$", 611 "^V(ADD|SUB)PSZ(128|256)rr(k?)$", 613 "^VPSHUFBZ(128|256)rrk(z?)$", 614 "^VPSHUF(H|L)WZ(128|256)rik(z?)$", 615 "^VPUNPCK(H|L)(BW|WD)Z(128|256)rrk(z?)$")>; 626 "^VPOPCNT(D|Q)Z128rm(b|k|kz)$", 633 … "^VPM(AX|IN)(S|U)QZ128rm((b|k|bk|kz)?)$", 638 … "^VPERM(I|T)2(D|Q|PS)Z128rm((b|k|bk|kz)?)$", 640 … "^VPERM(I|T)2PDZ128rm((b|k|bk|kz)?)$", 652 def : InstRW<[SPRWriteResGroup11, ReadAfterVecYLd], (instregex "^VPEXPAND(B|W)Z(128|256)rmk(z?)$", [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/zvol/zvol_misc/ |
H A D | zvol_misc_006_pos.ksh | 38 # ZFS volume as dump device, it should always have 128k volblocksize 43 # 3. Verify the volume's volblocksize=128k 63 log_assert "zfs volume as dumpdevice should have 128k volblocksize" 76 if [[ $blksize != "128K" ]]; then 80 log_pass "zfs volume as dumpdevice should have 128k volblocksize"
|
/freebsd/tests/sys/cddl/zfs/tests/zvol/zvol_misc/ |
H A D | zvol_misc_006_pos.ksh | 37 # ZFS volume as dump device, it should always have 128k volblocksize 42 # 3. Verify the volume's volblocksize=128k 64 log_assert "zfs volume as dumpdevice should have 128k volblocksize" 83 if [[ $blksize != "128K" ]]; then 87 log_pass "zfs volume as dumpdevice should have 128k volblocksize"
|
/freebsd/tests/sys/geom/class/eli/ |
H A D | init_test.sh | 13 geli init -B none -e $ealgo -l $keylen -P -K keyfile \ 15 atf_check geli attach -p -k keyfile ${md} 75 atf_check -s exit:0 -o ignore geli init -B none -P -K keyfile ${md} 82 atf_check -s exit:0 -o ignore geli init -P -K keyfile ${md} 87 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md} 89 atf_check -s exit:0 -o ignore geli attach -p -k keyfile ${md} 96 geli init -B backupfile -P -K keyfile ${md} 101 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md} 103 atf_check geli attach -p -k keyfile ${md} 134 geli init -i ${iter} -B none -J passfile0 -P -K keyfile0 ${md} [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ |
H A D | sign.c | 28 _crypto_sign_ed25519_clamp(unsigned char k[32]) in _crypto_sign_ed25519_clamp() 30 k[0] &= 248; in _crypto_sign_ed25519_clamp() 31 k[31] &= 127; in _crypto_sign_ed25519_clamp() 32 k[31] |= 64; in _crypto_sign_ed25519_clamp() 36 /* r = hash(B || empty_labelset || Z || pad1 || k || pad2 || empty_labelset || K || extra || M) (mo… 48 static const unsigned char zeros[128] = { 0x00 }; in _crypto_sign_ed25519_synthetic_r_hv() 55 crypto_hash_sha512_update(hs, zeros, 128 - (32 + 3 + 32) % 128); in _crypto_sign_ed25519_synthetic_r_hv() 57 crypto_hash_sha512_update(hs, zeros, 128 - 32 % 128); in _crypto_sign_ed25519_synthetic_r_hv()
|
/freebsd/crypto/openssl/crypto/rc2/ |
H A D | rc2_skey.c | 58 unsigned char *k; in RC2_set_key() local 62 k = (unsigned char *)&(key->data[0]); in RC2_set_key() 63 *k = 0; /* for if there is a zero length key */ in RC2_set_key() 65 if (len > 128) in RC2_set_key() 66 len = 128; in RC2_set_key() 73 k[i] = data[i]; in RC2_set_key() 76 d = k[len - 1]; in RC2_set_key() 78 for (i = len; i < 128; i++, j++) { in RC2_set_key() 79 d = key_table[(k[j] + d) & 0xff]; in RC2_set_key() 80 k[i] = d; in RC2_set_key() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/ |
H A D | pwhash_scryptsalsa208sha256_nosse.c | 173 * Compute Bout = BlockMix_{salsa20/8, r}(Bin). The input Bin must be 128r 221 * Compute B = SMix_r(B, N). The input B must be 128r bytes in length; 222 * the temporary storage V must be 128rN bytes in length; the temporary 235 size_t k; in smix() local 238 for (k = 0; k < 32 * r; k++) { in smix() 239 X[k] = LOAD32_LE(&B[4 * k]); in smix() 245 128 * r); in smix() 252 (escrypt_block_t *) Y, 128 * r); in smix() 265 128 * r); in smix() 273 128 * r); in smix() [all …]
|