Home
last modified time | relevance | path

Searched +full:256 +full:k (Results 1 – 25 of 1130) sorted by relevance

12345678910>>...46

/freebsd/tools/regression/ccd/layout/
H A Dccd0.sh16 foo 128k 128k 128k 128k 0 0
17 foo 128k 128k 128k 128k 0 4
18 foo 128k 128k 128k 128k 4 0
19 foo 128k 128k 128k 128k 4 2
20 foo 128k 128k 128k 128k 4 4
22 foo 256k 128k 128k 128k 0 0
23 foo 256k 128k 128k 128k 0 4
24 foo 256k 128k 128k 128k 4 0
25 foo 256k 128k 128k 128k 4 2
26 foo 256k 128k 128k 128k 4 4
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa_rfc6979.txt387 Title = RFC 6979 P-256 deterministic ECDSA tests
389 PrivateKey=P-256_PRIV
395 PublicKey=P-256_PUB
401 PrivPubKeyPair=P-256_PRIV:P-256_PUB
404 Key = P-256_PRIV
410 Key = P-256_PUB
415 Key = P-256_PUB
421 Key = P-256_PRIV
427 Key = P-256_PUB
432 Key = P-256_PUB
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-enc.180 [\fB\-k\fR \fIpassword\fR]
82 [\fB\-K\fR \fIkey\fR]
163 .IP "\fB\-k\fR \fIpassword\fR" 4
164 .IX Item "-k password"
175 The default algorithm is sha\-256.
208 .IP "\fB\-K\fR \fIkey\fR" 4
209 .IX Item "-K key"
213 key given with the \fB\-K\fR option will be used and the IV generated from the
219 of hex digits. When only the key is specified using the \fB\-K\fR option, the
229 .IP "\fB\-bufsize\fR \fInumber\fR[\fBk\fR]" 4
[all …]
/freebsd/crypto/heimdal/lib/asn1/
H A Dder_length.c49 val /= 256; in _heim_len_unsigned()
67 val /= 256; in _heim_len_int()
84 q = val % 256;
86 val /= 256; in len_oid()
93 q = ~(val % 256); in len_oid()
95 val /= 256; in len_oid()
111 q = val % 256; in der_length_len()
113 val /= 256; in der_length_len()
120 q = ~(val % 256); in der_length_tag()
122 val /= 256; in der_length_tag()
192 der_length_octet_string(const heim_octet_string * k) der_length_octet_string() argument
198 der_length_heim_integer(const heim_integer * k) der_length_heim_integer() argument
209 der_length_oid(const heim_oid * k) der_length_oid() argument
217 heim_octet_string k; der_length_generalized_time() local
229 heim_octet_string k; der_length_utctime() local
239 der_length_boolean(const int * k) der_length_boolean() argument
245 der_length_bit_string(const heim_bit_string * k) der_length_bit_string() argument
[all...]
H A Dder_put.c54 *p-- = val % 256; in der_put_unsigned()
55 val /= 256; in der_put_unsigned()
86 *p-- = val % 256; in der_put_integer()
87 val /= 256; in der_put_integer()
120 *p-- = val % 256; in der_put_length()
122 val /= 256; in der_put_length()
135 *p-- = ~(val % 256); in der_put_length()
137 val /= 256; in der_put_length()
160 *p-- = val % 256; in der_put_general_string()
162 val /= 256; in der_put_general_string()
305 heim_octet_string k; der_put_generalized_time() local
325 heim_octet_string k; der_put_utctime() local
[all...]
/freebsd/tests/sys/geom/class/eli/
H A Dtestvect.h3 …74H\263\312m\336\304\3515P\222Cb\037-\313W\0067\232\024%\235\252\322\035\225k\025\2248\251r\312]v\…
5 …333&\011'\360?\022\374P\336\337\031\266,~@!\037\000\320v\360!\225\221@C\266|k\370@\305\202\235+\31…
6 …j\344\346", 100, "\223\015X\340\024\244\2767\027\253\261\232\360(?\350H7\326K\322\246\341\222\202:…
7K\3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100,…
9k\004.\327\354\217,\357\353]I0\332We\245\257\371,\260\360\325\224\026q[VuS\217\004\262\376T\353\26…
13256n\006\250\2615\325\371", 200, "\213J\234\270\227$St\265\035\323\001&\025\027T>\015F\205\325\361…
14k\323o\271Y\335\306\375#\333\222\246?C\313\023\202>\005\025\216", 200, "\371\373\341\202(\231\010\…
15 …4\002\333J;\262", 200, "\3206K,\267r<\302r\207y\373\3625]2Y\3710\343\272\211\202\3465g\340jG\001`\…
17256\300\364\212\271\306q\242?-\307\324\317y^\201t\272\371\331M;c\210\202\201\221\363\030", 200, "\…
18 …0U\3621\301\316}k\362\306\227:\233+\000\230\334:,\005\307q\204\332L[\236\223\225\204y\037\037\262o…
[all …]
H A Dinit_test.sh13 geli init -B none -e $ealgo -l $keylen -P -K keyfile \
15 atf_check geli attach -p -k keyfile ${md}
75 atf_check -s exit:0 -o ignore geli init -B none -P -K keyfile ${md}
82 atf_check -s exit:0 -o ignore geli init -P -K keyfile ${md}
87 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md}
89 atf_check -s exit:0 -o ignore geli attach -p -k keyfile ${md}
96 geli init -B backupfile -P -K keyfile ${md}
101 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md}
103 atf_check geli attach -p -k keyfile ${md}
134 geli init -i ${iter} -B none -J passfile0 -P -K keyfile0 ${md}
[all …]
/freebsd/sys/contrib/zlib/
H A Dcrc32.c173 Return x^(n * 2^k) modulo p(x). Requires that x2n_table[] has been
176 local z_crc_t x2nmodp(z_off64_t n, unsigned k) { in x2nmodp() argument
182 p = multmodp(x2n_table[k & 31], p); in x2nmodp()
184 k++; in x2nmodp()
194 local z_crc_t FAR crc_table[256];
196 local z_word_t FAR crc_big_table[256];
197 local z_crc_t FAR crc_braid_table[W][256];
198 local z_word_t FAR crc_braid_big_table[W][256];
199 local void braid(z_crc_t [][256], z_word_t [][256], int, int);
315 for (i = 0; i < 256; i++) { in make_crc_table()
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Target/X86/
H A DX86SchedSapphireRapids.td577 "^VMOVDQA(32|64)Z((256)?)rr((_REV)?)$",
579 "^VMOVDQU(8|16|32|64)Z((256)?)rr((_REV)?)$")>;
602 "^V(ADD|SUB)PSZ128rm((b|k|bk|kz)?)$",
611 "^V(ADD|SUB)PSZ(128|256)rr(k?)$",
613 "^VPSHUFBZ(128|256)rrk(z?)$",
614 "^VPSHUF(H|L)WZ(128|256)rik(z?)$",
615 "^VPUNPCK(H|L)(BW|WD)Z(128|256)rrk(z?)$")>;
626 "^VPOPCNT(D|Q)Z128rm(b|k|kz)$",
633 … "^VPM(AX|IN)(S|U)QZ128rm((b|k|bk|kz)?)$",
637 def : InstRW<[SPRWriteResGroup10, ReadAfterVecYLd], (instregex "^VFPCLASSP(D|H|S)Z((256)?)rm$",
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-enc.pod.in23 [B<-k> I<password>]
25 [B<-K> I<key>]
117 =item B<-k> I<password>
131 The default algorithm is sha-256.
171 =item B<-K> I<key>
176 key given with the B<-K> option will be used and the IV generated from the
183 of hex digits. When only the key is specified using the B<-K> option, the
196 =item B<-bufsize> I<number>[B<k>]
200 The B<k> suffix can be specified to indicate that I<number> is provided
288 is better than 1 in 256 it isn't a very good test.
[all …]
/freebsd/contrib/bearssl/src/ec/
H A Dec_p256_m64.c76 * Values may reach up to 2^256-1. Montgomery multiplication is used.
79 /* R = 2^256 mod p */
116 * Fold carry t, using: 2^256 = 2^224 - 2^192 - 2^96 + 1 mod p. in f256_add()
154 * do by adding 2^256 - p. in f256_add()
197 * p = 2^256 - 2^224 + 2^192 + 2^96 - 1. in f256_sub()
235 * add 2^256, then subtract 2^256 - p. in f256_sub()
278 * We also have: f*p = f*2^256 - f*2^224 + f*2^192 + f*2^96 - f. in f256_montymul()
333 * At that point, we have computed t = (a*b + F*p) / 2^256, where in f256_montymul()
334 * F is a 256-bit integer whose limbs are the "f" coefficients in f256_montymul()
336 * a <= 2^256-1 in f256_montymul()
[all …]
H A Dec_c25519_m64.c117 * 2^256+74; thus, the carry cc is equal to 0, 1 or 2. in f255_add()
134 unsigned char k; in f255_add()
136 k = _addcarry_u64(0, a[0], b[0], &t0); in f255_add()
137 k = _addcarry_u64(k, a[1], b[1], &t1); in f255_add()
138 k = _addcarry_u64(k, a[2], b[2], &t2); in f255_add()
139 k = _addcarry_u64(k, a[3], b[3], &t3); in f255_add()
140 cc = (k << 1) + (t3 >> 63); in f255_add()
145 * 2^256+74; thus, the carry cc is equal to 0, 1 or 2. in f255_add()
151 k = _addcarry_u64(0, t0, 19 * cc, &d[0]); in f255_add()
152 k = _addcarry_u64(k, t1, 0, &d[1]); in f255_add()
[all …]
/freebsd/contrib/llvm-project/clang/lib/Headers/
H A Davxneconvertintrin.h26 __min_vector_width__(256)))
79 /// A 256-bit vector of [8 x float].
87 /// dst[MAX:256] := 0
145 /// A 256-bit vector of [8 x float].
153 /// dst[MAX:256] := 0
181 /// k := j*2
182 /// i := k*16
207 /// A pointer to a 256-bit memory location containing 16 consecutive
210 /// A 256-bit vector of [8 x float].
214 /// k := j*2
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Drc4.c19 u32 i, j, k; in rc4_skip() local
20 u8 S[256], *pos; in rc4_skip()
24 for (i = 0; i < 256; i++) in rc4_skip()
28 for (i = 0; i < 256; i++) { in rc4_skip()
38 for (k = 0; k < skip; k++) { in rc4_skip()
46 for (k = 0; k < data_len; k++) { in rc4_skip()
/freebsd/contrib/bearssl/test/
H A Dtest_speed.c53 long k; \
57 for (k = num; k > 0; k --) { \
105 long k; \
109 for (k = num; k > 0; k --) { \
154 long k; \
158 for (k = num; k > 0; k --) { \
201 long k; \
204 for (k = num; k > 0; k --) { \
205 bc(key, iv, (uint32_t)k, buf, sizeof buf); \
222 SPEED_HASH(SHA-256, sha256) in SPEED_HASH()
[all …]
/freebsd/sys/cddl/boot/zfs/
H A Dsha256.c32 * SHA-256 and SHA-512/256 hashes, as specified in FIPS 180-4, available at:
35 * This is a very compact implementation of SHA-256 and SHA-512/256.
51 /* SHA-224/256 operations */
63 /* SHA-256 round constants */
193 * Implements the SHA-224 and SHA-256 hash algos - to select between them
202 unsigned i, k; in SHA256() local
209 for (k = 0; k < padsize; k++) in SHA256()
210 pad[k] = ((const uint8_t *)buf)[k + i]; in SHA256()
250 * of this function is truncated to the first 256 bits that fit into 'zcp'.
256 uint8_t pad[256]; in SHA512()
[all …]
/freebsd/sys/net80211/
H A Dieee80211_crypto_wep.c88 wep_attach(struct ieee80211vap *vap, struct ieee80211_key *k) in wep_attach() argument
107 wep_detach(struct ieee80211_key *k) in wep_detach() argument
109 struct wep_ctx *ctx = k->wk_private; in wep_detach()
117 wep_setkey(struct ieee80211_key *k) in wep_setkey() argument
119 return k->wk_keylen >= 40/NBBY; in wep_setkey()
123 wep_setiv(struct ieee80211_key *k, uint8_t *ivp) in wep_setiv() argument
125 struct wep_ctx *ctx = k->wk_private; in wep_setiv()
130 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; in wep_setiv()
179 wep_encap(struct ieee80211_key *k, struct mbuf *m) in wep_encap() argument
181 struct wep_ctx *ctx = k->wk_private; in wep_encap()
[all …]
/freebsd/sys/dev/vnic/
H A Dnicvf_queues.h53 #define RBDR_SIZE0 0UL /* 8K entries */
54 #define RBDR_SIZE1 1UL /* 16K entries */
55 #define RBDR_SIZE2 2UL /* 32K entries */
56 #define RBDR_SIZE3 3UL /* 64K entries */
57 #define RBDR_SIZE4 4UL /* 126K entries */
58 #define RBDR_SIZE5 5UL /* 256K entries */
59 #define RBDR_SIZE6 6UL /* 512K entries */
61 #define SND_QUEUE_SIZE0 0UL /* 1K entries */
62 #define SND_QUEUE_SIZE1 1UL /* 2K entries */
63 #define SND_QUEUE_SIZE2 2UL /* 4K entries */
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/stat/
H A Dstatx_dioalign.ksh89 # Set recordsize to 128K, and make a 64K file (so only one block) for the
91 log_must zfs set recordsize=128K $TESTDS
92 log_must dd if=/dev/urandom of=$TESTFILE bs=64k count=1
119 # could grow to the recordsize. Our test file is currently a single 64K block,
121 for krs in 64 128 256 512 ; do
143 log_must zfs set recordsize=128K $TESTDS
144 log_must dd if=/dev/urandom of=$TESTFILE bs=192K count=1
149 for krs in 4 8 16 32 64 128 256 512 ; do
160 log_must zfs set recordsize=16K $TESTDS
177 log_mustnot dd if=/dev/urandom of=$TESTFILE bs=1024 count=256 oflag=direct
[all …]
/freebsd/sys/contrib/device-tree/Bindings/pci/
H A Dnvidia,tegra194-pcie.yaml161 a) speed is Gen-2 and MPS is 256B
268 reg = <0x0 0x14180000 0x0 0x00020000>, /* appl registers (128K) */
269 <0x0 0x38000000 0x0 0x00040000>, /* configuration space (256K) */
270 <0x0 0x38040000 0x0 0x00040000>, /* iATU_DMA reg space (256K) */
271 <0x0 0x38080000 0x0 0x00040000>; /* DBI reg space (256K) */
334 reg = <0x00 0x14160000 0x0 0x00020000>, /* appl registers (128K) */
335 <0x00 0x36000000 0x0 0x00040000>, /* configuration space (256K) */
336 <0x00 0x36040000 0x0 0x00040000>, /* iATU_DMA reg space (256K) */
337 <0x00 0x36080000 0x0 0x00040000>, /* DBI reg space (256K) */
338 <0x24 0x30000000 0x0 0x10000000>; /* ECAM (256MB) */
/freebsd/crypto/openssl/include/crypto/
H A Dml_kem.h19 # define ML_KEM_DEGREE 256
21 * With (q-1) an odd multiple of 256, and 17 ("zeta") as a primitive 256th root
22 * of unity, the polynomial (X^256+1) splits in Z_q[X] into 128 irreducible
36 * resulting shared secret "K" (also 32 bytes) and an internal random value "r"
63 * Variant n q k eta1 eta2 du dv secbits
65 * ML-KEM-512 256 3329 2 3 2 10 4 128
66 * ML-KEM-768 256 3329 3 2 2 10 4 192
67 * ML-KEM-1024 256 3329 4 2 2 11 5 256
73 * - "q" (ML_KEM_PRIME above) is the fixed prime (256 * 13 + 1 = 3329) used in
75 * - "k" is the row rank of the square matrix "A", with entries in R_q, that
[all …]
/freebsd/crypto/libecc/src/examples/sss/
H A Dsss.h38 * size of an element in Fp with ~256 bit prime.
54 /* We use SHA-256 for HMAC, so the size is 32 bytes */
68 * - k: the quorum of shares to regenerate the secret (of course k <= n)
75 ATTRIBUTE_WARN_UNUSED_RET int sss_generate(sss_share *shares, unsigned short k, unsigned short n, s…
79 * - k: the quorum of shares to regenerate the secret
80 * - shares: a pointer to the k shares
82 * - secret: the secret value computed from the k shares
84 ATTRIBUTE_WARN_UNUSED_RET int sss_combine(const sss_share *shares, unsigned short k, sss_secret *se…
88 * - shares: a pointer to the input k shares allowing the regeneration
90 * - k: the input shares (of course k <= n)
[all …]
/freebsd/sys/contrib/dev/iwlwifi/
H A Diwl-fh.h37 * of the buffer, which must be 4K aligned. Once this is set up, the device
42 * 31-0: Keep-warm buffer physical base address [35:4], must be 4K aligned
53 * bytes from one another. Each TFD circular buffer in DRAM must be 256-byte
59 * 27-0: TFD CB physical base address [35:8], must be 256-byte aligned
97 * Define the maximum transfer size. (64 / 128 / 256)
160 * 1) Receive Buffer Descriptor (RBD) circular buffer (CB), typically with 256
163 * (typically 4K, although 8K or 16K are also selectable by driver).
168 * 27-0: Receive Buffer physical address bits [35:8], 256-byte aligned
210 * Due to this, the maximum number of filled RBs is 255, instead of 256. To
229 * 27-0: RBD CD physical base address [35:8], must be 256-byte aligned.
[all …]
/freebsd/contrib/libfido2/man/
H A Dfido2-token.149 .Fl k Ar key_path
74 .Fl k Ar key_path
88 .Op Fl k Ar rp_id Fl i Ar cred_id
93 .Op Fl k Ar rp_id
118 .Fl k Ar key_path
134 .Fl k Ar user_id
164 .It Fl D Fl b Fl k Ar key_path Ar device
173 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key.
206 .It Fl G Fl b Fl k Ar key_path Ar blob_path Ar device
215 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key.
[all …]
/freebsd/crypto/krb5/src/util/et/
H A Det_h.awk14 c2n["K"]=11
40 c2n["k"]=37
82 # figure out: table_number_base=table_number*256
83 tab_base_low = tab_base_low * 256
84 tab_base_high = (tab_base_high * 256) + int(tab_base_low / mod_base)
87 if (table_number > 128*256*256) {
88 # figure out: table_number_base -= 256*256*256*256
89 # sub_high, sub_low is 256*256*256*256
90 sub_low = 256*256*256 % mod_base
91 sub_high = int(256*256*256 / mod_base)
[all …]

12345678910>>...46