| /freebsd/tools/regression/ccd/layout/ |
| H A D | ccd0.sh | 16 foo 128k 128k 128k 128k 0 0 17 foo 128k 128k 128k 128k 0 4 18 foo 128k 128k 128k 128k 4 0 19 foo 128k 128k 128k 128k 4 2 20 foo 128k 128k 128k 128k 4 4 22 foo 256k 128k 128k 128k 0 0 23 foo 256k 128k 128k 128k 0 4 24 foo 256k 128k 128k 128k 4 0 25 foo 256k 128k 128k 128k 4 2 26 foo 256k 128k 128k 128k 4 4 [all …]
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_ecdsa_rfc6979.txt | 387 Title = RFC 6979 P-256 deterministic ECDSA tests 389 PrivateKey=P-256_PRIV 395 PublicKey=P-256_PUB 401 PrivPubKeyPair=P-256_PRIV:P-256_PUB 404 Key = P-256_PRIV 410 Key = P-256_PUB 415 Key = P-256_PUB 421 Key = P-256_PRIV 427 Key = P-256_PUB 432 Key = P-256_PUB [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-enc.1 | 80 [\fB\-k\fR \fIpassword\fR] 82 [\fB\-K\fR \fIkey\fR] 163 .IP "\fB\-k\fR \fIpassword\fR" 4 164 .IX Item "-k password" 175 The default algorithm is sha\-256. 208 .IP "\fB\-K\fR \fIkey\fR" 4 209 .IX Item "-K key" 213 key given with the \fB\-K\fR option will be used and the IV generated from the 219 of hex digits. When only the key is specified using the \fB\-K\fR option, the 229 .IP "\fB\-bufsize\fR \fInumber\fR[\fBk\fR]" 4 [all …]
|
| /freebsd/crypto/heimdal/lib/asn1/ |
| H A D | der_length.c | 49 val /= 256; in _heim_len_unsigned() 67 val /= 256; in _heim_len_int() 84 q = val % 256; 86 val /= 256; in len_oid() 93 q = ~(val % 256); in len_oid() 95 val /= 256; in len_oid() 111 q = val % 256; in der_length_len() 113 val /= 256; in der_length_len() 120 q = ~(val % 256); in der_length_tag() 122 val /= 256; in der_length_tag() 192 der_length_octet_string(const heim_octet_string * k) der_length_octet_string() argument 198 der_length_heim_integer(const heim_integer * k) der_length_heim_integer() argument 209 der_length_oid(const heim_oid * k) der_length_oid() argument 217 heim_octet_string k; der_length_generalized_time() local 229 heim_octet_string k; der_length_utctime() local 239 der_length_boolean(const int * k) der_length_boolean() argument 245 der_length_bit_string(const heim_bit_string * k) der_length_bit_string() argument [all...] |
| H A D | der_put.c | 54 *p-- = val % 256; in der_put_unsigned() 55 val /= 256; in der_put_unsigned() 86 *p-- = val % 256; in der_put_integer() 87 val /= 256; in der_put_integer() 120 *p-- = val % 256; in der_put_length() 122 val /= 256; in der_put_length() 135 *p-- = ~(val % 256); in der_put_length() 137 val /= 256; in der_put_length() 160 *p-- = val % 256; in der_put_general_string() 162 val /= 256; in der_put_general_string() 305 heim_octet_string k; der_put_generalized_time() local 325 heim_octet_string k; der_put_utctime() local [all...] |
| /freebsd/tests/sys/geom/class/eli/ |
| H A D | testvect.h | 3 …74H\263\312m\336\304\3515P\222Cb\037-\313W\0067\232\024%\235\252\322\035\225k\025\2248\251r\312]v\… 5 …333&\011'\360?\022\374P\336\337\031\266,~@!\037\000\320v\360!\225\221@C\266|k\370@\305\202\235+\31… 6 …j\344\346", 100, "\223\015X\340\024\244\2767\027\253\261\232\360(?\350H7\326K\322\246\341\222\202:… 7 …K\3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100,… 9 …k\004.\327\354\217,\357\353]I0\332We\245\257\371,\260\360\325\224\026q[VuS\217\004\262\376T\353\26… 13 …256n\006\250\2615\325\371", 200, "\213J\234\270\227$St\265\035\323\001&\025\027T>\015F\205\325\361… 14 …k\323o\271Y\335\306\375#\333\222\246?C\313\023\202>\005\025\216", 200, "\371\373\341\202(\231\010\… 15 …4\002\333J;\262", 200, "\3206K,\267r<\302r\207y\373\3625]2Y\3710\343\272\211\202\3465g\340jG\001`\… 17 …256\300\364\212\271\306q\242?-\307\324\317y^\201t\272\371\331M;c\210\202\201\221\363\030", 200, "\… 18 …0U\3621\301\316}k\362\306\227:\233+\000\230\334:,\005\307q\204\332L[\236\223\225\204y\037\037\262o… [all …]
|
| H A D | init_test.sh | 13 geli init -B none -e $ealgo -l $keylen -P -K keyfile \ 15 atf_check geli attach -p -k keyfile ${md} 75 atf_check -s exit:0 -o ignore geli init -B none -P -K keyfile ${md} 82 atf_check -s exit:0 -o ignore geli init -P -K keyfile ${md} 87 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md} 89 atf_check -s exit:0 -o ignore geli attach -p -k keyfile ${md} 96 geli init -B backupfile -P -K keyfile ${md} 101 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md} 103 atf_check geli attach -p -k keyfile ${md} 134 geli init -i ${iter} -B none -J passfile0 -P -K keyfile0 ${md} [all …]
|
| /freebsd/sys/contrib/zlib/ |
| H A D | crc32.c | 173 Return x^(n * 2^k) modulo p(x). Requires that x2n_table[] has been 176 local z_crc_t x2nmodp(z_off64_t n, unsigned k) { in x2nmodp() argument 182 p = multmodp(x2n_table[k & 31], p); in x2nmodp() 184 k++; in x2nmodp() 194 local z_crc_t FAR crc_table[256]; 196 local z_word_t FAR crc_big_table[256]; 197 local z_crc_t FAR crc_braid_table[W][256]; 198 local z_word_t FAR crc_braid_big_table[W][256]; 199 local void braid(z_crc_t [][256], z_word_t [][256], int, int); 315 for (i = 0; i < 256; i++) { in make_crc_table() [all …]
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/X86/ |
| H A D | X86SchedSapphireRapids.td | 577 "^VMOVDQA(32|64)Z((256)?)rr((_REV)?)$", 579 "^VMOVDQU(8|16|32|64)Z((256)?)rr((_REV)?)$")>; 602 "^V(ADD|SUB)PSZ128rm((b|k|bk|kz)?)$", 611 "^V(ADD|SUB)PSZ(128|256)rr(k?)$", 613 "^VPSHUFBZ(128|256)rrk(z?)$", 614 "^VPSHUF(H|L)WZ(128|256)rik(z?)$", 615 "^VPUNPCK(H|L)(BW|WD)Z(128|256)rrk(z?)$")>; 626 "^VPOPCNT(D|Q)Z128rm(b|k|kz)$", 633 … "^VPM(AX|IN)(S|U)QZ128rm((b|k|bk|kz)?)$", 637 def : InstRW<[SPRWriteResGroup10, ReadAfterVecYLd], (instregex "^VFPCLASSP(D|H|S)Z((256)?)rm$", [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-enc.pod.in | 23 [B<-k> I<password>] 25 [B<-K> I<key>] 117 =item B<-k> I<password> 131 The default algorithm is sha-256. 171 =item B<-K> I<key> 176 key given with the B<-K> option will be used and the IV generated from the 183 of hex digits. When only the key is specified using the B<-K> option, the 196 =item B<-bufsize> I<number>[B<k>] 200 The B<k> suffix can be specified to indicate that I<number> is provided 288 is better than 1 in 256 it isn't a very good test. [all …]
|
| /freebsd/contrib/bearssl/src/ec/ |
| H A D | ec_p256_m64.c | 76 * Values may reach up to 2^256-1. Montgomery multiplication is used. 79 /* R = 2^256 mod p */ 116 * Fold carry t, using: 2^256 = 2^224 - 2^192 - 2^96 + 1 mod p. in f256_add() 154 * do by adding 2^256 - p. in f256_add() 197 * p = 2^256 - 2^224 + 2^192 + 2^96 - 1. in f256_sub() 235 * add 2^256, then subtract 2^256 - p. in f256_sub() 278 * We also have: f*p = f*2^256 - f*2^224 + f*2^192 + f*2^96 - f. in f256_montymul() 333 * At that point, we have computed t = (a*b + F*p) / 2^256, where in f256_montymul() 334 * F is a 256-bit integer whose limbs are the "f" coefficients in f256_montymul() 336 * a <= 2^256-1 in f256_montymul() [all …]
|
| H A D | ec_c25519_m64.c | 117 * 2^256+74; thus, the carry cc is equal to 0, 1 or 2. in f255_add() 134 unsigned char k; in f255_add() 136 k = _addcarry_u64(0, a[0], b[0], &t0); in f255_add() 137 k = _addcarry_u64(k, a[1], b[1], &t1); in f255_add() 138 k = _addcarry_u64(k, a[2], b[2], &t2); in f255_add() 139 k = _addcarry_u64(k, a[3], b[3], &t3); in f255_add() 140 cc = (k << 1) + (t3 >> 63); in f255_add() 145 * 2^256+74; thus, the carry cc is equal to 0, 1 or 2. in f255_add() 151 k = _addcarry_u64(0, t0, 19 * cc, &d[0]); in f255_add() 152 k = _addcarry_u64(k, t1, 0, &d[1]); in f255_add() [all …]
|
| /freebsd/contrib/llvm-project/clang/lib/Headers/ |
| H A D | avxneconvertintrin.h | 26 __min_vector_width__(256))) 79 /// A 256-bit vector of [8 x float]. 87 /// dst[MAX:256] := 0 145 /// A 256-bit vector of [8 x float]. 153 /// dst[MAX:256] := 0 181 /// k := j*2 182 /// i := k*16 207 /// A pointer to a 256-bit memory location containing 16 consecutive 210 /// A 256-bit vector of [8 x float]. 214 /// k := j*2 [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | rc4.c | 19 u32 i, j, k; in rc4_skip() local 20 u8 S[256], *pos; in rc4_skip() 24 for (i = 0; i < 256; i++) in rc4_skip() 28 for (i = 0; i < 256; i++) { in rc4_skip() 38 for (k = 0; k < skip; k++) { in rc4_skip() 46 for (k = 0; k < data_len; k++) { in rc4_skip()
|
| /freebsd/contrib/bearssl/test/ |
| H A D | test_speed.c | 53 long k; \ 57 for (k = num; k > 0; k --) { \ 105 long k; \ 109 for (k = num; k > 0; k --) { \ 154 long k; \ 158 for (k = num; k > 0; k --) { \ 201 long k; \ 204 for (k = num; k > 0; k --) { \ 205 bc(key, iv, (uint32_t)k, buf, sizeof buf); \ 222 SPEED_HASH(SHA-256, sha256) in SPEED_HASH() [all …]
|
| /freebsd/sys/cddl/boot/zfs/ |
| H A D | sha256.c | 32 * SHA-256 and SHA-512/256 hashes, as specified in FIPS 180-4, available at: 35 * This is a very compact implementation of SHA-256 and SHA-512/256. 51 /* SHA-224/256 operations */ 63 /* SHA-256 round constants */ 193 * Implements the SHA-224 and SHA-256 hash algos - to select between them 202 unsigned i, k; in SHA256() local 209 for (k = 0; k < padsize; k++) in SHA256() 210 pad[k] = ((const uint8_t *)buf)[k + i]; in SHA256() 250 * of this function is truncated to the first 256 bits that fit into 'zcp'. 256 uint8_t pad[256]; in SHA512() [all …]
|
| /freebsd/sys/net80211/ |
| H A D | ieee80211_crypto_wep.c | 88 wep_attach(struct ieee80211vap *vap, struct ieee80211_key *k) in wep_attach() argument 107 wep_detach(struct ieee80211_key *k) in wep_detach() argument 109 struct wep_ctx *ctx = k->wk_private; in wep_detach() 117 wep_setkey(struct ieee80211_key *k) in wep_setkey() argument 119 return k->wk_keylen >= 40/NBBY; in wep_setkey() 123 wep_setiv(struct ieee80211_key *k, uint8_t *ivp) in wep_setiv() argument 125 struct wep_ctx *ctx = k->wk_private; in wep_setiv() 130 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; in wep_setiv() 179 wep_encap(struct ieee80211_key *k, struct mbuf *m) in wep_encap() argument 181 struct wep_ctx *ctx = k->wk_private; in wep_encap() [all …]
|
| /freebsd/sys/dev/vnic/ |
| H A D | nicvf_queues.h | 53 #define RBDR_SIZE0 0UL /* 8K entries */ 54 #define RBDR_SIZE1 1UL /* 16K entries */ 55 #define RBDR_SIZE2 2UL /* 32K entries */ 56 #define RBDR_SIZE3 3UL /* 64K entries */ 57 #define RBDR_SIZE4 4UL /* 126K entries */ 58 #define RBDR_SIZE5 5UL /* 256K entries */ 59 #define RBDR_SIZE6 6UL /* 512K entries */ 61 #define SND_QUEUE_SIZE0 0UL /* 1K entries */ 62 #define SND_QUEUE_SIZE1 1UL /* 2K entries */ 63 #define SND_QUEUE_SIZE2 2UL /* 4K entries */ [all …]
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/stat/ |
| H A D | statx_dioalign.ksh | 89 # Set recordsize to 128K, and make a 64K file (so only one block) for the 91 log_must zfs set recordsize=128K $TESTDS 92 log_must dd if=/dev/urandom of=$TESTFILE bs=64k count=1 119 # could grow to the recordsize. Our test file is currently a single 64K block, 121 for krs in 64 128 256 512 ; do 143 log_must zfs set recordsize=128K $TESTDS 144 log_must dd if=/dev/urandom of=$TESTFILE bs=192K count=1 149 for krs in 4 8 16 32 64 128 256 512 ; do 160 log_must zfs set recordsize=16K $TESTDS 177 log_mustnot dd if=/dev/urandom of=$TESTFILE bs=1024 count=256 oflag=direct [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/pci/ |
| H A D | nvidia,tegra194-pcie.yaml | 161 a) speed is Gen-2 and MPS is 256B 268 reg = <0x0 0x14180000 0x0 0x00020000>, /* appl registers (128K) */ 269 <0x0 0x38000000 0x0 0x00040000>, /* configuration space (256K) */ 270 <0x0 0x38040000 0x0 0x00040000>, /* iATU_DMA reg space (256K) */ 271 <0x0 0x38080000 0x0 0x00040000>; /* DBI reg space (256K) */ 334 reg = <0x00 0x14160000 0x0 0x00020000>, /* appl registers (128K) */ 335 <0x00 0x36000000 0x0 0x00040000>, /* configuration space (256K) */ 336 <0x00 0x36040000 0x0 0x00040000>, /* iATU_DMA reg space (256K) */ 337 <0x00 0x36080000 0x0 0x00040000>, /* DBI reg space (256K) */ 338 <0x24 0x30000000 0x0 0x10000000>; /* ECAM (256MB) */
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ml_kem.h | 19 # define ML_KEM_DEGREE 256 21 * With (q-1) an odd multiple of 256, and 17 ("zeta") as a primitive 256th root 22 * of unity, the polynomial (X^256+1) splits in Z_q[X] into 128 irreducible 36 * resulting shared secret "K" (also 32 bytes) and an internal random value "r" 63 * Variant n q k eta1 eta2 du dv secbits 65 * ML-KEM-512 256 3329 2 3 2 10 4 128 66 * ML-KEM-768 256 3329 3 2 2 10 4 192 67 * ML-KEM-1024 256 3329 4 2 2 11 5 256 73 * - "q" (ML_KEM_PRIME above) is the fixed prime (256 * 13 + 1 = 3329) used in 75 * - "k" is the row rank of the square matrix "A", with entries in R_q, that [all …]
|
| /freebsd/crypto/libecc/src/examples/sss/ |
| H A D | sss.h | 38 * size of an element in Fp with ~256 bit prime. 54 /* We use SHA-256 for HMAC, so the size is 32 bytes */ 68 * - k: the quorum of shares to regenerate the secret (of course k <= n) 75 ATTRIBUTE_WARN_UNUSED_RET int sss_generate(sss_share *shares, unsigned short k, unsigned short n, s… 79 * - k: the quorum of shares to regenerate the secret 80 * - shares: a pointer to the k shares 82 * - secret: the secret value computed from the k shares 84 ATTRIBUTE_WARN_UNUSED_RET int sss_combine(const sss_share *shares, unsigned short k, sss_secret *se… 88 * - shares: a pointer to the input k shares allowing the regeneration 90 * - k: the input shares (of course k <= n) [all …]
|
| /freebsd/sys/contrib/dev/iwlwifi/ |
| H A D | iwl-fh.h | 37 * of the buffer, which must be 4K aligned. Once this is set up, the device 42 * 31-0: Keep-warm buffer physical base address [35:4], must be 4K aligned 53 * bytes from one another. Each TFD circular buffer in DRAM must be 256-byte 59 * 27-0: TFD CB physical base address [35:8], must be 256-byte aligned 97 * Define the maximum transfer size. (64 / 128 / 256) 160 * 1) Receive Buffer Descriptor (RBD) circular buffer (CB), typically with 256 163 * (typically 4K, although 8K or 16K are also selectable by driver). 168 * 27-0: Receive Buffer physical address bits [35:8], 256-byte aligned 210 * Due to this, the maximum number of filled RBs is 255, instead of 256. To 229 * 27-0: RBD CD physical base address [35:8], must be 256-byte aligned. [all …]
|
| /freebsd/contrib/libfido2/man/ |
| H A D | fido2-token.1 | 49 .Fl k Ar key_path 74 .Fl k Ar key_path 88 .Op Fl k Ar rp_id Fl i Ar cred_id 93 .Op Fl k Ar rp_id 118 .Fl k Ar key_path 134 .Fl k Ar user_id 164 .It Fl D Fl b Fl k Ar key_path Ar device 173 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key. 206 .It Fl G Fl b Fl k Ar key_path Ar blob_path Ar device 215 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key. [all …]
|
| /freebsd/crypto/krb5/src/util/et/ |
| H A D | et_h.awk | 14 c2n["K"]=11 40 c2n["k"]=37 82 # figure out: table_number_base=table_number*256 83 tab_base_low = tab_base_low * 256 84 tab_base_high = (tab_base_high * 256) + int(tab_base_low / mod_base) 87 if (table_number > 128*256*256) { 88 # figure out: table_number_base -= 256*256*256*256 89 # sub_high, sub_low is 256*256*256*256 90 sub_low = 256*256*256 % mod_base 91 sub_high = int(256*256*256 / mod_base) [all …]
|