Home
last modified time | relevance | path

Searched +full:48 +full:k (Results 1 – 25 of 800) sorted by relevance

12345678910>>...32

/freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/
H A Daeskey.c82 #define ke4(k, i) \ argument
83 { k[4 * (i) + 4] = ss[0] ^= ls_box(ss[3], 3) ^ t_use(r, c)[i]; \
84 k[4 * (i) + 5] = ss[1] ^= ss[0]; \
85 k[4 * (i) + 6] = ss[2] ^= ss[1]; \
86 k[4 * (i) + 7] = ss[3] ^= ss[2]; \
116 #define kef6(k, i) \ argument
117 { k[6 * (i) + 6] = ss[0] ^= ls_box(ss[5], 3) ^ t_use(r, c)[i]; \
118 k[6 * (i) + 7] = ss[1] ^= ss[0]; \
119 k[6 * (i) + 8] = ss[2] ^= ss[1]; \
120 k[6 * (i) + 9] = ss[3] ^= ss[2]; \
[all …]
/freebsd/crypto/krb5/src/lib/crypto/builtin/aes/
H A Daeskey.c85 #define ke4(k,i) \ argument
86 { k[4*(i)+4] = ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; \
87 k[4*(i)+5] = ss[1] ^= ss[0]; \
88 k[4*(i)+6] = ss[2] ^= ss[1]; \
89 k[4*(i)+7] = ss[3] ^= ss[2]; \
128 #define kef6(k,i) \ argument
129 { k[6*(i)+ 6] = ss[0] ^= ls_box(ss[5],3) ^ t_use(r,c)[i]; \
130 k[6*(i)+ 7] = ss[1] ^= ss[0]; \
131 k[6*(i)+ 8] = ss[2] ^= ss[1]; \
132 k[6*(i)+ 9] = ss[3] ^= ss[2]; \
[all …]
/freebsd/lib/msun/src/
H A Ds_exp2.c90 0x1.925c353aa2ff9p-1, 0x1.5400p-48,
103 0x1.a0c667b5de54dp-1, -0x1.5000p-48,
140 0x1.ccb0f2e6d1689p-1, 0x1.0200p-48,
141 0x1.cdf0b555dc412p-1, 0x1.3600p-48,
150 0x1.d955d71ff6090p-1, 0x1.4c00p-48,
151 0x1.da9e603db32aep-1, 0x1.f900p-48,
153 0x1.dd321f301b445p-1, -0x1.5200p-48,
162 0x1.e8f7977cdb726p-1, -0x1.3700p-48,
165 0x1.ecf482d8e680dp-1, 0x1.5500p-48,
168 0x1.f0f9c1cb64106p-1, -0x1.a880p-48,
345 int k; exp2() local
[all...]
/freebsd/crypto/openssl/crypto/chacha/asm/
H A Dchacha-armv8.pl43 # ThunderX2 7.22/+48% 5.64 4.10
179 stp x23,x24,[sp,#48]
255 ldp @x[13],@x[15],[$inp,#48]
280 stp @x[12],@x[14],[$out,#48]
288 ldp x23,x24,[x29,#48]
327 stp @x[12],@x[14],[sp,#48]
340 stp xzr,xzr,[sp,#48]
345 ldp x23,x24,[x29,#48]
390 my @K = map("v$_.4s",(0..3));
483 stp x23,x24,[sp,#48]
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dmilenage.c27 * @opc: OPc = 128-bit value derived from OP and K
28 * @k: K = 128-bit subscriber key
30 * @sqn: SQN = 48-bit sequence number
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument
45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1()
64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1()
78 * @opc: OPc = 128-bit value derived from OP and K
79 * @k: K = 128-bit subscriber key
84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
[all …]
H A Dsha384.c23 * @mac: Buffer for the hash (48 bytes)
30 unsigned char tk[48]; in hmac_sha384_vector()
47 key_len = 48; in hmac_sha384_vector()
52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector()
54 * where K is an n byte key in hmac_sha384_vector()
97 * @mac: Buffer for the hash (48 bytes)
/freebsd/stand/forth/
H A Dmenu.4th170 : +c! ( N C-ADDR/U K -- C-ADDR/U )
171 3 pick 3 pick ( n c-addr/u k -- n c-addr/u k n c-addr )
172 rot + c! ( n c-addr/u k n c-addr -- n c-addr/u )
241 menuidx @ 48 +
300 s" kernel_state" evaluate @ 48 + s" kernel[N]" 7 +c! getenv
393 kerncapbuf 0 s" [K]ernel: " strcat
517 \ ASCII of 48 plus the menu item (ie. 58 for the tenth item, aka. `:')
528 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' )
547 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' )
552 s" kernel_state" evaluate @ 48 + ( n -- n y )
[all …]
/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_fw_mmp.h44 * Input parameter list for ECC P384 Variable Point Multiplication [k]P ,
52 uint64_t k; /**< k = scalar (6 qwords)*/ member
58 * Input parameter list for ECC P384 Generator Point Multiplication [k]G ,
64 uint64_t k; /**< k = scalar (6 qwords)*/ member
76 uint64_t k; /**< k = random value, &gt; 0 and &lt; n (order of G for P384) member
85 * Input parameter list for ECC P256 Variable Point Multiplication [k]P ,
93 uint64_t k; /**< k = scalar (4 qwords)*/ member
99 * Input parameter list for ECC P256 Generator Point Multiplication [k]G ,
105 uint64_t k; /**< k = scalar (4 qwords)*/ member
117 uint64_t k; /**< k = random value, &gt; 0 and &lt; n (order of G for P256) member
[all …]
/freebsd/crypto/openssl/crypto/camellia/asm/
H A Dcmllt4-sparcv9.pl107 ldd [$key + 48], %f20
129 ldd [$key + 48], %f24
203 ldd [$key - 48], %f22
222 ldd [$key - 48], %f22
319 std %f0, [$out + 0] ! k[0, 1]
321 std %f2, [$out + 8] ! k[2, 3]
338 std %f0, [$out + 0] ! k[0, 1]
340 std %f2, [$out + 8] ! k[2, 3]
363 std %f0, [$out + 0x10] ! k[ 4, 5]
364 std %f2, [$out + 0x18] ! k[ 6, 7]
[all …]
/freebsd/contrib/bearssl/src/ec/
H A Dec_p256_m62.c79 * - top limb is less than 2^48 + 2^30
85 #define MASK48 (BIT(48) - BIT(0))
143 s = a[4] >> 48; /* s < 2^14 */ in f256_partial_reduce()
155 a[4] = w + (s << 16) - cc; /* a[4] < 2^48 + 2^30 */ in f256_partial_reduce()
214 * Thus, the value 's' (t[4] / 2^48) will be necessarily in f256_sub()
217 s = t[4] >> 48; in f256_sub()
222 cc = -(w >> 52) & 0xFFF; /* cc <= 48 */ in f256_sub()
229 d[4] = (t[4] & MASK48) + (s << 16) - cc; /* d[4] < 2^48 + 2^30 */ in f256_sub()
263 * the factor f fits on 52 bits, so f<<48 fits on in f256_montymul()
291 + ((unsigned __int128)f << 48) in f256_montymul()
[all …]
/freebsd/tests/sys/geom/class/eli/
H A Dtestvect.h3 …74H\263\312m\336\304\3515P\222Cb\037-\313W\0067\232\024%\235\252\322\035\225k\025\2248\251r\312]v\…
5 …333&\011'\360?\022\374P\336\337\031\266,~@!\037\000\320v\360!\225\221@C\266|k\370@\305\202\235+\31…
6 …j\344\346", 100, "\223\015X\340\024\244\2767\027\253\261\232\360(?\350H7\326K\322\246\341\222\202:…
7K\3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100,…
9 …{ ",;\270P\012\035\262\235", 8, "\375 \232J\304\271_\272\033\027\363\021\227\260\323\310\304k\004.…
13 …7\235l$\355\037\214\220\032\213\320\265lM\334\320\313+\205.\355\310\201K\370^\025\134\346[K", 64 },
14 …{ "9s72\020\270\251\350", 8, "\323\370:k\323o\271Y\335\306\375#\333\222\246?C\313\023\202>\005\025…
15 …4\002\333J;\262", 200, "\3206K,\267r<\302r\207y\373\3625]2Y\3710\343\272\211\202\3465g\340jG\001`\…
17 …1YS\230\231|\356\024D8\243f\223\335\207\361\2241=\264\0366\030\230Z0\340\226K\352\241C\355\260\236…
18 …\267c\253\354\301\221X", 200, "\017m\031\004\022\364(\016\310U\3621\301\316}k\362\306\227:\233+\00…
[all …]
/freebsd/contrib/bearssl/src/hash/
H A Dmd5.c39 static const uint32_t K[64] = { variable
61 static const unsigned char MP[48] = {
87 a = b + ROTL(a + F(b, c, d) + m[i + 0] + K[i + 0], 7); in br_md5_round()
88 d = a + ROTL(d + F(a, b, c) + m[i + 1] + K[i + 1], 12); in br_md5_round()
89 c = d + ROTL(c + F(d, a, b) + m[i + 2] + K[i + 2], 17); in br_md5_round()
90 b = c + ROTL(b + F(c, d, a) + m[i + 3] + K[i + 3], 22); in br_md5_round()
93 a = b + ROTL(a + G(b, c, d) + m[MP[i - 16]] + K[i + 0], 5); in br_md5_round()
94 d = a + ROTL(d + G(a, b, c) + m[MP[i - 15]] + K[i + 1], 9); in br_md5_round()
95 c = d + ROTL(c + G(d, a, b) + m[MP[i - 14]] + K[i + 2], 14); in br_md5_round()
96 b = c + ROTL(b + G(c, d, a) + m[MP[i - 13]] + K[i + 3], 20); in br_md5_round()
[all …]
/freebsd/crypto/openssl/crypto/aes/asm/
H A Dvpaes-loongarch64.pl86 vxor.v $vr4,$vr4,$vr5 # 4 = sb1u + k
111 vori.b $vr5,$vr11,0 # 2 : a/k
114 vand.v $vr0,$vr0,$vr9 # 0 = k
115 vshuf.b $vr5,$vr18,$vr5,$vr0 # 2 = a/k
120 vxor.v $vr3,$vr3,$vr5 # 3 = iak = 1/i + a/k
123 vxor.v $vr4,$vr4,$vr5 # 4 = jak = 1/j + a/k
136 vxor.v $vr4,$vr4,$vr5 # 4 = sb1u + k
174 vld $vr5,$t0,48
222 vori.b $vr2,$vr11,0 # 2 : a/k
224 vand.v $vr0,$vr0,$vr9 # 0 = k
[all …]
H A Daesni-sha1-x86_64.pl223 movaps %xmm9,96+48(%rsp)
264 movdqu 48($inp),@X[-1&7]
273 movdqa @X[-4&7],0(%rsp) # X[]+K xfer to IALU
286 my ($n,$k)=($r/10,$r%10);
287 if ($k==0) {
297 movups `32+16*$k-112`($key),$rndkey[1]
300 } elsif ($k==9) {
305 movups `32+16*($k+0)-112`($key),$rndkey[1]
307 movups `32+16*($k+1)-112`($key),$rndkey[0]
310 movups `32+16*($k+2)-112`($key),$rndkey[1]
[all …]
H A Dvpaes-x86.pl48 # (**) "Core 2" refers to initial 65nm design, a.k.a. Conroe.
215 &pxor ("xmm4","xmm5"); # 4 = sb1u + k
239 &movdqa ("xmm5",&QWP($k_inv+16,$const));# 2 : a/k
242 &pand ("xmm0","xmm6"); # 0 = k
243 &pshufb ("xmm5","xmm0"); # 2 = a/k
248 &pxor ("xmm3","xmm5"); # 3 = iak = 1/i + a/k
251 &pxor ("xmm4","xmm5"); # 4 = jak = 1/j + a/k
264 &pxor ("xmm4","xmm5"); # 4 = sb1u + k
294 &movdqa ("xmm5",&QWP($k_mc_forward+48,$const));
341 &movdqa ("xmm2",&QWP($k_inv+16,$const));# 2 : a/k
[all …]
/freebsd/crypto/openssl/crypto/sha/asm/
H A Dsha512-ia64.pl131 K=r15;
280 shrp X[15]=X[15],X[14],48 }
283 shrp X[14]=X[14],X[13],48 };;
286 shrp X[13]=X[13],X[12],48 }
289 shrp X[12]=X[12],X[11],48 };;
292 shrp X[11]=X[11],X[10],48 }
295 shrp X[10]=X[10],X[ 9],48 };;
297 shrp X[ 9]=X[ 9],X[ 8],48
298 shrp X[ 8]=X[ 8],X[ 7],48 }
299 { .mii; shrp X[ 7]=X[ 7],X[ 6],48
[all …]
/freebsd/crypto/openssl/providers/implementations/rands/
H A Ddrbg_ctr.c53 unsigned char K[32]; member
58 unsigned char KX[48];
89 if (!ossl_assert(n <= sizeof(ctr->K))) in ctr_XOR()
92 ctr->K[i] ^= in[i]; in ctr_XOR()
124 * Handle several BCC operations for as much data as we need for K and X
128 unsigned char in_tmp[48]; in ctr_BCC_blocks()
146 unsigned char bltmp[48] = {0}; in ctr_BCC_init()
149 memset(ctr->KX, 0, 48); in ctr_BCC_init()
241 /* Set up key K */ in ctr_df()
244 /* X follows key K */ in ctr_df()
[all …]
/freebsd/share/man/man7/
H A Dascii.750 110 H 111 I 112 J 113 K 114 L 115 M 116 N 117 O
54 150 h 151 i 152 j 153 k 154 l 155 m 156 n 157 o
72 48 H 49 I 4a J 4b K 4c L 4d M 4e N 4f O
76 68 h 69 i 6a j 6b k 6c l 6d m 6e n 6f o
91 48 0 49 1 50 2 51 3 52 4 53 5 54 6 55 7
94 72 H 73 I 74 J 75 K 76 L 77 M 78 N 79 O
98 104 h 105 i 106 j 107 k 108 l 109 m 110 n 111 o
120 VT + K k 01011
H A Darch.7263 .It aarch64 Ta 4K, 64K, 2M, 1G
264 .It aarch64c Ta 4K, 64K, 2M, 1G
265 .It amd64 Ta 4K, 2M, 1G
266 .It armv7 Ta 4K, 1M
267 .It i386 Ta 4K, 2M (PAE), 4M
268 .It powerpc Ta 4K
269 .It powerpcspe Ta 4K
270 .It powerpc64 Ta 4K
271 .It powerpc64le Ta 4K
272 .It riscv64 Ta 4K, 2M, 1G
[all …]
/freebsd/share/misc/
H A Dascii10 |110 H |111 I |112 J |113 K |114 L |115 M |116 N |117 O |
14 |150 h |151 i |152 j |153 k |154 l |155 m |156 n |157 o |
27 | 48 H | 49 I | 4a J | 4b K | 4c L | 4d M | 4e N | 4f O |
31 | 68 h | 69 i | 6a j | 6b k | 6c l | 6d m | 6e n | 6f o |
41 | 48 0 | 49 1 | 50 2 | 51 3 | 52 4 | 53 5 | 54 6 | 55 7 |
44 | 72 H | 73 I | 74 J | 75 K | 76 L | 77 M | 78 N | 79 O |
48 |104 h |105 i |106 j |107 k |108 l |109 m |110 n |111 o |
/freebsd/contrib/netbsd-tests/ipf/expected/
H A Dl1.b22 42 63 44 65 46 67 48 69 4a 6b 4c 6d BcDeFgHiJkLm
26 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN
27 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN
28 01/01/1970 00:00:00.000000 anon0 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN
29 01/01/1970 00:00:00.000000 e1 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -A K-S OUT
30 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -AF K-S IN
33 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN
37 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN
38 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN
39 01/01/1970 00:00:00.000000 anon0 @0:4 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN
[all …]
/freebsd/crypto/openssl/crypto/rc4/asm/
H A Drc4-md5-x86_64.pl92 my @K=( 0xd76aa478,0xe8c7b756,0x242070db,0xc1bdceee,
242 my $k=$i%$MOD;
245 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1);
254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
255 #md5# add \$$K[$i],$a
258 #rc4# movl $TY#d,4*$k($XX[1])
266 $code.=<<___ if ($rc4 && $j==15 && $k==$MOD-1);
282 my $k=$i%$MOD;
285 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1);
294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
[all …]
/freebsd/crypto/openssl/crypto/ec/
H A Decp_nistp384.c49 * can serialize an element of this field into 48 bytes. We call this an
53 typedef u8 felem_bytearray[48];
116 static void bin48_to_felem(felem out, const u8 in[48]) in bin48_to_felem() argument
128 static void felem_to_bin48(u8 out[48], const felem in) in felem_to_bin48() argument
130 memset(out, 0, 48); in felem_to_bin48()
303 * out[i] < out_orig[i] + 2^64 + 2^48
322 + (((widelimb) 1) << 48) in felem_diff_128_64()
500 * out[6] <= 2^48
514 * [3]: Y = 2^48 (acc[6] >> 48)
552 acc[6] += (in[12] & 0xff) << 48; in felem_reduce_ref()
[all …]
/freebsd/sys/contrib/openzfs/module/icp/asm-arm/sha2/
H A Dsha512-armv7.S124 ldr r9, [r0,#48+LO]
125 ldr r10, [r0,#48+HI]
129 str r9, [sp,#48+0]
130 str r10, [sp,#48+4]
200 ldr r11,[sp,#48+0] @ g.lo
202 ldr r12,[sp,#48+4] @ g.hi
213 ldr r11,[r14,#LO] @ K[i].lo
215 ldr r12,[r14,#HI] @ K[i].hi
223 adc r4,r4,r12 @ T += K[i]
340 ldr r11,[sp,#48+0] @ g.lo
[all …]
/freebsd/bin/dd/
H A Dref.pareven5 00000040 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.|
13 000000c0 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.|

12345678910>>...32