/freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
H A D | aeskey.c | 81 #define ke4(k, i) \ argument 82 { k[4 * (i) + 4] = ss[0] ^= ls_box(ss[3], 3) ^ t_use(r, c)[i]; \ 83 k[4 * (i) + 5] = ss[1] ^= ss[0]; \ 84 k[4 * (i) + 6] = ss[2] ^= ss[1]; \ 85 k[4 * (i) + 7] = ss[3] ^= ss[2]; \ 115 #define kef6(k, i) \ argument 116 { k[6 * (i) + 6] = ss[0] ^= ls_box(ss[5], 3) ^ t_use(r, c)[i]; \ 117 k[6 * (i) + 7] = ss[1] ^= ss[0]; \ 118 k[6 * (i) + 8] = ss[2] ^= ss[1]; \ 119 k[6 * (i) + 9] = ss[3] ^= ss[2]; \ [all …]
|
/freebsd/lib/msun/src/ |
H A D | s_exp2.c | 90 0x1.925c353aa2ff9p-1, 0x1.5400p-48, 103 0x1.a0c667b5de54dp-1, -0x1.5000p-48, 140 0x1.ccb0f2e6d1689p-1, 0x1.0200p-48, 141 0x1.cdf0b555dc412p-1, 0x1.3600p-48, 150 0x1.d955d71ff6090p-1, 0x1.4c00p-48, 151 0x1.da9e603db32aep-1, 0x1.f900p-48, 153 0x1.dd321f301b445p-1, -0x1.5200p-48, 162 0x1.e8f7977cdb726p-1, -0x1.3700p-48, 165 0x1.ecf482d8e680dp-1, 0x1.5500p-48, 168 0x1.f0f9c1cb64106p-1, -0x1.a880p-48, 345 int k; exp2() local [all...] |
/freebsd/crypto/openssl/crypto/chacha/asm/ |
H A D | chacha-armv8.pl | 43 # ThunderX2 7.22/+48% 5.64 4.10 175 stp x23,x24,[sp,#48] 251 ldp @x[13],@x[15],[$inp,#48] 276 stp @x[12],@x[14],[$out,#48] 284 ldp x23,x24,[x29,#48] 323 stp @x[12],@x[14],[sp,#48] 336 stp xzr,xzr,[sp,#48] 341 ldp x23,x24,[x29,#48] 351 my @K = map("v$_.4s",(0..3)); 443 stp x23,x24,[sp,#48] [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | milenage.c | 27 * @opc: OPc = 128-bit value derived from OP and K 28 * @k: K = 128-bit subscriber key 30 * @sqn: SQN = 48-bit sequence number 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1() 64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1() 78 * @opc: OPc = 128-bit value derived from OP and K 79 * @k: K = 128-bit subscriber key 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL [all …]
|
H A D | sha384.c | 23 * @mac: Buffer for the hash (48 bytes) 30 unsigned char tk[48]; in hmac_sha384_vector() 47 key_len = 48; in hmac_sha384_vector() 52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector() 54 * where K is an n byte key in hmac_sha384_vector() 97 * @mac: Buffer for the hash (48 bytes)
|
/freebsd/stand/forth/ |
H A D | menu.4th | 170 : +c! ( N C-ADDR/U K -- C-ADDR/U ) 171 3 pick 3 pick ( n c-addr/u k -- n c-addr/u k n c-addr ) 172 rot + c! ( n c-addr/u k n c-addr -- n c-addr/u ) 241 menuidx @ 48 + 300 s" kernel_state" evaluate @ 48 + s" kernel[N]" 7 +c! getenv 393 kerncapbuf 0 s" [K]ernel: " strcat 517 \ ASCII of 48 plus the menu item (ie. 58 for the tenth item, aka. `:') 528 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' ) 547 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' ) 552 s" kernel_state" evaluate @ 48 + ( n -- n y ) [all …]
|
H A D | menu-commands.4th | 263 : init_cyclestate ( N K -- N ) 264 over cycle_stateN ( n k -- n k addr ) 266 tuck @ ( n k addr -- n addr k c ) 267 over <> ( n addr k c -- n addr k 0|-1 ) 269 rot ( n addr k -- addr k n ) 271 swap rot ( addr k n -- n k addr ) 273 2drop ( n k addr -- n ) 281 kernel_state @ ( n -- n k ) 282 init_cyclestate ( n k -- n ) 288 48 + ( n n2 -- n n2' ) \ kernel_state to ASCII num [all …]
|
/freebsd/sys/dev/qat/qat_api/firmware/include/ |
H A D | icp_qat_fw_mmp.h | 46 * Input parameter list for ECC P384 Variable Point Multiplication [k]P , 54 uint64_t k; /**< k = scalar (6 qwords)*/ member 60 * Input parameter list for ECC P384 Generator Point Multiplication [k]G , 66 uint64_t k; /**< k = scalar (6 qwords)*/ member 78 uint64_t k; /**< k = random value, > 0 and < n (order of G for P384) member 87 * Input parameter list for ECC P256 Variable Point Multiplication [k]P , 95 uint64_t k; /**< k = scalar (4 qwords)*/ member 101 * Input parameter list for ECC P256 Generator Point Multiplication [k]G , 107 uint64_t k; /**< k = scalar (4 qwords)*/ member 119 uint64_t k; /**< k = random value, > 0 and < n (order of G for P256) member [all …]
|
/freebsd/crypto/openssl/crypto/camellia/asm/ |
H A D | cmllt4-sparcv9.pl | 107 ldd [$key + 48], %f20 129 ldd [$key + 48], %f24 203 ldd [$key - 48], %f22 222 ldd [$key - 48], %f22 319 std %f0, [$out + 0] ! k[0, 1] 321 std %f2, [$out + 8] ! k[2, 3] 338 std %f0, [$out + 0] ! k[0, 1] 340 std %f2, [$out + 8] ! k[2, 3] 363 std %f0, [$out + 0x10] ! k[ 4, 5] 364 std %f2, [$out + 0x18] ! k[ 6, 7] [all …]
|
/freebsd/contrib/bearssl/src/ec/ |
H A D | ec_p256_m62.c | 79 * - top limb is less than 2^48 + 2^30 85 #define MASK48 (BIT(48) - BIT(0)) 143 s = a[4] >> 48; /* s < 2^14 */ in f256_partial_reduce() 155 a[4] = w + (s << 16) - cc; /* a[4] < 2^48 + 2^30 */ in f256_partial_reduce() 214 * Thus, the value 's' (t[4] / 2^48) will be necessarily in f256_sub() 217 s = t[4] >> 48; in f256_sub() 222 cc = -(w >> 52) & 0xFFF; /* cc <= 48 */ in f256_sub() 229 d[4] = (t[4] & MASK48) + (s << 16) - cc; /* d[4] < 2^48 + 2^30 */ in f256_sub() 263 * the factor f fits on 52 bits, so f<<48 fits on in f256_montymul() 291 + ((unsigned __int128)f << 48) in f256_montymul() [all …]
|
/freebsd/tests/sys/geom/class/eli/ |
H A D | testvect.h | 3 …74H\263\312m\336\304\3515P\222Cb\037-\313W\0067\232\024%\235\252\322\035\225k\025\2248\251r\312]v\… 5 …333&\011'\360?\022\374P\336\337\031\266,~@!\037\000\320v\360!\225\221@C\266|k\370@\305\202\235+\31… 6 …j\344\346", 100, "\223\015X\340\024\244\2767\027\253\261\232\360(?\350H7\326K\322\246\341\222\202:… 7 …K\3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100,… 9 …{ ",;\270P\012\035\262\235", 8, "\375 \232J\304\271_\272\033\027\363\021\227\260\323\310\304k\004.… 13 …7\235l$\355\037\214\220\032\213\320\265lM\334\320\313+\205.\355\310\201K\370^\025\134\346[K", 64 }, 14 …{ "9s72\020\270\251\350", 8, "\323\370:k\323o\271Y\335\306\375#\333\222\246?C\313\023\202>\005\025… 15 …4\002\333J;\262", 200, "\3206K,\267r<\302r\207y\373\3625]2Y\3710\343\272\211\202\3465g\340jG\001`\… 17 …1YS\230\231|\356\024D8\243f\223\335\207\361\2241=\264\0366\030\230Z0\340\226K\352\241C\355\260\236… 18 …\267c\253\354\301\221X", 200, "\017m\031\004\022\364(\016\310U\3621\301\316}k\362\306\227:\233+\00… [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_EncodeInit.3 | 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' 99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' 100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' 101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' 102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' 181 Encoding of binary data is performed in blocks of 48 input bytes (or less for 182 the final block). For each 48 byte input block encoded 64 bytes of base 64 data 184 final block (which may be less than 48 bytes) will output 4 bytes for every 3 195 blocks of data (48 bytes) will be immediately processed and output by this [all …]
|
/freebsd/contrib/bearssl/src/hash/ |
H A D | md5.c | 39 static const uint32_t K[64] = { variable 61 static const unsigned char MP[48] = { 87 a = b + ROTL(a + F(b, c, d) + m[i + 0] + K[i + 0], 7); in br_md5_round() 88 d = a + ROTL(d + F(a, b, c) + m[i + 1] + K[i + 1], 12); in br_md5_round() 89 c = d + ROTL(c + F(d, a, b) + m[i + 2] + K[i + 2], 17); in br_md5_round() 90 b = c + ROTL(b + F(c, d, a) + m[i + 3] + K[i + 3], 22); in br_md5_round() 93 a = b + ROTL(a + G(b, c, d) + m[MP[i - 16]] + K[i + 0], 5); in br_md5_round() 94 d = a + ROTL(d + G(a, b, c) + m[MP[i - 15]] + K[i + 1], 9); in br_md5_round() 95 c = d + ROTL(c + G(d, a, b) + m[MP[i - 14]] + K[i + 2], 14); in br_md5_round() 96 b = c + ROTL(b + G(c, d, a) + m[MP[i - 13]] + K[i + 3], 20); in br_md5_round() [all …]
|
/freebsd/crypto/openssl/providers/implementations/rands/ |
H A D | drbg_ctr.c | 47 unsigned char K[32]; member 52 unsigned char KX[48]; 84 ctr->K[i] ^= in[i]; in ctr_XOR() 116 * Handle several BCC operations for as much data as we need for K and X 120 unsigned char in_tmp[48]; in ctr_BCC_blocks() 138 unsigned char bltmp[48] = {0}; in ctr_BCC_init() 141 memset(ctr->KX, 0, 48); in ctr_BCC_init() 233 /* Set up key K */ in ctr_df() 236 /* X follows key K */ in ctr_df() 266 unsigned char V_tmp[48], ou in ctr_update() [all...] |
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aesni-sha1-x86_64.pl | 223 movaps %xmm9,96+48(%rsp) 264 movdqu 48($inp),@X[-1&7] 273 movdqa @X[-4&7],0(%rsp) # X[]+K xfer to IALU 286 my ($n,$k)=($r/10,$r%10); 287 if ($k==0) { 297 movups `32+16*$k-112`($key),$rndkey[1] 300 } elsif ($k==9) { 305 movups `32+16*($k+0)-112`($key),$rndkey[1] 307 movups `32+16*($k+1)-112`($key),$rndkey[0] 310 movups `32+16*($k+2)-112`($key),$rndkey[1] [all …]
|
H A D | vpaes-x86.pl | 48 # (**) "Core 2" refers to initial 65nm design, a.k.a. Conroe. 215 &pxor ("xmm4","xmm5"); # 4 = sb1u + k 239 &movdqa ("xmm5",&QWP($k_inv+16,$const));# 2 : a/k 242 &pand ("xmm0","xmm6"); # 0 = k 243 &pshufb ("xmm5","xmm0"); # 2 = a/k 248 &pxor ("xmm3","xmm5"); # 3 = iak = 1/i + a/k 251 &pxor ("xmm4","xmm5"); # 4 = jak = 1/j + a/k 264 &pxor ("xmm4","xmm5"); # 4 = sb1u + k 294 &movdqa ("xmm5",&QWP($k_mc_forward+48,$const)); 341 &movdqa ("xmm2",&QWP($k_inv+16,$const));# 2 : a/k [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-ia64.pl | 131 K=r15; 280 shrp X[15]=X[15],X[14],48 } 283 shrp X[14]=X[14],X[13],48 };; 286 shrp X[13]=X[13],X[12],48 } 289 shrp X[12]=X[12],X[11],48 };; 292 shrp X[11]=X[11],X[10],48 } 295 shrp X[10]=X[10],X[ 9],48 };; 297 shrp X[ 9]=X[ 9],X[ 8],48 298 shrp X[ 8]=X[ 8],X[ 7],48 } 299 { .mii; shrp X[ 7]=X[ 7],X[ 6],48 [all …]
|
/freebsd/share/man/man7/ |
H A D | ascii.7 | 50 110 H 111 I 112 J 113 K 114 L 115 M 116 N 117 O 54 150 h 151 i 152 j 153 k 154 l 155 m 156 n 157 o 72 48 H 49 I 4a J 4b K 4c L 4d M 4e N 4f O 76 68 h 69 i 6a j 6b k 6c l 6d m 6e n 6f o 91 48 0 49 1 50 2 51 3 52 4 53 5 54 6 55 7 94 72 H 73 I 74 J 75 K 76 L 77 M 78 N 79 O 98 104 h 105 i 106 j 107 k 108 l 109 m 110 n 111 o 120 VT + K k 01011
|
/freebsd/share/misc/ |
H A D | ascii | 10 |110 H |111 I |112 J |113 K |114 L |115 M |116 N |117 O | 14 |150 h |151 i |152 j |153 k |154 l |155 m |156 n |157 o | 27 | 48 H | 49 I | 4a J | 4b K | 4c L | 4d M | 4e N | 4f O | 31 | 68 h | 69 i | 6a j | 6b k | 6c l | 6d m | 6e n | 6f o | 41 | 48 0 | 49 1 | 50 2 | 51 3 | 52 4 | 53 5 | 54 6 | 55 7 | 44 | 72 H | 73 I | 74 J | 75 K | 76 L | 77 M | 78 N | 79 O | 48 |104 h |105 i |106 j |107 k |108 l |109 m |110 n |111 o |
|
/freebsd/contrib/netbsd-tests/ipf/expected/ |
H A D | l1.b | 22 42 63 44 65 46 67 48 69 4a 6b 4c 6d BcDeFgHiJkLm 26 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN 27 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN 28 01/01/1970 00:00:00.000000 anon0 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN 29 01/01/1970 00:00:00.000000 e1 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -A K-S OUT 30 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -AF K-S IN 33 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN 37 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN 38 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN 39 01/01/1970 00:00:00.000000 anon0 @0:4 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN [all …]
|
/freebsd/crypto/openssl/crypto/rc4/asm/ |
H A D | rc4-md5-x86_64.pl | 92 my @K=( 0xd76aa478,0xe8c7b756,0x242070db,0xc1bdceee, 242 my $k=$i%$MOD; 245 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1); 254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 255 #md5# add \$$K[$i],$a 258 #rc4# movl $TY#d,4*$k($XX[1]) 266 $code.=<<___ if ($rc4 && $j==15 && $k==$MOD-1); 282 my $k=$i%$MOD; 285 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1); 294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d [all …]
|
/freebsd/sys/contrib/openzfs/module/icp/asm-arm/sha2/ |
H A D | sha512-armv7.S | 123 ldr r9, [r0,#48+LO] 124 ldr r10, [r0,#48+HI] 128 str r9, [sp,#48+0] 129 str r10, [sp,#48+4] 199 ldr r11,[sp,#48+0] @ g.lo 201 ldr r12,[sp,#48+4] @ g.hi 212 ldr r11,[r14,#LO] @ K[i].lo 214 ldr r12,[r14,#HI] @ K[i].hi 222 adc r4,r4,r12 @ T += K[i] 339 ldr r11,[sp,#48+0] @ g.lo [all …]
|
/freebsd/bin/dd/ |
H A D | ref.pareven | 5 00000040 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.| 13 000000c0 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.|
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_stream/chacha20/ref/ |
H A D | chacha20_ref.c | 46 chacha_keysetup(chacha_ctx *ctx, const uint8_t *k) in chacha_keysetup() argument 52 ctx->input[4] = LOAD32_LE(k + 0); in chacha_keysetup() 53 ctx->input[5] = LOAD32_LE(k + 4); in chacha_keysetup() 54 ctx->input[6] = LOAD32_LE(k + 8); in chacha_keysetup() 55 ctx->input[7] = LOAD32_LE(k + 12); in chacha_keysetup() 56 ctx->input[8] = LOAD32_LE(k + 16); in chacha_keysetup() 57 ctx->input[9] = LOAD32_LE(k + 20); in chacha_keysetup() 58 ctx->input[10] = LOAD32_LE(k + 24); in chacha_keysetup() 59 ctx->input[11] = LOAD32_LE(k + 28); in chacha_keysetup() 180 x12 = XOR(x12, LOAD32_LE(m + 48)); in chacha20_encrypt_bytes() [all …]
|
/freebsd/contrib/unbound/compat/ |
H A D | chacha_private.h | 51 static const char sigma[16] = "expand 32-byte k"; 52 static const char tau[16] = "expand 16-byte k"; 55 chacha_keysetup(chacha_ctx *x,const u8 *k,u32 kbits,u32 ATTR_UNUSED(ivbits)) in chacha_keysetup() argument 59 x->input[4] = U8TO32_LITTLE(k + 0); in chacha_keysetup() 60 x->input[5] = U8TO32_LITTLE(k + 4); in chacha_keysetup() 61 x->input[6] = U8TO32_LITTLE(k + 8); in chacha_keysetup() 62 x->input[7] = U8TO32_LITTLE(k + 12); in chacha_keysetup() 64 k += 16; in chacha_keysetup() 69 x->input[8] = U8TO32_LITTLE(k + 0); in chacha_keysetup() 70 x->input[9] = U8TO32_LITTLE(k + 4); in chacha_keysetup() [all …]
|