Home
last modified time | relevance | path

Searched +full:48 +full:k (Results 1 – 25 of 728) sorted by relevance

12345678910>>...30

/freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/
H A Daeskey.c81 #define ke4(k, i) \ argument
82 { k[4 * (i) + 4] = ss[0] ^= ls_box(ss[3], 3) ^ t_use(r, c)[i]; \
83 k[4 * (i) + 5] = ss[1] ^= ss[0]; \
84 k[4 * (i) + 6] = ss[2] ^= ss[1]; \
85 k[4 * (i) + 7] = ss[3] ^= ss[2]; \
115 #define kef6(k, i) \ argument
116 { k[6 * (i) + 6] = ss[0] ^= ls_box(ss[5], 3) ^ t_use(r, c)[i]; \
117 k[6 * (i) + 7] = ss[1] ^= ss[0]; \
118 k[6 * (i) + 8] = ss[2] ^= ss[1]; \
119 k[6 * (i) + 9] = ss[3] ^= ss[2]; \
[all …]
/freebsd/lib/msun/src/
H A Ds_exp2.c90 0x1.925c353aa2ff9p-1, 0x1.5400p-48,
103 0x1.a0c667b5de54dp-1, -0x1.5000p-48,
140 0x1.ccb0f2e6d1689p-1, 0x1.0200p-48,
141 0x1.cdf0b555dc412p-1, 0x1.3600p-48,
150 0x1.d955d71ff6090p-1, 0x1.4c00p-48,
151 0x1.da9e603db32aep-1, 0x1.f900p-48,
153 0x1.dd321f301b445p-1, -0x1.5200p-48,
162 0x1.e8f7977cdb726p-1, -0x1.3700p-48,
165 0x1.ecf482d8e680dp-1, 0x1.5500p-48,
168 0x1.f0f9c1cb64106p-1, -0x1.a880p-48,
345 int k; exp2() local
[all...]
/freebsd/crypto/openssl/crypto/chacha/asm/
H A Dchacha-armv8.pl43 # ThunderX2 7.22/+48% 5.64 4.10
175 stp x23,x24,[sp,#48]
251 ldp @x[13],@x[15],[$inp,#48]
276 stp @x[12],@x[14],[$out,#48]
284 ldp x23,x24,[x29,#48]
323 stp @x[12],@x[14],[sp,#48]
336 stp xzr,xzr,[sp,#48]
341 ldp x23,x24,[x29,#48]
351 my @K = map("v$_.4s",(0..3));
443 stp x23,x24,[sp,#48]
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dmilenage.c27 * @opc: OPc = 128-bit value derived from OP and K
28 * @k: K = 128-bit subscriber key
30 * @sqn: SQN = 48-bit sequence number
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument
45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1()
64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1()
78 * @opc: OPc = 128-bit value derived from OP and K
79 * @k: K = 128-bit subscriber key
84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
[all …]
H A Dsha384.c23 * @mac: Buffer for the hash (48 bytes)
30 unsigned char tk[48]; in hmac_sha384_vector()
47 key_len = 48; in hmac_sha384_vector()
52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector()
54 * where K is an n byte key in hmac_sha384_vector()
97 * @mac: Buffer for the hash (48 bytes)
/freebsd/stand/forth/
H A Dmenu.4th170 : +c! ( N C-ADDR/U K -- C-ADDR/U )
171 3 pick 3 pick ( n c-addr/u k -- n c-addr/u k n c-addr )
172 rot + c! ( n c-addr/u k n c-addr -- n c-addr/u )
241 menuidx @ 48 +
300 s" kernel_state" evaluate @ 48 + s" kernel[N]" 7 +c! getenv
393 kerncapbuf 0 s" [K]ernel: " strcat
517 \ ASCII of 48 plus the menu item (ie. 58 for the tenth item, aka. `:')
528 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' )
547 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' )
552 s" kernel_state" evaluate @ 48 + ( n -- n y )
[all …]
H A Dmenu-commands.4th263 : init_cyclestate ( N K -- N )
264 over cycle_stateN ( n k -- n k addr )
266 tuck @ ( n k addr -- n addr k c )
267 over <> ( n addr k c -- n addr k 0|-1 )
269 rot ( n addr k -- addr k n )
271 swap rot ( addr k n -- n k addr )
273 2drop ( n k addr -- n )
281 kernel_state @ ( n -- n k )
282 init_cyclestate ( n k -- n )
288 48 + ( n n2 -- n n2' ) \ kernel_state to ASCII num
[all …]
/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_fw_mmp.h46 * Input parameter list for ECC P384 Variable Point Multiplication [k]P ,
54 uint64_t k; /**< k = scalar (6 qwords)*/ member
60 * Input parameter list for ECC P384 Generator Point Multiplication [k]G ,
66 uint64_t k; /**< k = scalar (6 qwords)*/ member
78 uint64_t k; /**< k = random value, &gt; 0 and &lt; n (order of G for P384) member
87 * Input parameter list for ECC P256 Variable Point Multiplication [k]P ,
95 uint64_t k; /**< k = scalar (4 qwords)*/ member
101 * Input parameter list for ECC P256 Generator Point Multiplication [k]G ,
107 uint64_t k; /**< k = scalar (4 qwords)*/ member
119 uint64_t k; /**< k = random value, &gt; 0 and &lt; n (order of G for P256) member
[all …]
/freebsd/crypto/openssl/crypto/camellia/asm/
H A Dcmllt4-sparcv9.pl107 ldd [$key + 48], %f20
129 ldd [$key + 48], %f24
203 ldd [$key - 48], %f22
222 ldd [$key - 48], %f22
319 std %f0, [$out + 0] ! k[0, 1]
321 std %f2, [$out + 8] ! k[2, 3]
338 std %f0, [$out + 0] ! k[0, 1]
340 std %f2, [$out + 8] ! k[2, 3]
363 std %f0, [$out + 0x10] ! k[ 4, 5]
364 std %f2, [$out + 0x18] ! k[ 6, 7]
[all …]
/freebsd/contrib/bearssl/src/ec/
H A Dec_p256_m62.c79 * - top limb is less than 2^48 + 2^30
85 #define MASK48 (BIT(48) - BIT(0))
143 s = a[4] >> 48; /* s < 2^14 */ in f256_partial_reduce()
155 a[4] = w + (s << 16) - cc; /* a[4] < 2^48 + 2^30 */ in f256_partial_reduce()
214 * Thus, the value 's' (t[4] / 2^48) will be necessarily in f256_sub()
217 s = t[4] >> 48; in f256_sub()
222 cc = -(w >> 52) & 0xFFF; /* cc <= 48 */ in f256_sub()
229 d[4] = (t[4] & MASK48) + (s << 16) - cc; /* d[4] < 2^48 + 2^30 */ in f256_sub()
263 * the factor f fits on 52 bits, so f<<48 fits on in f256_montymul()
291 + ((unsigned __int128)f << 48) in f256_montymul()
[all …]
/freebsd/tests/sys/geom/class/eli/
H A Dtestvect.h3 …74H\263\312m\336\304\3515P\222Cb\037-\313W\0067\232\024%\235\252\322\035\225k\025\2248\251r\312]v\…
5 …333&\011'\360?\022\374P\336\337\031\266,~@!\037\000\320v\360!\225\221@C\266|k\370@\305\202\235+\31…
6 …j\344\346", 100, "\223\015X\340\024\244\2767\027\253\261\232\360(?\350H7\326K\322\246\341\222\202:…
7K\3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100,…
9 …{ ",;\270P\012\035\262\235", 8, "\375 \232J\304\271_\272\033\027\363\021\227\260\323\310\304k\004.…
13 …7\235l$\355\037\214\220\032\213\320\265lM\334\320\313+\205.\355\310\201K\370^\025\134\346[K", 64 },
14 …{ "9s72\020\270\251\350", 8, "\323\370:k\323o\271Y\335\306\375#\333\222\246?C\313\023\202>\005\025…
15 …4\002\333J;\262", 200, "\3206K,\267r<\302r\207y\373\3625]2Y\3710\343\272\211\202\3465g\340jG\001`\…
17 …1YS\230\231|\356\024D8\243f\223\335\207\361\2241=\264\0366\030\230Z0\340\226K\352\241C\355\260\236…
18 …\267c\253\354\301\221X", 200, "\017m\031\004\022\364(\016\310U\3621\301\316}k\362\306\227:\233+\00…
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_EncodeInit.397 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
181 Encoding of binary data is performed in blocks of 48 input bytes (or less for
182 the final block). For each 48 byte input block encoded 64 bytes of base 64 data
184 final block (which may be less than 48 bytes) will output 4 bytes for every 3
195 blocks of data (48 bytes) will be immediately processed and output by this
[all …]
/freebsd/contrib/bearssl/src/hash/
H A Dmd5.c39 static const uint32_t K[64] = { variable
61 static const unsigned char MP[48] = {
87 a = b + ROTL(a + F(b, c, d) + m[i + 0] + K[i + 0], 7); in br_md5_round()
88 d = a + ROTL(d + F(a, b, c) + m[i + 1] + K[i + 1], 12); in br_md5_round()
89 c = d + ROTL(c + F(d, a, b) + m[i + 2] + K[i + 2], 17); in br_md5_round()
90 b = c + ROTL(b + F(c, d, a) + m[i + 3] + K[i + 3], 22); in br_md5_round()
93 a = b + ROTL(a + G(b, c, d) + m[MP[i - 16]] + K[i + 0], 5); in br_md5_round()
94 d = a + ROTL(d + G(a, b, c) + m[MP[i - 15]] + K[i + 1], 9); in br_md5_round()
95 c = d + ROTL(c + G(d, a, b) + m[MP[i - 14]] + K[i + 2], 14); in br_md5_round()
96 b = c + ROTL(b + G(c, d, a) + m[MP[i - 13]] + K[i + 3], 20); in br_md5_round()
[all …]
/freebsd/crypto/openssl/providers/implementations/rands/
H A Ddrbg_ctr.c47 unsigned char K[32]; member
52 unsigned char KX[48];
84 ctr->K[i] ^= in[i]; in ctr_XOR()
116 * Handle several BCC operations for as much data as we need for K and X
120 unsigned char in_tmp[48]; in ctr_BCC_blocks()
138 unsigned char bltmp[48] = {0}; in ctr_BCC_init()
141 memset(ctr->KX, 0, 48); in ctr_BCC_init()
233 /* Set up key K */ in ctr_df()
236 /* X follows key K */ in ctr_df()
266 unsigned char V_tmp[48], ou in ctr_update()
[all...]
/freebsd/crypto/openssl/crypto/aes/asm/
H A Daesni-sha1-x86_64.pl223 movaps %xmm9,96+48(%rsp)
264 movdqu 48($inp),@X[-1&7]
273 movdqa @X[-4&7],0(%rsp) # X[]+K xfer to IALU
286 my ($n,$k)=($r/10,$r%10);
287 if ($k==0) {
297 movups `32+16*$k-112`($key),$rndkey[1]
300 } elsif ($k==9) {
305 movups `32+16*($k+0)-112`($key),$rndkey[1]
307 movups `32+16*($k+1)-112`($key),$rndkey[0]
310 movups `32+16*($k+2)-112`($key),$rndkey[1]
[all …]
H A Dvpaes-x86.pl48 # (**) "Core 2" refers to initial 65nm design, a.k.a. Conroe.
215 &pxor ("xmm4","xmm5"); # 4 = sb1u + k
239 &movdqa ("xmm5",&QWP($k_inv+16,$const));# 2 : a/k
242 &pand ("xmm0","xmm6"); # 0 = k
243 &pshufb ("xmm5","xmm0"); # 2 = a/k
248 &pxor ("xmm3","xmm5"); # 3 = iak = 1/i + a/k
251 &pxor ("xmm4","xmm5"); # 4 = jak = 1/j + a/k
264 &pxor ("xmm4","xmm5"); # 4 = sb1u + k
294 &movdqa ("xmm5",&QWP($k_mc_forward+48,$const));
341 &movdqa ("xmm2",&QWP($k_inv+16,$const));# 2 : a/k
[all …]
/freebsd/crypto/openssl/crypto/sha/asm/
H A Dsha512-ia64.pl131 K=r15;
280 shrp X[15]=X[15],X[14],48 }
283 shrp X[14]=X[14],X[13],48 };;
286 shrp X[13]=X[13],X[12],48 }
289 shrp X[12]=X[12],X[11],48 };;
292 shrp X[11]=X[11],X[10],48 }
295 shrp X[10]=X[10],X[ 9],48 };;
297 shrp X[ 9]=X[ 9],X[ 8],48
298 shrp X[ 8]=X[ 8],X[ 7],48 }
299 { .mii; shrp X[ 7]=X[ 7],X[ 6],48
[all …]
/freebsd/share/man/man7/
H A Dascii.750 110 H 111 I 112 J 113 K 114 L 115 M 116 N 117 O
54 150 h 151 i 152 j 153 k 154 l 155 m 156 n 157 o
72 48 H 49 I 4a J 4b K 4c L 4d M 4e N 4f O
76 68 h 69 i 6a j 6b k 6c l 6d m 6e n 6f o
91 48 0 49 1 50 2 51 3 52 4 53 5 54 6 55 7
94 72 H 73 I 74 J 75 K 76 L 77 M 78 N 79 O
98 104 h 105 i 106 j 107 k 108 l 109 m 110 n 111 o
120 VT + K k 01011
/freebsd/share/misc/
H A Dascii10 |110 H |111 I |112 J |113 K |114 L |115 M |116 N |117 O |
14 |150 h |151 i |152 j |153 k |154 l |155 m |156 n |157 o |
27 | 48 H | 49 I | 4a J | 4b K | 4c L | 4d M | 4e N | 4f O |
31 | 68 h | 69 i | 6a j | 6b k | 6c l | 6d m | 6e n | 6f o |
41 | 48 0 | 49 1 | 50 2 | 51 3 | 52 4 | 53 5 | 54 6 | 55 7 |
44 | 72 H | 73 I | 74 J | 75 K | 76 L | 77 M | 78 N | 79 O |
48 |104 h |105 i |106 j |107 k |108 l |109 m |110 n |111 o |
/freebsd/contrib/netbsd-tests/ipf/expected/
H A Dl1.b22 42 63 44 65 46 67 48 69 4a 6b 4c 6d BcDeFgHiJkLm
26 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN
27 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN
28 01/01/1970 00:00:00.000000 anon0 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN
29 01/01/1970 00:00:00.000000 e1 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -A K-S OUT
30 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -AF K-S IN
33 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN
37 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN
38 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN
39 01/01/1970 00:00:00.000000 anon0 @0:4 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN
[all …]
/freebsd/crypto/openssl/crypto/rc4/asm/
H A Drc4-md5-x86_64.pl92 my @K=( 0xd76aa478,0xe8c7b756,0x242070db,0xc1bdceee,
242 my $k=$i%$MOD;
245 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1);
254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
255 #md5# add \$$K[$i],$a
258 #rc4# movl $TY#d,4*$k($XX[1])
266 $code.=<<___ if ($rc4 && $j==15 && $k==$MOD-1);
282 my $k=$i%$MOD;
285 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1);
294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
[all …]
/freebsd/sys/contrib/openzfs/module/icp/asm-arm/sha2/
H A Dsha512-armv7.S123 ldr r9, [r0,#48+LO]
124 ldr r10, [r0,#48+HI]
128 str r9, [sp,#48+0]
129 str r10, [sp,#48+4]
199 ldr r11,[sp,#48+0] @ g.lo
201 ldr r12,[sp,#48+4] @ g.hi
212 ldr r11,[r14,#LO] @ K[i].lo
214 ldr r12,[r14,#HI] @ K[i].hi
222 adc r4,r4,r12 @ T += K[i]
339 ldr r11,[sp,#48+0] @ g.lo
[all …]
/freebsd/bin/dd/
H A Dref.pareven5 00000040 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.|
13 000000c0 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_stream/chacha20/ref/
H A Dchacha20_ref.c46 chacha_keysetup(chacha_ctx *ctx, const uint8_t *k) in chacha_keysetup() argument
52 ctx->input[4] = LOAD32_LE(k + 0); in chacha_keysetup()
53 ctx->input[5] = LOAD32_LE(k + 4); in chacha_keysetup()
54 ctx->input[6] = LOAD32_LE(k + 8); in chacha_keysetup()
55 ctx->input[7] = LOAD32_LE(k + 12); in chacha_keysetup()
56 ctx->input[8] = LOAD32_LE(k + 16); in chacha_keysetup()
57 ctx->input[9] = LOAD32_LE(k + 20); in chacha_keysetup()
58 ctx->input[10] = LOAD32_LE(k + 24); in chacha_keysetup()
59 ctx->input[11] = LOAD32_LE(k + 28); in chacha_keysetup()
180 x12 = XOR(x12, LOAD32_LE(m + 48)); in chacha20_encrypt_bytes()
[all …]
/freebsd/contrib/unbound/compat/
H A Dchacha_private.h51 static const char sigma[16] = "expand 32-byte k";
52 static const char tau[16] = "expand 16-byte k";
55 chacha_keysetup(chacha_ctx *x,const u8 *k,u32 kbits,u32 ATTR_UNUSED(ivbits)) in chacha_keysetup() argument
59 x->input[4] = U8TO32_LITTLE(k + 0); in chacha_keysetup()
60 x->input[5] = U8TO32_LITTLE(k + 4); in chacha_keysetup()
61 x->input[6] = U8TO32_LITTLE(k + 8); in chacha_keysetup()
62 x->input[7] = U8TO32_LITTLE(k + 12); in chacha_keysetup()
64 k += 16; in chacha_keysetup()
69 x->input[8] = U8TO32_LITTLE(k + 0); in chacha_keysetup()
70 x->input[9] = U8TO32_LITTLE(k + 4); in chacha_keysetup()
[all …]

12345678910>>...30