| /freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
| H A D | aeskey.c | 82 #define ke4(k, i) \ argument 83 { k[4 * (i) + 4] = ss[0] ^= ls_box(ss[3], 3) ^ t_use(r, c)[i]; \ 84 k[4 * (i) + 5] = ss[1] ^= ss[0]; \ 85 k[4 * (i) + 6] = ss[2] ^= ss[1]; \ 86 k[4 * (i) + 7] = ss[3] ^= ss[2]; \ 116 #define kef6(k, i) \ argument 117 { k[6 * (i) + 6] = ss[0] ^= ls_box(ss[5], 3) ^ t_use(r, c)[i]; \ 118 k[6 * (i) + 7] = ss[1] ^= ss[0]; \ 119 k[6 * (i) + 8] = ss[2] ^= ss[1]; \ 120 k[6 * (i) + 9] = ss[3] ^= ss[2]; \ [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/aes/ |
| H A D | aeskey.c | 85 #define ke4(k,i) \ argument 86 { k[4*(i)+4] = ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; \ 87 k[4*(i)+5] = ss[1] ^= ss[0]; \ 88 k[4*(i)+6] = ss[2] ^= ss[1]; \ 89 k[4*(i)+7] = ss[3] ^= ss[2]; \ 128 #define kef6(k,i) \ argument 129 { k[6*(i)+ 6] = ss[0] ^= ls_box(ss[5],3) ^ t_use(r,c)[i]; \ 130 k[6*(i)+ 7] = ss[1] ^= ss[0]; \ 131 k[6*(i)+ 8] = ss[2] ^= ss[1]; \ 132 k[6*(i)+ 9] = ss[3] ^= ss[2]; \ [all …]
|
| /freebsd/lib/msun/src/ |
| H A D | s_exp2.c | 90 0x1.925c353aa2ff9p-1, 0x1.5400p-48, 103 0x1.a0c667b5de54dp-1, -0x1.5000p-48, 140 0x1.ccb0f2e6d1689p-1, 0x1.0200p-48, 141 0x1.cdf0b555dc412p-1, 0x1.3600p-48, 150 0x1.d955d71ff6090p-1, 0x1.4c00p-48, 151 0x1.da9e603db32aep-1, 0x1.f900p-48, 153 0x1.dd321f301b445p-1, -0x1.5200p-48, 162 0x1.e8f7977cdb726p-1, -0x1.3700p-48, 165 0x1.ecf482d8e680dp-1, 0x1.5500p-48, 168 0x1.f0f9c1cb64106p-1, -0x1.a880p-48, 345 int k; exp2() local [all...] |
| /freebsd/crypto/openssl/crypto/chacha/asm/ |
| H A D | chacha-armv8.pl | 43 # ThunderX2 7.22/+48% 5.64 4.10 179 stp x23,x24,[sp,#48] 255 ldp @x[13],@x[15],[$inp,#48] 280 stp @x[12],@x[14],[$out,#48] 288 ldp x23,x24,[x29,#48] 327 stp @x[12],@x[14],[sp,#48] 340 stp xzr,xzr,[sp,#48] 345 ldp x23,x24,[x29,#48] 390 my @K = map("v$_.4s",(0..3)); 483 stp x23,x24,[sp,#48] [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | milenage.c | 27 * @opc: OPc = 128-bit value derived from OP and K 28 * @k: K = 128-bit subscriber key 30 * @sqn: SQN = 48-bit sequence number 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1() 64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1() 78 * @opc: OPc = 128-bit value derived from OP and K 79 * @k: K = 128-bit subscriber key 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL [all …]
|
| H A D | sha384.c | 23 * @mac: Buffer for the hash (48 bytes) 30 unsigned char tk[48]; in hmac_sha384_vector() 47 key_len = 48; in hmac_sha384_vector() 52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector() 54 * where K is an n byte key in hmac_sha384_vector() 97 * @mac: Buffer for the hash (48 bytes)
|
| /freebsd/stand/forth/ |
| H A D | menu.4th | 170 : +c! ( N C-ADDR/U K -- C-ADDR/U ) 171 3 pick 3 pick ( n c-addr/u k -- n c-addr/u k n c-addr ) 172 rot + c! ( n c-addr/u k n c-addr -- n c-addr/u ) 241 menuidx @ 48 + 300 s" kernel_state" evaluate @ 48 + s" kernel[N]" 7 +c! getenv 393 kerncapbuf 0 s" [K]ernel: " strcat 517 \ ASCII of 48 plus the menu item (ie. 58 for the tenth item, aka. `:') 528 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' ) 547 c@ dup 48 > over 57 < and if ( '1' <= c1 <= '8' ) 552 s" kernel_state" evaluate @ 48 + ( n -- n y ) [all …]
|
| /freebsd/sys/dev/qat/qat_api/firmware/include/ |
| H A D | icp_qat_fw_mmp.h | 44 * Input parameter list for ECC P384 Variable Point Multiplication [k]P , 52 uint64_t k; /**< k = scalar (6 qwords)*/ member 58 * Input parameter list for ECC P384 Generator Point Multiplication [k]G , 64 uint64_t k; /**< k = scalar (6 qwords)*/ member 76 uint64_t k; /**< k = random value, > 0 and < n (order of G for P384) member 85 * Input parameter list for ECC P256 Variable Point Multiplication [k]P , 93 uint64_t k; /**< k = scalar (4 qwords)*/ member 99 * Input parameter list for ECC P256 Generator Point Multiplication [k]G , 105 uint64_t k; /**< k = scalar (4 qwords)*/ member 117 uint64_t k; /**< k = random value, > 0 and < n (order of G for P256) member [all …]
|
| /freebsd/crypto/openssl/crypto/camellia/asm/ |
| H A D | cmllt4-sparcv9.pl | 107 ldd [$key + 48], %f20 129 ldd [$key + 48], %f24 203 ldd [$key - 48], %f22 222 ldd [$key - 48], %f22 319 std %f0, [$out + 0] ! k[0, 1] 321 std %f2, [$out + 8] ! k[2, 3] 338 std %f0, [$out + 0] ! k[0, 1] 340 std %f2, [$out + 8] ! k[2, 3] 363 std %f0, [$out + 0x10] ! k[ 4, 5] 364 std %f2, [$out + 0x18] ! k[ 6, 7] [all …]
|
| /freebsd/contrib/bearssl/src/ec/ |
| H A D | ec_p256_m62.c | 79 * - top limb is less than 2^48 + 2^30 85 #define MASK48 (BIT(48) - BIT(0)) 143 s = a[4] >> 48; /* s < 2^14 */ in f256_partial_reduce() 155 a[4] = w + (s << 16) - cc; /* a[4] < 2^48 + 2^30 */ in f256_partial_reduce() 214 * Thus, the value 's' (t[4] / 2^48) will be necessarily in f256_sub() 217 s = t[4] >> 48; in f256_sub() 222 cc = -(w >> 52) & 0xFFF; /* cc <= 48 */ in f256_sub() 229 d[4] = (t[4] & MASK48) + (s << 16) - cc; /* d[4] < 2^48 + 2^30 */ in f256_sub() 263 * the factor f fits on 52 bits, so f<<48 fits on in f256_montymul() 291 + ((unsigned __int128)f << 48) in f256_montymul() [all …]
|
| /freebsd/tests/sys/geom/class/eli/ |
| H A D | testvect.h | 3 …74H\263\312m\336\304\3515P\222Cb\037-\313W\0067\232\024%\235\252\322\035\225k\025\2248\251r\312]v\… 5 …333&\011'\360?\022\374P\336\337\031\266,~@!\037\000\320v\360!\225\221@C\266|k\370@\305\202\235+\31… 6 …j\344\346", 100, "\223\015X\340\024\244\2767\027\253\261\232\360(?\350H7\326K\322\246\341\222\202:… 7 …K\3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100,… 9 …{ ",;\270P\012\035\262\235", 8, "\375 \232J\304\271_\272\033\027\363\021\227\260\323\310\304k\004.… 13 …7\235l$\355\037\214\220\032\213\320\265lM\334\320\313+\205.\355\310\201K\370^\025\134\346[K", 64 }, 14 …{ "9s72\020\270\251\350", 8, "\323\370:k\323o\271Y\335\306\375#\333\222\246?C\313\023\202>\005\025… 15 …4\002\333J;\262", 200, "\3206K,\267r<\302r\207y\373\3625]2Y\3710\343\272\211\202\3465g\340jG\001`\… 17 …1YS\230\231|\356\024D8\243f\223\335\207\361\2241=\264\0366\030\230Z0\340\226K\352\241C\355\260\236… 18 …\267c\253\354\301\221X", 200, "\017m\031\004\022\364(\016\310U\3621\301\316}k\362\306\227:\233+\00… [all …]
|
| /freebsd/contrib/bearssl/src/hash/ |
| H A D | md5.c | 39 static const uint32_t K[64] = { variable 61 static const unsigned char MP[48] = { 87 a = b + ROTL(a + F(b, c, d) + m[i + 0] + K[i + 0], 7); in br_md5_round() 88 d = a + ROTL(d + F(a, b, c) + m[i + 1] + K[i + 1], 12); in br_md5_round() 89 c = d + ROTL(c + F(d, a, b) + m[i + 2] + K[i + 2], 17); in br_md5_round() 90 b = c + ROTL(b + F(c, d, a) + m[i + 3] + K[i + 3], 22); in br_md5_round() 93 a = b + ROTL(a + G(b, c, d) + m[MP[i - 16]] + K[i + 0], 5); in br_md5_round() 94 d = a + ROTL(d + G(a, b, c) + m[MP[i - 15]] + K[i + 1], 9); in br_md5_round() 95 c = d + ROTL(c + G(d, a, b) + m[MP[i - 14]] + K[i + 2], 14); in br_md5_round() 96 b = c + ROTL(b + G(c, d, a) + m[MP[i - 13]] + K[i + 3], 20); in br_md5_round() [all …]
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | vpaes-loongarch64.pl | 86 vxor.v $vr4,$vr4,$vr5 # 4 = sb1u + k 111 vori.b $vr5,$vr11,0 # 2 : a/k 114 vand.v $vr0,$vr0,$vr9 # 0 = k 115 vshuf.b $vr5,$vr18,$vr5,$vr0 # 2 = a/k 120 vxor.v $vr3,$vr3,$vr5 # 3 = iak = 1/i + a/k 123 vxor.v $vr4,$vr4,$vr5 # 4 = jak = 1/j + a/k 136 vxor.v $vr4,$vr4,$vr5 # 4 = sb1u + k 174 vld $vr5,$t0,48 222 vori.b $vr2,$vr11,0 # 2 : a/k 224 vand.v $vr0,$vr0,$vr9 # 0 = k [all …]
|
| H A D | aesni-sha1-x86_64.pl | 223 movaps %xmm9,96+48(%rsp) 264 movdqu 48($inp),@X[-1&7] 273 movdqa @X[-4&7],0(%rsp) # X[]+K xfer to IALU 286 my ($n,$k)=($r/10,$r%10); 287 if ($k==0) { 297 movups `32+16*$k-112`($key),$rndkey[1] 300 } elsif ($k==9) { 305 movups `32+16*($k+0)-112`($key),$rndkey[1] 307 movups `32+16*($k+1)-112`($key),$rndkey[0] 310 movups `32+16*($k+2)-112`($key),$rndkey[1] [all …]
|
| H A D | vpaes-x86.pl | 48 # (**) "Core 2" refers to initial 65nm design, a.k.a. Conroe. 215 &pxor ("xmm4","xmm5"); # 4 = sb1u + k 239 &movdqa ("xmm5",&QWP($k_inv+16,$const));# 2 : a/k 242 &pand ("xmm0","xmm6"); # 0 = k 243 &pshufb ("xmm5","xmm0"); # 2 = a/k 248 &pxor ("xmm3","xmm5"); # 3 = iak = 1/i + a/k 251 &pxor ("xmm4","xmm5"); # 4 = jak = 1/j + a/k 264 &pxor ("xmm4","xmm5"); # 4 = sb1u + k 294 &movdqa ("xmm5",&QWP($k_mc_forward+48,$const)); 341 &movdqa ("xmm2",&QWP($k_inv+16,$const));# 2 : a/k [all …]
|
| /freebsd/crypto/openssl/crypto/sha/asm/ |
| H A D | sha512-ia64.pl | 131 K=r15; 280 shrp X[15]=X[15],X[14],48 } 283 shrp X[14]=X[14],X[13],48 };; 286 shrp X[13]=X[13],X[12],48 } 289 shrp X[12]=X[12],X[11],48 };; 292 shrp X[11]=X[11],X[10],48 } 295 shrp X[10]=X[10],X[ 9],48 };; 297 shrp X[ 9]=X[ 9],X[ 8],48 298 shrp X[ 8]=X[ 8],X[ 7],48 } 299 { .mii; shrp X[ 7]=X[ 7],X[ 6],48 [all …]
|
| /freebsd/crypto/openssl/providers/implementations/rands/ |
| H A D | drbg_ctr.c | 53 unsigned char K[32]; member 58 unsigned char KX[48]; 89 if (!ossl_assert(n <= sizeof(ctr->K))) in ctr_XOR() 92 ctr->K[i] ^= in[i]; in ctr_XOR() 124 * Handle several BCC operations for as much data as we need for K and X 128 unsigned char in_tmp[48]; in ctr_BCC_blocks() 146 unsigned char bltmp[48] = {0}; in ctr_BCC_init() 149 memset(ctr->KX, 0, 48); in ctr_BCC_init() 241 /* Set up key K */ in ctr_df() 244 /* X follows key K */ in ctr_df() [all …]
|
| /freebsd/share/man/man7/ |
| H A D | ascii.7 | 50 110 H 111 I 112 J 113 K 114 L 115 M 116 N 117 O 54 150 h 151 i 152 j 153 k 154 l 155 m 156 n 157 o 72 48 H 49 I 4a J 4b K 4c L 4d M 4e N 4f O 76 68 h 69 i 6a j 6b k 6c l 6d m 6e n 6f o 91 48 0 49 1 50 2 51 3 52 4 53 5 54 6 55 7 94 72 H 73 I 74 J 75 K 76 L 77 M 78 N 79 O 98 104 h 105 i 106 j 107 k 108 l 109 m 110 n 111 o 120 VT + K k 01011
|
| H A D | arch.7 | 263 .It aarch64 Ta 4K, 64K, 2M, 1G 264 .It aarch64c Ta 4K, 64K, 2M, 1G 265 .It amd64 Ta 4K, 2M, 1G 266 .It armv7 Ta 4K, 1M 267 .It i386 Ta 4K, 2M (PAE), 4M 268 .It powerpc Ta 4K 269 .It powerpcspe Ta 4K 270 .It powerpc64 Ta 4K 271 .It powerpc64le Ta 4K 272 .It riscv64 Ta 4K, 2M, 1G [all …]
|
| /freebsd/share/misc/ |
| H A D | ascii | 10 |110 H |111 I |112 J |113 K |114 L |115 M |116 N |117 O | 14 |150 h |151 i |152 j |153 k |154 l |155 m |156 n |157 o | 27 | 48 H | 49 I | 4a J | 4b K | 4c L | 4d M | 4e N | 4f O | 31 | 68 h | 69 i | 6a j | 6b k | 6c l | 6d m | 6e n | 6f o | 41 | 48 0 | 49 1 | 50 2 | 51 3 | 52 4 | 53 5 | 54 6 | 55 7 | 44 | 72 H | 73 I | 74 J | 75 K | 76 L | 77 M | 78 N | 79 O | 48 |104 h |105 i |106 j |107 k |108 l |109 m |110 n |111 o |
|
| /freebsd/contrib/netbsd-tests/ipf/expected/ |
| H A D | l1.b | 22 42 63 44 65 46 67 48 69 4a 6b 4c 6d BcDeFgHiJkLm 26 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN 27 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN 28 01/01/1970 00:00:00.000000 anon0 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN 29 01/01/1970 00:00:00.000000 e1 @0:1 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -A K-S OUT 30 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -AF K-S IN 33 01/01/1970 00:00:00.000000 anon0 @0:1 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN 37 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -S K-S IN 38 01/01/1970 00:00:00.000000 anon0 @0:4 p 1.1.1.1,1025 -> 2.2.2.2,25 PR tcp len 20 40 -A K-S IN 39 01/01/1970 00:00:00.000000 anon0 @0:4 p 2.2.2.2,25 -> 1.1.1.1,1025 PR tcp len 20 40 -AS K-S IN [all …]
|
| /freebsd/crypto/openssl/crypto/rc4/asm/ |
| H A D | rc4-md5-x86_64.pl | 92 my @K=( 0xd76aa478,0xe8c7b756,0x242070db,0xc1bdceee, 242 my $k=$i%$MOD; 245 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1); 254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 255 #md5# add \$$K[$i],$a 258 #rc4# movl $TY#d,4*$k($XX[1]) 266 $code.=<<___ if ($rc4 && $j==15 && $k==$MOD-1); 282 my $k=$i%$MOD; 285 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1); 294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d [all …]
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ecp_nistp384.c | 49 * can serialize an element of this field into 48 bytes. We call this an 53 typedef u8 felem_bytearray[48]; 116 static void bin48_to_felem(felem out, const u8 in[48]) in bin48_to_felem() argument 128 static void felem_to_bin48(u8 out[48], const felem in) in felem_to_bin48() argument 130 memset(out, 0, 48); in felem_to_bin48() 303 * out[i] < out_orig[i] + 2^64 + 2^48 322 + (((widelimb) 1) << 48) in felem_diff_128_64() 500 * out[6] <= 2^48 514 * [3]: Y = 2^48 (acc[6] >> 48) 552 acc[6] += (in[12] & 0xff) << 48; in felem_reduce_ref() [all …]
|
| /freebsd/sys/contrib/openzfs/module/icp/asm-arm/sha2/ |
| H A D | sha512-armv7.S | 124 ldr r9, [r0,#48+LO] 125 ldr r10, [r0,#48+HI] 129 str r9, [sp,#48+0] 130 str r10, [sp,#48+4] 200 ldr r11,[sp,#48+0] @ g.lo 202 ldr r12,[sp,#48+4] @ g.hi 213 ldr r11,[r14,#LO] @ K[i].lo 215 ldr r12,[r14,#HI] @ K[i].hi 223 adc r4,r4,r12 @ T += K[i] 340 ldr r11,[sp,#48+0] @ g.lo [all …]
|
| /freebsd/bin/dd/ |
| H A D | ref.pareven | 5 00000040 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.| 13 000000c0 c0 41 42 c3 44 c5 c6 47 48 c9 ca 4b cc 4d 4e cf |.AB.D..GH..K.MN.|
|