| /freebsd/crypto/openssl/crypto/modes/asm/ |
| H A D | aes-gcm-armv8-unroll8_64.pl | 19 # Unroll x8 in main loop, main loop to act on 8 16B blocks per iteration, and then do modulo of the… 20 # intermediate hashesfrom the 8 blocks. 27 # | CTR block 8k+13| AES block 8k+8 | GHASH block 8k+0 | 30 # | CTR block 8k+14| AES block 8k+9 | GHASH block 8k+1 | 33 # | CTR block 8k+15| AES block 8k+10| GHASH block 8k+2 | 36 # | CTR block 8k+16| AES block 8k+11| GHASH block 8k+3 | 39 # | CTR block 8k+17| AES block 8k+12| GHASH block 8k+4 | 42 # | CTR block 8k+18| AES block 8k+13| GHASH block 8k+5 | 45 # | CTR block 8k+19| AES block 8k+14| GHASH block 8k+6 | 48 # | CTR block 8k+20| AES block 8k+15| GHASH block 8k+7 | [all …]
|
| H A D | aes-gcm-armv8_64.pl | 27 # | CTR block 4k+8 | AES block 4k+4 | GHASH block 4k+0 | 30 # | CTR block 4k+9 | AES block 4k+5 | GHASH block 4k+1 | 33 # | CTR block 4k+10| AES block 4k+6 | GHASH block 4k+2 | 36 # | CTR block 4k+11| AES block 4k+7 | GHASH block 4k+3 | 43 # Ensure previous generated intermediate hash is aligned and merged with result for GHASH 4k+0 44 # EXT low_acc, low_acc, low_acc, #8 45 # EOR res_curr (4k+0), res_curr (4k+0), low_acc 61 # LDR input_low, [ input_ptr ], #8 62 # LDR input_high, [ input_ptr ], #8 128 # EOR t_m.8B, t_m.8B, res_curr.8B [all …]
|
| /freebsd/sys/crypto/openssl/aarch64/ |
| H A D | aes-gcm-armv8-unroll8_64.S | 4 #if __ARM_MAX_ARCH__>=8 202 ext v19.16b, v19.16b, v19.16b, #8 223 aesmc v3.16b, v3.16b //AES block 8k+11 - round 8 225 aesmc v6.16b, v6.16b //AES block 8k+14 - round 8 227 aesmc v2.16b, v2.16b //AES block 8k+10 - round 8 230 aesmc v7.16b, v7.16b //AES block 8k+15 - round 8 232 aesmc v0.16b, v0.16b //AES block 8k+8 - round 8 235 aese v3.16b, v26.16b //AES block 8k+11 - round 9 237 aesmc v4.16b, v4.16b //AES block 8k+12 - round 8 238 aese v2.16b, v26.16b //AES block 8k+10 - round 9 [all …]
|
| H A D | aes-gcm-armv8_64.S | 4 #if __ARM_MAX_ARCH__>=8 34 ext v11.16b, v11.16b, v11.16b, #8 46 ext v15.16b, v15.16b, v15.16b, #8 80 ext v14.16b, v14.16b, v14.16b, #8 90 ext v12.16b, v12.16b, v12.16b, #8 125 ext v13.16b, v13.16b, v13.16b, #8 200 aesmc v0.16b, v0.16b //AES block 0 - round 8 206 aesmc v2.16b, v2.16b //AES block 2 - round 8 209 aesmc v3.16b, v3.16b //AES block 3 - round 8 212 aesmc v1.16b, v1.16b //AES block 1 - round 8 [all …]
|
| /freebsd/contrib/unbound/util/storage/ |
| H A D | lookup3.c | 118 #define rot(x,k) (((x)<<(k)) | ((x)>>(32-(k)))) argument 150 Some k values for my "a-=c; a^=rot(c,k); c+=b;" arrangement that 152 4 6 8 16 19 4 177 c -= b; c ^= rot(b, 8); b += a; \ 203 4 8 15 26 3 22 24 204 10 8 15 26 3 22 24 205 11 8 15 26 3 22 24 233 const uint32_t *k, /* the key, an array of uint32_t values */ in hashword() argument 245 a += k[0]; in hashword() 246 b += k[1]; in hashword() [all …]
|
| /freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
| H A D | aeskey.c | 38 * values correspond with Nk values of 4, 6 and 8 respectively. 44 * nk = 4 5 6 7 8 46 * cx->n_col = 4 10 9 8 7 7 50 * cx->n_col = 8 29 23 19 17 14 65 * 8. cstyled code and removed lint warnings 82 #define ke4(k, i) \ argument 83 { k[4 * (i) + 4] = ss[0] ^= ls_box(ss[3], 3) ^ t_use(r, c)[i]; \ 84 k[4 * (i) + 5] = ss[1] ^= ss[0]; \ 85 k[4 * (i) + 6] = ss[2] ^= ss[1]; \ 86 k[4 * (i) + 7] = ss[3] ^= ss[2]; \ [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/aes/ |
| H A D | aeskey.c | 53 values correspond with Nk values of 4, 6 and 8 respectively. 59 nk = 4 5 6 7 8 61 cx->n_col = 4 10 9 8 7 7 65 cx->n_col = 8 29 23 19 17 14 85 #define ke4(k,i) \ argument 86 { k[4*(i)+4] = ss[0] ^= ls_box(ss[3],3) ^ t_use(r,c)[i]; \ 87 k[4*(i)+5] = ss[1] ^= ss[0]; \ 88 k[4*(i)+6] = ss[2] ^= ss[1]; \ 89 k[4*(i)+7] = ss[3] ^= ss[2]; \ 105 ke4(cx->ks, 8); in aes_xi() [all …]
|
| /freebsd/crypto/openssl/test/recipes/04-test_pem_reading_data/ |
| H A D | dsa-onecolumn.pem | 31 k 50 8 72 K 81 K 92 K 148 k 173 k 186 k 198 k 239 K [all …]
|
| H A D | cert-onecolumn.pem | 19 k 32 k 35 k 385 k 825 k 921 K 945 K 950 K 956 K 973 K [all …]
|
| /freebsd/contrib/file/tests/ |
| H A D | matilde.arm.testfile | 2 <[d��y�����'�P�[<k�0^��<j~yJ/!ݘG&�����e�4ta��+a�<�p������(����n���{i�/�8A�<� ٫7… 3 …8A{1e�d!�Tkr(��n���u�RP<Rby��z��z�;+~��*�s�'�7q#�ڰ<p�l���-*�Bm�h2U�v��ښ�m�< pq��ry�+… 6 …Pg����*�0�*=�K|�K~��%PS�k`<� mJ���,��=�Fxh �� S �<Cg��!ˀj1�`��b�\�~.փ�$$瑰<<�r?��… 9 !�:���=K����[��<Ɖ�lH��!L��-��I��w�9:y��<�U'�ԫ�Lc�\vyY>�Ԫ�ϧ�4p<&@i�~#�������)J$�� 11 …:�<6BmЩ���2Z��8Ђ�ׯ�^��lFaP< ���I�a-��0�Z���p~iz�PP��� �<4xcC��`���x��{��Z\DT�~�;Y��<2�… 12 ـ�M���,ˬ3aѾLb< 5]B� p���:Յ��0(ʵ5L�9�<ey�=)��y@z8F�X '��8 13 ]��o�<xm�a'H��K�_��1_���A��G�M�@<��o�a��5�6!l4� 14 ,�3۳ޢl�<`e�/wb��0���n�(R�! p&�K�0<&qX�?��kƳ��y���fD�.+2D��`<L{��K��E2�)5Em@Z�.�fN@…
|
| H A D | HWP97.hwp.testfile | 1 …��OkA�|��%j{�@��b��8ԕ�����-����6YĔfb�`�… 2 m��9eI��yؾ�s�N��i�� ���cWgg�K�q1�3.&}�=��k9�r��+w�u�xp 5 …����7����{���$��܅y҅���\t�8���#S&O�貔������ �Z��SV��u�C�:�!g���阔���5*;�L4e�<� ������w��N�k��… 7 >��ĕ�y~/Yۿ��5����W����)�Wȴ�8tǮI��G�MW��ֺD��y�.;O�&�^�0��/�z�!���� 8 …�Փ3Q�"����l����a�ˤ�&W:Ln�VdR�u�;*g�^���|�N���צ��{��h_ \��t�:K�Y�>�� i����P�G2i�3�… 11 �ƭ�^�ή��/7o9_nV9��Mn.8�JzQZK�C��J��eh`����p��Rkn�h?璴2�c�m�ʉ 12 ����ɡ�����[��B�ՄiҠ�%���"�>��y0۠�d9�h���*����q��D{m��h�N\D��\��w���]`ד�Ws�؊�����ö3�r�Z8�H�… 14 �bo�����Z�rb����^r~�Kο᮹u�'n�S���8&.!��K���y�p���b����@�>`����(G�9Zp~QX�Ve� 15 �U��s�]�Y �}#�ѽ�k�"!����9v����ߕa�/튏ٰ�������g,��IL����'.��\`Q�3�kpr��zo�p�s��� ? G.*� 16 �8���%p���c���H�M8<7X��y�r���H�;��a�7��{�oՙ��y�v�VCⶼ��z˶|lP=n�y�<��V˾����;�-d#5�ع��3�… [all …]
|
| /freebsd/sys/libkern/ |
| H A D | jenkins_hash.c | 44 #define rot(x,k) (((x)<<(k)) | ((x)>>(32-(k)))) argument 67 Some k values for my "a-=c; a^=rot(c,k); c+=b;" arrangement that 69 4 6 8 16 19 4 94 c -= b; c ^= rot(b, 8); b += a; \ 120 4 8 15 26 3 22 24 121 10 8 15 26 3 22 24 122 11 8 15 26 3 22 24 150 const uint32_t *k, /* the key, an array of uint32_t values */ in jenkins_hash32() argument 162 a += k[0]; in jenkins_hash32() 163 b += k[1]; in jenkins_hash32() [all …]
|
| /freebsd/crypto/openssl/crypto/cast/ |
| H A D | c_enc.c | 22 const CAST_LONG *k; in CAST_encrypt() local 24 k = &(key->data[0]); in CAST_encrypt() 28 E_CAST(0, k, l, r, +, ^, -); in CAST_encrypt() 29 E_CAST(1, k, r, l, ^, -, +); in CAST_encrypt() 30 E_CAST(2, k, l, r, -, +, ^); in CAST_encrypt() 31 E_CAST(3, k, r, l, +, ^, -); in CAST_encrypt() 32 E_CAST(4, k, l, r, ^, -, +); in CAST_encrypt() 33 E_CAST(5, k, r, l, -, +, ^); in CAST_encrypt() 34 E_CAST(6, k, l, r, +, ^, -); in CAST_encrypt() 35 E_CAST(7, k, r, l, ^, -, +); in CAST_encrypt() [all …]
|
| H A D | c_skey.c | 23 a[n+2]=(l>> 8)&0xff; \ 36 CAST_LONG k[32]; in CAST_set_key() local 38 CAST_LONG l, *K; in CAST_set_key() local 52 K = &k[0]; in CAST_set_key() 53 X[0] = ((x[0] << 24) | (x[1] << 16) | (x[2] << 8) | x[3]) & 0xffffffffL; in CAST_set_key() 54 X[1] = ((x[4] << 24) | (x[5] << 16) | (x[6] << 8) | x[7]) & 0xffffffffL; in CAST_set_key() 55 X[2] = ((x[8] << 24) | (x[9] << 16) | (x[10] << 8) | x[11]) & 0xffffffffL; in CAST_set_key() 57 ((x[12] << 24) | (x[13] << 16) | (x[14] << 8) | x[15]) & 0xffffffffL; in CAST_set_key() 60 l = X[0] ^ S4[x[13]] ^ S5[x[15]] ^ S6[x[12]] ^ S7[x[14]] ^ S6[x[8]]; in CAST_set_key() 65 CAST_exp(l, Z, z, 8); in CAST_set_key() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | memmem.c | 38 twobyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in twobyte_memmem() argument 40 uint16_t nw = n[0]<<8 | n[1], hw = h[0]<<8 | h[1]; in twobyte_memmem() 41 for (h+=2, k-=2; k; k--, hw = hw<<8 | *h++) in twobyte_memmem() 47 threebyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in threebyte_memmem() argument 49 uint32_t nw = n[0]<<24 | n[1]<<16 | n[2]<<8; in threebyte_memmem() 50 uint32_t hw = h[0]<<24 | h[1]<<16 | h[2]<<8; in threebyte_memmem() 51 for (h+=3, k-=3; k; k--, hw = (hw|*h++)<<8) in threebyte_memmem() 57 fourbyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in fourbyte_memmem() argument 59 uint32_t nw = n[0]<<24 | n[1]<<16 | n[2]<<8 | n[3]; in fourbyte_memmem() 60 uint32_t hw = h[0]<<24 | h[1]<<16 | h[2]<<8 | h[3]; in fourbyte_memmem() [all …]
|
| /freebsd/lib/libc/string/ |
| H A D | memmem.c | 29 twobyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in twobyte_memmem() argument 31 uint16_t nw = n[0] << 8 | n[1], hw = h[0] << 8 | h[1]; in twobyte_memmem() 32 for (h += 2, k -= 2; k; k--, hw = hw << 8 | *h++) in twobyte_memmem() 39 threebyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in threebyte_memmem() argument 41 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8; in threebyte_memmem() 42 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8; in threebyte_memmem() 43 for (h += 3, k -= 3; k; k--, hw = (hw | *h++) << 8) in threebyte_memmem() 50 fourbyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in fourbyte_memmem() argument 52 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8 | n[3]; in fourbyte_memmem() 53 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8 | h[3]; in fourbyte_memmem() [all …]
|
| H A D | strstr.c | 31 uint16_t nw = n[0] << 8 | n[1], hw = h[0] << 8 | h[1]; in twobyte_strstr() 32 for (h++; *h && hw != nw; hw = hw << 8 | *++h) in twobyte_strstr() 40 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8; in threebyte_strstr() 41 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8; in threebyte_strstr() 42 for (h += 2; *h && hw != nw; hw = (hw | *++h) << 8) in threebyte_strstr() 50 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8 | n[3]; in fourbyte_strstr() 51 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8 | h[3]; in fourbyte_strstr() 52 for (h += 3; *h && hw != nw; hw = hw << 8 | *++h) in fourbyte_strstr() 61 ((a)[(size_t)(b) / (8 * sizeof *(a))] op \ 62 (size_t)1 << ((size_t)(b) % (8 * sizeof *(a)))) [all …]
|
| /freebsd/lib/virtual_oss/bt/cosdata-gen/ |
| H A D | cosdata.c | 77 float S[8][16]; in main() 79 int k; in main() local 86 for (k = 0; k < AC(sbc8_coeffs); k++) { in main() 87 if ((count % 8) == 0 && count != 0) in main() 89 printf("%0.12ff, ", (float)sbc8_coeffs[k]); in main() 96 for (k = 0; k < AC(sbc4_coeffs); k++) { in main() 97 if ((count % 8) == 0 && count != 0) in main() 99 printf("%0.12ff, ", (float)sbc4_coeffs[k]); in main() 105 printf("static const float cosdata8[8][16] = {\n "); in main() 106 for (i = 0; i < 8; i++) { in main() [all …]
|
| /freebsd/sys/dev/cxgb/common/ |
| H A D | jhash.h | 22 b -= c; b -= a; b ^= (a<<8); \ 42 const u8 *k = key; in jhash() local 49 a += (k[0] +((u32)k[1]<<8) +((u32)k[2]<<16) +((u32)k[3]<<24)); in jhash() 50 b += (k[4] +((u32)k[5]<<8) +((u32)k[6]<<16) +((u32)k[7]<<24)); in jhash() 51 c += (k[8] +((u32)k[9]<<8) +((u32)k[10]<<16)+((u32)k[11]<<24)); in jhash() 55 k += 12; in jhash() 61 case 11: c += ((u32)k[10]<<24); in jhash() 62 case 10: c += ((u32)k[9]<<16); in jhash() 63 case 9 : c += ((u32)k[8]<<8); in jhash() 64 case 8 : b += ((u32)k[7]<<24); in jhash() [all …]
|
| /freebsd/crypto/openssl/crypto/chacha/asm/ |
| H A D | chacha-ia64.pl | 20 my @k = map("r$_",(16..31)); 22 my @y = map("r$_",(8..11)); 46 ADDP @k[11]=4,$key 57 { .mlx; ld4 @k[4]=[$key],8 58 movl @k[0]=0x61707865 } 59 { .mlx; ld4 @k[5]=[@k[11]],8 60 movl @k[1]=0x3320646e };; 61 { .mlx; ld4 @k[6]=[$key],8 62 movl @k[2]=0x79622d32 } 63 { .mlx; ld4 @k[7]=[@k[11]],8 [all …]
|
| H A D | chacha-armv8.pl | 206 mov.32 @x[8],@d[4] 220 foreach (&ROUND(0, 4, 8,12)) { eval; } 233 add.32 @x[8],@x[8],@d[4] 250 add @x[8],@x[8],@x[9],lsl#32 262 rev @x[8],@x[8] 271 eor @x[8],@x[8],@x[9] 279 stp @x[8],@x[10],[$out,#32] 310 add @x[8],@x[8],@x[9],lsl#32 319 rev @x[8],@x[8] 326 stp @x[8],@x[10],[sp,#32] [all …]
|
| H A D | chacha-s390x.pl | 56 $SIZE_T=8; 60 my $stdframe=16*$SIZE_T+4*8; 64 my @t=map("%r$_",(8,9)); 76 # 0 4 8 12 < even round 82 # 2 7 8 13 111 rll (@x[$d0],@x[$d0],8); 112 rll (@x[$d1],@x[$d1],8); 121 stm ($xc,$xc_,"$stdframe+4*8+4*$c0($sp)"); # reload pair of 'c's 122 lm ($xc,$xc_,"$stdframe+4*8+4*$c2($sp)"); 142 rll (@x[$d2],@x[$d2],8); [all …]
|
| /freebsd/sys/compat/linuxkpi/common/include/linux/ |
| H A D | jhash.h | 29 b -= c; b -= a; b ^= (a<<8); \ 49 const u8 *k = key; in jhash() local 56 a += (k[0] +((u32)k[1]<<8) +((u32)k[2]<<16) +((u32)k[3]<<24)); in jhash() 57 b += (k[4] +((u32)k[5]<<8) +((u32)k[6]<<16) +((u32)k[7]<<24)); in jhash() 58 c += (k[8] +((u32)k[9]<<8) +((u32)k[10]<<16)+((u32)k[11]<<24)); in jhash() 62 k += 12; in jhash() 68 case 11: c += ((u32)k[10]<<24); in jhash() 69 case 10: c += ((u32)k[9]<<16); in jhash() 70 case 9 : c += ((u32)k[8]<<8); in jhash() 71 case 8 : b += ((u32)k[7]<<24); in jhash() [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | milenage.c | 27 * @opc: OPc = 128-bit value derived from OP and K 28 * @k: K = 128-bit subscriber key 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1() 51 os_memcpy(tmp2 + 8, tmp2, 8); in milenage_f1() 55 /* rotate (tmp2 XOR OP_C) by r1 (= 0x40 = 8 bytes) */ in milenage_f1() 57 tmp3[(i + 8) % 16] = tmp2[i] ^ opc[i]; in milenage_f1() 64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1() 69 os_memcpy(mac_a, tmp1, 8); /* f1 */ in milenage_f1() 71 os_memcpy(mac_s, tmp1 + 8, 8); /* f1* */ in milenage_f1() [all …]
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/AVR/MCTargetDesc/ |
| H A D | AVRFixupKinds.h | 48 /// Replaces the 8-bit immediate with another value. 51 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 52 /// with the lower 8 bits of a 16-bit value (bits 0-7). 54 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 55 /// with the upper 8 bits of a 16-bit value (bits 8-15). 57 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 58 /// with the upper 8 bits of a 24-bit value (bits 16-23). 60 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 61 /// with the upper 8 bit [all...] |