/freebsd/contrib/unbound/util/storage/ |
H A D | lookup3.c | 118 #define rot(x,k) (((x)<<(k)) | ((x)>>(32-(k)))) argument 150 Some k values for my "a-=c; a^=rot(c,k); c+=b;" arrangement that 152 4 6 8 16 19 4 177 c -= b; c ^= rot(b, 8); b += a; \ 203 4 8 15 26 3 22 24 204 10 8 15 26 3 22 24 205 11 8 15 26 3 22 24 233 const uint32_t *k, /* the key, an array of uint32_t values */ in hashword() argument 245 a += k[0]; in hashword() 246 b += k[1]; in hashword() [all …]
|
/freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
H A D | aeskey.c | 37 * values correspond with Nk values of 4, 6 and 8 respectively. 43 * nk = 4 5 6 7 8 45 * cx->n_col = 4 10 9 8 7 7 49 * cx->n_col = 8 29 23 19 17 14 64 * 8. cstyled code and removed lint warnings 81 #define ke4(k, i) \ argument 82 { k[4 * (i) + 4] = ss[0] ^= ls_box(ss[3], 3) ^ t_use(r, c)[i]; \ 83 k[4 * (i) + 5] = ss[1] ^= ss[0]; \ 84 k[4 * (i) + 6] = ss[2] ^= ss[1]; \ 85 k[4 * (i) + 7] = ss[3] ^= ss[2]; \ [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | aes-gcm-armv8_64.pl | 27 # | CTR block 4k+8 | AES block 4k+4 | GHASH block 4k+0 | 30 # | CTR block 4k+9 | AES block 4k+5 | GHASH block 4k+1 | 33 # | CTR block 4k+10| AES block 4k+6 | GHASH block 4k+2 | 36 # | CTR block 4k+11| AES block 4k+7 | GHASH block 4k+3 | 43 # Ensure previous generated intermediate hash is aligned and merged with result for GHASH 4k+0 44 # EXT low_acc, low_acc, low_acc, #8 45 # EOR res_curr (4k+0), res_curr (4k+0), low_acc 61 # LDR input_low, [ input_ptr ], #8 62 # LDR input_high, [ input_ptr ], #8 128 # EOR t_m.8B, t_m.8B, res_curr.8B [all …]
|
/freebsd/sys/crypto/openssl/aarch64/ |
H A D | aes-gcm-armv8_64.S | 4 #if __ARM_MAX_ARCH__>=8 34 ext v11.16b, v11.16b, v11.16b, #8 46 ext v15.16b, v15.16b, v15.16b, #8 80 ext v14.16b, v14.16b, v14.16b, #8 90 ext v12.16b, v12.16b, v12.16b, #8 125 ext v13.16b, v13.16b, v13.16b, #8 200 aesmc v0.16b, v0.16b //AES block 0 - round 8 206 aesmc v2.16b, v2.16b //AES block 2 - round 8 209 aesmc v3.16b, v3.16b //AES block 3 - round 8 212 aesmc v1.16b, v1.16b //AES block 1 - round 8 [all …]
|
/freebsd/crypto/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | dsa-onecolumn.pem | 31 k 50 8 72 K 81 K 92 K 148 k 173 k 186 k 198 k 239 K [all …]
|
H A D | cert-onecolumn.pem | 19 k 32 k 35 k 385 k 825 k 921 K 945 K 950 K 956 K 973 K [all …]
|
/freebsd/contrib/file/tests/ |
H A D | matilde.arm.testfile | 2 <[d��y�����'�P�[<k�0^��<j~yJ/!ݘG&�����e�4ta��+a�<�p������(����n���{i�/�8A�<� ٫7… 3 …8A{1e�d!�Tkr(��n���u�RP<Rby��z��z�;+~��*�s�'�7q#�ڰ<p�l���-*�Bm�h2U�v��ښ�m�< pq��ry�+… 6 …Pg����*�0�*=�K|�K~��%PS�k`<� mJ���,��=�Fxh �� S �<Cg��!ˀj1�`��b�\�~.փ�$$瑰<<�r?��… 9 !�:���=K����[��<Ɖ�lH��!L��-��I��w�9:y��<�U'�ԫ�Lc�\vyY>�Ԫ�ϧ�4p<&@i�~#�������)J$�� 11 …:�<6BmЩ���2Z��8Ђ�ׯ�^��lFaP< ���I�a-��0�Z���p~iz�PP��� �<4xcC��`���x��{��Z\DT�~�;Y��<2�… 12 ـ�M���,ˬ3aѾLb< 5]B� p���:Յ��0(ʵ5L�9�<ey�=)��y@z8F�X '��8 13 ]��o�<xm�a'H��K�_��1_���A��G�M�@<��o�a��5�6!l4� 14 ,�3۳ޢl�<`e�/wb��0���n�(R�! p&�K�0<&qX�?��kƳ��y���fD�.+2D��`<L{��K��E2�)5Em@Z�.�fN@…
|
H A D | HWP97.hwp.testfile | 1 …��OkA�|��%j{�@��b��8ԕ�����-����6YĔfb�`�… 2 m��9eI��yؾ�s�N��i�� ���cWgg�K�q1�3.&}�=��k9�r��+w�u�xp 5 …����7����{���$��܅y҅���\t�8���#S&O�貔������ �Z��SV��u�C�:�!g���阔���5*;�L4e�<� ������w��N�k��… 7 >��ĕ�y~/Yۿ��5����W����)�Wȴ�8tǮI��G�MW��ֺD��y�.;O�&�^�0��/�z�!���� 8 …�Փ3Q�"����l����a�ˤ�&W:Ln�VdR�u�;*g�^���|�N���צ��{��h_ \��t�:K�Y�>�� i����P�G2i�3�… 11 �ƭ�^�ή��/7o9_nV9��Mn.8�JzQZK�C��J��eh`����p��Rkn�h?璴2�c�m�ʉ 12 ����ɡ�����[��B�ՄiҠ�%���"�>��y0۠�d9�h���*����q��D{m��h�N\D��\��w���]`ד�Ws�؊�����ö3�r�Z8�H�… 14 �bo�����Z�rb����^r~�Kο᮹u�'n�S���8&.!��K���y�p���b����@�>`����(G�9Zp~QX�Ve� 15 �U��s�]�Y �}#�ѽ�k�"!����9v����ߕa�/튏ٰ�������g,��IL����'.��\`Q�3�kpr��zo�p�s��� ? G.*� 16 �8���%p���c���H�M8<7X��y�r���H�;��a�7��{�oՙ��y�v�VCⶼ��z˶|lP=n�y�<��V˾����;�-d#5�ع��3�… [all …]
|
/freebsd/sys/libkern/ |
H A D | jenkins_hash.c | 44 #define rot(x,k) (((x)<<(k)) | ((x)>>(32-(k)))) argument 67 Some k values for my "a-=c; a^=rot(c,k); c+=b;" arrangement that 69 4 6 8 16 19 4 94 c -= b; c ^= rot(b, 8); b += a; \ 120 4 8 15 26 3 22 24 121 10 8 15 26 3 22 24 122 11 8 15 26 3 22 24 150 const uint32_t *k, /* the key, an array of uint32_t values */ in jenkins_hash32() argument 162 a += k[0]; in jenkins_hash32() 163 b += k[1]; in jenkins_hash32() [all …]
|
/freebsd/crypto/openssl/crypto/cast/ |
H A D | c_enc.c | 22 const CAST_LONG *k; in CAST_encrypt() local 24 k = &(key->data[0]); in CAST_encrypt() 28 E_CAST(0, k, l, r, +, ^, -); in CAST_encrypt() 29 E_CAST(1, k, r, l, ^, -, +); in CAST_encrypt() 30 E_CAST(2, k, l, r, -, +, ^); in CAST_encrypt() 31 E_CAST(3, k, r, l, +, ^, -); in CAST_encrypt() 32 E_CAST(4, k, l, r, ^, -, +); in CAST_encrypt() 33 E_CAST(5, k, r, l, -, +, ^); in CAST_encrypt() 34 E_CAST(6, k, l, r, +, ^, -); in CAST_encrypt() 35 E_CAST(7, k, r, l, ^, -, +); in CAST_encrypt() [all …]
|
H A D | c_skey.c | 23 a[n+2]=(l>> 8)&0xff; \ 36 CAST_LONG k[32]; in CAST_set_key() local 38 CAST_LONG l, *K; in CAST_set_key() local 52 K = &k[0]; in CAST_set_key() 53 X[0] = ((x[0] << 24) | (x[1] << 16) | (x[2] << 8) | x[3]) & 0xffffffffL; in CAST_set_key() 54 X[1] = ((x[4] << 24) | (x[5] << 16) | (x[6] << 8) | x[7]) & 0xffffffffL; in CAST_set_key() 55 X[2] = ((x[8] << 24) | (x[9] << 16) | (x[10] << 8) | x[11]) & 0xffffffffL; in CAST_set_key() 57 ((x[12] << 24) | (x[13] << 16) | (x[14] << 8) | x[15]) & 0xffffffffL; in CAST_set_key() 60 l = X[0] ^ S4[x[13]] ^ S5[x[15]] ^ S6[x[12]] ^ S7[x[14]] ^ S6[x[8]]; in CAST_set_key() 65 CAST_exp(l, Z, z, 8); in CAST_set_key() [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | memmem.c | 38 twobyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in twobyte_memmem() argument 40 uint16_t nw = n[0]<<8 | n[1], hw = h[0]<<8 | h[1]; in twobyte_memmem() 41 for (h+=2, k-=2; k; k--, hw = hw<<8 | *h++) in twobyte_memmem() 47 threebyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in threebyte_memmem() argument 49 uint32_t nw = n[0]<<24 | n[1]<<16 | n[2]<<8; in threebyte_memmem() 50 uint32_t hw = h[0]<<24 | h[1]<<16 | h[2]<<8; in threebyte_memmem() 51 for (h+=3, k-=3; k; k--, hw = (hw|*h++)<<8) in threebyte_memmem() 57 fourbyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in fourbyte_memmem() argument 59 uint32_t nw = n[0]<<24 | n[1]<<16 | n[2]<<8 | n[3]; in fourbyte_memmem() 60 uint32_t hw = h[0]<<24 | h[1]<<16 | h[2]<<8 | h[3]; in fourbyte_memmem() [all …]
|
/freebsd/lib/libc/string/ |
H A D | memmem.c | 29 twobyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in twobyte_memmem() argument 31 uint16_t nw = n[0] << 8 | n[1], hw = h[0] << 8 | h[1]; in twobyte_memmem() 32 for (h += 2, k -= 2; k; k--, hw = hw << 8 | *h++) in twobyte_memmem() 39 threebyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in threebyte_memmem() argument 41 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8; in threebyte_memmem() 42 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8; in threebyte_memmem() 43 for (h += 3, k -= 3; k; k--, hw = (hw | *h++) << 8) in threebyte_memmem() 50 fourbyte_memmem(const unsigned char *h, size_t k, const unsigned char *n) in fourbyte_memmem() argument 52 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8 | n[3]; in fourbyte_memmem() 53 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8 | h[3]; in fourbyte_memmem() [all …]
|
H A D | strstr.c | 31 uint16_t nw = n[0] << 8 | n[1], hw = h[0] << 8 | h[1]; in twobyte_strstr() 32 for (h++; *h && hw != nw; hw = hw << 8 | *++h) in twobyte_strstr() 40 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8; in threebyte_strstr() 41 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8; in threebyte_strstr() 42 for (h += 2; *h && hw != nw; hw = (hw | *++h) << 8) in threebyte_strstr() 50 uint32_t nw = (uint32_t)n[0] << 24 | n[1] << 16 | n[2] << 8 | n[3]; in fourbyte_strstr() 51 uint32_t hw = (uint32_t)h[0] << 24 | h[1] << 16 | h[2] << 8 | h[3]; in fourbyte_strstr() 52 for (h += 3; *h && hw != nw; hw = hw << 8 | *++h) in fourbyte_strstr() 61 ((a)[(size_t)(b) / (8 * sizeof *(a))] op \ 62 (size_t)1 << ((size_t)(b) % (8 * sizeof *(a)))) [all …]
|
/freebsd/sys/dev/cxgb/common/ |
H A D | jhash.h | 22 b -= c; b -= a; b ^= (a<<8); \ 42 const u8 *k = key; in jhash() local 49 a += (k[0] +((u32)k[1]<<8) +((u32)k[2]<<16) +((u32)k[3]<<24)); in jhash() 50 b += (k[4] +((u32)k[5]<<8) +((u32)k[6]<<16) +((u32)k[7]<<24)); in jhash() 51 c += (k[8] +((u32)k[9]<<8) +((u32)k[10]<<16)+((u32)k[11]<<24)); in jhash() 55 k += 12; in jhash() 61 case 11: c += ((u32)k[10]<<24); in jhash() 62 case 10: c += ((u32)k[9]<<16); in jhash() 63 case 9 : c += ((u32)k[8]<<8); in jhash() 64 case 8 : b += ((u32)k[7]<<24); in jhash() [all …]
|
/freebsd/crypto/openssl/crypto/chacha/asm/ |
H A D | chacha-ia64.pl | 20 my @k = map("r$_",(16..31)); 22 my @y = map("r$_",(8..11)); 46 ADDP @k[11]=4,$key 57 { .mlx; ld4 @k[4]=[$key],8 58 movl @k[0]=0x61707865 } 59 { .mlx; ld4 @k[5]=[@k[11]],8 60 movl @k[1]=0x3320646e };; 61 { .mlx; ld4 @k[6]=[$key],8 62 movl @k[2]=0x79622d32 } 63 { .mlx; ld4 @k[7]=[@k[11]],8 [all …]
|
H A D | chacha-armv8.pl | 202 mov.32 @x[8],@d[4] 216 foreach (&ROUND(0, 4, 8,12)) { eval; } 229 add.32 @x[8],@x[8],@d[4] 246 add @x[8],@x[8],@x[9],lsl#32 258 rev @x[8],@x[8] 267 eor @x[8],@x[8],@x[9] 275 stp @x[8],@x[10],[$out,#32] 306 add @x[8],@x[8],@x[9],lsl#32 315 rev @x[8],@x[8] 322 stp @x[8],@x[10],[sp,#32] [all …]
|
H A D | chacha-s390x.pl | 56 $SIZE_T=8; 60 my $stdframe=16*$SIZE_T+4*8; 64 my @t=map("%r$_",(8,9)); 76 # 0 4 8 12 < even round 82 # 2 7 8 13 111 rll (@x[$d0],@x[$d0],8); 112 rll (@x[$d1],@x[$d1],8); 121 stm ($xc,$xc_,"$stdframe+4*8+4*$c0($sp)"); # reload pair of 'c's 122 lm ($xc,$xc_,"$stdframe+4*8+4*$c2($sp)"); 142 rll (@x[$d2],@x[$d2],8); [all …]
|
/freebsd/sys/compat/linuxkpi/common/include/linux/ |
H A D | jhash.h | 29 b -= c; b -= a; b ^= (a<<8); \ 49 const u8 *k = key; in jhash() local 56 a += (k[0] +((u32)k[1]<<8) +((u32)k[2]<<16) +((u32)k[3]<<24)); in jhash() 57 b += (k[4] +((u32)k[5]<<8) +((u32)k[6]<<16) +((u32)k[7]<<24)); in jhash() 58 c += (k[8] +((u32)k[9]<<8) +((u32)k[10]<<16)+((u32)k[11]<<24)); in jhash() 62 k += 12; in jhash() 68 case 11: c += ((u32)k[10]<<24); in jhash() 69 case 10: c += ((u32)k[9]<<16); in jhash() 70 case 9 : c += ((u32)k[8]<<8); in jhash() 71 case 8 : b += ((u32)k[7]<<24); in jhash() [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | milenage.c | 27 * @opc: OPc = 128-bit value derived from OP and K 28 * @k: K = 128-bit subscriber key 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1() 51 os_memcpy(tmp2 + 8, tmp2, 8); in milenage_f1() 55 /* rotate (tmp2 XOR OP_C) by r1 (= 0x40 = 8 bytes) */ in milenage_f1() 57 tmp3[(i + 8) % 16] = tmp2[i] ^ opc[i]; in milenage_f1() 64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1() 69 os_memcpy(mac_a, tmp1, 8); /* f1 */ in milenage_f1() 71 os_memcpy(mac_s, tmp1 + 8, 8); /* f1* */ in milenage_f1() [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Target/AVR/MCTargetDesc/ |
H A D | AVRFixupKinds.h | 48 /// Replaces the 8-bit immediate with another value. 51 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 52 /// with the lower 8 bits of a 16-bit value (bits 0-7). 54 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 55 /// with the upper 8 bits of a 16-bit value (bits 8-15). 57 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 58 /// with the upper 8 bits of a 24-bit value (bits 16-23). 60 /// Replaces the immediate operand of a 16-bit `Rd, K` instruction 61 /// with the upper 8 bit [all...] |
/freebsd/sys/contrib/zlib/ |
H A D | crc32.c | 34 each word consists of W bytes (4 or 8). If N is 3, for example, then three 36 indices in the array of words: 0, 3, 6, ..., 1, 4, 7, ..., and 2, 5, 8, ... 40 W must be 4 or 8. The upper limit on N can be increased if desired by adding 48 with N=5, W=8. The Sparc, PowerPC, and MIPS64 were all fastest at N=5, W=4. 80 # define W 8 /* required for MAKECRCH */ 83 # define W 8 90 # if W == 8 && defined(Z_U8) 102 #if defined(__aarch64__) && defined(__ARM_FEATURE_CRC32) && W == 8 114 # if W == 8 in byte_swap() 119 (word & 0xff00000000) >> 8 | in byte_swap() [all …]
|
/freebsd/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_keycache.c | 169 mac_hi = (mac[5] << 8) | mac[4]; in ar9300_set_key_cache_entry_mac() 171 | (mac[1] << 8) | mac[0]; in ar9300_set_key_cache_entry_mac() 190 const HAL_KEYVAL *k, const u_int8_t *mac, in ar9300_set_key_cache_entry() argument 197 (KEY_XOR << 24 | KEY_XOR << 16 | KEY_XOR << 8 | KEY_XOR) : 0; in ar9300_set_key_cache_entry() 200 int is_proxysta_key = k->kv_type & HAL_KEY_PROXY_STA_MASK; in ar9300_set_key_cache_entry() 212 switch (k->kv_type & AH_KEYTYPE_MASK) { in ar9300_set_key_cache_entry() 235 if (k->kv_len < 40 / NBBY) { in ar9300_set_key_cache_entry() 237 __func__, k->kv_len); in ar9300_set_key_cache_entry() 240 if (k->kv_len <= 40 / NBBY) { in ar9300_set_key_cache_entry() 242 } else if (k->kv_len <= 104 / NBBY) { in ar9300_set_key_cache_entry() [all …]
|
/freebsd/crypto/openssl/crypto/camellia/ |
H A D | camellia.c | 56 #define GETU32(p) (((u32)(p)[0] << 24) ^ ((u32)(p)[1] << 16) ^ ((u32)(p)[2] << 8) ^ ((u32)(p)[3]… 57 #define PUTU32(p,v) ((p)[0] = (u8)((v) >> 24), (p)[1] = (u8)((v) >> 16), (p)[2] = (u8)((v) >> 8), … 259 _t3 ^= SBOX3_3033[(_t0 >> 8)&0xff];\ 262 _t2 ^= SBOX4_4404[(_t1 >> 8)&0xff];\ 265 _t3 = RightRotate(_t3,8);\ 286 int Camellia_Ekeygen(int keyBitLength, const u8 *rawKey, KEY_TABLE_TYPE k) in Camellia_Ekeygen() argument 290 k[0] = s0 = GETU32(rawKey); in Camellia_Ekeygen() 291 k[1] = s1 = GETU32(rawKey + 4); in Camellia_Ekeygen() 292 k[2] = s2 = GETU32(rawKey + 8); in Camellia_Ekeygen() 293 k[3] = s3 = GETU32(rawKey + 12); in Camellia_Ekeygen() [all …]
|
/freebsd/crypto/openssl/crypto/whrlpool/ |
H A D | wp_block.c | 170 * eight 8-bit values instead. Well, yes, but in order to do so *and* 182 # define C0(K,i) (Cx.q[K.c[(i)*8+0]]) argument 183 # define C1(K,i) ROTATE(Cx.q[K.c[(i)*8+1]],8) argument 184 # define C2(K,i) ROTATE(Cx.q[K.c[(i)*8+2]],16) argument 185 # define C3(K,i) ROTATE(Cx.q[K.c[(i)*8+3]],24) argument 186 # define C4(K,i) ROTATE(Cx.q[K.c[(i)*8+4]],32) argument 187 # define C5(K,i) ROTATE(Cx.q[K.c[(i)*8+5]],40) argument 188 # define C6(K,i) ROTATE(Cx.q[K.c[(i)*8+6]],48) argument 189 # define C7(K,i) ROTATE(Cx.q[K.c[(i)*8+7]],56) argument 191 # define N 8 [all …]
|