| /freebsd/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 184 struct sshkey *k1 = NULL, *k2 = NULL, *k3 = NULL, *kf = NULL; in sshkey_tests() local 194 k1 = sshkey_new(-42); in sshkey_tests() 195 ASSERT_PTR_EQ(k1, NULL); in sshkey_tests() 199 k1 = sshkey_new(KEY_UNSPEC); in sshkey_tests() 200 ASSERT_PTR_NE(k1, NULL); in sshkey_tests() 201 sshkey_free(k1); in sshkey_tests() 206 k1 = sshkey_new(KEY_RSA); in sshkey_tests() 207 ASSERT_PTR_NE(k1, NULL); in sshkey_tests() 208 ASSERT_PTR_NE(k1->pkey, NULL); in sshkey_tests() 209 sshkey_free(k1); in sshkey_tests() [all …]
|
| H A D | test_fuzz.c | 52 struct sshkey *k1; in public_fuzz() local 66 &k1), 0); in public_fuzz() 67 sshkey_free(k1); in public_fuzz() 71 if (sshkey_from_blob(fuzz_ptr(fuzz), fuzz_len(fuzz), &k1) == 0) in public_fuzz() 72 sshkey_free(k1); in public_fuzz() 113 struct sshkey *k1; in sshkey_fuzz_tests() local 123 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0); in sshkey_fuzz_tests() 124 sshkey_free(k1); in sshkey_fuzz_tests() 131 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0) in sshkey_fuzz_tests() 132 sshkey_free(k1); in sshkey_fuzz_tests() [all …]
|
| H A D | test_file.c | 46 struct sshkey *k1, *k2; in sshkey_file_tests() local 61 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0); in sshkey_file_tests() 63 ASSERT_PTR_NE(k1, NULL); in sshkey_file_tests() 67 ASSERT_BIGNUM_EQ(rsa_n(k1), a); in sshkey_file_tests() 68 ASSERT_BIGNUM_EQ(rsa_p(k1), b); in sshkey_file_tests() 69 ASSERT_BIGNUM_EQ(rsa_q(k1), c); in sshkey_file_tests() 81 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 90 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 100 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 108 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() [all …]
|
| /freebsd/contrib/jemalloc/include/jemalloc/internal/ |
| H A D | hash.h | 88 uint32_t k1 = hash_get_block_32(blocks, i); in hash_x86_32() local 90 k1 *= c1; in hash_x86_32() 91 k1 = hash_rotl_32(k1, 15); in hash_x86_32() 92 k1 *= c2; in hash_x86_32() 94 h1 ^= k1; in hash_x86_32() 104 uint32_t k1 = 0; in hash_x86_32() local 107 case 3: k1 ^= tail[2] << 16; JEMALLOC_FALLTHROUGH; in hash_x86_32() 108 case 2: k1 ^= tail[1] << 8; JEMALLOC_FALLTHROUGH; in hash_x86_32() 109 case 1: k1 in hash_x86_32() 144 uint32_t k1 = hash_get_block_32(blocks, i*4 + 0); hash_x86_128() local 174 uint32_t k1 = 0; hash_x86_128() local 242 uint64_t k1 = hash_get_block_64(blocks, i*2 + 0); hash_x64_128() local 260 uint64_t k1 = 0; hash_x64_128() local [all...] |
| /freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/ |
| H A D | AMDGPURegBankCombiner.cpp | 83 Register &Val, CstTy &K0, CstTy &K1) const; 98 bool isClampZeroToOne(MachineInstr *K0, MachineInstr *K1) const; 174 CstTy &K0, CstTy &K1) const { in matchMed() 175 // 4 operand commutes of: min(max(Val, K0), K1). in matchMed() 176 // Find K1 from outer instr: min(max(...), K1) or min(K1, max(...)). in matchMed() 178 // 4 operand commutes of: max(min(Val, K1), K0). in matchMed() 180 // Find K1 and Val from inner instr: min(K1, Val) or min(Val, K1). in matchMed() 186 m_Cst(K1)), in matchMed() 188 MMMOpc.Max, m_CommutativeBinOp(MMMOpc.Min, m_Reg(Val), m_Cst(K1)), in matchMed() 205 std::optional<ValueAndVReg> K0, K1; in matchIntMinMaxToMed3() local [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/soc/spacemit/ |
| H A D | spacemit,k1-syscon.yaml | 4 $id: http://devicetree.org/schemas/soc/spacemit/spacemit,k1-syscon.yaml# 7 title: SpacemiT K1 SoC System Controller 13 System controllers found on SpacemiT K1 SoC, which are capable of 19 - spacemit,k1-syscon-apbc 20 - spacemit,k1-syscon-apmu 21 - spacemit,k1-syscon-mpmu 22 - spacemit,k1-syscon-rcpu 23 - spacemit,k1-syscon-rcpu2 24 - spacemit,k1-syscon-apbc2 42 See <dt-bindings/clock/spacemit,k1-syscon.h> for valid indices. [all …]
|
| /freebsd/sys/contrib/ck/src/ |
| H A D | ck_ht_hash.h | 137 uint32_t k1 = getblock(blocks,i); in MurmurHash3_x86_32() local 139 k1 *= c1; in MurmurHash3_x86_32() 140 k1 = ROTL32(k1,15); in MurmurHash3_x86_32() 141 k1 *= c2; in MurmurHash3_x86_32() 143 h1 ^= k1; in MurmurHash3_x86_32() 153 uint32_t k1 = 0; in MurmurHash3_x86_32() local 157 case 3: k1 ^= tail[2] << 16; in MurmurHash3_x86_32() 159 case 2: k1 ^= tail[1] << 8; in MurmurHash3_x86_32() 161 case 1: k1 ^= tail[0]; in MurmurHash3_x86_32() 162 k1 *= c1; k1 = ROTL32(k1,15); k1 *= c2; h1 ^= k1; in MurmurHash3_x86_32() [all …]
|
| /freebsd/sys/crypto/openssl/amd64/ |
| H A D | rsaz-4k-avx512.S | 433 vpcmpuq $6,.Lmask52x4(%rip),%ymm3,%k1 435 kmovb %k1,%r14d 440 vpcmpuq $6,.Lmask52x4(%rip),%ymm5,%k1 442 kmovb %k1,%r13d 447 vpcmpuq $6,.Lmask52x4(%rip),%ymm7,%k1 449 kmovb %k1,%r12d 454 vpcmpuq $6,.Lmask52x4(%rip),%ymm9,%k1 456 kmovb %k1,%r11d 461 vpcmpuq $6,.Lmask52x4(%rip),%ymm11,%k1 463 kmovb %k1,%r10d [all …]
|
| H A D | rsaz-3k-avx512.S | 525 vpcmpuq $6,.Lmask52x4(%rip),%ymm3,%k1 527 kmovb %k1,%r14d 532 vpcmpuq $6,.Lmask52x4(%rip),%ymm5,%k1 534 kmovb %k1,%r13d 539 vpcmpuq $6,.Lmask52x4(%rip),%ymm7,%k1 541 kmovb %k1,%r12d 546 vpcmpuq $6,.Lmask52x4(%rip),%ymm9,%k1 548 kmovb %k1,%r11d 559 vpcmpuq $0,.Lmask52x4(%rip),%ymm3,%k1 561 kmovb %k1,%r9d [all …]
|
| /freebsd/sys/contrib/device-tree/src/riscv/spacemit/ |
| H A D | k1.dtsi | 6 #include <dt-bindings/clock/spacemit,k1-syscon.h> 12 model = "SpacemiT K1"; 13 compatible = "spacemit,k1"; 350 compatible = "spacemit,k1-syscon-rcpu"; 356 compatible = "spacemit,k1-syscon-rcpu2"; 362 compatible = "spacemit,k1-syscon-apbc"; 373 compatible = "spacemit,k1-gpio"; 391 compatible = "spacemit,k1-pwm", "marvell,pxa910-pwm"; 400 compatible = "spacemit,k1-pwm", "marvell,pxa910-pwm"; 409 compatible = "spacemit,k1-pwm", "marvell,pxa910-pwm"; [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/ |
| H A D | cmac.c | 65 /* Generate subkeys K1 and K2 as described in RFC 4493 figure 2.2. */ 69 unsigned char *K1, in generate_subkey() argument 84 /* K1 := (MSB(L) == 0) ? L << 1 : (L << 1) XOR const_Rb */ in generate_subkey() 86 leftshift_onebit(L, K1); in generate_subkey() 89 xor_128(tmp, const_Rb, K1); in generate_subkey() 92 /* K2 := (MSB(K1) == 0) ? K1 << 1 : (K1 << 1) XOR const_Rb */ in generate_subkey() 93 if ((K1[0] & 0x80) == 0) { in generate_subkey() 94 leftshift_onebit(K1, K2); in generate_subkey() 96 leftshift_onebit(K1, tmp); in generate_subkey() 131 unsigned char K1[BLOCK_SIZE], K2[BLOCK_SIZE]; in krb5int_cmac_checksum() local [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | des.h | 61 # define DES_ecb2_encrypt(i,o,k1,k2,e) \ argument 62 DES_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e)) 64 # define DES_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \ argument 65 DES_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e)) 67 # define DES_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \ argument 68 DES_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e)) 70 # define DES_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \ argument 71 DES_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n))
|
| /freebsd/contrib/atf/atf-c/detail/ |
| H A D | map_test.c | 82 const char *const array[] = { "K1", "V1", "K2", "V2", NULL }; in ATF_TC_BODY() 89 iter = atf_map_find_c(&map, "K1"); in ATF_TC_BODY() 91 ATF_REQUIRE(strcmp(atf_map_citer_key(iter), "K1") == 0); in ATF_TC_BODY() 105 const char *const array[] = { "K1", "V1", "K2", NULL }; in ATF_TC_BODY() 130 RE(atf_map_insert(&map, "K1", val1, false)); in ATF_TC_BODY() 136 iter = atf_map_find(&map, "K1"); in ATF_TC_BODY() 138 ATF_REQUIRE(strcmp(atf_map_iter_key(iter), "K1") == 0); in ATF_TC_BODY() 142 iter = atf_map_find(&map, "K1"); in ATF_TC_BODY() 144 ATF_REQUIRE(strcmp(atf_map_iter_key(iter), "K1") == 0); in ATF_TC_BODY() 168 RE(atf_map_insert(&map, "K1", val1, false)); in ATF_TC_BODY() [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/sha1/ |
| H A D | shs.c | 21 #define K1 0x5A827999L /* Rounds 0-19 */ macro 125 subRound(A, B, C, D, E, f1, K1, x); in SHSTransform() 145 subRound( A, B, C, D, E, f1, K1, eData[ 0 ] ); in SHSTransform() 146 subRound( E, A, B, C, D, f1, K1, eData[ 1 ] ); in SHSTransform() 147 subRound( D, E, A, B, C, f1, K1, eData[ 2 ] ); in SHSTransform() 148 subRound( C, D, E, A, B, f1, K1, eData[ 3 ] ); in SHSTransform() 149 subRound( B, C, D, E, A, f1, K1, eData[ 4 ] ); in SHSTransform() 150 subRound( A, B, C, D, E, f1, K1, eData[ 5 ] ); in SHSTransform() 151 subRound( E, A, B, C, D, f1, K1, eData[ 6 ] ); in SHSTransform() 152 subRound( D, E, A, B, C, f1, K1, eData[ 7 ] ); in SHSTransform() [all …]
|
| /freebsd/crypto/krb5/src/util/support/ |
| H A D | hashtab.c | 46 uint64_t k1; member 77 siphash24(const uint8_t *data, size_t len, uint64_t k0, uint64_t k1) in siphash24() argument 80 uint64_t v1 = k1 ^ 0x646F72616E646F6D; in siphash24() 82 uint64_t v3 = k1 ^ 0x7465646279746573; in siphash24() 118 uint64_t k0 = load_64_le(seed), k1 = load_64_le(seed + 8); in k5_siphash24() local 120 return siphash24(data, len, k0, k1); in k5_siphash24() 137 ht->k1 = load_64_le(seed + 8); in k5_hashtab_create() 139 ht->k0 = ht->k1 = 0; in k5_hashtab_create() 185 j = siphash24(ent->key, ent->klen, ht->k0, ht->k1) % newsize; in resize_table() 215 i = siphash24(key, klen, ht->k0, ht->k1) % ht->nbuckets; in k5_hashtab_add() [all …]
|
| H A D | t_json.c | 211 "{\"k1\":\"s1\",\"k2\":\"s2\"}", in test_json() 212 "{\"k1\":[\"s1\",\"s2\",\"s3\"],\"k2\":\"s3\"}", in test_json() 213 "{\"k1\":{\"k2\":\"s1\",\"k3\":\"s2\",\"k4\":\"s3\"},\"k5\":\"s4\"}", in test_json() 244 check(k5_json_decode("{ \"k1\" : { \"k2\" : \"s2\", \"k3\" : \"s3\" }, " in test_json() 246 v2 = k5_json_object_get(v, "k1"); in test_json() 247 check(v2 != NULL, "object2[k1]"); in test_json() 248 check(k5_json_get_tid(v2) == K5_JSON_TID_OBJECT, "object2[k1] tid"); in test_json() 250 check(v2 != NULL, "object2[k1][k3]"); in test_json() 251 check(k5_json_get_tid(v2) == K5_JSON_TID_STRING, "object2[k1][k3] tid"); in test_json() 252 check(strcmp(k5_json_string_utf8(v2), "s3") == 0, "object2[k1][k3] utf8"); in test_json() [all …]
|
| /freebsd/tests/sys/kqueue/libkqueue/ |
| H A D | main.c | 240 _kevent_cmp(struct kevent *k1, struct kevent *k2, const char *file, int line) in _kevent_cmp() argument 249 if (k1->flags & EV_ADD) in _kevent_cmp() 252 if (k1->ident != k2->ident || k1->filter != k2->filter || in _kevent_cmp() 253 k1->flags != k2->flags || k1->fflags != k2->fflags || in _kevent_cmp() 254 k1->data != k2->data || k1->udata != k2->udata || in _kevent_cmp() 255 k1->ext[0] != k2->ext[0] || k1->ext[1] != k2->ext[1] || in _kevent_cmp() 256 k1->ext[0] != k2->ext[2] || k1->ext[0] != k2->ext[3]) { in _kevent_cmp() 257 kev1_str = kevent_to_str(k1); in _kevent_cmp()
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
| H A D | lac_sym_hash_sw_precomputes.c | 248 Cpa8U k1[LAC_HASH_CMAC_BLOCK_SIZE], in LacSymHash_AesECBPreCompute() local 255 /* Original state size includes K, K1 and K2 which are of equal in LacSymHash_AesECBPreCompute() 261 * K is just copeid, K1 and K2 need to be single inplace encrypt in LacSymHash_AesECBPreCompute() 279 /* Derived keys (k1 and k2), copy them to in LacSymHash_AesECBPreCompute() 283 /* Calculating K1 */ in LacSymHash_AesECBPreCompute() 285 k1[i] = (*ptr) << 1; in LacSymHash_AesECBPreCompute() 287 k1[i - 1] |= in LacSymHash_AesECBPreCompute() 298 k1[i] ^= LAC_SYM_AES_CMAC_RB_128; in LacSymHash_AesECBPreCompute() 305 k2[i] = (k1[i]) << 1; in LacSymHash_AesECBPreCompute() 308 (k1[i]) >> (LAC_NUM_BITS_IN_BYTE - 1); in LacSymHash_AesECBPreCompute() [all …]
|
| /freebsd/contrib/bzip2/ |
| H A D | bzlib.c | 542 UChar k1; in unRLE_obuf_to_output_FAST() local 569 BZ_GET_FAST(k1); BZ_RAND_UPD_MASK; in unRLE_obuf_to_output_FAST() 570 k1 ^= BZ_RAND_MASK; s->nblock_used++; in unRLE_obuf_to_output_FAST() 572 if (k1 != s->k0) { s->k0 = k1; continue; }; in unRLE_obuf_to_output_FAST() 575 BZ_GET_FAST(k1); BZ_RAND_UPD_MASK; in unRLE_obuf_to_output_FAST() 576 k1 ^= BZ_RAND_MASK; s->nblock_used++; in unRLE_obuf_to_output_FAST() 578 if (k1 != s->k0) { s->k0 = k1; continue; }; in unRLE_obuf_to_output_FAST() 581 BZ_GET_FAST(k1); BZ_RAND_UPD_MASK; in unRLE_obuf_to_output_FAST() 582 k1 ^= BZ_RAND_MASK; s->nblock_used++; in unRLE_obuf_to_output_FAST() 584 if (k1 != s->k0) { s->k0 = k1; continue; }; in unRLE_obuf_to_output_FAST() [all …]
|
| /freebsd/crypto/openssl/crypto/cmac/ |
| H A D | cmac.c | 28 /* Keys k1 and k2 */ 29 unsigned char k1[EVP_MAX_BLOCK_LENGTH]; member 39 /* Make temporary keys K1 and K2 */ 41 static void make_kn(unsigned char *k1, const unsigned char *l, int bl) in make_kn() argument 48 k1[i] = (c << 1) | ((cnext = l[i + 1]) >> 7); in make_kn() 51 k1[i] = (c << 1) ^ ((0 - carry) & (bl == 16 ? 0x87 : 0x1b)); in make_kn() 73 OPENSSL_cleanse(ctx->k1, EVP_MAX_BLOCK_LENGTH); in CMAC_CTX_cleanup() 103 memcpy(out->k1, in->k1, bl); in CMAC_CTX_copy() 160 make_kn(ctx->k1, ctx->tbl, bl); in ossl_cmac_init() 161 make_kn(ctx->k2, ctx->k1, bl); in ossl_cmac_init() [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/clock/ |
| H A D | spacemit,k1-pll.yaml | 4 $id: http://devicetree.org/schemas/clock/spacemit,k1-pll.yaml# 7 title: SpacemiT K1 PLL 14 const: spacemit,k1-pll 31 See <dt-bindings/clock/spacemit,k1-syscon.h> for valid indices. 45 compatible = "spacemit,k1-pll";
|
| /freebsd/sys/contrib/device-tree/Bindings/i2c/ |
| H A D | spacemit,k1-i2c.yaml | 4 $id: http://devicetree.org/schemas/i2c/spacemit,k1-i2c.yaml# 7 title: I2C controller embedded in SpacemiT's K1 SoC 17 const: spacemit,k1-i2c 37 K1 support three different modes which running different frequencies 55 compatible = "spacemit,k1-i2c";
|
| /freebsd/lib/libmd/amd64/ |
| H A D | md5block.S | 75 .macro rounds f, p, q, s0, s1, s2, s3, k0, k1, k2, k3 77 round %edx, %eax, %ebx, %ecx, \f, \k1, \p*1+\q, \s1 83 .macro rounds0 i, k0, k1, k2, k3 84 rounds f0, 1, \i, 7, 12, 17, 22, \k0, \k1, \k2, \k3 87 .macro rounds1 i, k0, k1, k2, k3 88 rounds f1, 5, 5*\i+1, 5, 9, 14, 20, \k0, \k1, \k2, \k3 91 .macro rounds2 i, k0, k1, k2, k3 92 rounds f2, 3, 3*\i+5, 4, 11, 16, 23, \k0, \k1, \k2, \k3 95 .macro rounds3 i, k0, k1, k2, k3 96 rounds f3, 7, 7*\i, 6, 10, 15, 21, \k0, \k1, \k2, \k3 [all …]
|
| /freebsd/sys/contrib/libsodium/test/default/ |
| H A D | box_easy2.c | 20 unsigned char *k1; in main() local 43 k1 = (unsigned char *) sodium_malloc(crypto_box_BEFORENMBYTES); in main() 79 ret = crypto_box_beforenm(k1, small_order_p, bobsk); in main() 84 ret = crypto_box_beforenm(k1, alicepk, bobsk); in main() 91 if (crypto_box_easy_afternm(c, m, 0, nonce, k1) != 0) { in main() 96 crypto_box_easy_afternm(c, m, (unsigned long long) mlen, nonce, k1); in main() 128 k1); in main() 141 sodium_free(k1); in main()
|
| /freebsd/lib/libmd/aarch64/ |
| H A D | md5block.S | 69 .macro rounds f, m0, m1, m2, m3, s0, s1, s2, s3, k0, k1, k2, k3 71 round d, a, b, c, \f, \k1, \m1, \s1 77 .macro rounds0 m0, m1, m2, m3, k0, k1, k2, k3 78 rounds f0, \m0, \m1, \m2, \m3, 7, 12, 17, 22, \k0, \k1, \k2, \k3 81 .macro rounds1 m0, m1, m2, m3, k0, k1, k2, k3 83 round1 d, a, b, c, \k1, \m1, 9 88 .macro rounds2 m0, m1, m2, m3, k0, k1, k2, k3 89 rounds f2, \m0, \m1, \m2, \m3, 4, 11, 16, 23, \k0, \k1, \k2, \k3 92 .macro rounds3 m0, m1, m2, m3, k0, k1, k2, k3 93 rounds f3, \m0, \m1, \m2, \m3, 6, 10, 15, 21, \k0, \k1, \k2, \k3
|