/freebsd/contrib/file/magic/Magdir/ |
H A D | audio | 2 #------------------------------------------------------------------------------ 12 >12 belong 1 8-bit ISDN mu-law, 14 >12 belong 2 8-bit linear PCM [REF-PCM], 16 >12 belong 3 16-bit linear PCM, 18 >12 belong 4 24-bit linear PCM, 20 >12 belong 5 32-bit linear PCM, 22 >12 belong 6 32-bit IEEE floating point, 24 >12 belong 7 64-bit IEEE floating point, 26 >12 belong 8 Fragmented sample data, 27 >12 belong 10 DSP program, [all …]
|
H A D | database | 2 #------------------------------------------------------------------------------ 12 0 belong 0x13579acd GNU dbm 1.x or ndbm database, big endian, 32-bit 13 !:mime application/x-gdbm 15 !:mime application/x-gdbm 16 0 belong 0x13579acf GNU dbm 1.x or ndbm database, big endian, 64-bit 17 !:mime application/x-gdbm 18 0 lelong 0x13579acd GNU dbm 1.x or ndbm database, little endian, 32-bit 19 !:mime application/x-gdbm 21 !:mime application/x-gdbm 22 0 lelong 0x13579acf GNU dbm 1.x or ndbm database, little endian, 64-bit [all …]
|
H A D | zip | 1 #------------------------------------------------------------------------------ 13 >>4 leshort x \b, made by 17 >>6 leshort x \b, extract using at least 20 >>12 ulelong x \b, last modified 21 >>14 lemsdosdate x \b, last modified %s 22 >>12 lemsdostime x %s 24 >>24 ulelong !0xFFffFFff \b, uncompressed size %u 26 >>10 leshort x \b, method= 41 >0 leshort 12 \bbzip2 58 >>0 leshort x \b[%#x] [all …]
|
/freebsd/contrib/bmake/unit-tests/ |
H A D | varmod-subst-regex.mk | 1 # $NetBSD: varmod-subst-regex.mk,v 1.12 2024/07/20 11:05:12 rillig Exp $ 6 .MAKEFLAGS: -dL 8 all: mod-regex-compile-error 9 all: mod-regex-limits-{1,2,3,4,5,6} 10 all: mod-regex-errors-{1,2} 11 all: unmatched-subexpression 14 # the regular expression "a b" since these words don't contain any 16 .if ${:Ua b b c:C,a b,,} != "a b b c" 22 .if ${:Ua b b c:C,a b,,1} != "a b b c" 29 .if ${:Ua b b c:C,a b,,W} != " b c" [all …]
|
H A D | varmod-edge.mk | 1 # $NetBSD: varmod-edge.mk,v 1.36 2025/03/29 19:08:52 rillig Exp $ 9 # - INP, the input to the test 10 # - MOD, the expression for testing the modifier 11 # - EXP, the expected output 14 MOD= ${INP:M(*)} 16 .if ${MOD} != ${EXP} 17 . warning expected "${EXP}", got "${MOD}" 24 INP= (paren-brace} ( 25 MOD= ${INP:M(*}} 26 EXP= (paren-brace} [all …]
|
/freebsd/sys/netinet6/ |
H A D | ip6_id.c | 1 /*- 2 * SPDX-License-Identifier: (BSD-3-Clause AND BSD-2-Clause) 34 /*- 39 * such a mathematical system to generate more random (yet non-repeating) 63 * $OpenBSD: ip6_id.c,v 1.3 2003/12/12 06:57:12 itojun Exp $ 68 * seed = random (bits - 1) bit 70 * j = random so that gcd(j,n-1) == 1 71 * g = g0^j mod n will be a generator again. 74 * X[n] = a*X[n-1]+b mod m is a Linear Congruential Generator 75 * with a = 7^(even random) mod m, [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | ghash-parisc.pl | 2 # Copyright 2010-2020 The OpenSSL Project Authors. All Rights Reserved. 19 # The module implements "4-bit" GCM GHASH function and underlying 20 # single multiplication operation in GF(2^128). "4-bit" means that it 21 # uses 256 bytes per-key table [+128 bytes shared table]. On PA-7100LC 23 # fast as code generated by gcc 3.2. PA-RISC 2.0 loop is scheduled for 24 # 8 cycles, but measured performance on PA-8600 system is ~9 cycles per 25 # processed byte. This is ~2.2x faster than 64-bit code generated by 26 # vendor compiler (which used to be very hard to beat:-). 28 # Special thanks to polarhome.com for providing HP-UX account. 90 $rem2="%r6"; # used in PA-RISC 2.0 code [all …]
|
/freebsd/crypto/openssl/crypto/objects/ |
H A D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi… [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/input/touchscreen/ |
H A D | stmpe.txt | 2 ---------------- 5 - compatible: "st,stmpe-ts" 8 - st,ave-ctrl : Sample average control 9 0 -> 1 sample 10 1 -> 2 samples 11 2 -> 4 samples 12 3 -> 8 samples 13 - st,touch-det-delay : Touch detect interrupt delay (recommended is 3) 14 0 -> 10 us 15 1 -> 50 us [all …]
|
/freebsd/crypto/krb5/src/lib/crypto/builtin/md4/ |
H A D | md4.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 36 #include "rsa-md4.h" 60 #define ROTATE_LEFT(x, n) ((((x) << (n)) & 0xffffffff) | ((x) >> (32-(n)))) 64 #define FF(a, b, c, d, x, s) \ argument 65 {(a) += F ((b), (c), (d)) + (x); \ 68 #define GG(a, b, c, d, x, s) \ argument 69 {(a) += G ((b), (c), (d)) + (x) + 013240474631UL; \ 72 #define HH(a, b, c, d, x, s) \ argument 73 {(a) += H ((b), (c), (d)) + (x) + 015666365641UL; \ 80 mdContext->i[0] = mdContext->i[1] = (krb5_ui_4)0; in krb5int_MD4Init() [all …]
|
/freebsd/crypto/openssl/crypto/bn/asm/ |
H A D | parisc-mont.pl | 2 # Copyright 2009-2020 The OpenSSL Project Authors. All Rights Reserved. 17 # On PA-7100LC this module performs ~90-50% better, less for longer 18 # keys, than code generated by gcc 3.2 for PA-RISC 1.1. Latter means 19 # that compiler utilized xmpyu instruction to perform 32x32=64-bit 24 # toward 4 times 16x16=32-bit multiplications [plus complementary 27 # for PA-RISC 1.1, but the "baseline" is far from optimal. The actual 28 # improvement coefficient was never collected on PA-7100LC, or any 30 # vendor compiler. But to give you a taste, PA-RISC 1.1 code path 32 # of ~5x on PA-8600. 34 # On PA-RISC 2.0 it has to compete with pa-risc2[W].s, which is [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | BN_add.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
H A D | EC_GROUP_new.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-parisc.pl | 2 # Copyright 2009-2020 The OpenSSL Project Authors. All Rights Reserved. 17 # SHA256/512 block procedure for PA-RISC. 22 # PA-7100LC. Compared to code generated by vendor compiler this 23 # implementation is almost 70% faster in 64-bit build, but delivers 24 # virtually same performance in 32-bit build on PA-8600. 27 # PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the 28 # code is executed on PA-RISC 2.0 processor and switches to 64-bit 29 # code path delivering adequate performance even in "blended" 32-bit 30 # build. Though 64-bit code is not any faster than code generated by 31 # vendor compiler on PA-8600... [all …]
|
/freebsd/crypto/openssl/crypto/bn/ |
H A D | bn_gf2m.c | 2 * Copyright 2002-2021 The OpenSSL Project Authors. All Rights Reserved. 32 /* Platform-specific macros to accelerate squaring. */ 42 SQR_nibble((w) >> 12) << 24 | SQR_nibble((w) >> 8) << 16 | \ 50 SQR_nibble((w) >> 12) << 24 | SQR_nibble((w) >> 8) << 16 | \ 56 * Product of two polynomials a, b each with degree < BN_BITS2 - 1, result is 57 * a polynomial r with degree < 2 * BN_BITS - 1 The caller MUST ensure that 62 const BN_ULONG b) in bn_GF2m_mul_1x1() argument 81 s = tab[b & 0x7]; in bn_GF2m_mul_1x1() 83 s = tab[b >> 3 & 0x7]; in bn_GF2m_mul_1x1() 86 s = tab[b >> 6 & 0x7]; in bn_GF2m_mul_1x1() [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | bn.h | 2 * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. 34 * 64-bit processor with LP64 ABI 42 * 64-bit processor other than LP64 ABI 56 # define BN_TBIT ((BN_ULONG)1 << (BN_BITS2 - 1)) 76 void BN_set_flags(BIGNUM *b, int n); 77 int BN_get_flags(const BIGNUM *b, int n); 80 #define BN_RAND_TOP_ANY -1 94 void BN_with_flags(BIGNUM *dest, const BIGNUM *b, int flags); 97 int BN_GENCB_call(BN_GENCB *cb, int a, int b); 102 /* Populate a BN_GENCB structure with an "old"-style callback */ [all …]
|
/freebsd/crypto/krb5/src/lib/crypto/builtin/md5/ |
H A D | md5.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 6 * it is identified as the "RSA Data Security, Inc. MD5 Message- 12 * Data Security, Inc. MD5 Message-Digest Algorithm" in all 26 ** md5.c -- the source code for MD5 routines ** 27 ** RSA Data Security, Inc. MD5 Message-Digest Algorithm ** 38 #include "rsa-md5.h" 44 ** Message-digest routines: ** 49 ** The message digest is now in mdContext->digest[0...15] ** 74 #define ROTATE_LEFT(x, n) ((((x) << (n)) & 0xffffffff) | ((x) >> (32-(n)))) 78 #define FF(a, b, c, d, x, s, ac) \ argument [all …]
|
/freebsd/crypto/openssl/crypto/rc4/asm/ |
H A D | rc4-md5-x86_64.pl | 2 # Copyright 2011-2020 The OpenSSL Project Authors. All Rights Reserved. 21 # since both algorithms exhibit instruction-level parallelism, ILP, 24 # instruction sequence is virtually identical to rc4-x86_64.pl, which 46 # (*) rc4-x86_64.pl delivers 5.3 on Opteron, so real improvement 64 ( $xlate="${dir}x86_64-xlate.pl" and -f $xlate ) or 65 ( $xlate="${dir}../../perlasm/x86_64-xlate.pl" and -f $xlate) or 66 die "can't locate x86_64-xlate.pl"; 89 # size_t len); # number of 64-byte blocks 120 my $MOD=32; # 16, 32 or 64 167 mov -8($dat),$XX[0]#b [all …]
|
/freebsd/crypto/krb5/src/lib/crypto/crypto_tests/ |
H A D | vb.txt | 9 Ekey(0 To KeySchLenMax - 1) As Long 15 K(0 To KeyLenMax - 1) As Byte 19 IO(0 To BlkLenMax - 1) As Byte 24 Private Declare Function AesEncKey Lib "d:\dll_path\aes.dll" Alias "_aes_enc_key@12" (K As KeyBlk, … 25 Private Declare Function AesDecKey Lib "d:\dll_path\aes.dll" Alias "_aes_dec_key@12" (K As KeyBlk, … 26 Private Declare Function AesEncBlk Lib "d:\dll_path\aes.dll" Alias "_aes_enc_blk@12" (Ib As IoBlk, … 27 Private Declare Function AesDecBlk Lib "d:\dll_path\aes.dll" Alias "_aes_dec_blk@12" (Ib As IoBlk, … 37 H = Int(X Mod 16) 45 Private Sub OutKey(S As String, B As KeyBlk) ' Display a key value 47 For i = 0 To KeyLen - 1 [all …]
|
/freebsd/crypto/openssl/crypto/ec/asm/ |
H A D | ecp_nistz256-x86.pl | 2 # Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved. 23 # original .c module was made 32-bit savvy in order to make this 26 # with/without -DECP_NISTZ256_ASM 27 # Pentium +66-163% 28 # PIII +72-172% 29 # P4 +65-132% 30 # Core2 +90-215% 31 # Sandy Bridge +105-265% (contemporary i[57]-* are all close to this) 32 # Atom +65-155% 33 # Opteron +54-110% [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | md5-internal.c | 3 * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> 24 * md5_vector - MD5 hash for data vector 29 * Returns: 0 on success, -1 of failure 37 return -1; in md5_vector() 47 /* ===== start - public domain MD5 implementation ===== */ 49 * This code implements the MD5 message-digest algorithm. 62 * will fill a supplied 16-byte array with the digest. 69 * Note: this code is harmless on little-endian machines. 79 } while (--longs); in byteReverse() 89 ctx->buf[0] = 0x67452301; in MD5Init() [all …]
|
H A D | fips_prf_wolfssl.c | 2 * FIPS 186-2 PRF for libcrypto 3 * Copyright (c) 2004-2017, Jouni Malinen <j@w1.fi> 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 49 /* FIPS 186-2 + change notice 1 */ in fips186_2_prf() 62 /* XVAL = (XKEY + XSEED_j) mod 2^b */ in fips186_2_prf() 70 WPA_PUT_BE32(xpos + 12, _t[3]); in fips186_2_prf() 73 /* XKEY = (1 + XKEY + w_i) mod 2^b */ in fips186_2_prf() 75 for (k = 19; k >= 0; k--) { in fips186_2_prf()
|
/freebsd/contrib/bearssl/src/rsa/ |
H A D | rsa_i15_privexp.c | 33 * We want to invert e modulo phi = (p-1)(q-1). This first in br_rsa_i15_compute_privexp() 37 * Since p = 3 mod 4 and q = 3 mod 4, phi/4 is an odd integer. in br_rsa_i15_compute_privexp() 39 * modulo phi, but this would involve assembling three modulus-wide in br_rsa_i15_compute_privexp() 42 * slightly more than 3 kB of stack space for RSA-4096. This in br_rsa_i15_compute_privexp() 47 * - We compute phi = k*e + r (Euclidean division of phi by e). in br_rsa_i15_compute_privexp() 50 * enforce non-ridiculously-small factors. in br_rsa_i15_compute_privexp() 52 * - We find small u, v such that u*e - v*r = 1 (using a in br_rsa_i15_compute_privexp() 56 * - Solution is: d = u + v*k in br_rsa_i15_compute_privexp() 58 * the above implies d < r + e*((phi-r)/e) = phi in br_rsa_i15_compute_privexp() 61 uint16_t tmp[4 * ((BR_MAX_RSA_FACTOR + 14) / 15) + 12]; in br_rsa_i15_compute_privexp() [all …]
|
H A D | rsa_i31_privexp.c | 33 * We want to invert e modulo phi = (p-1)(q-1). This first in br_rsa_i31_compute_privexp() 37 * Since p = 3 mod 4 and q = 3 mod 4, phi/4 is an odd integer. in br_rsa_i31_compute_privexp() 39 * modulo phi, but this would involve assembling three modulus-wide in br_rsa_i31_compute_privexp() 42 * slightly more than 3 kB of stack space for RSA-4096. This in br_rsa_i31_compute_privexp() 47 * - We compute phi = k*e + r (Euclidean division of phi by e). in br_rsa_i31_compute_privexp() 50 * enforce non-ridiculously-small factors. in br_rsa_i31_compute_privexp() 52 * - We find small u, v such that u*e - v*r = 1 (using a in br_rsa_i31_compute_privexp() 56 * - Solution is: d = u + v*k in br_rsa_i31_compute_privexp() 58 * the above implies d < r + e*((phi-r)/e) = phi in br_rsa_i31_compute_privexp() 61 uint32_t tmp[4 * ((BR_MAX_RSA_FACTOR + 30) / 31) + 12]; in br_rsa_i31_compute_privexp() [all …]
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ecp_nistz256.c | 2 * Copyright 2014-2022 The OpenSSL Project Authors. All Rights Reserved. 48 #define ALIGNPTR(p,N) ((unsigned char *)p+N-(size_t)p%N) 71 * Constant time access to the X and Y coordinates of the pre-computed, 72 * generator multiplies, in the Montgomery domain. Pre-calculated 93 * functions]; b) addition is allowed to produce partially reduced 95 * step. Choice between the two can be platform-specific, but it was a) 98 /* Modular add: res = a+b mod P */ 101 const BN_ULONG b[P256_LIMBS]); 102 /* Modular mul by 2: res = 2*a mod P */ 105 /* Modular mul by 3: res = 3*a mod P */ [all …]
|