Symbol: K
games/gomoku/pickmove.c
67
return (PT(K,10));
lib/libc/db/hash/page.h
74
#define PAIRSIZE(K,D) (2*sizeof(u_int16_t) + (K)->size + (D)->size)
lib/libc/db/hash/page.h
76
#define KEYSIZE(K) (4*sizeof(u_int16_t) + (K)->size);
lib/libc/db/hash/page.h
80
#define PAIRFITS(P,K,D) \
lib/libc/db/hash/page.h
82
(PAIRSIZE((K),(D)) + OVFLSIZE) <= FREESPACE((P)))
lib/libcrypto/cast/cast.c
680
CAST_LONG l, *K;
lib/libcrypto/cast/cast.c
695
K = &k[0];
lib/libcrypto/cast/cast.c
711
K[0] = S4[z[ 8]]^S5[z[ 9]]^S6[z[ 7]]^S7[z[ 6]]^S4[z[ 2]];
lib/libcrypto/cast/cast.c
712
K[1] = S4[z[10]]^S5[z[11]]^S6[z[ 5]]^S7[z[ 4]]^S5[z[ 6]];
lib/libcrypto/cast/cast.c
713
K[2] = S4[z[12]]^S5[z[13]]^S6[z[ 3]]^S7[z[ 2]]^S6[z[ 9]];
lib/libcrypto/cast/cast.c
714
K[3] = S4[z[14]]^S5[z[15]]^S6[z[ 1]]^S7[z[ 0]]^S7[z[12]];
lib/libcrypto/cast/cast.c
725
K[4] = S4[x[ 3]]^S5[x[ 2]]^S6[x[12]]^S7[x[13]]^S4[x[ 8]];
lib/libcrypto/cast/cast.c
726
K[5] = S4[x[ 1]]^S5[x[ 0]]^S6[x[14]]^S7[x[15]]^S5[x[13]];
lib/libcrypto/cast/cast.c
727
K[6] = S4[x[ 7]]^S5[x[ 6]]^S6[x[ 8]]^S7[x[ 9]]^S6[x[ 3]];
lib/libcrypto/cast/cast.c
728
K[7] = S4[x[ 5]]^S5[x[ 4]]^S6[x[10]]^S7[x[11]]^S7[x[ 7]];
lib/libcrypto/cast/cast.c
739
K[8] = S4[z[ 3]]^S5[z[ 2]]^S6[z[12]]^S7[z[13]]^S4[z[ 9]];
lib/libcrypto/cast/cast.c
740
K[9] = S4[z[ 1]]^S5[z[ 0]]^S6[z[14]]^S7[z[15]]^S5[z[12]];
lib/libcrypto/cast/cast.c
741
K[10] = S4[z[ 7]]^S5[z[ 6]]^S6[z[ 8]]^S7[z[ 9]]^S6[z[ 2]];
lib/libcrypto/cast/cast.c
742
K[11] = S4[z[ 5]]^S5[z[ 4]]^S6[z[10]]^S7[z[11]]^S7[z[ 6]];
lib/libcrypto/cast/cast.c
753
K[12] = S4[x[ 8]]^S5[x[ 9]]^S6[x[ 7]]^S7[x[ 6]]^S4[x[ 3]];
lib/libcrypto/cast/cast.c
754
K[13] = S4[x[10]]^S5[x[11]]^S6[x[ 5]]^S7[x[ 4]]^S5[x[ 7]];
lib/libcrypto/cast/cast.c
755
K[14] = S4[x[12]]^S5[x[13]]^S6[x[ 3]]^S7[x[ 2]]^S6[x[ 8]];
lib/libcrypto/cast/cast.c
756
K[15] = S4[x[14]]^S5[x[15]]^S6[x[ 1]]^S7[x[ 0]]^S7[x[13]];
lib/libcrypto/cast/cast.c
757
if (K != k)
lib/libcrypto/cast/cast.c
759
K += 16;
lib/libcrypto/ripemd/ripemd.c
107
#define RIP2(a,b,c,d,e,w,s,K) { \
lib/libcrypto/ripemd/ripemd.c
108
a+=F2(b,c,d)+w+K; \
lib/libcrypto/ripemd/ripemd.c
112
#define RIP3(a,b,c,d,e,w,s,K) { \
lib/libcrypto/ripemd/ripemd.c
113
a+=F3(b,c,d)+w+K; \
lib/libcrypto/ripemd/ripemd.c
117
#define RIP4(a,b,c,d,e,w,s,K) { \
lib/libcrypto/ripemd/ripemd.c
118
a+=F4(b,c,d)+w+K; \
lib/libcrypto/ripemd/ripemd.c
122
#define RIP5(a,b,c,d,e,w,s,K) { \
lib/libcrypto/ripemd/ripemd.c
123
a+=F5(b,c,d)+w+K; \
lib/libcrypto/sm4/sm4.c
152
uint32_t K[4];
lib/libcrypto/sm4/sm4.c
155
K[0] = crypto_load_be32toh(&key[0 * 4]) ^ SM4_FK[0];
lib/libcrypto/sm4/sm4.c
156
K[1] = crypto_load_be32toh(&key[1 * 4]) ^ SM4_FK[1];
lib/libcrypto/sm4/sm4.c
157
K[2] = crypto_load_be32toh(&key[2 * 4]) ^ SM4_FK[2];
lib/libcrypto/sm4/sm4.c
158
K[3] = crypto_load_be32toh(&key[3 * 4]) ^ SM4_FK[3];
lib/libcrypto/sm4/sm4.c
164
X = K[(i + 1) % 4] ^ K[(i + 2) % 4] ^ K[(i + 3) % 4] ^ SM4_CK[i];
lib/libcrypto/sm4/sm4.c
172
K[i % 4] ^= t;
lib/libcrypto/sm4/sm4.c
173
ks->rk[i] = K[i % 4];
lib/libpcap/optimize.c
1129
b->oval = K(b->s.k);
lib/libpcap/optimize.c
879
v = K(s->k);
lib/libpcap/optimize.c
884
v = K(s->k);
lib/libpcap/optimize.c
897
val[A_ATOM] = K(s->k);
lib/libpcap/optimize.c
922
val[A_ATOM] = K(s->k);
lib/libpcap/optimize.c
927
fold_op(s, val[A_ATOM], K(s->k));
lib/libpcap/optimize.c
928
val[A_ATOM] = K(s->k);
lib/libpcap/optimize.c
932
val[A_ATOM] = F(s->code, val[A_ATOM], K(s->k));
lib/libpcap/optimize.c
947
val[A_ATOM] = K(s->k);
lib/libpcap/optimize.c
954
F(s->code, val[A_ATOM], K(s->k));
lib/libpcap/optimize.c
977
vstore(s, &val[A_ATOM], K(s->k), alter);
regress/lib/libcrypto/gcm128/gcm128test.c
114
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
155
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
201
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
246
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
297
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
314
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
334
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
377
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
424
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
470
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
522
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
539
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
559
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
603
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
61
const uint8_t K[128];
regress/lib/libcrypto/gcm128/gcm128test.c
651
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
698
.K = {
regress/lib/libcrypto/gcm128/gcm128test.c
751
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
77
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
785
.K = {0},
regress/lib/libcrypto/gcm128/gcm128test.c
867
AES_set_encrypt_key(tv->K, tv->K_len * 8, &key);
regress/lib/libcrypto/gcm128/gcm128test.c
94
.K = {0},
sys/crypto/cmac.c
100
XOR(K, ctx->M_last);
sys/crypto/cmac.c
103
if (K[0] & 0x80) {
sys/crypto/cmac.c
104
LSHIFT(K, K);
sys/crypto/cmac.c
105
K[15] ^= 0x87;
sys/crypto/cmac.c
107
LSHIFT(K, K);
sys/crypto/cmac.c
114
XOR(K, ctx->M_last);
sys/crypto/cmac.c
119
explicit_bzero(K, sizeof K);
sys/crypto/cmac.c
86
u_int8_t K[16];
sys/crypto/cmac.c
89
memset(K, 0, sizeof K);
sys/crypto/cmac.c
90
AES_Encrypt(&ctx->aesctx, K, K);
sys/crypto/cmac.c
92
if (K[0] & 0x80) {
sys/crypto/cmac.c
93
LSHIFT(K, K);
sys/crypto/cmac.c
94
K[15] ^= 0x87;
sys/crypto/cmac.c
96
LSHIFT(K, K);
sys/crypto/gmac.c
117
AES_Setkey(&ctx->K, key, klen - AESCTR_NONCESIZE);
sys/crypto/gmac.c
121
AES_Encrypt(&ctx->K, ctx->ghash.H, ctx->ghash.H);
sys/crypto/gmac.c
164
AES_Encrypt(&ctx->K, ctx->J, keystream);
sys/crypto/gmac.h
35
AES_CTX K;
sys/crypto/key_wrap.c
33
aes_key_wrap_set_key(aes_key_wrap_ctx *ctx, const u_int8_t *K, size_t K_len)
sys/crypto/key_wrap.c
35
AES_Setkey(&ctx->ctx, K, K_len);
sys/crypto/key_wrap.c
39
aes_key_wrap_set_key_wrap_only(aes_key_wrap_ctx *ctx, const u_int8_t *K,
sys/crypto/key_wrap.c
42
AES_Setkey(&ctx->ctx, K, K_len);
sys/dev/pci/drm/amd/pm/legacy-dpm/si_dpm.c
2609
dte_tables->K = cpu_to_be32(table_size);
sys/dev/pci/drm/amd/pm/legacy-dpm/sislands_smc.h
360
uint32_t K;
sys/dev/pci/drm/radeon/si_dpm.c
2437
dte_tables->K = cpu_to_be32(table_size);
sys/dev/pci/drm/radeon/sislands_smc.h
364
uint32_t K;
sys/dev/videomode/vesagtf.c
179
#define C_PRIME256(p) (((p->C - p->J) * p->K) + (p->J * 256))
sys/dev/videomode/vesagtf.c
180
#define M_PRIME256(p) (p->K * p->M)
sys/dev/videomode/vesagtf.c
643
params.K = VESAGTF_K;
sys/dev/videomode/vesagtf.h
51
unsigned K; /* blanking formula scaling factor */
usr.bin/calendar/pesach.c
40
d = (T - 10 * K + L + 14) + K * a + b / 4. - L * y;
usr.sbin/npppd/pptp/pptp_call.c
584
grehdr->K = 1;
usr.sbin/npppd/pptp/pptp_local.h
40
K:1,
usr.sbin/npppd/pptp/pptp_local.h
49
K:1,
usr.sbin/npppd/pptp/pptpd.c
752
grehdr->C == 0 && grehdr->R == 0 && grehdr->K != 0 &&
usr.sbin/npppd/pptp/pptpd.c
931
(grehdr->K != 0)? "K" : "", (grehdr->S != 0)? "S" : "",