/dports/devel/apr1/apr-1.7.0/random/unix/ |
H A D | sha2.c | 230 #define ROUND256(a,b,c,d,e,f,g,h) \ macro 273 ROUND256(a,b,c,d,e,f,g,h); in apr__SHA256_Transform() 274 ROUND256(h,a,b,c,d,e,f,g); in apr__SHA256_Transform() 275 ROUND256(g,h,a,b,c,d,e,f); in apr__SHA256_Transform() 276 ROUND256(f,g,h,a,b,c,d,e); in apr__SHA256_Transform() 277 ROUND256(e,f,g,h,a,b,c,d); in apr__SHA256_Transform() 278 ROUND256(d,e,f,g,h,a,b,c); in apr__SHA256_Transform() 279 ROUND256(c,d,e,f,g,h,a,b); in apr__SHA256_Transform() 280 ROUND256(b,c,d,e,f,g,h,a); in apr__SHA256_Transform()
|
/dports/security/samhain/samhain-4.4.3/src/ |
H A D | sh_checksum.c | 211 #define ROUND256(a,b,c,d,e,f,g,h) \ macro 254 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 255 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 256 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 257 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 258 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 259 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 260 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 261 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|
/dports/security/samhain-client/samhain-4.4.3/src/ |
H A D | sh_checksum.c | 211 #define ROUND256(a,b,c,d,e,f,g,h) \ macro 254 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 255 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 256 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 257 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 258 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 259 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 260 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 261 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|
/dports/security/samhain-server/samhain-4.4.3/src/ |
H A D | sh_checksum.c | 211 #define ROUND256(a,b,c,d,e,f,g,h) \ macro 254 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 255 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 256 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 257 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 258 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 259 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 260 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 261 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|
/dports/security/ncrack/ncrack-0.7/opensshlib/ |
H A D | sha2.c | 305 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 350 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 351 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 352 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 353 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 354 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 355 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 356 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|
/dports/security/asignify/asignify-1.0/libasignify/ |
H A D | sha2.c | 292 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 336 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform() 337 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform() 338 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform() 339 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform() 340 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform() 341 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform() 342 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform() 343 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/openbsd-compat/ |
H A D | sha2.c | 305 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 350 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 351 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 352 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 353 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 354 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 355 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 356 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|
/dports/security/kc24/kc-2.4.2/bcrypt/ |
H A D | sha2.c | 286 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 330 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform() 331 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform() 332 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform() 333 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform() 334 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform() 335 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform() 336 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform() 337 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
|
/dports/security/pam_ssh_agent_auth/pam_ssh_agent_auth-7ff7858/openbsd-compat/ |
H A D | sha2.c | 305 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 350 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 351 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 352 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 353 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 354 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 355 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 356 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|
/dports/security/py-bcrypt/bcrypt-3.2.0/src/_csrc/ |
H A D | sha2.c | 246 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 290 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform() 291 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform() 292 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform() 293 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform() 294 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform() 295 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform() 296 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform() 297 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
|
/dports/databases/postgresql96-server/postgresql-9.6.24/contrib/pgcrypto/ |
H A D | sha2.c | 277 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 335 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 336 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 337 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 338 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 339 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 340 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 341 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 342 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/pgpool-II-41/pgpool-II-4.1.10/src/utils/ |
H A D | sha2.c | 284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/pgpool-II-42/pgpool-II-4.2.3/src/utils/ |
H A D | sha2.c | 284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/pgpool-II-43/pgpool-II-4.3.0/src/utils/ |
H A D | sha2.c | 284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/pgpool-II-40/pgpool-II-4.0.17/src/utils/ |
H A D | sha2.c | 284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql96-pltcl/postgresql-9.6.24/contrib/pgcrypto/ |
H A D | sha2.c | 277 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 335 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 336 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 337 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 338 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 339 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 340 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 341 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 342 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql96-plpython/postgresql-9.6.24/contrib/pgcrypto/ |
H A D | sha2.c | 277 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 335 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 336 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 337 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 338 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 339 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 340 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 341 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 342 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql10-pltcl/postgresql-10.19/src/common/ |
H A D | sha2.c | 291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql10-contrib/postgresql-10.19/src/common/ |
H A D | sha2.c | 291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql10-client/postgresql-10.19/src/common/ |
H A D | sha2.c | 291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql10-plpython/postgresql-10.19/src/common/ |
H A D | sha2.c | 291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql10-plperl/postgresql-10.19/src/common/ |
H A D | sha2.c | 291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/databases/postgresql10-docs/postgresql-10.19/src/common/ |
H A D | sha2.c | 291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform() 350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform() 351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform() 352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform() 353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform() 354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform() 355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform() 356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
|
/dports/net/openntpd/openntpd-6.8p1/compat/ |
H A D | sha2.c | 358 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 402 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform() 403 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform() 404 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform() 405 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform() 406 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform() 407 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform() 408 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform() 409 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
|
/dports/emulators/hercules/hercules-3.13/crypto/ |
H A D | sha256.c | 258 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro 304 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform() 305 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform() 306 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform() 307 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform() 308 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform() 309 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform() 310 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform() 311 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
|