Home
last modified time | relevance | path

Searched refs:ROUND256 (Results 1 – 25 of 118) sorted by relevance

12345

/dports/devel/apr1/apr-1.7.0/random/unix/
H A Dsha2.c230 #define ROUND256(a,b,c,d,e,f,g,h) \ macro
273 ROUND256(a,b,c,d,e,f,g,h); in apr__SHA256_Transform()
274 ROUND256(h,a,b,c,d,e,f,g); in apr__SHA256_Transform()
275 ROUND256(g,h,a,b,c,d,e,f); in apr__SHA256_Transform()
276 ROUND256(f,g,h,a,b,c,d,e); in apr__SHA256_Transform()
277 ROUND256(e,f,g,h,a,b,c,d); in apr__SHA256_Transform()
278 ROUND256(d,e,f,g,h,a,b,c); in apr__SHA256_Transform()
279 ROUND256(c,d,e,f,g,h,a,b); in apr__SHA256_Transform()
280 ROUND256(b,c,d,e,f,g,h,a); in apr__SHA256_Transform()
/dports/security/samhain/samhain-4.4.3/src/
H A Dsh_checksum.c211 #define ROUND256(a,b,c,d,e,f,g,h) \ macro
254 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
255 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
256 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
257 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
258 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
259 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
260 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
261 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
/dports/security/samhain-client/samhain-4.4.3/src/
H A Dsh_checksum.c211 #define ROUND256(a,b,c,d,e,f,g,h) \ macro
254 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
255 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
256 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
257 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
258 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
259 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
260 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
261 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
/dports/security/samhain-server/samhain-4.4.3/src/
H A Dsh_checksum.c211 #define ROUND256(a,b,c,d,e,f,g,h) \ macro
254 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
255 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
256 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
257 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
258 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
259 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
260 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
261 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
/dports/security/ncrack/ncrack-0.7/opensshlib/
H A Dsha2.c305 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
350 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
351 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
352 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
353 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
354 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
355 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
356 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
/dports/security/asignify/asignify-1.0/libasignify/
H A Dsha2.c292 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
336 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform()
337 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform()
338 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform()
339 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform()
340 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform()
341 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform()
342 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform()
343 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
/dports/security/gnome-ssh-askpass/openssh-6.6p1/openbsd-compat/
H A Dsha2.c305 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
350 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
351 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
352 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
353 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
354 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
355 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
356 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
/dports/security/kc24/kc-2.4.2/bcrypt/
H A Dsha2.c286 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
330 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform()
331 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform()
332 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform()
333 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform()
334 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform()
335 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform()
336 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform()
337 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
/dports/security/pam_ssh_agent_auth/pam_ssh_agent_auth-7ff7858/openbsd-compat/
H A Dsha2.c305 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
350 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
351 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
352 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
353 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
354 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
355 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
356 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()
/dports/security/py-bcrypt/bcrypt-3.2.0/src/_csrc/
H A Dsha2.c246 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
290 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform()
291 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform()
292 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform()
293 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform()
294 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform()
295 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform()
296 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform()
297 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
/dports/databases/postgresql96-server/postgresql-9.6.24/contrib/pgcrypto/
H A Dsha2.c277 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
335 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
336 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
337 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
338 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
339 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
340 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
341 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
342 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/pgpool-II-41/pgpool-II-4.1.10/src/utils/
H A Dsha2.c284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/pgpool-II-42/pgpool-II-4.2.3/src/utils/
H A Dsha2.c284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/pgpool-II-43/pgpool-II-4.3.0/src/utils/
H A Dsha2.c284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/pgpool-II-40/pgpool-II-4.0.17/src/utils/
H A Dsha2.c284 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
342 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
343 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
344 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
345 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
346 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
347 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
348 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
349 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql96-pltcl/postgresql-9.6.24/contrib/pgcrypto/
H A Dsha2.c277 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
335 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
336 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
337 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
338 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
339 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
340 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
341 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
342 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql96-plpython/postgresql-9.6.24/contrib/pgcrypto/
H A Dsha2.c277 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
335 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
336 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
337 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
338 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
339 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
340 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
341 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
342 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql10-pltcl/postgresql-10.19/src/common/
H A Dsha2.c291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql10-contrib/postgresql-10.19/src/common/
H A Dsha2.c291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql10-client/postgresql-10.19/src/common/
H A Dsha2.c291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql10-plpython/postgresql-10.19/src/common/
H A Dsha2.c291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql10-plperl/postgresql-10.19/src/common/
H A Dsha2.c291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/databases/postgresql10-docs/postgresql-10.19/src/common/
H A Dsha2.c291 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
349 ROUND256(a, b, c, d, e, f, g, h); in SHA256_Transform()
350 ROUND256(h, a, b, c, d, e, f, g); in SHA256_Transform()
351 ROUND256(g, h, a, b, c, d, e, f); in SHA256_Transform()
352 ROUND256(f, g, h, a, b, c, d, e); in SHA256_Transform()
353 ROUND256(e, f, g, h, a, b, c, d); in SHA256_Transform()
354 ROUND256(d, e, f, g, h, a, b, c); in SHA256_Transform()
355 ROUND256(c, d, e, f, g, h, a, b); in SHA256_Transform()
356 ROUND256(b, c, d, e, f, g, h, a); in SHA256_Transform()
/dports/net/openntpd/openntpd-6.8p1/compat/
H A Dsha2.c358 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
402 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform()
403 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform()
404 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform()
405 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform()
406 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform()
407 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform()
408 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform()
409 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
/dports/emulators/hercules/hercules-3.13/crypto/
H A Dsha256.c258 #define ROUND256(a,b,c,d,e,f,g,h) do { \ macro
304 ROUND256(a,b,c,d,e,f,g,h); in SHA256_Transform()
305 ROUND256(h,a,b,c,d,e,f,g); in SHA256_Transform()
306 ROUND256(g,h,a,b,c,d,e,f); in SHA256_Transform()
307 ROUND256(f,g,h,a,b,c,d,e); in SHA256_Transform()
308 ROUND256(e,f,g,h,a,b,c,d); in SHA256_Transform()
309 ROUND256(d,e,f,g,h,a,b,c); in SHA256_Transform()
310 ROUND256(c,d,e,f,g,h,a,b); in SHA256_Transform()
311 ROUND256(b,c,d,e,f,g,h,a); in SHA256_Transform()

12345