/freebsd/sys/contrib/device-tree/Bindings/iio/pressure/ |
H A D | honeywell,hsc030pa.yaml | 63 enum: [001BA, 1.6BA, 2.5BA, 004BA, 006BA, 010BA, 1.6MD, 2.5MD, 004MD, 64 006MD, 010MD, 016MD, 025MD, 040MD, 060MD, 100MD, 160MD, 250MD, 65 400MD, 600MD, 001BD, 1.6BD, 2.5BD, 004BD, 2.5MG, 004MG, 006MG, 66 010MG, 016MG, 025MG, 040MG, 060MG, 100MG, 160MG, 250MG, 400MG, 67 600MG, 001BG, 1.6BG, 2.5BG, 004BG, 006BG, 010BG, 100KA, 160KA, 68 250KA, 400KA, 600KA, 001GA, 160LD, 250LD, 400LD, 600LD, 001KD, 70 100KD, 160KD, 250KD, 400KD, 250LG, 400LG, 600LG, 001KG, 1.6KG, 72 160KG, 250KG, 400KG, 600KG, 001GG, 015PA, 030PA, 060PA, 100PA,
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RIPEMD160_Init.pod | 6 RIPEMD-160 hash function 17 unsigned char *md); 21 int RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); 29 RIPEMD-160 is a cryptographic hash function with a 30 160 bit output. 32 RIPEMD160() computes the RIPEMD-160 message digest of the B<n> 33 bytes at B<d> and places it in B<md> (which must have space for 34 RIPEMD160_DIGEST_LENGTH == 20 bytes of output). If B<md> is NULL, the digest 45 RIPEMD160_Final() places the message digest in B<md>, which must have 64 ISO/IEC 10118-3:2016 Dedicated Hash-Function 1 (RIPEMD-160).
|
H A D | SHA256_Init.pod | 26 int SHA1_Final(unsigned char *md, SHA_CTX *c); 30 int SHA224_Final(unsigned char *md, SHA256_CTX *c); 34 int SHA256_Final(unsigned char *md, SHA256_CTX *c); 38 int SHA384_Final(unsigned char *md, SHA512_CTX *c); 42 int SHA512_Final(unsigned char *md, SHA512_CTX *c); 53 (EVP_Q_digest(d, n, md, NULL, NULL, "SHA256", NULL) ? md : NULL) 56 160 bit output. 59 bytes at B<d> and places it in B<md> (which must have space for 60 SHA_DIGEST_LENGTH == 20 bytes of output). If B<md> is NULL, the digest 61 is placed in a static array. Note: setting B<md> to NULL is B<not thread safe>. [all …]
|
H A D | EVP_PKEY_CTX_ctrl.pod | 86 int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md); 88 int EVP_PKEY_CTX_set_signature_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 109 int EVP_PKEY_CTX_set_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 110 int EVP_PKEY_CTX_get_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 115 int EVP_PKEY_CTX_set_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 116 int EVP_PKEY_CTX_get_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 127 int EVP_PKEY_CTX_set_dsa_paramgen_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 155 int EVP_PKEY_CTX_set_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 156 int EVP_PKEY_CTX_get_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 169 int EVP_PKEY_CTX_set_ecdh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | RIPEMD160_Init.3 | 141 RIPEMD\-160 hash function 154 \& unsigned char *md); 158 \& int RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); 166 \&\s-1RIPEMD\-160\s0 is a cryptographic hash function with a 167 160 bit output. 169 \&\s-1\fBRIPEMD160\s0()\fR computes the \s-1RIPEMD\-160\s0 message digest of the \fBn\fR 170 bytes at \fBd\fR and places it in \fBmd\fR (which must have space for 171 \&\s-1RIPEMD160_DIGEST_LENGTH\s0 == 20 bytes of output). If \fBmd\fR is \s-1NULL,\s0 the digest 182 \&\fBRIPEMD160_Final()\fR places the message digest in \fBmd\fR, which must have 198 \&\s-1ISO/IEC 10118\-3:2016\s0 Dedicated Hash-Function 1 (\s-1RIPEMD\-160\s0).
|
H A D | SHA256_Init.3 | 163 \& int SHA1_Final(unsigned char *md, SHA_CTX *c); 167 \& int SHA224_Final(unsigned char *md, SHA256_CTX *c); 171 \& int SHA256_Final(unsigned char *md, SHA256_CTX *c); 175 \& int SHA384_Final(unsigned char *md, SHA512_CTX *c); 179 \& int SHA512_Final(unsigned char *md, SHA512_CTX *c); 191 \& (EVP_Q_digest(d, n, md, NULL, NULL, "SHA256", NULL) ? md : NULL) 195 160 bit output. 198 bytes at \fBd\fR and places it in \fBmd\fR (which must have space for 199 \&\s-1SHA_DIGEST_LENGTH\s0 == 20 bytes of output). If \fBmd\fR is \s-1NULL,\s0 the digest 200 is placed in a static array. Note: setting \fBmd\fR to \s-1NULL\s0 is \fBnot thread safe\fR. [all …]
|
H A D | EVP_PKEY_CTX_ctrl.3 | 221 \& int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md); 223 \& int EVP_PKEY_CTX_set_signature_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 244 \& int EVP_PKEY_CTX_set_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 245 \& int EVP_PKEY_CTX_get_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 250 \& int EVP_PKEY_CTX_set_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 251 \& int EVP_PKEY_CTX_get_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 262 \& int EVP_PKEY_CTX_set_dsa_paramgen_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 290 \& int EVP_PKEY_CTX_set_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 291 \& int EVP_PKEY_CTX_get_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 304 \& int EVP_PKEY_CTX_set_ecdh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); [all …]
|
/freebsd/crypto/openssl/crypto/ffc/ |
H A D | ffc_params_generate.c | 16 * 1024 160 40 53 /* In fips mode 1024/160 can only be used for verification */ in ffc_validate_LN() 54 if (verify && L == 1024 && N == 160) in ffc_validate_LN() 70 /* Allow legacy 1024/160 in non fips mode */ in ffc_validate_LN() 71 if (L == 1024 && N == 160) in ffc_validate_LN() 84 if (L >= 1024 && N >= 160) in ffc_validate_LN() 139 unsigned char md[EVP_MAX_MD_SIZE]; in generate_canonical_g() local 165 md[0] = (unsigned char)(gindex & 0xff); in generate_canonical_g() 166 md[1] = (unsigned char)((counter >> 8) & 0xff); in generate_canonical_g() 167 md[2] = (unsigned char)(counter & 0xff); in generate_canonical_g() [all …]
|
/freebsd/crypto/openssl/providers/common/ |
H A D | securitycheck.c | 172 * (512 <= L < 2048 or 160 <= N < 224). in ossl_dsa_check_key() 175 * For example a L = 256, N = 160 key *would* be allowed by SP 800-131Ar2 in ossl_dsa_check_key() 179 if (L < 512 || N < 160) in ossl_dsa_check_key() 235 int ossl_digest_get_approved_nid_with_sha1(OSSL_LIB_CTX *ctx, const EVP_MD *md, in ossl_digest_get_approved_nid_with_sha1() argument 238 int mdnid = ossl_digest_get_approved_nid(md); in ossl_digest_get_approved_nid_with_sha1() 249 int ossl_digest_is_allowed(OSSL_LIB_CTX *ctx, const EVP_MD *md) in ossl_digest_is_allowed() argument 253 return ossl_digest_get_approved_nid(md) != NID_undef; in ossl_digest_is_allowed()
|
/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 31 const EVP_MD *pmd; /* MD for parameter generation */ 35 const EVP_MD *md; /* MD for the signature */ member 47 dctx->md = NULL; in pkey_dsa_init() 67 dctx->md = sctx->md; in pkey_dsa_copy() 91 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_sign() 115 if (dctx->md != NULL && tbslen != (size_t)EVP_MD_get_size(dctx->md)) in pkey_dsa_verify() 135 if (p1 != 160 && p1 != 224 && p1 && p1 != 256) in pkey_dsa_ctrl() 165 dctx->md = p2; in pkey_dsa_ctrl() 169 *(const EVP_MD **)p2 = dctx->md; in pkey_dsa_ctrl() 199 const EVP_MD *md = EVP_get_digestbyname(value); in pkey_dsa_ctrl_str() local [all …]
|
/freebsd/tools/test/stress2/misc/ |
H A D | cmp.sh | 44 mount | grep $mntpoint | grep -q /dev/md && umount -f $mntpoint 45 [ -c /dev/md$mdstart ] && mdconfig -d -u $mdstart 49 newfs md$mdstart > /dev/null 50 mount /dev/md$mdstart $mntpoint 60 mount /dev/md$mdstart $mntpoint 66 while mount | grep $mntpoint | grep -q /dev/md; do 109 #define LOOPS 160
|
H A D | umountf2.sh | 47 mount | grep "$mntpoint" | grep md$mdstart > /dev/null && umount $mntpoint 48 mdconfig -l | grep md$mdstart > /dev/null && mdconfig -d -u $mdstart 51 newfs md$mdstart > /dev/null 2>&1 52 mount /dev/md$mdstart $mntpoint 807 report_failure(160);
|
/freebsd/crypto/openssl/crypto/err/ |
H A D | openssl.txt | 102 the asn1 object identifier is not known for this md 112 ASN1_R_UNKNOWN_FORMAT:160:unknown format 220 CMP_R_ERROR_UNEXPECTED_CERTCONF:160:error unexpected certconf 285 CMS_R_CERTIFICATE_HAS_NO_KEYID:160:certificate has no keyid 319 CMS_R_MD_BIO_INIT_ERROR:119:md bio init error 547 EC_R_CURVE_DOES_NOT_SUPPORT_ECDH:160:curve does not support ecdh 753 EVP_R_UNKNOWN_CIPHER:160:unknown cipher 980 PROV_R_BN_ERROR:160:bn error 1018 PROV_R_INVALID_MGF1_MD:167:invalid mgf1 md 1173 RSA_R_INVALID_LABEL:160:invalid label [all …]
|
/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 37 const EVP_MD *md; member 99 dctx->md = sctx->md; in pkey_dh_copy() 295 subprime_len = 160; in ffc_params_generate() 298 if (dctx->md != NULL) in ffc_params_generate() 299 ossl_ffc_set_digest(&ret->params, EVP_MD_get0_name(dctx->md), NULL); in ffc_params_generate()
|
/freebsd/sys/dev/hwpmc/ |
H A D | hwpmc_e500.c | 219 PMC_E500MC_ONLY(FPU_DOUBLE_PUMP, 160), 330 e500_pcpu_init(struct pmc_mdep *md, int cpu) in e500_pcpu_init() argument 334 powerpc_pcpu_init(md, cpu); in e500_pcpu_init() 350 e500_pcpu_fini(struct pmc_mdep *md, int cpu) in e500_pcpu_fini() argument 358 return (powerpc_pcpu_fini(md, cpu)); in e500_pcpu_fini()
|
/freebsd/contrib/less/ |
H A D | pattern.c | 91 char msg[160]; in compile_pattern2() 394 pcre2_match_data *md = pcre2_match_data_create(nsp-1, NULL); in match_pattern1() local 396 line_off, flags, md, NULL); in match_pattern1() 400 PCRE2_SIZE *ovector = pcre2_get_ovector_pointer(md); in match_pattern1() 417 pcre2_match_data_free(md); in match_pattern1()
|
/freebsd/crypto/libecc/src/examples/hash/ |
H A D | md2.c | 13 /* All the inner MD-2 operations */ 18 138, 23, 229, 18, 190, 78, 196, 214, 218, 158, 222, 73, 160, 251, 35 /* MD-2 core processing. Returns 0 on success, -1 on error. */
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ts.h | 246 /* This must return a unique number less than 160 bits long. */ 280 int TS_RESP_CTX_set_ess_cert_id_digest(TS_RESP_CTX *ctx, const EVP_MD *md); 296 * accepted by default. The md argument is shared with the caller. 298 int TS_RESP_CTX_add_md(TS_RESP_CTX *ctx, const EVP_MD *md); 378 * provided data and the MD algorithm of the response. This flag should not 436 * md_alg = MD algorithm from request 484 const char *md, TS_RESP_CTX *ctx);
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 69 const struct signature_alg *md; member 1574 const struct signature_alg *md; in _hx509_signature_best_before() local 1576 md = find_sig_alg(&alg->algorithm); in _hx509_signature_best_before() 1577 if (md == NULL) { in _hx509_signature_best_before() 1581 if (md->best_before && md->best_before < t) { in _hx509_signature_best_before() 1584 md->name); in _hx509_signature_best_before() 1594 const struct signature_alg *md; in _hx509_self_signed_valid() local 1596 md = find_sig_alg(&alg->algorithm); in _hx509_self_signed_valid() 1597 if (md == NULL) { in _hx509_self_signed_valid() 1601 if ((md->flags & SELF_SIGNED_OK) == 0) { in _hx509_self_signed_valid() [all …]
|
/freebsd/tests/sys/aio/ |
H A D | aio_test.c | 32 * fd is used for write and read (i.e., file, md device), but for others the 818 /* Store the md unit number in a symlink for future cleanup */ in aio_md_setup() 822 snprintf(pathname, PATH_MAX, "/dev/md%d", unit); in aio_md_setup() 982 char vdev_name[160]; in aio_zvol_setup() 984 char cmd[160]; in aio_zvol_setup() 985 char zvol_name[160]; in aio_zvol_setup() 986 char devname[160]; in aio_zvol_setup() 1032 char cmd[160]; in aio_zvol_cleanup() 2041 * Note that unlike md, the zvol is not a geom device, does not allow unmapped
|
/freebsd/tools/tools/crypto/ |
H A D | cryptocheck.c | 87 * ripemd160 160-bit RIPEMD 97 * ripemd160hmac 160-bit RIPEMD HMAC 541 openssl_hash(const struct alg *alg, const EVP_MD *md, const void *buffer, in openssl_hash() argument 554 rc = EVP_DigestInit_ex(mdctx, md, NULL); in openssl_hash() 578 const EVP_MD *md; in run_hash_test() local 587 md = alg->evp_md(); in run_hash_test() 588 assert((size_t)EVP_MD_size(md) <= sizeof(control_digest)); in run_hash_test() 594 if (!openssl_hash(alg, md, buffer, size, control_digest, &digest_len)) in run_hash_test() 601 if (memcmp(control_digest, test_digest, EVP_MD_size(md)) == 0) in run_hash_test() 657 const EVP_MD *md; in run_hmac_test() local [all …]
|
/freebsd/share/misc/ |
H A D | usb_vendors | 1697 0acd Sitecom Internal Multi Memory reader/writer MD-005 1699 10cd Sitecom Internal Multi Memory reader/writer MD-005 1701 20cd Sitecom Internal Multi Memory reader/writer MD-005 2010 2002 MD-5500 Printer 2635 0377 Medion MD 5345 Scanner 2637 037b Medion MD 6190 Scanner 2646 0392 Medion/Lifetec/Tevion/Cytron MD 6190 3667 160f P-105 3950 160a DR-2050C Scanner 4521 32aa Powershot ELPH 160 / IXUS 160 [all …]
|
/freebsd/share/termcap/ |
H A D | termcap | 190 :dl=\ER:do=^J:ic=\EQ:md=\E(:me=\EG0:mh=\E):\ 291 :kl=\E[D:kr=\E[C:ku=\E[A:le=\E[D:mb=\E[5m:md=\E[1m:\ 420 :le=\ED:li#24:mb=\E4D:md=\E4H:me=\E4@:\ 448 :md=\EZ:me=\Ew\Eq\Ez\EB:mk=\EF\Ef0;\Eb0;:mr=\Ep:\ 464 :md=\E[1m:mr=\E[7m:mb=\E[5m:me=\E[m:\ 475 :md=\E[1m:mr=\E[7m:mb=\E[5m:mk=\E[8m:me=\E[0m:\ 548 :md=2\E[1m:mr=2\E[7m:mb=2\E[5m:me=2\E[m:is=\E[1;24r\E[24;1H:\ 565 :mb=\E[5m:md=\E[1m:me=\E[m:\ 865 :md=\E[1m:mr=\E[7m:mb=\E[5m:me=\E[m:\ 939 :mb=\EOb:md=\EOd:me=\EN*:mr=\EOr:nd=\EV:pt:rc=\034:rs=\EN*:sc=\035:\ [all …]
|
/freebsd/contrib/wpa/src/common/ |
H A D | ieee802_11_common.c | 1669 "LI", "LT", "LU", "LV", "MD", "ME", "MK", "MT", "NL", "NO", "PL", "PT", 1939 case 129: /* center freqs 50, 114, 163; 160 MHz */ in ieee80211_chan_to_freq_global() 1946 case 134: /* UHB channels, 160 MHz: 15, 47, 79.. */ in ieee80211_chan_to_freq_global() 2876 return 160; in oper_class_bw_to_int() 2903 return 3; /* 160 MHz */ in center_idx_to_bw_6ghz() 3235 case 129: /* center freqs 50, 114, 163; 160 MHz */ in op_class_to_bandwidth() 3236 return 160; in op_class_to_bandwidth() 3245 case 134: /* UHB channels, 160 MHz: 15, 47, 79.. */ in op_class_to_bandwidth() 3247 return 160; in op_class_to_bandwidth() 3298 case 129: /* center freqs 50, 114, 163; 160 MHz */ in op_class_to_ch_width() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | pgp | 252 >0 byte 0x03 RIPE-MD/160
|