| /freebsd/sys/contrib/device-tree/Bindings/iio/pressure/ |
| H A D | honeywell,hsc030pa.yaml | 63 enum: [001BA, 1.6BA, 2.5BA, 004BA, 006BA, 010BA, 1.6MD, 2.5MD, 004MD, 64 006MD, 010MD, 016MD, 025MD, 040MD, 060MD, 100MD, 160MD, 250MD, 65 400MD, 600MD, 001BD, 1.6BD, 2.5BD, 004BD, 2.5MG, 004MG, 006MG, 66 010MG, 016MG, 025MG, 040MG, 060MG, 100MG, 160MG, 250MG, 400MG, 67 600MG, 001BG, 1.6BG, 2.5BG, 004BG, 006BG, 010BG, 100KA, 160KA, 68 250KA, 400KA, 600KA, 001GA, 160LD, 250LD, 400LD, 600LD, 001KD, 70 100KD, 160KD, 250KD, 400KD, 250LG, 400LG, 600LG, 001KG, 1.6KG, 72 160KG, 250KG, 400KG, 600KG, 001GG, 015PA, 030PA, 060PA, 100PA,
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | RIPEMD160_Init.pod | 6 RIPEMD-160 hash function 17 unsigned char *md); 21 int RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); 29 RIPEMD-160 is a cryptographic hash function with a 30 160 bit output. 32 RIPEMD160() computes the RIPEMD-160 message digest of the B<n> 33 bytes at B<d> and places it in B<md> (which must have space for 34 RIPEMD160_DIGEST_LENGTH == 20 bytes of output). If B<md> is NULL, the digest 45 RIPEMD160_Final() places the message digest in B<md>, which must have 64 ISO/IEC 10118-3:2016 Dedicated Hash-Function 1 (RIPEMD-160).
|
| H A D | SHA256_Init.pod | 26 int SHA1_Final(unsigned char *md, SHA_CTX *c); 30 int SHA224_Final(unsigned char *md, SHA256_CTX *c); 34 int SHA256_Final(unsigned char *md, SHA256_CTX *c); 38 int SHA384_Final(unsigned char *md, SHA512_CTX *c); 42 int SHA512_Final(unsigned char *md, SHA512_CTX *c); 53 (EVP_Q_digest(d, n, md, NULL, NULL, "SHA256", NULL) ? md : NULL) 56 160 bit output. 59 bytes at B<d> and places it in B<md> (which must have space for 60 SHA_DIGEST_LENGTH == 20 bytes of output). If B<md> is NULL, the digest 61 is placed in a static array. Note: setting B<md> to NULL is B<not thread safe>. [all …]
|
| H A D | EVP_PKEY_CTX_ctrl.pod | 86 int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md); 88 int EVP_PKEY_CTX_set_signature_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 109 int EVP_PKEY_CTX_set_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 110 int EVP_PKEY_CTX_get_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 115 int EVP_PKEY_CTX_set_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 116 int EVP_PKEY_CTX_get_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 127 int EVP_PKEY_CTX_set_dsa_paramgen_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 155 int EVP_PKEY_CTX_set_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 156 int EVP_PKEY_CTX_get_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 169 int EVP_PKEY_CTX_set_ecdh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | RIPEMD160_Init.3 | 65 RIPEMD\-160 hash function 78 \& unsigned char *md); 82 \& int RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); 90 RIPEMD\-160 is a cryptographic hash function with a 91 160 bit output. 93 \&\fBRIPEMD160()\fR computes the RIPEMD\-160 message digest of the \fBn\fR 94 bytes at \fBd\fR and places it in \fBmd\fR (which must have space for 95 RIPEMD160_DIGEST_LENGTH == 20 bytes of output). If \fBmd\fR is NULL, the digest 106 \&\fBRIPEMD160_Final()\fR places the message digest in \fBmd\fR, which must have 122 ISO/IEC 10118\-3:2016 Dedicated Hash-Function 1 (RIPEMD\-160).
|
| H A D | SHA256_Init.3 | 87 \& int SHA1_Final(unsigned char *md, SHA_CTX *c); 91 \& int SHA224_Final(unsigned char *md, SHA256_CTX *c); 95 \& int SHA256_Final(unsigned char *md, SHA256_CTX *c); 99 \& int SHA384_Final(unsigned char *md, SHA512_CTX *c); 103 \& int SHA512_Final(unsigned char *md, SHA512_CTX *c); 115 \& (EVP_Q_digest(d, n, md, NULL, NULL, "SHA256", NULL) ? md : NULL) 119 160 bit output. 122 bytes at \fBd\fR and places it in \fBmd\fR (which must have space for 123 SHA_DIGEST_LENGTH == 20 bytes of output). If \fBmd\fR is NULL, the digest 124 is placed in a static array. Note: setting \fBmd\fR to NULL is \fBnot thread safe\fR. [all …]
|
| H A D | EVP_PKEY_CTX_ctrl.3 | 145 \& int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md); 147 \& int EVP_PKEY_CTX_set_signature_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 168 \& int EVP_PKEY_CTX_set_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 169 \& int EVP_PKEY_CTX_get_rsa_mgf1_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 174 \& int EVP_PKEY_CTX_set_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 175 \& int EVP_PKEY_CTX_get_rsa_oaep_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 186 \& int EVP_PKEY_CTX_set_dsa_paramgen_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 214 \& int EVP_PKEY_CTX_set_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); 215 \& int EVP_PKEY_CTX_get_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **md); 228 \& int EVP_PKEY_CTX_set_ecdh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); [all …]
|
| /freebsd/crypto/openssl/crypto/ffc/ |
| H A D | ffc_params_generate.c | 16 * 1024 160 40 53 /* In fips mode 1024/160 can only be used for verification */ in ffc_validate_LN() 54 if (verify && L == 1024 && N == 160) in ffc_validate_LN() 70 /* Allow legacy 1024/160 in non fips mode */ in ffc_validate_LN() 71 if (L == 1024 && N == 160) in ffc_validate_LN() 84 if (L >= 1024 && N >= 160) in ffc_validate_LN() 139 unsigned char md[EVP_MAX_MD_SIZE]; in generate_canonical_g() local 165 md[0] = (unsigned char)(gindex & 0xff); in generate_canonical_g() 166 md[1] = (unsigned char)((counter >> 8) & 0xff); in generate_canonical_g() 167 md[2] = (unsigned char)(counter & 0xff); in generate_canonical_g() [all …]
|
| /freebsd/crypto/openssl/crypto/dsa/ |
| H A D | dsa_pmeth.c | 31 const EVP_MD *pmd; /* MD for parameter generation */ 35 const EVP_MD *md; /* MD for the signature */ member 47 dctx->md = NULL; in pkey_dsa_init() 67 dctx->md = sctx->md; in pkey_dsa_copy() 91 if (dctx->md != NULL) { in pkey_dsa_sign() 92 md_size = EVP_MD_get_size(dctx->md); in pkey_dsa_sign() 120 if (dctx->md != NULL) { in pkey_dsa_verify() 121 md_size = EVP_MD_get_size(dctx->md); in pkey_dsa_verify() 145 if (p1 != 160 && p1 != 224 && p1 && p1 != 256) in pkey_dsa_ctrl() 175 dctx->md = p2; in pkey_dsa_ctrl() [all …]
|
| /freebsd/tools/test/stress2/misc/ |
| H A D | cmp.sh | 44 mount | grep $mntpoint | grep -q /dev/md && umount -f $mntpoint 45 [ -c /dev/md$mdstart ] && mdconfig -d -u $mdstart 49 newfs md$mdstart > /dev/null 50 mount /dev/md$mdstart $mntpoint 60 mount /dev/md$mdstart $mntpoint 66 while mount | grep $mntpoint | grep -q /dev/md; do 109 #define LOOPS 160
|
| H A D | umountf2.sh | 47 mount | grep "$mntpoint" | grep md$mdstart > /dev/null && umount $mntpoint 48 mdconfig -l | grep md$mdstart > /dev/null && mdconfig -d -u $mdstart 51 newfs md$mdstart > /dev/null 2>&1 52 mount /dev/md$mdstart $mntpoint 807 report_failure(160);
|
| /freebsd/crypto/openssl/crypto/err/ |
| H A D | openssl.txt | 103 the asn1 object identifier is not known for this md 113 ASN1_R_UNKNOWN_FORMAT:160:unknown format 229 CMP_R_ERROR_UNEXPECTED_CERTCONF:160:error unexpected certconf 312 CMS_R_CERTIFICATE_HAS_NO_KEYID:160:certificate has no keyid 346 CMS_R_MD_BIO_INIT_ERROR:119:md bio init error 604 EC_R_CURVE_DOES_NOT_SUPPORT_ECDH:160:curve does not support ecdh 825 EVP_R_UNKNOWN_CIPHER:160:unknown cipher 1057 PROV_R_BN_ERROR:160:bn error 1107 PROV_R_INVALID_MGF1_MD:167:invalid mgf1 md 1276 RSA_R_INVALID_LABEL:160:invalid label [all …]
|
| /freebsd/crypto/openssl/crypto/dh/ |
| H A D | dh_pmeth.c | 37 const EVP_MD *md; member 97 dctx->md = sctx->md; in pkey_dh_copy() 293 subprime_len = 160; in ffc_params_generate() 296 if (dctx->md != NULL) in ffc_params_generate() 297 ossl_ffc_set_digest(&ret->params, EVP_MD_get0_name(dctx->md), NULL); in ffc_params_generate()
|
| /freebsd/sys/dev/hwpmc/ |
| H A D | hwpmc_e500.c | 219 PMC_E500MC_ONLY(FPU_DOUBLE_PUMP, 160), 330 e500_pcpu_init(struct pmc_mdep *md, int cpu) in e500_pcpu_init() argument 334 powerpc_pcpu_init(md, cpu); in e500_pcpu_init() 350 e500_pcpu_fini(struct pmc_mdep *md, int cpu) in e500_pcpu_fini() argument 358 return (powerpc_pcpu_fini(md, cpu)); in e500_pcpu_fini()
|
| /freebsd/contrib/less/ |
| H A D | pattern.c | 91 char msg[160]; in compile_pattern2() 394 pcre2_match_data *md = pcre2_match_data_create(nsp-1, NULL); in match_pattern1() local 396 line_off, flags, md, NULL); in match_pattern1() 400 PCRE2_SIZE *ovector = pcre2_get_ovector_pointer(md); in match_pattern1() 417 pcre2_match_data_free(md); in match_pattern1()
|
| /freebsd/crypto/libecc/src/examples/hash/ |
| H A D | md2.c | 13 /* All the inner MD-2 operations */ 18 138, 23, 229, 18, 190, 78, 196, 214, 218, 158, 222, 73, 160, 251, 35 /* MD-2 core processing. Returns 0 on success, -1 on error. */
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ts.h | 248 /* This must return a unique number less than 160 bits long. */ 282 int TS_RESP_CTX_set_ess_cert_id_digest(TS_RESP_CTX *ctx, const EVP_MD *md); 298 * accepted by default. The md argument is shared with the caller. 300 int TS_RESP_CTX_add_md(TS_RESP_CTX *ctx, const EVP_MD *md); 380 * provided data and the MD algorithm of the response. This flag should not 455 * md_alg = MD algorithm from request 503 const char *md, TS_RESP_CTX *ctx);
|
| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | crypto.c | 69 const struct signature_alg *md; member 1574 const struct signature_alg *md; in _hx509_signature_best_before() local 1576 md = find_sig_alg(&alg->algorithm); in _hx509_signature_best_before() 1577 if (md == NULL) { in _hx509_signature_best_before() 1581 if (md->best_before && md->best_before < t) { in _hx509_signature_best_before() 1584 md->name); in _hx509_signature_best_before() 1594 const struct signature_alg *md; in _hx509_self_signed_valid() local 1596 md = find_sig_alg(&alg->algorithm); in _hx509_self_signed_valid() 1597 if (md == NULL) { in _hx509_self_signed_valid() 1601 if ((md->flags & SELF_SIGNED_OK) == 0) { in _hx509_self_signed_valid() [all …]
|
| /freebsd/tests/sys/aio/ |
| H A D | aio_test.c | 32 * fd is used for write and read (i.e., file, md device), but for others the 809 /* Store the md unit number in a symlink for future cleanup */ in aio_md_setup() 813 snprintf(pathname, PATH_MAX, "/dev/md%d", unit); in aio_md_setup() 973 char vdev_name[160]; in aio_zvol_setup() 975 char cmd[160]; in aio_zvol_setup() 976 char zvol_name[160]; in aio_zvol_setup() 977 char devname[160]; in aio_zvol_setup() 1020 char cmd[160]; in aio_zvol_cleanup() 2013 * Note that unlike md, the zvol is not a geom device, does not allow unmapped
|
| /freebsd/tools/tools/crypto/ |
| H A D | cryptocheck.c | 87 * ripemd160 160-bit RIPEMD 97 * ripemd160hmac 160-bit RIPEMD HMAC 546 openssl_hash(const struct alg *alg, const EVP_MD *md, const void *buffer, in openssl_hash() argument 559 rc = EVP_DigestInit_ex(mdctx, md, NULL); in openssl_hash() 583 const EVP_MD *md; in run_hash_test() local 592 md = alg->evp_md(); in run_hash_test() 593 assert((size_t)EVP_MD_size(md) <= sizeof(control_digest)); in run_hash_test() 599 if (!openssl_hash(alg, md, buffer, size, control_digest, &digest_len)) in run_hash_test() 606 if (memcmp(control_digest, test_digest, EVP_MD_size(md)) == 0) in run_hash_test() 662 const EVP_MD *md; in run_hmac_test() local [all …]
|
| /freebsd/share/misc/ |
| H A D | usb_vendors | 1710 0acd Sitecom Internal Multi Memory reader/writer MD-005 1712 10cd Sitecom Internal Multi Memory reader/writer MD-005 1714 20cd Sitecom Internal Multi Memory reader/writer MD-005 2026 2002 MD-5500 Printer 2651 0377 Medion MD 5345 Scanner 2653 037b Medion MD 6190 Scanner 2662 0392 Medion/Lifetec/Tevion/Cytron MD 6190 3693 160f P-105 3978 160a DR-2050C Scanner 4551 32aa Powershot ELPH 160 / IXUS 160 [all …]
|
| /freebsd/share/termcap/ |
| H A D | termcap | 190 :dl=\ER:do=^J:ic=\EQ:md=\E(:me=\EG0:mh=\E):\ 291 :kl=\E[D:kr=\E[C:ku=\E[A:le=\E[D:mb=\E[5m:md=\E[1m:\ 420 :le=\ED:li#24:mb=\E4D:md=\E4H:me=\E4@:\ 448 :md=\EZ:me=\Ew\Eq\Ez\EB:mk=\EF\Ef0;\Eb0;:mr=\Ep:\ 464 :md=\E[1m:mr=\E[7m:mb=\E[5m:me=\E[m:\ 475 :md=\E[1m:mr=\E[7m:mb=\E[5m:mk=\E[8m:me=\E[0m:\ 548 :md=2\E[1m:mr=2\E[7m:mb=2\E[5m:me=2\E[m:is=\E[1;24r\E[24;1H:\ 565 :mb=\E[5m:md=\E[1m:me=\E[m:\ 865 :md=\E[1m:mr=\E[7m:mb=\E[5m:me=\E[m:\ 939 :mb=\EOb:md=\EOd:me=\EN*:mr=\EOr:nd=\EV:pt:rc=\034:rs=\EN*:sc=\035:\ [all …]
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | ieee802_11_common.c | 1669 "LI", "LT", "LU", "LV", "MD", "ME", "MK", "MT", "NL", "NO", "PL", "PT", 1939 case 129: /* center freqs 50, 114, 163; 160 MHz */ in ieee80211_chan_to_freq_global() 1946 case 134: /* UHB channels, 160 MHz: 15, 47, 79.. */ in ieee80211_chan_to_freq_global() 2876 return 160; in oper_class_bw_to_int() 2903 return 3; /* 160 MHz */ in center_idx_to_bw_6ghz() 3235 case 129: /* center freqs 50, 114, 163; 160 MHz */ in op_class_to_bandwidth() 3236 return 160; in op_class_to_bandwidth() 3245 case 134: /* UHB channels, 160 MHz: 15, 47, 79.. */ in op_class_to_bandwidth() 3247 return 160; in op_class_to_bandwidth() 3298 case 129: /* center freqs 50, 114, 163; 160 MHz */ in op_class_to_ch_width() [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | pgp | 252 >0 byte 0x03 RIPE-MD/160
|
| /freebsd/sys/i386/i386/ |
| H A D | pmap.c | 1859 m->md.pat_mode, false); in __CONCAT() 2373 TAILQ_REMOVE(&m->md.pv_list, pv, pv_next); in pmap_pv_reclaim() 2374 if (TAILQ_EMPTY(&m->md.pv_list) && in pmap_pv_reclaim() 2607 TAILQ_INSERT_TAIL(&m->md.pv_list, pv, pv_next); in pmap_pv_demote_pde() 2641 pv = pmap_pvh_remove(&m->md, pmap, va); in pmap_pv_promote_pde() 2650 pmap_pvh_free(&m->md, pmap, va); in pmap_pv_promote_pde() 2671 pmap_pvh_free(&m->md, pmap, va); in pmap_remove_entry() 2672 if (TAILQ_EMPTY(&m->md.pv_list) && (m->flags & PG_FICTITIOUS) == 0) { in pmap_remove_entry() 2692 TAILQ_INSERT_TAIL(&m->md.pv_list, pv, pv_next); in pmap_insert_entry() 2708 TAILQ_INSERT_TAIL(&m->md.pv_list, pv, pv_next); in pmap_try_insert_pv_entry() [all …]
|