| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-enc.pod.in | 10 B<openssl> B<enc>|I<cipher> 11 [B<-I<cipher>>] 12 [B<-help>] 13 [B<-list>] 14 [B<-ciphers>] 15 [B<-in> I<filename>] 16 [B<-out> I<filename>] 17 [B<-pass> I<arg>] 18 [B<-e>] 19 [B<-d>] [all …]
|
| H A D | openssl.pod | 11 B<openssl> 16 B<openssl> B<no->I<XXX> [ I<options> ] 18 B<openssl> B<-help> | B<-version> 26 The B<openssl> program is a command line program for using the various 27 cryptography functions of OpenSSL's B<crypto> library from the shell. 41 The B<openssl> program provides a rich variety of commands (I<command> in 50 The command B<no->I<XXX> tests whether a command of the 52 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1 53 and prints I<XXX>. In both cases, the output goes to B<stdout> and 54 nothing is printed to B<stderr>. Additional command line arguments [all …]
|
| H A D | openssl-pkcs8.pod.in | 10 B<openssl> B<pkcs8> 11 [B<-help>] 12 [B<-topk8>] 13 [B<-inform> B<DER>|B<PEM>] 14 [B<-outform> B<DER>|B<PEM>] 15 [B<-in> I<filename>] 16 [B<-passin> I<arg>] 17 [B<-out> I<filename>] 18 [B<-passout> I<arg>] 19 [B<-iter> I<count>] [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_PKEY-SLH-DSA.pod | 8 EVP_PKEY-SLH-DSA-SHA2-256s, EVP_PKEY-SLH-DSA-SHA2-256f, 11 EVP_PKEY-SLH-DSA-SHAKE-256s, EVP_PKEY-SLH-DSA-SHAKE-256f 16 The B<SLH-DSA-SHA2-128s>, B<EVP_PKEY-SLH-DSA-SHA2-128f>, 17 B<SLH-DSA-SHA2-192s>, B<EVP_PKEY-SLH-DSA-SHA2-192f>, 18 B<SLH-DSA-SHA2-256s>, B<EVP_PKEY-SLH-DSA-SHA2-256f>, 19 B<SLH-DSA-SHAKE-128s>, B<EVP_PKEY-SLH-DSA-SHAKE-128f>, 20 B<SLH-DSA-SHAKE-192s>, B<EVP_PKEY-SLH-DSA-SHAKE-192f>, 21 B<SLH-DSA-SHAKE-256s> and B<EVP_PKEY-SLH-DSA-SHAKE-256f> key types are 28 operations compared to B<ML-DSA>. It does however have proven security proofs, 31 Each of the different key types has an associated security parameter B<n>. [all …]
|
| H A D | EVP_SIGNATURE-SLH-DSA.pod | 8 EVP_SIGNATURE-SLH-DSA-SHA2-256s, EVP_SIGNATURE-SLH-DSA-SHA2-256f, 11 EVP_SIGNATURE-SLH-DSA-SHAKE-256s, EVP_SIGNATURE-SLH-DSA-SHAKE-256f 16 The B<SLH-DSA-SHA2-128s>, B<EVP_PKEY-SLH-DSA-SHA2-128f>, 17 B<SLH-DSA-SHA2-192s>, B<EVP_PKEY-SLH-DSA-SHA2-192f>, 18 B<SLH-DSA-SHA2-256s>, B<EVP_PKEY-SLH-DSA-SHA2-256f>, 19 B<SLH-DSA-SHAKE-128s>, B<EVP_PKEY-SLH-DSA-SHAKE-128f>, 20 B<SLH-DSA-SHAKE-192s>, B<EVP_PKEY-SLH-DSA-SHAKE-192f>, 21 B<SLH-DSA-SHAKE-256s> and B<EVP_PKEY-SLH-DSA-SHAKE-256f> EVP_PKEY implementations 38 where B<ctx> is some optional value of size 0x00..0xFF. 53 =item "context-string" (B<OSSL_SIGNATURE_PARAM_CONTEXT_STRING>) <octet string> [all …]
|
| H A D | EVP_SIGNATURE-RSA.pod | 33 =item "RSA-SHA2-256", "RSA-SHA256", "sha256WithRSAEncryption", "1.2.840.113549.1.1.11" 43 =item "RSA-SHA2-512/256", "RSA-SHA512-256", "sha512-256WithRSAEncryption", "1.2.840.113549.1.1.16" 47 =item "RSA-SHA3-256", "id-rsassa-pkcs1-v1_5-with-sha3-256", "2.16.840.1.101.3.4.3.14" 71 =item "digest" (B<OSSL_SIGNATURE_PARAM_DIGEST>) <UTF8 string> 73 =item "properties" (B<OSSL_SIGNATURE_PARAM_PROPERTIES>) <UTF8 string> 80 =item "pad-mode" (B<OSSL_SIGNATURE_PARAM_PAD_MODE>) <UTF8 string> 86 =item "none" (B<OSSL_PKEY_RSA_PAD_MODE_NONE>) 88 =item "pkcs1" (B<OSSL_PKEY_RSA_PAD_MODE_PKCSV15>) 90 =item "x931" (B<OSSL_PKEY_RSA_PAD_MODE_X931>) 96 =item "pss" (B<OSSL_PKEY_RSA_PAD_MODE_PSS>) [all …]
|
| H A D | EVP_MD-SHAKE.pod | 11 B<EVP_MD> API. 28 (Section 6.2), we have S<KECCAK-KMAC-128(M, d)> = S<KECCAK[256](M || 00, d)> 31 =item KECCAK-KMAC-256 33 Known names are "KECCAK-KMAC-256" and "KECCAK-KMAC256". This is used 35 (Section 6.2), we have S<KECCAK-KMAC-256(M, d)> = S<KECCAK[512](M || 00, d)> 42 =item SHAKE-256 44 Known names are "SHAKE-256" and "SHAKE256". 54 =item "xoflen" (B<OSSL_DIGEST_PARAM_XOFLEN>) <unsigned integer> 57 The length of the "xoflen" parameter should not exceed that of a B<size_t>. 59 The SHAKE-128 and SHAKE-256 implementations do not have any default digest [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | meteorological | 9 >80 search/256 XXRINEXB RINEX Data, GEO SBAS Broadcast 10 >>&32 string x \b, date %15.15s 11 >>5 string x \b, version %6.6s 13 >80 search/256 XXRINEXD RINEX Data, Observation (Hatanaka comp) 14 >>&32 string x \b, date %15.15s 15 >>5 string x \b, version %6.6s 17 >80 search/256 XXRINEXC RINEX Data, Clock 18 >>&32 string x \b, date %15.15s 19 >>5 string x \b, version %6.6s 21 >80 search/256 XXRINEXH RINEX Data, GEO SBAS Navigation [all …]
|
| H A D | pc98 | 9 0 string/b MAKI01 Maki-chan v1. 10 >6 ubyte|0x20 x \b%c image 11 >8 ubelong >0x40404040 \b, system ID: 13 >>9 byte x \b%c 14 >>10 byte x \b%c 15 >>11 byte x \b%c 16 >44 ubeshort x \b, %dx 17 >46 ubeshort x \b%d 18 >38 ubeshort&2 0 \b, 16 paletted RGB colors 19 >38 ubeshort&2 2 \b, 8 fixed RGB colors [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OPENSSL_s390xcap.pod | 19 set the B<OPENSSL_s390xcap> environment variable before you start the 37 are B<z900>, B<z990>, B<z9>, B<z10>, B<z196>, B<zEC12>, B<z13>, B<z14>, 38 B<z15>, and B<z16>. 44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>, 45 B<km>, B<kmc>, B<kmac>, B<kmctr>, B<kmo>, B<kmf>, B<prno>, B<kma>, B<pcc> 46 and B<kdsa>. 87 # 2 1<<61 KIMD-SHA-256 90 # 33 1<<30 KIMD-SHA3-256 94 # 37 1<<26 KIMD-SHAKE-256 100 # 33 1<<30 KLMD-SHA3-256 [all …]
|
| H A D | EVP_aes_128_gcm.pod | 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 101 128 and 256 bits length respectively. The authentication tag is 160 bits long. 110 Authenticated encryption with AES in CBC mode using SHA256 (SHA-2, 256-bits) as 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag 112 is 256 bits long. 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode 140 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section 153 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to 154 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input 155 of a 512-bit key to achieve AES 256-bit security. [all …]
|
| /freebsd/usr.bin/tail/tests/ |
| H A D | tail_test.sh | 404 jot -b aaaaaaa 129 > file1 405 jot -b aaaaaaa 128 > expectfile 423 atf_check -o inline:"b\nc" tail -2 infile 431 atf_set "descr" "Test -b option" 435 (jot -b a 256 ; jot -b b 256 ; jot -b c 256) >infile 436 (jot -b b 256 ; jot -b c 256) >outfile 438 atf_check -o file:outfile tail -b +2 infile # start at the 2nd block 439 atf_check -o file:outfile tail -b -2 infile # 2 blocks from the end 440 atf_check -o file:outfile tail -b 2 infile # 2 blocks from the end 450 (jot -b a 256 ; jot -b b 256 ; jot -b c 256) >infile [all …]
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_ecdsa_rfc6979.txt | 387 Title = RFC 6979 P-256 deterministic ECDSA tests 389 PrivateKey=P-256_PRIV 395 PublicKey=P-256_PUB 401 PrivPubKeyPair=P-256_PRIV:P-256_PUB 404 Key = P-256_PRIV 410 Key = P-256_PUB 415 Key = P-256_PUB 421 Key = P-256_PRIV 427 Key = P-256_PUB 432 Key = P-256_PUB [all …]
|
| H A D | evppkey_ecdsa.txt | 19 # EC P-256 key 21 PrivateKey=P-256 30 PublicKey=P-256-PUBLIC 36 PrivPubKeyPair = P-256:P-256-PUBLIC 40 Verify = P-256-PUBLIC 46 Verify = P-256-PUBLIC 53 Verify = P-256-PUBLIC 60 Verify = P-256-PUBLIC 67 Verify = P-256-PUBLIC 75 Verify = P-256-PUBLIC [all …]
|
| H A D | evppkey_ecdsa_sigalg.txt | 19 # EC P-256 key 21 PrivateKey=P-256 30 PublicKey=P-256-PUBLIC 36 PrivPubKeyPair = P-256:P-256-PUBLIC 41 Verify = ECDSA-SHA1:P-256-PUBLIC 47 Verify = ECDSA-SHA1:P-256-PUBLIC 54 Verify = ECDSA-SHA1:P-256-PUBLIC 61 Verify = ECDSA-SHA1:P-256-PUBLIC 68 Verify = ECDSA-SHA1:P-256-PUBLIC 75 Verify = ECDSA-SHA1:P-256-PUBLIC [all …]
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/X86/ |
| H A D | X86LowerAMXIntrinsics.cpp | 50 return FVT->getNumElements() == 256 && in isV256I32Ty() 73 Value *Step, StringRef Name, IRBuilderBase &B, 77 IRBuilderBase &B, Value *Row, Value *Col, 86 createTileDPLoops(BasicBlock *Start, BasicBlock *End, IRBuilderBase &B, 106 IRBuilderBase &B, Loop *L) { in createLoop() argument 122 B.SetInsertPoint(Latch); in createLoop() 123 Value *Inc = B.CreateAdd(IV, Step, Name + ".step"); in createLoop() 124 Value *Cond = B.CreateICmpNE(Inc, Bound, Name + ".cond"); in createLoop() 149 BasicBlock *Start, BasicBlock *End, IRBuilderBase &B, Value *Row, in createTileLoadStoreLoops() argument 164 BasicBlock *RowBody = createLoop(Start, End, Row, B.getInt16(1), in createTileLoadStoreLoops() [all …]
|
| H A D | X86SchedSapphireRapids.td | 577 "^VMOVDQA(32|64)Z((256)?)rr((_REV)?)$", 579 "^VMOVDQU(8|16|32|64)Z((256)?)rr((_REV)?)$")>; 602 "^V(ADD|SUB)PSZ128rm((b|k|bk|kz)?)$", 611 "^V(ADD|SUB)PSZ(128|256)rr(k?)$", 613 "^VPSHUFBZ(128|256)rrk(z?)$", 614 "^VPSHUF(H|L)WZ(128|256)rik(z?)$", 615 "^VPUNPCK(H|L)(BW|WD)Z(128|256)rrk(z?)$")>; 625 "^VPOPCNT(B|D|Q|W)Z128rm$", 626 "^VPOPCNT(D|Q)Z128rm(b|k|kz)$", 633 … "^VPM(AX|IN)(S|U)QZ128rm((b|k|bk|kz)?)$", [all …]
|
| /freebsd/tests/sys/geom/class/eli/ |
| H A D | testvect.h | 6 …22\202:@\254\3218\016T\275\212^\005\344\202\230\220s\311\201\025\233~K6\241*b\244\203\273\355\270\… 7 …3374\247\016\343\246\353\300\373\267\335\314h\216\245$\373\210\214\014b\340\377\256\0202E", 100, "… 8 …1\376\277+\276L\337\270G\345!>29\010\204m\240!\326\255\326\321\272(\325T\033B\262[\267]\272", 100,… 9 …K\250\020\203sJ\234I,\271\012\230\204g\323\345\343\343\350\231\227\015\350b\256\012\367Q\255v\365\… 11 …B\245\317\366@V\036\227\273I\205\251\306GW\200*\340P\267\202#\354\330\266O\347\254(\203\270\366w\2… 13 …{ "\246<\216\226^F\004\036", 8, "\344].\210\212\236\252f\256n\006\250\2615\325\371", 200, "\213J\2… 14 …36znr;\337a'\025\335n\032f\304\177u\001n{\236`\261\346N\2748R\017\243\226[\256@<\021m\202r\363g", … 17 …256\300\364\212\271\306q\242?-\307\324\317y^\201t\272\371\331M;c\210\202\201\221\363\030", 200, "\… 18 …B", 8, "\357\274\204\366N9\273:\216\331,D\300t\320\361\324F\313\220E\250u\203\307\003\221\365X\303… 20 …325\327\256\342f", 8, "\227E\237\320\214GB\332\005\0333\250=\020c(\345\007?\032)\2643\243\202\371\… [all …]
|
| /freebsd/contrib/llvm-project/clang/lib/Headers/ |
| H A D | sha512intrin.h | 19 __min_vector_width__(256))) 34 /// A 256-bit vector of [4 x long long]. 38 /// A 256-bit vector of [4 x long long]. 61 /// dst[MAX:256] := 0 81 /// A 256-bit vector of [4 x long long]. 83 /// A 256-bit vector of [4 x long long]. 85 /// A 256-bit vector of [4 x long long]. 109 /// dst[MAX:256] := 0 117 /// state (C,D,G,H) from \a __A, an initial SHA512 state (A,B,E,F) from 120 /// of the third operand). The updated SHA512 state (A,B,E,F) is written to [all …]
|
| /freebsd/sbin/setkey/ |
| H A D | sample.cf | 36 # Host-A and Host-B. Encryption algorithm is aes-cbc whose key 42 # Host-A Host-B 45 # At Host-A and Host-B, 62 # Security protocol is old AH tunnel mode, i.e. RFC1826, with hmac-sha2-256 64 # That protocol takes place between Gateway-A and Gateway-B. 68 # Network-A Gateway-A Gateway-B Network-B 78 -A hmac-sha2-256 "this is the test" ; 81 -A hmac-sha2-256 "this is the test" ; 88 # At Gateway-B. Attention to the selector and peer's IP address for tunnel. 95 -A hmac-sha2-256 "this is the test" ; [all …]
|
| /freebsd/contrib/bearssl/src/ec/ |
| H A D | ec_p256_m64.c | 76 * Values may reach up to 2^256-1. Montgomery multiplication is used. 79 /* R = 2^256 mod p */ 85 /* Curve equation is y^2 = x^3 - 3*x + B. This constant is B*R mod p 86 (Montgomery representation of B). */ 96 f256_add(uint64_t *d, const uint64_t *a, const uint64_t *b) in f256_add() argument 105 w = (unsigned __int128)a[0] + b[0]; in f256_add() 107 w = (unsigned __int128)a[1] + b[1] + (w >> 64); in f256_add() 109 w = (unsigned __int128)a[2] + b[2] + (w >> 64); in f256_add() 111 w = (unsigned __int128)a[3] + b[3] + (w >> 64); in f256_add() 116 * Fold carry t, using: 2^256 = 2^224 - 2^192 - 2^96 + 1 mod p. in f256_add() [all …]
|
| /freebsd/tests/sys/cddl/zfs/bin/ |
| H A D | rename_dir.c | 39 * mkdir -p 1/2/3/4/5 a/b/c/d/e 52 char buf[256]; in main() 63 if (rename("a/b/c", "1/2/3/c") == 0) in main() 65 if (rename("1/2/3/c", "a/b/c") == 0) in main() 68 (void) strlcat(buf, "c_count: %d,", 256); in main() 69 (void) strlcat(buf, msg, 256); in main() 77 if (rename("1", "a/b/c/d/e/1") == 0) in main() 79 if (rename("a/b/c/d/e/1", "1") == 0) in main() 82 (void) strlcat(buf, "p_count: %d,", 256); in main() 83 (void) strlcat(buf, msg, 256); in main()
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/aes/ |
| H A D | aestab.h | 42 256 byte tables: 47 256 32-bit word OR 4 x 256 32-bit word tables: 103 #define d_1(t,n,b,e) EXTERN AES_ALIGN CONST XP_DIR t n[256] = b(e) argument 104 #define d_4(t,n,b,e,f,g,h) EXTERN AES_ALIGN CONST XP_DIR t n[4][256] = { b(e), b(f), b(g), b(h) } argument 107 #define d_1(t,n,b,e) EXTERN AES_ALIGN CONST XP_DIR t n[256] 108 #define d_4(t,n,b,e,f,g,h) EXTERN AES_ALIGN CONST XP_DIR t n[4][256]
|
| /freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
| H A D | aestab.h | 50 * 256 byte tables: 55 * 256 32-bit word OR 4 x 256 32-bit word tables: 94 #define d_1(t, n, b, e) static const t n[256] = b(e) argument 95 #define d_4(t, n, b, e, f, g, h) static const t n[4][256] = \ argument 96 {b(e), b(f), b(g), b(h)} 99 #define d_1(t, n, b, e) static const t n[256] 100 #define d_4(t, n, b, e, f, g, h) static const t n[4][256]
|
| /freebsd/sys/contrib/openzfs/module/zfs/ |
| H A D | vdev_raidz_math_scalar.c | 50 uint8_t b[ELEM_SIZE]; member 69 * - 1 failed disk: 256B (1 mul. coefficient) 70 * - 2 failed disks: 512B (2 mul. coefficients) 71 * - 3 failed disks: 1536B (6 mul. coefficients) 78 static uint8_t vdev_raidz_mul_lt[256][256] __attribute__((aligned(256))); 84 for (c = 0; c < 256; c++) in raidz_init_scalar() 85 for (i = 0; i < 256; i++) in raidz_init_scalar() 142 a.b[7] = mul_lt[a.b[7]]; \ 143 a.b[6] = mul_lt[a.b[6]]; \ 144 a.b[5] = mul_lt[a.b[5]]; \ [all …]
|