| /freebsd/sys/contrib/device-tree/Bindings/iio/frequency/ |
| H A D | adi,admfm2000.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 4 --- 6 $schema: http://devicetree.org/meta-schemas/core.yaml# 11 - Kim Seer Paller <kimseer.paller@analog.com> 16 It consists of a LNA, mixer, IF filter, DSA, and IF amplifier for each down 22 - adi,admfm2000 24 '#address-cells': 27 '#size-cells': 31 "^channel@[0-1]$": 44 adi,mixer-mode: [all …]
|
| /freebsd/crypto/libecc/src/examples/sig/dsa/ |
| H A D | dsa.h | 2 * Copyright (C) 2021 - This file is part of libecc project 8 * This software is licensed under a dual BSD and GPL v2 license. 15 * NOTE: although we only need libarith for DSA as we 24 /* We define hereafter the types and functions for DSA. 25 * The notations are taken from NIST FIPS 186-4 and should be 29 /* DSA public key, composed of: 30 * p the DSA prime modulus 31 * q the DSA prime order (prime divisor of (p-1)) 32 * g the DSA generator 42 /* DSA private key, composed of: [all …]
|
| H A D | dsa.c | 2 * Copyright (C) 2021 - This file is part of libecc project 8 * This software is licensed under a dual BSD and GPL v2 license. 11 #include "dsa.h" 24 * The purpose of this example is to implement the DSA 25 * related algorithms as per FIPS 186-4 based on libecc arithmetic 30 * not optimized for big numbers >= 1024 bits usually used for DSA. 35 * FIPS 186-4 rather than a production code. Use it at your own risk! 41 * of DSA (e.g. by protecting the private key and nonces using constant 45 * All-in-all, this piece of code can be useful in some contexts, or risky to 46 * use in other sensitive ones where advanced side-channels or fault attacks [all …]
|
| /freebsd/crypto/libecc/src/examples/sig/kcdsa/ |
| H A D | kcdsa.h | 2 * Copyright (C) 2021 - This file is part of libecc project 8 * This software is licensed under a dual BSD and GPL v2 license. 24 /* The DSA include file as we reuse DSA primitives internally */ 25 #include "../dsa/dsa.h" 32 * q the KCDSA prime order (prime divisor of (p-1)) 36 * NOTE: the KCDSA (Schnorr DSA) public key is mapped to a DSA public key 43 * q the KCDSA prime order (prime divisor of (p-1)) 47 * NOTE: the KCDSA (Schnorr DSA) private key is mapped to a DSA private key
|
| /freebsd/crypto/libecc/src/examples/sig/sdsa/ |
| H A D | sdsa.h | 2 * Copyright (C) 2021 - This file is part of libecc project 8 * This software is licensed under a dual BSD and GPL v2 license. 24 /* The DSA include file as we reuse DSA primitives internally */ 25 #include "../dsa/dsa.h" 32 * q the SDSA prime order (prime divisor of (p-1)) 36 * NOTE: the SDSA (Schnorr DSA) public key is mapped to a DSA public key 43 * q the SDSA prime order (prime divisor of (p-1)) 47 * NOTE: the SDSA (Schnorr DSA) private key is mapped to a DSA private key
|
| H A D | sdsa.c | 2 * Copyright (C) 2021 - This file is part of libecc project 8 * This software is licensed under a dual BSD and GPL v2 license. 25 * scheme (aka SDSA for Schnorr DSA) based on libecc arithmetic primitives. 27 * one corresponding to SDSA as described in the ISO14888-3 standard. 42 * of Schnorr DSA (e.g. by protecting the private key and nonces using constant 46 * All-in-all, this piece of code can be useful in some contexts, or risky to 47 * use in other sensitive ones where advanced side-channels or fault attacks 52 /* NOTE: since SDSA is very similar to DSA, we reuse some of our DSA 54 * have the exact same type as DSA keys. 122 p = &(priv->p); in sdsa_sign() [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/net/ |
| H A D | hisilicon-hns-dsaf.txt | 1 Hisilicon DSA Fabric device controller 4 - compatible: should be "hisilicon,hns-dsaf-v1" or "hisilicon,hns-dsaf-v2". 5 "hisilicon,hns-dsaf-v1" is for hip05. 6 "hisilicon,hns-dsaf-v2" is for Hi1610 and Hi1612. 7 - mode: dsa fabric mode string. only support one of dsaf modes like these: 8 "2port-64vf", 9 "6port-16rss", 10 "6port-16vf", 11 "single-port". 12 - interrupts: should contain the DSA Fabric and rcb interrupt. [all …]
|
| /freebsd/crypto/libecc/src/examples/sig/gostr34_10_94/ |
| H A D | gostr34_10_94.h | 2 * Copyright (C) 2021 - This file is part of libecc project 8 * This software is licensed under a dual BSD and GPL v2 license. 24 /* The DSA include file as we reuse DSA primitives internally */ 25 #include "../dsa/dsa.h" 32 * q the GOSTR34_10_94 prime order (prime divisor of (p-1)) 36 * NOTE: the GOST public key is mapped to a DSA public key 43 * q the GOSTR34_10_94 prime order (prime divisor of (p-1)) 47 * NOTE: the GOST private key is mapped to a DSA private key
|
| /freebsd/crypto/openssl/test/recipes/15-test_dsaparam_data/invalid/ |
| H A D | p2048_q256_bad_q.pem | 1 -----BEGIN DSA PARAMETERS----- 8 H57M3PwkTsq+v2/dAoIBADKkGYUe9qsp4mqxkBKaEdpcjmjfLrvtE+3ikipPPGHh 14 -----END DSA PARAMETERS-----
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-pkcs8.1 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OPENSSL-PKCS8 1ossl" 58 .TH OPENSSL-PKCS8 1ossl 2025-09-30 3.5.4 OpenSSL 64 openssl\-pkcs8 \- PKCS#8 format private key conversion command 68 [\fB\-help\fR] 69 [\fB\-topk8\fR] 70 [\fB\-inform\fR \fBDER\fR|\fBPEM\fR] 71 [\fB\-outform\fR \fBDER\fR|\fBPEM\fR] 72 [\fB\-in\fR \fIfilename\fR] 73 [\fB\-passin\fR \fIarg\fR] [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-pkcs8.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-pkcs8 - PKCS#8 format private key conversion command 11 [B<-help>] 12 [B<-topk8>] 13 [B<-inform> B<DER>|B<PEM>] 14 [B<-outform> B<DER>|B<PEM>] 15 [B<-in> I<filename>] 16 [B<-passin> I<arg>] 17 [B<-out> I<filename>] 18 [B<-passout> I<arg>] [all …]
|
| /freebsd/crypto/libecc/.github/workflows/ |
| H A D | libecc_examples.yml | 8 runs-on: ubuntu-22.04 10 #max-parallel: 10 17 - name: checkout repository 18 uses: actions/checkout@v2 21 - name: libecc examples tests 32 sudo apt-get update; 33 sudo apt-get -y install libomp-dev; 36 …-DUSER_NN_BIT_LEN=4096" make && cd src/examples/ && EXTRA_CFLAGS="-DUSER_NN_BIT_LEN=4096" make && … 37 …/sss/sss && ./basic/curve_basic_examples && ./basic/curve_ecdh && make clean && cd - && make clean; 38 …/sss/sss && ./basic/curve_basic_examples && ./basic/curve_ecdh && make clean && cd - && make clean; [all …]
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/Frontend/OpenMP/ |
| H A D | ConstructCompositionT.h | 1 //===- ConstructCompositionT.h -- Composing compound constructs -----------===// 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 14 //===----------------------------------------------------------------------===// 47 // clauses are added to it. This is to avoid non-deterministic output. 67 // 1. "if": the "directive-name-modifier" on the merged clause may need 78 // clause id -> set of leaf constructs that contain it 80 // clause id -> set of instances of that clause 93 // Step 2: identify composite sub-construct, and merge the constituent leafs. in ConstructCompositionT() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | PEM_read_bio_PrivateKey.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH PEM_READ_BIO_PRIVATEKEY 3ossl 2025-09-30 3.5.4 OpenSSL 95 PEM_write_bio_PKCS7, PEM_write_PKCS7 \- PEM routines 236 \& DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **x, 238 \& DSA *PEM_read_DSAPrivateKey(FILE *fp, DSA **x, 240 \& int PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc, 243 \& int PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc, 247 \& DSA *PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x, 249 \& DSA *PEM_read_DSA_PUBKEY(FILE *fp, DSA **x, 251 \& int PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x); [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 90-test_store.t | 2 # Copyright 2016-2023 The OpenSSL Project Authors. All Rights Reserved. 23 my $use_dsa = !disabled("dsa"); 54 "rsa-key-pkcs1.pem", "rsa-key-pkcs1.der", 55 "rsa-key-pkcs1-aes128.pem", 56 "rsa-key-pkcs8.pem", "rsa-key-pkcs8.der", 57 "rsa-key-pkcs8-pbes2-sha1.pem", "rsa-key-pkcs8-pbes2-sha1.der", 58 "rsa-key-pkcs8-pbes2-sha256.pem", "rsa-key-pkcs8-pbes2-sha256.der", 61 "rsa-key-pkcs8-pbes1-sha1-3des.pem", "rsa-key-pkcs8-pbes1-sha1-3des.der", 64 "rsa-key-sha1-3des-sha1.p12", "rsa-key-sha1-3des-sha256.p12", 65 "rsa-key-aes256-cbc-sha256.p12", [all …]
|
| /freebsd/crypto/openssl/providers/implementations/encode_decode/ |
| H A D | ml_common_codecs.h | 18 /*- 19 * The DER ASN.1 encoding of ML-DSA and ML-KEM public keys prepends 22 bytes 22 * - 4 byte outer sequence tag and length 23 * - 2 byte algorithm sequence tag and length 24 * - 2 byte algorithm OID tag and length 25 * - 9 byte algorithm OID (from NIST CSOR OID arc) 26 * - 4 byte bit string tag and length 27 * - 1 bitstring lead byte 34 /*- 38 * ML-DSA-PrivateKey ::= CHOICE { [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | PEM_read_bio_PrivateKey.pod | 36 PEM_write_bio_PKCS7, PEM_write_PKCS7 - PEM routines 175 DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **x, 177 DSA *PEM_read_DSAPrivateKey(FILE *fp, DSA **x, 179 int PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc, 182 int PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc, 186 DSA *PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x, 188 DSA *PEM_read_DSA_PUBKEY(FILE *fp, DSA **x, 190 int PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x); 191 int PEM_write_DSA_PUBKEY(FILE *fp, DSA *x); 192 DSA *PEM_read_bio_DSAparams(BIO *bp, DSA **x, pem_password_cb *cb, void *u); [all …]
|
| /freebsd/contrib/file/tests/ |
| H A D | Makefile.am | 3 test_CPPFLAGS = -I$(top_builddir)/src 6 android-vdex-1.result \ 7 android-vdex-1.testfile \ 8 android-vdex-2.result \ 9 android-vdex-2.testfile \ 26 CVE-2014-1943.result \ 27 CVE-2014-1943.testfile \ 28 dsd64-dff.result \ 29 dsd64-dff.testfile \ 30 dsd64-dsf.result \ [all …]
|
| /freebsd/crypto/openssl/crypto/objects/ |
| H A D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi… [all …]
|
| /freebsd/crypto/heimdal/lib/asn1/ |
| H A D | rfc2459.asn1 | 1 -- $Id$ -- 2 -- Definitions from rfc2459/rfc3280 14 id-pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) 16 id-pkcs1-rsaEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 1 } 17 id-pkcs1-md2WithRSAEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 2 } 18 id-pkcs1-md5WithRSAEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 4 } 19 id-pkcs1-sha1WithRSAEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 5 } 20 id-pkcs1-sha256WithRSAEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 11 } 21 id-pkcs1-sha384WithRSAEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 12 } 22 id-pkcs1-sha512WithRSAEncryption OBJECT IDENTIFIER ::= { id-pkcs-1 13 } [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | x509.h.in | 2 * {- join("\n * ", @autowarntext) -} 4 * Copyright 1995-2024 The OpenSSL Project Authors. All Rights Reserved. 13 {- 15 -} 38 # include <openssl/dsa.h> 53 {- 58 -} 70 /*- 71 * <https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3>: 72 * The KeyUsage BITSTRING is treated as a little-endian integer, hence bit `0` [all …]
|
| H A D | obj_mac.h | 5 * Copyright 2000-2025 The OpenSSL Project Authors. All Rights Reserved. 21 #define SN_itu_t "ITU-T" 22 #define LN_itu_t "itu-t" 34 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T" 35 #define LN_joint_iso_itu_t "joint-iso-itu-t" 42 #define SN_member_body "member-body" 47 #define SN_identified_organization "identified-organization" 56 #define SN_hmac_md5 "HMAC-MD5" 57 #define LN_hmac_md5 "hmac-md5" 61 #define SN_hmac_sha1 "HMAC-SHA1" [all …]
|
| H A D | x509.h | 5 * Copyright 1995-2024 The OpenSSL Project Authors. All Rights Reserved. 37 # include <openssl/dsa.h> 168 /*- 169 * <https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3>: 170 * The KeyUsage BITSTRING is treated as a little-endian integer, hence bit `0` 428 * spki structures - useful if you are writing a CA web page 447 /*- Unused (and iv length is wrong) 461 /* Password based encryption V2 structures */ 595 OSSL_DEPRECATEDIN_3_0 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); 596 OSSL_DEPRECATEDIN_3_0 int i2d_DSA_PUBKEY_fp(FILE *fp, const DSA *dsa); [all …]
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | x509.h | 2 * Copyright 2015-2025 The OpenSSL Project Authors. All Rights Reserved. 168 ASN1_BIT_STRING *issuerUID; /* [ 1 ] optional in v2 */ 169 ASN1_BIT_STRING *subjectUID; /* [ 2 ] optional in v2 */ 220 /* chain of X509s - untrusted - passed in */ 257 /* chain of X509s - built up and trusted */ 345 DSA *ossl_d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, long length);
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Scalar/ |
| H A D | TailRecursionElimination.h | 1 //===---- TailRecursionElimination.h ----------------------------*- C++ -*-===// 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 23 // run-time constant on all exits from the function. It is possible, though 36 // in the entry block requires analysis to proves that the tail-called 44 // requires some substantial analysis (such as with DSA) to prove safe to 50 //===----------------------------------------------------------------------===//
|