/freebsd/crypto/openssl/providers/ |
H A D | encoders.inc | 2 * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. 14 #define ENCODER_STRUCTURE_type_specific_keypair "type-specific" 15 #define ENCODER_STRUCTURE_type_specific_params "type-specific" 16 #define ENCODER_STRUCTURE_type_specific "type-specific" 17 #define ENCODER_STRUCTURE_type_specific_no_pub "type-specific" 23 #define ENCODER_STRUCTURE_DSA "dsa" 50 ENCODER_TEXT("RSA-PSS", rsapss, yes), 56 ENCODER_TEXT("DSA", dsa, yes), 70 * Entries for key type specific output formats. The structure name on these 78 * OSSL_ENCODER_CTX_new_for_pkey(pkey, selection, "DER", "type-specific", [all …]
|
H A D | decoders.inc | 2 * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. 14 #define DECODER_STRUCTURE_type_specific_keypair "type-specific" 15 #define DECODER_STRUCTURE_type_specific_params "type-specific" 16 #define DECODER_STRUCTURE_type_specific "type-specific" 17 #define DECODER_STRUCTURE_type_specific_no_pub "type-specific" 23 #define DECODER_STRUCTURE_DSA "dsa" 49 DECODER_w_structure("DSA", der, PrivateKeyInfo, dsa, yes), 50 DECODER_w_structure("DSA", der, SubjectPublicKeyInfo, dsa, yes), 51 DECODER_w_structure("DSA", der, type_specific, dsa, yes), 52 DECODER_w_structure("DSA", der, DSA, dsa, yes), [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | DSA_meth_new.pod | 13 DSA_meth_set_keygen - Routines to build up DSA methods 17 #include <openssl/dsa.h> 39 int, DSA *); 41 int, DSA *)); 43 int (*DSA_meth_get_sign_setup(const DSA_METHOD *dsam))(DSA *, BN_CTX *,$ 45 int DSA_meth_set_sign_setup(DSA_METHOD *dsam, int (*sign_setup)(DSA *, BN_CTX *, 49 int, DSA_SIG *, DSA *); 51 int, DSA_SIG *, DSA *)); 53 int (*DSA_meth_get_mod_exp(const DSA_METHOD *dsam))(DSA *dsa, BIGNUM *rr, BIGNUM *a1, 57 int DSA_meth_set_mod_exp(DSA_METHOD *dsam, int (*mod_exp)(DSA *dsa, BIGNUM *rr, [all …]
|
H A D | BIO_get_ex_new_index.pod | 26 - application-specific data 56 int DSA_set_ex_data(DSA *type, int idx, void *arg); 57 void *DSA_get_ex_data(DSA *type, int idx); 78 All functions with a I<TYPE> of B<DH>, B<DSA>, B<RSA> and B<EC_KEY> are deprecated. 85 These functions handle application-specific data for OpenSSL data 107 TYPE_get_ex_new_index() returns a new index on success or -1 on error. 128 Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
|
H A D | SSL_CTX_set_security_level.pod | 5 …_security_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security fra… 58 application specific value. 77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits 86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys 93 Security level set to 128 bits of security. As a result RSA, DSA and DH keys 101 Security level set to 192 bits of security. As a result RSA, DSA and 108 Security level set to 256 bits of security. As a result RSA, DSA and DH keys 120 setting B<-DOPENSSL_TLS_SECURITY_LEVEL=level>. If not set then 1 is used. 138 See SP800-57 for how the security limits are related to individual 141 Some security levels require large key sizes for non-ECC public key [all …]
|
H A D | EVP_PKEY_check.pod | 8 - key and parameter validation functions 52 within SP800-56A and SP800-56B. For backwards compatibility reasons the OpenSSL 54 For further information see L<EVP_PKEY-DSA(7)/DSA key validation>, 55 L<EVP_PKEY-DH(7)/DH key validation>, L<EVP_PKEY-EC(7)/EC key validation> and 56 L<EVP_PKEY-RSA(7)/RSA key validation>. 58 Refer to SP800-5 [all...] |
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | DSA_meth_new.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
H A D | EVP_PKEY_CTX_ctrl.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/net/dsa/ |
H A D | dsa-port.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/net/dsa/dsa-port.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Generic DSA Switch Port 10 - Andrew Lunn <andrew@lunn.ch> 11 - Florian Fainelli <f.fainelli@gmail.com> 12 - Vladimir Oltean <olteanv@gmail.com> 15 A DSA switch port is a component of a switch that manages one MAC, and can 17 DSA-specific functionality. [all …]
|
H A D | ocelot.txt | 5 ----- 9 - VSC9959 (Felix) 10 - VSC9953 (Seville) 13 larger ENETC root complex. As a result, the ethernet-switch node is a sub-node 25 For the external switch ports, depending on board configuration, "phy-mode" and 26 "phy-handle" are populated by board specific device tree instances. Ports 4 and 32 By default, in fsl-ls1028a.dtsi, the NPI port is assigned to the internal 33 2.5Gbps port@4, but can be moved to the 1Gbps port@5, depending on the specific 36 operate as an entire slave DSA chip. NPI functionality (and therefore DSA 39 Any port can be disabled (and in fsl-ls1028a.dtsi, they are indeed all disabled [all …]
|
H A D | marvell.txt | 1 Marvell DSA Switch Device Tree Bindings 2 --------- [all...] |
/freebsd/crypto/openssl/providers/implementations/encode_decode/ |
H A D | decode_der2key.c | 2 * Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved. 29 #include "crypto/dsa.h" 54 * The EVP_PKEY_xxx type macro. Should be zero for type specific 55 * structures, non-zero when the outermost structure is PKCS#8 or 64 /* For type specific decoders, we use the corresponding d2i */ 65 d2i_of_void *d2i_private_key; /* From type-specific DER */ 66 d2i_of_void *d2i_public_key; /* From type-specific DER */ 67 d2i_of_void *d2i_key_params; /* From type-specific DER */ 79 * For any key, we may need to make provider specific adjustments, such 111 && (OBJ_obj2nid(alg->algorithm) == ctx->desc->evp_type in der2key_decode_p8() [all …]
|
H A D | encode_key2any.c | 2 * Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved. 26 #include <openssl/dsa.h> 46 /* Set to 0 if parameters should not be saved (dsa only) */ 109 OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); in p8info_to_encp8() 111 if (ctx->cipher == NULL) in p8info_to_encp8() 115 &ctx->pwdata)) { in p8info_to_encp8() 119 /* First argument == -1 means "standard" */ in p8info_to_encp8() 120 p8 = PKCS8_encrypt_ex(-1, ctx->cipher, kstr, klen, NULL, 0, 0, p8info, libctx, NULL); in p8info_to_encp8() 197 if (!ctx->cipher_intent) in key_to_epki_der_priv_bio() 200 if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, in key_to_epki_der_priv_bio() [all …]
|
H A D | decode_pem2der.c | 2 * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. 62 ctx->provctx = provctx; in pem2der_newctx() 85 || pass_data->cb == NULL in pem2der_pass_helper() 86 || !pass_data->cb(buf, num, &plen, NULL, pass_data->cbarg)) in pem2der_pass_helper() 87 return -1; in pem2der_pass_helper() 114 /* Our set of type specific PEM types */ in pem2der_decode() 115 { PEM_STRING_DHPARAMS, OSSL_OBJECT_PKEY, "DH", "type-specific" }, in pem2der_decode() 116 { PEM_STRING_DHXPARAMS, OSSL_OBJECT_PKEY, "X9.42 DH", "type-specific" }, in pem2der_decode() 117 { PEM_STRING_DSA, OSSL_OBJECT_PKEY, "DSA", "type-specific" }, in pem2der_decode() 118 { PEM_STRING_DSA_PUBLIC, OSSL_OBJECT_PKEY, "DSA", "type-specific" }, in pem2der_decode() [all …]
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Frontend/OpenMP/ |
H A D | ConstructCompositionT.h | 1 //===- ConstructCompositionT.h -- Composing compound constructs -----------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 14 //===----------------------------------------------------------------------===// 47 // clauses are added to it. This is to avoid non-deterministic output. 57 ClauseTy makeClause(llvm::omp::Clause clauseId, S &&specific) { in makeClause() 58 return typename ClauseTy::BaseT{clauseId, std::move(specific)}; in makeClause() 67 // 1. "if": the "directive-name-modifier" on the merged clause may need 78 // clause id -> set of leaf constructs that contain it 80 // clause id -> set of instances of that clause [all …]
|
/freebsd/sys/dev/qat/qat_api/include/lac/ |
H A D | cpa_cy_dsa.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 13 * @defgroup cpaCyDsa Digital Signature Algorithm (DSA) API 19 * (Cryptography) Digital Signature Algorithm (DSA) operations. 21 * Support is provided for FIPS PUB 186-2 with Change Notice 1 22 * specification, and optionally for FIPS PUB 186-3. If an 23 * implementation does not support FIPS PUB 186-3, then the 27 * Support for FIPS PUB 186-2 with Change Notice 1 implies supporting 29 * - L = 1024, N = 160 31 * Support for FIPS PUB 186-3 implies supporting the following choices [all …]
|
/freebsd/crypto/openssl/crypto/engine/ |
H A D | README.md | 1 Notes on engines of 2001-09-24 9 lynched for sticking all this in CHANGES.md or the commit mails :-). 37 selection, eg. in SSL/TLS, or by user-controllable configuration. 49 into ENGINE is storage - the OBJ_NAME-based storage used by EVP to register 50 ciphers simultaneously registers cipher *types* and cipher *implementations* - 53 solution is necessarily that ENGINE-provided ciphers simply are not registered, 56 for cleanup, modularity, and DSO support - yet EVP_CIPHERs, as exposed to 60 Already there is a problem with the way ENGINE supports RSA, DSA, etc whereby 64 linker hassles if nothing else - linking a 1-line application that calls 2 basic 66 ENGINE code being linked in *and* because of that DSA, DH, and RAND also. If we [all …]
|
/freebsd/crypto/openssl/crypto/bn/asm/ |
H A D | via-mont.pl | 2 # Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved. 17 # Wrapper around 'rep montmul', VIA-specific instruction accessing 18 # PadLock Montgomery Multiplier. The wrapper is designed as drop-in 21 # Below are interleaved outputs from 'openssl speed rsa dsa' for 4 23 # Lines marked with "software integer" denote performance of hand- 24 # coded integer-only assembler found in OpenSSL 0.9.7. "Software SSE2" 25 # refers to hand-coded SSE2 Montgomery multiplication procedure found 52 # dsa 512 bits 0.001342s 0.001651s 745.2 605.7 software integer 53 # dsa 512 bits 0.000844s 0.000987s 1185.3 1013.1 software SSE2 54 # dsa 512 bits 0.001902s 0.002247s 525.6 444.9 hardware VIA SDK [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-dsa.c | 15 * or promote products derived from this software without specific prior 26 #include "netdissect-stdinc.h" 34 * Format of (Ethertyped or not) DSA tagged frames: 38 * 0 +---+---+---+---+---+---+---+---+ 40 * +6 +---+---+---+---+---+---+---+---+ 42 * +6 +---+---+---+---+---+---+---+---+ +- 43 * | Prog. DSA Ether Type [15:8] | | (8-byte) EDSA Tag 44 * +1 +---+---+---+---+---+---+---+---+ | Contains a programmable Ether type, 45 * | Prog. DSA Ether Type [7:0] | | two reserved bytes (always 0), 46 * +1 +---+---+---+---+---+---+---+---+ | and a standard DSA tag. [all …]
|
H A D | print-realtek.c | 2 * Copyright (c) 2007 - Andrey "nording" Chernyak <andrew@nording.ru> 14 * or promote products derived from this software without specific prior 30 #include "netdissect-stdinc.h" 36 #define RTL_PROTOCOL_OFFSET 0 /* Protocol and possibly other data - 1 byte */ 42 #define RTL_PROTOCOL_XXX_DSA 0x04 /* DSA protocol for some chip(s) */ 52 * for the RTL8306 DSA protocol tag format. 54 #define RTL_PROTOCOL_8306_DSA 0x90 /* RTL8306 DSA protocol */ 55 #define RTL_PROTOCOL_8366RB_DSA 0xA0 /* RTL8366RB DSA protocol */ 57 #define RRCP_OPCODE_ISREPLY_OFFSET 1 /* opcode and isreply flag - 1 byte */ 66 #define RRCP_AUTHKEY_OFFSET 2 /* authorization key - 2 bytes, 0x2379 by default */ [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | endecode_test.c | 2 * Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved. 79 * Use 512-bit DH(X) keys with predetermined parameters for efficiency, in make_template() 190 || strcmp(output_structure, "type-specific") != 0) in test_encode_decode() 265 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_prov() 266 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_prov() 270 mem_buf->data = NULL; in encode_EVP_PKEY_prov() 271 mem_buf->length = 0; in encode_EVP_PKEY_prov() 380 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_legacy_PEM() 381 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_legacy_PEM() 385 mem_buf->data = NULL; in encode_EVP_PKEY_legacy_PEM() [all …]
|
/freebsd/share/doc/papers/diskperf/ |
H A D | equip.ms | 14 .\" without specific prior written permission. 53 ``DSA'' 55 An important aspect of DSA is migrating a large part 74 The UDA50 is a UNIBUS implementation of a DSA controller. 76 the effects of a slow UNIBUS such as the one on the VAX-11/780. 97 The controller ws first implemented for the VAX-11/750 as the SC750 109 The controller is contained in its own rack-mounted drawer with an integral 118 The RA81 is a rack-mountable 456 Megabyte (formatted) Winchester 121 of the DEC \fBDSA\fR scheme. 123 protocol with the controller over a pair of mini-coaxial cables.
|
/freebsd/crypto/openssl/apps/ |
H A D | dsa.c | 2 * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. 20 #include <openssl/dsa.h> 47 {"help", OPT_HELP, '-', "Display this summary"}, 48 {"", OPT_CIPHER, '-', "Any supported cipher"}, 50 {"pvk-strong", OPT_PVK_STRONG, '-', "Enable 'Strong' PVK encoding level (default)"}, 51 {"pvk-weak", OPT_PVK_WEAK, '-', "Enable 'Weak' PVK encoding level"}, 52 {"pvk-none", OPT_PVK_NONE, '-', "Don't enforce PVK encoding"}, 61 {"pubin", OPT_PUBIN, '-', "Expect a public key in input file"}, 67 {"noout", OPT_NOOUT, '-', "Don't print key out"}, 68 {"text", OPT_TEXT, '-', "Print the key in text"}, [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-format-options.pod | 5 openssl-format-options - OpenSSL command input and output format options 39 =item B<-inform> I<format>, B<-outform> I<format> 43 =item B<-keyform> I<format> 47 =item B<-CRLform> I<format> 71 An engine must be configured or specified using the B<-engine> option. 72 A password or PIN may be supplied to the engine using the B<-passin> option. 76 A DER-encoded file containing a PKCS#12 object. 83 a block of base-64 encoding (defined in IETF RFC 4648), with specific 87 ----- BEGIN object-type ----- 91 ----- END object-type ----- [all …]
|
/freebsd/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 2 * Copyright 2005-2021 The OpenSSL Project Authors. All Rights Reserved. 16 * RSA and DSA low level APIs are deprecated for public use, but still ok for 24 #include <openssl/dsa.h> 63 * Create an EVP_PKEY from a type specific key. 121 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */ 150 * |*pisdss| is the indicator for whether the key is a DSA key or not. 156 * -1 No expectations, this function will assign 0 or 1 depending on 219 return -1; in ossl_do_blob_header() 243 return -1; in ossl_do_blob_header() 293 length -= 16; in do_b2i_key() [all …]
|