Home
last modified time | relevance | path

Searched full:md5 (Results 1 – 25 of 911) sorted by relevance

12345678910>>...37

/freebsd/sbin/md5/
H A DMakefile2 PROG= md5
4 LINKS= ${BINDIR}/md5 ${BINDIR}/md5sum \
5 ${BINDIR}/md5 ${BINDIR}/rmd160 \
6 ${BINDIR}/md5 ${BINDIR}/rmd160sum \
7 ${BINDIR}/md5 ${BINDIR}/sha1 \
8 ${BINDIR}/md5 ${BINDIR}/sha1sum \
9 ${BINDIR}/md5 ${BINDIR}/sha224 \
10 ${BINDIR}/md5 ${BINDIR}/sha224sum \
11 ${BINDIR}/md5 ${BINDIR}/sha256 \
12 ${BINDIR}/md5 ${BINDIR}/sha256sum \
[all …]
H A Dmd5.15 .Nm md5 , sha1 , sha224 , sha256 , sha384 ,
57 .Nm md5 , sha1 , sha224 , sha256 , sha384 , sha512 , sha512t224 , sha512t256 ,
99 The MD5 and SHA-1 algorithms have been proven to be vulnerable to practical
282 .Nm md5 , sha1 , sha224 , sha256 , sha384 , sha512 ,
303 Calculate the MD5 checksum of the string
306 $ md5 -s Hello
307 MD5 ("Hello") = 8b1a9953c4611296a827abf8c47804d7
313 $ echo -n Hello | md5
319 $ md5 -r /boot/loader.conf /etc/rc.conf
349 $ md5 /boot/loader.conf > digest && md5 -c $(cut -f2 -d= digest) /boot/loader.conf
[all …]
/freebsd/contrib/ntp/sntp/tests/
H A Dcrypto.c37 struct key md5; test_MakeMd5Mac() local
127 struct key md5; test_VerifyCorrectMD5() local
235 struct key md5; test_VerifyFailure() local
254 struct key md5; test_PacketSizeNotMultipleOfFourBytes() local
/freebsd/contrib/netbsd-tests/sbin/resize_ffs/
H A Dtestdata.md51 MD5 (1024) = eadce85bc513cc7b9b46c027ce07ccdb
2 MD5 (1025) = 3cf2a95b3af7377ca81ff08265534334
3 MD5 (131072) = 3bf5f82ad5e1f8878caa699548cc0955
4 MD5 (131073) = 3423d2f10e3abb20e1ceae4b055f5071
5 MD5 (16384) = 933f03c66d4e2da32089ed994c9b34bd
6 MD5 (16385) = d0b296920f44ef298880a2d963066026
7 MD5 (2048) = fb03fb8916dd57f9648f89a06bb46f06
8 MD5 (2049) = f2e489640fc3af5f09352d27717d832e
9 MD5 (32768) = d940d6ccf83aeb00e71b9bbeaf860962
10 MD5 (32769) = 760e060cefd844c082a10b3bef1408f7
[all …]
/freebsd/crypto/openssl/crypto/rc4/asm/
H A Drc4-md5-x86_64.pl19 # This is RC4+MD5 "stitch" implementation. The idea, as spelled in
26 # and Jim Guilford of Intel. MD5 is fresh implementation aiming to
28 # weaved into it, one RC4 round per one MD5 round. In addition to the
34 # RC4 MD5 RC4+MD5 stitch gain
50 my ($rc4,$md5)=(1,1); # what to generate?
51 my $D="#" if (!$md5); # if set to "#", MD5 is stitched into RC4(),
74 if ($rc4 && !$md5) {
77 } elsif ($md5 && !$rc4) {
88 # const void *inp, # MD5 input
112 my @V=("%r8d","%r9d","%r10d","%r11d"); # MD5 registers
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpmd_md.txt83 Title = MD5 tests
85 Digest = MD5
89 Digest = MD5
93 Digest = MD5
97 Digest = MD5
101 Digest = MD5
105 Digest = MD5
109 Digest = MD5
113 Title = MD5-SHA1
115 Digest = MD5-SHA1
[all …]
/freebsd/crypto/openssl/crypto/md5/
H A Dbuild.info5 $MD5ASM_x86=md5-586.S
6 $MD5ASM_x86_64=md5-x86_64.s
7 $MD5ASM_sparcv9=md5-sparcv9.S
21 # without conditioning this on dso. The issue is MD5 which is needed in the
35 GENERATE[md5-586.S]=asm/md5-586.pl
37 GENERATE[md5-x86_64.s]=asm/md5-x86_64.pl
39 GENERATE[md5-sparcv9.S]=asm/md5-sparcv9.pl
40 INCLUDE[md5-sparcv9.o]=..
/freebsd/contrib/ntp/html/
H A Dauthentic.html51 RSA Message Digest 5 (MD5) algorithm commonly called keyed-MD5.
54 server. The MD5 message digest algorithm is included in the
115 such as MD5, SHA, or AES-128 CMAC. When authentication is specified,
146 permitted key type is MD5.</p>
156 1 MD5 L";Nw&lt;`.I&lt;f4U0)247"i # MD5 key
157 2 MD5 &amp;&gt;l0%XXK9O'51VwV&lt;xq~ # MD5 key
158 3 MD5 lb4zLW~d^!K:]RsD'qb6 # MD5 key
159 4 MD5 Yue:tL[+vR)M`n~bY,'? # MD5 key
160 5 MD5 B;fxlKgr/&amp;4ZTbL6=RxA # MD5 key
161 6 MD5 4eYwa`o}3i@@V@..R9!l # MD5 key
[all …]
H A Dkeygen.html31 …<p id="intro"><tt>ntp-keygen [ -deGHIMPT ] [ -b <i>modulus</i> ] [ -c [ RSA-MD2 | RSA-MD5 | RSA-SHA
47 containing ten pseudo-random printable ASCII strings suitable for the MD5
98 default RSA host key and matching RSA-MD5 certificate with expiration
115 default, the signature message digest type is MD5, but any combination
137 …<dt><tt>-c [ RSA-MD2 | RSA-MD5 | RSA-SHA | RSA-SHA1 | RSA-MDC2 | RSA-RIPEMD160 | DSA-SHA | DSA-SHA…
141 option is <tt>RSA-MD5</tt>. If compatibility with FIPS 140-2 is
185 <dd>Generate a new keys file containing 10 MD5 keys and 10 SHA keys.
186 An MD5 key is a string of 20 random printable ASCII characters,
292 1 MD5 L";Nw&lt;`.I&lt;f4U0)247"i # MD5 key
293 2 MD5 &amp;&gt;l0%XXK9O'51VwV&lt;xq~ # MD5 key
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt52 EAP-MD5 + - - + + + + + - - + +
60 EAP-PEAPv0/MD5 + - - + + + + + - - + -
71 EAP-PEAPv1/MD5 - - - + + +1 + +5 - - + -
83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
106 EAP-FAST/MD5(aprov) - - - - - + - - - - + -
111 EAP-FAST/MD5(auth) - - - - - + - - - - + -
142 - EAP-MD5-Challenge
148 - EAP-PEAPv0 / MD5-Challenge
150 - EAP-TTLS / EAP-MD5-Challenge
166 - EAP-MD5
[all …]
/freebsd/contrib/ntp/util/
H A Dntp-keygen.texi72 MD5 message digest algorithm included in the distribution.
135 default RSA host key and matching RSA-MD5 certificate with expiration
157 message digest type is MD5, but any combination of sign key type and
243 1 MD5 "]!ghT%O;3)WJ,/Nc:>I # MD5 key
244 2 MD5 lu+H^tF46BKR-6~p{V_5 # MD5 key
245 3 MD5 :lnoVsE%Y}z*avh%EtNC # MD5 key
246 4 MD5 |fdZrf0sF~@PHZ;w-i^V # MD5 key
247 5 MD5 IyAG>O"}y"LmCRS!*bHC # MD5 key
248 6 MD5 ">e\A@>hT/661ri52,,H # MD5 key
249 7 MD5 c9x=M'CfLxax9v)PV-si # MD5 key
[all …]
H A Dntp-keygen.mdoc.in41 suitable for the MD5 message digest algorithm included in the
151 .Cm RSA\-MD5
171 .Cm MD5 ,
175 .Cm AES128CMAC , MD2 , MD5 , MDC2 , SHA , SHA1
315 .Cm MD5 ,
370 .Cm MD5
484 .Pa ntpkey Ns _ Cm RSA\-MD5 _ Pa cert_alice. Ar filestamp ,
634 .Cm RSA\-MD2 , RSA\-MD5 , RSA\-MDC2 , RSA\-SHA , RSA\-SHA1 , RSA\-RIPEMD160 , DSA\-SHA ,
647 .Cm RSA\-MD5 .
734 .Cm MD5
[all...]
H A Dntp-keygen.1ntp-keygenmdoc41 suitable for the MD5 message digest algorithm included in the
151 .Cm RSA\-MD5
171 .Cm MD5 ,
175 .Cm AES128CMAC , MD2 , MD5 , MDC2 , SHA , SHA1
315 .Cm MD5 ,
370 .Cm MD5
484 .Pa ntpkey Ns _ Cm RSA\-MD5 _ Pa cert_alice. Ar filestamp ,
634 .Cm RSA\-MD2 , RSA\-MD5 , RSA\-MDC2 , RSA\-SHA , RSA\-SHA1 , RSA\-RIPEMD160 , DSA\-SHA ,
647 .Cm RSA\-MD5 .
734 .Cm MD5
[all...]
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_md5.c2 * hostapd / EAP-MD5 server
51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); in eap_md5_buildReq()
59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); in eap_md5_check()
88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " in eap_md5_check()
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " in eap_md5_process()
119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN); in eap_md5_process()
124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); in eap_md5_process()
130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success"); in eap_md5_process()
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_md5.c2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); in eap_md5_process()
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", in eap_md5_process()
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process()
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", in eap_md5_process()
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); in eap_md5_process()
91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); in eap_md5_process()
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); in eap_md5_process()
107 EAP_VENDOR_IETF, EAP_TYPE_MD5, "MD5"); in eap_peer_md5_register()
/freebsd/tests/sys/geom/class/shsec/
H A D2_test.sh24 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
31 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then
38 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then
45 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then
/freebsd/contrib/llvm-project/llvm/include/llvm/Support/
H A DMD5.h5 * MD5 Message-Digest Algorithm (RFC 1321).
8 * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5
25 * See md5.c for more information.
41 class MD5 {
47 // Our MD5 implementation returns the result in little endian, so the low in low()
63 MD5();
78 /// This is suitable for getting the MD5 at any time without invalidating the
108 /// Helper to compute and return lower 64 bits of the given string's MD5 hash.
112 MD5 Hash; in MD5Hash()
114 MD5 in MD5Hash()
[all...]
/freebsd/tests/sys/geom/class/mirror/
H A D2_test.sh26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
32 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
38 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
45 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
H A D3_test.sh26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
H A D4_test.sh26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
H A D5_test.sh26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
H A D7_test.sh26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
/freebsd/contrib/llvm-project/llvm/lib/Support/
H A DMD5.cpp5 * MD5 Message-Digest Algorithm (RFC 1321).
8 * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5
40 #include "llvm/Support/MD5.h"
50 // The basic MD5 functions.
60 // The MD5 transformation for all four rounds.
79 const uint8_t *MD5::body(ArrayRef<uint8_t> Data) { in body()
186 MD5::MD5() = default;
189 void MD5::update(ArrayRef<uint8_t> Data) { in update()
227 void MD5::update(StringRef Str) { in update()
234 void MD5::final(MD5Result &Result) { in final()
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dmd5.c2 * MD5 hash implementation and interface functions
12 #include "md5.h"
17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104)
43 /* if key is longer than 64 bytes reset it to key = MD5(key) */ in hmac_md5_vector()
53 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5_vector()
68 /* perform inner MD5 */ in hmac_md5_vector()
84 /* perform outer MD5 */ in hmac_md5_vector()
97 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104)
/freebsd/crypto/openssl/doc/man3/
H A DEVP_md5.pod7 - MD5 For EVP
18 MD5 is a cryptographic hash function standardized in RFC 1321 and designed by
21 The CMU Software Engineering Institute considers MD5 unsuitable for further
28 The MD5 algorithm which produces a 128-bit output from a given input.
32 A hash algorithm of SSL v3 that combines MD5 with SHA-1 as described in RFC
43 L<EVP_MD_fetch(3)> with L<EVP_MD-MD5(7)> or L<EVP_MD-MD5-SHA1(7)> instead.

12345678910>>...37