/freebsd/sbin/md5/ |
H A D | Makefile | 2 PROG= md5 4 LINKS= ${BINDIR}/md5 ${BINDIR}/md5sum \ 5 ${BINDIR}/md5 ${BINDIR}/rmd160 \ 6 ${BINDIR}/md5 ${BINDIR}/rmd160sum \ 7 ${BINDIR}/md5 ${BINDIR}/sha1 \ 8 ${BINDIR}/md5 ${BINDIR}/sha1sum \ 9 ${BINDIR}/md5 ${BINDIR}/sha224 \ 10 ${BINDIR}/md5 ${BINDIR}/sha224sum \ 11 ${BINDIR}/md5 ${BINDIR}/sha256 \ 12 ${BINDIR}/md5 ${BINDIR}/sha256sum \ [all …]
|
H A D | md5.1 | 5 .Nm md5 , sha1 , sha224 , sha256 , sha384 , 57 .Nm md5 , sha1 , sha224 , sha256 , sha384 , sha512 , sha512t224 , sha512t256 , 99 The MD5 and SHA-1 algorithms have been proven to be vulnerable to practical 282 .Nm md5 , sha1 , sha224 , sha256 , sha384 , sha512 , 303 Calculate the MD5 checksum of the string 306 $ md5 -s Hello 307 MD5 ("Hello") = 8b1a9953c4611296a827abf8c47804d7 313 $ echo -n Hello | md5 319 $ md5 -r /boot/loader.conf /etc/rc.conf 349 $ md5 /boot/loader.conf > digest && md5 -c $(cut -f2 -d= digest) /boot/loader.conf [all …]
|
/freebsd/contrib/ntp/sntp/tests/ |
H A D | crypto.c | 37 struct key md5; test_MakeMd5Mac() local 127 struct key md5; test_VerifyCorrectMD5() local 235 struct key md5; test_VerifyFailure() local 254 struct key md5; test_PacketSizeNotMultipleOfFourBytes() local
|
/freebsd/contrib/netbsd-tests/sbin/resize_ffs/ |
H A D | testdata.md5 | 1 MD5 (1024) = eadce85bc513cc7b9b46c027ce07ccdb 2 MD5 (1025) = 3cf2a95b3af7377ca81ff08265534334 3 MD5 (131072) = 3bf5f82ad5e1f8878caa699548cc0955 4 MD5 (131073) = 3423d2f10e3abb20e1ceae4b055f5071 5 MD5 (16384) = 933f03c66d4e2da32089ed994c9b34bd 6 MD5 (16385) = d0b296920f44ef298880a2d963066026 7 MD5 (2048) = fb03fb8916dd57f9648f89a06bb46f06 8 MD5 (2049) = f2e489640fc3af5f09352d27717d832e 9 MD5 (32768) = d940d6ccf83aeb00e71b9bbeaf860962 10 MD5 (32769) = 760e060cefd844c082a10b3bef1408f7 [all …]
|
/freebsd/crypto/openssl/crypto/rc4/asm/ |
H A D | rc4-md5-x86_64.pl | 19 # This is RC4+MD5 "stitch" implementation. The idea, as spelled in 26 # and Jim Guilford of Intel. MD5 is fresh implementation aiming to 28 # weaved into it, one RC4 round per one MD5 round. In addition to the 34 # RC4 MD5 RC4+MD5 stitch gain 50 my ($rc4,$md5)=(1,1); # what to generate? 51 my $D="#" if (!$md5); # if set to "#", MD5 is stitched into RC4(), 74 if ($rc4 && !$md5) { 77 } elsif ($md5 && !$rc4) { 88 # const void *inp, # MD5 input 112 my @V=("%r8d","%r9d","%r10d","%r11d"); # MD5 registers [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmd_md.txt | 83 Title = MD5 tests 85 Digest = MD5 89 Digest = MD5 93 Digest = MD5 97 Digest = MD5 101 Digest = MD5 105 Digest = MD5 109 Digest = MD5 113 Title = MD5-SHA1 115 Digest = MD5-SHA1 [all …]
|
/freebsd/crypto/openssl/crypto/md5/ |
H A D | build.info | 5 $MD5ASM_x86=md5-586.S 6 $MD5ASM_x86_64=md5-x86_64.s 7 $MD5ASM_sparcv9=md5-sparcv9.S 21 # without conditioning this on dso. The issue is MD5 which is needed in the 35 GENERATE[md5-586.S]=asm/md5-586.pl 37 GENERATE[md5-x86_64.s]=asm/md5-x86_64.pl 39 GENERATE[md5-sparcv9.S]=asm/md5-sparcv9.pl 40 INCLUDE[md5-sparcv9.o]=..
|
/freebsd/contrib/ntp/html/ |
H A D | authentic.html | 51 RSA Message Digest 5 (MD5) algorithm commonly called keyed-MD5. 54 server. The MD5 message digest algorithm is included in the 115 such as MD5, SHA, or AES-128 CMAC. When authentication is specified, 146 permitted key type is MD5.</p> 156 1 MD5 L";Nw<`.I<f4U0)247"i # MD5 key 157 2 MD5 &>l0%XXK9O'51VwV<xq~ # MD5 key 158 3 MD5 lb4zLW~d^!K:]RsD'qb6 # MD5 key 159 4 MD5 Yue:tL[+vR)M`n~bY,'? # MD5 key 160 5 MD5 B;fxlKgr/&4ZTbL6=RxA # MD5 key 161 6 MD5 4eYwa`o}3i@@V@..R9!l # MD5 key [all …]
|
H A D | keygen.html | 31 …<p id="intro"><tt>ntp-keygen [ -deGHIMPT ] [ -b <i>modulus</i> ] [ -c [ RSA-MD2 | RSA-MD5 | RSA-SHA 47 containing ten pseudo-random printable ASCII strings suitable for the MD5 98 default RSA host key and matching RSA-MD5 certificate with expiration 115 default, the signature message digest type is MD5, but any combination 137 …<dt><tt>-c [ RSA-MD2 | RSA-MD5 | RSA-SHA | RSA-SHA1 | RSA-MDC2 | RSA-RIPEMD160 | DSA-SHA | DSA-SHA… 141 option is <tt>RSA-MD5</tt>. If compatibility with FIPS 140-2 is 185 <dd>Generate a new keys file containing 10 MD5 keys and 10 SHA keys. 186 An MD5 key is a string of 20 random printable ASCII characters, 292 1 MD5 L";Nw<`.I<f4U0)247"i # MD5 key 293 2 MD5 &>l0%XXK9O'51VwV<xq~ # MD5 key [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | eap_testing.txt | 52 EAP-MD5 + - - + + + + + - - + + 60 EAP-PEAPv0/MD5 + - - + + + + + - - + - 71 EAP-PEAPv1/MD5 - - - + + +1 + +5 - - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 106 EAP-FAST/MD5(aprov) - - - - - + - - - - + - 111 EAP-FAST/MD5(auth) - - - - - + - - - - + - 142 - EAP-MD5-Challenge 148 - EAP-PEAPv0 / MD5-Challenge 150 - EAP-TTLS / EAP-MD5-Challenge 166 - EAP-MD5 [all …]
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.texi | 72 MD5 message digest algorithm included in the distribution. 135 default RSA host key and matching RSA-MD5 certificate with expiration 157 message digest type is MD5, but any combination of sign key type and 243 1 MD5 "]!ghT%O;3)WJ,/Nc:>I # MD5 key 244 2 MD5 lu+H^tF46BKR-6~p{V_5 # MD5 key 245 3 MD5 :lnoVsE%Y}z*avh%EtNC # MD5 key 246 4 MD5 |fdZrf0sF~@PHZ;w-i^V # MD5 key 247 5 MD5 IyAG>O"}y"LmCRS!*bHC # MD5 key 248 6 MD5 ">e\A@>hT/661ri52,,H # MD5 key 249 7 MD5 c9x=M'CfLxax9v)PV-si # MD5 key [all …]
|
H A D | ntp-keygen.mdoc.in | 41 suitable for the MD5 message digest algorithm included in the 151 .Cm RSA\-MD5 171 .Cm MD5 , 175 .Cm AES128CMAC , MD2 , MD5 , MDC2 , SHA , SHA1 315 .Cm MD5 , 370 .Cm MD5 484 .Pa ntpkey Ns _ Cm RSA\-MD5 _ Pa cert_alice. Ar filestamp , 634 .Cm RSA\-MD2 , RSA\-MD5 , RSA\-MDC2 , RSA\-SHA , RSA\-SHA1 , RSA\-RIPEMD160 , DSA\-SHA , 647 .Cm RSA\-MD5 . 734 .Cm MD5 [all...] |
H A D | ntp-keygen.1ntp-keygenmdoc | 41 suitable for the MD5 message digest algorithm included in the 151 .Cm RSA\-MD5 171 .Cm MD5 , 175 .Cm AES128CMAC , MD2 , MD5 , MDC2 , SHA , SHA1 315 .Cm MD5 , 370 .Cm MD5 484 .Pa ntpkey Ns _ Cm RSA\-MD5 _ Pa cert_alice. Ar filestamp , 634 .Cm RSA\-MD2 , RSA\-MD5 , RSA\-MDC2 , RSA\-SHA , RSA\-SHA1 , RSA\-RIPEMD160 , DSA\-SHA , 647 .Cm RSA\-MD5 . 734 .Cm MD5 [all...] |
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_md5.c | 2 * hostapd / EAP-MD5 server 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); in eap_md5_buildReq() 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); in eap_md5_check() 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " in eap_md5_check() 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " in eap_md5_process() 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN); in eap_md5_process() 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); in eap_md5_process() 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success"); in eap_md5_process() [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); in eap_md5_process() 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", in eap_md5_process() 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process() 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", in eap_md5_process() 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); in eap_md5_process() 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); in eap_md5_process() 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); in eap_md5_process() 107 EAP_VENDOR_IETF, EAP_TYPE_MD5, "MD5"); in eap_peer_md5_register()
|
/freebsd/tests/sys/geom/class/shsec/ |
H A D | 2_test.sh | 24 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 31 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then 38 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then 45 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Support/ |
H A D | MD5.h | 5 * MD5 Message-Digest Algorithm (RFC 1321). 8 * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5 25 * See md5.c for more information. 41 class MD5 { 47 // Our MD5 implementation returns the result in little endian, so the low in low() 63 MD5(); 78 /// This is suitable for getting the MD5 at any time without invalidating the 108 /// Helper to compute and return lower 64 bits of the given string's MD5 hash. 112 MD5 Hash; in MD5Hash() 114 MD5 in MD5Hash() [all...] |
/freebsd/tests/sys/geom/class/mirror/ |
H A D | 2_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 32 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 38 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 45 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
H A D | 3_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
H A D | 4_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
H A D | 5_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
H A D | 7_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
/freebsd/contrib/llvm-project/llvm/lib/Support/ |
H A D | MD5.cpp | 5 * MD5 Message-Digest Algorithm (RFC 1321). 8 * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5 40 #include "llvm/Support/MD5.h" 50 // The basic MD5 functions. 60 // The MD5 transformation for all four rounds. 79 const uint8_t *MD5::body(ArrayRef<uint8_t> Data) { in body() 186 MD5::MD5() = default; 189 void MD5::update(ArrayRef<uint8_t> Data) { in update() 227 void MD5::update(StringRef Str) { in update() 234 void MD5::final(MD5Result &Result) { in final() [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | md5.c | 2 * MD5 hash implementation and interface functions 12 #include "md5.h" 17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104) 43 /* if key is longer than 64 bytes reset it to key = MD5(key) */ in hmac_md5_vector() 53 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5_vector() 68 /* perform inner MD5 */ in hmac_md5_vector() 84 /* perform outer MD5 */ in hmac_md5_vector() 97 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104)
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_md5.pod | 7 - MD5 For EVP 18 MD5 is a cryptographic hash function standardized in RFC 1321 and designed by 21 The CMU Software Engineering Institute considers MD5 unsuitable for further 28 The MD5 algorithm which produces a 128-bit output from a given input. 32 A hash algorithm of SSL v3 that combines MD5 with SHA-1 as described in RFC 43 L<EVP_MD_fetch(3)> with L<EVP_MD-MD5(7)> or L<EVP_MD-MD5-SHA1(7)> instead.
|