Home
last modified time | relevance | path

Searched full:generation (Results 1 – 25 of 1614) sorted by relevance

12345678910>>...65

/freebsd/sys/contrib/ck/include/
H A Dck_fifo.h208 char *generation CK_CC_PACKED;
229 stub->next.generation = NULL; in ck_fifo_mpmc_init()
231 fifo->head.generation = fifo->tail.generation = NULL; in ck_fifo_mpmc_init()
257 entry->next.generation = 0; in ck_fifo_mpmc_enqueue()
261 tail.generation = ck_pr_load_ptr(&fifo->tail.generation); in ck_fifo_mpmc_enqueue()
264 next.generation = ck_pr_load_ptr(&tail.pointer->next.generation); in ck_fifo_mpmc_enqueue()
268 if (ck_pr_load_ptr(&fifo->tail.generation) != tail.generation) in ck_fifo_mpmc_enqueue()
279 update.generation = tail.generation + 1; in ck_fifo_mpmc_enqueue()
287 update.generation = next.generation + 1; in ck_fifo_mpmc_enqueue()
296 update.generation = tail.generation + 1; in ck_fifo_mpmc_enqueue()
[all …]
H A Dck_stack.h42 char *generation CK_CC_PACKED;
199 original.generation = ck_pr_load_ptr(&target->generation); in ck_stack_pop_mpmc()
208 update.generation = original.generation + 1; in ck_stack_pop_mpmc()
215 update.generation = original.generation + 1; in ck_stack_pop_mpmc()
233 original.generation = ck_pr_load_ptr(&target->generation); in ck_stack_trypop_mpmc()
239 update.generation = original.generation + 1; in ck_stack_trypop_mpmc()
257 * a generation count.
338 stack->generation = NULL; in ck_stack_init()
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-pkey.796 .IP "key generation" 4
97 .IX Item "key generation"
99 .IP "parameter generation" 4
100 .IX Item "parameter generation"
163 …| generation |<---------------------------+ +--------------------------…
179 …ecover generation generation
206generation generation generation generation generation generation generation generat…
208generation
210generation generation generation generation generation generation generation generat…
212generation
[all …]
H A DEVP_PKEY-FFC.779 specifies that the values used for FFC parameter generation are also required
116 An optional domain parameter \fIseed\fR value used during generation and validation
118 For validation this needs to set the \fIseed\fR that was produced during generation.
121 Sets the index to use for canonical generation and verification of the generator
125 is not set or is \-1 then unverifiable generation of the generator \fIg\fR will be
129 An optional domain parameter \fIcounter\fR value that is output during generation
133 For unverifiable generation of the generator \fIg\fR this value is output during
134 generation of \fIg\fR. Its value is the first integer larger than one that
156 .SS "FFC key generation parameters"
157 .IX Subsection "FFC key generation parameters"
[all …]
H A DEVP_PKEY-DSA.768 parameter generation are also required for parameter validation.
74 As part of FIPS 140\-3 DSA is not longer FIPS approved for key generation and
89 .SS "DSA key generation parameters"
90 .IX Subsection "DSA key generation parameters"
91 The \fBDSA\fR key type supports the FFC key generation parameters (see
92 "FFC key generation parameters" in \fBEVP_PKEY\-FFC\fR\|(7)
163 .IP "A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function." 4
164 .IX Item "A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function."
166 .IP "A.2.3 Generation of canonical generator g." 4
167 .IX Item "A.2.3 Generation of canonical generator g."
[all …]
H A DEVP_PKEY-DH.7114 Used for DH generation of safe primes using the old safe prime generator code.
122 .SS "DH and DHX domain parameter / key generation parameters"
123 .IX Subsection "DH and DHX domain parameter / key generation parameters"
124 In addition to the common FFC key generation parameters that all FFC key types
125 should support (see "FFC key generation parameters" in \fBEVP_PKEY\-FFC\fR\|(7)) the
129 Sets the type of parameter generation. For \fBDH\fR valid values are:
139 These are described in "FFC key generation parameters" in \fBEVP_PKEY\-FFC\fR\|(7)
168 values used for FFC parameter generation are also required for parameter
276 \&\fBDER\fR data, additional values used during generation may be required to
337 .IP "5.5.1.1 FFC Domain Parameter Selection/Generation" 4
[all …]
H A DEVP_PKEY-HMAC.798 .SS "Common MAC key generation parameters"
99 .IX Subsection "Common MAC key generation parameters"
100 MAC key generation is unusual in that no new key is actually generated. Instead
106 .SS "CMAC key generation parameters"
107 .IX Subsection "CMAC key generation parameters"
108 In addition to the common MAC key generation parameters, the CMAC key generation
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-genpkey.1133 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC,
136 Valid built-in algorithm names for parameter generation (see the \fB\-genparam\fR
145 implementation. See "KEY GENERATION OPTIONS" and
146 "PARAMETER GENERATION OPTIONS" below for more details.
186 .SH "KEY GENERATION OPTIONS"
187 .IX Header "KEY GENERATION OPTIONS"
190 below. There are no key generation options defined for the X25519, X448, ED25519
192 .SS "RSA Key Generation Options"
193 .IX Subsection "RSA Key Generation Options"
204 .SS "RSA-PSS Key Generation Options"
[all …]
/freebsd/crypto/openssl/doc/man7/
H A DEVP_PKEY-FFC.pod21 specifies that the values used for FFC parameter generation are also required
75 An optional domain parameter I<seed> value used during generation and validation
77 For validation this needs to set the I<seed> that was produced during generation.
81 Sets the index to use for canonical generation and verification of the generator
85 is not set or is -1 then unverifiable generation of the generator I<g> will be
90 An optional domain parameter I<counter> value that is output during generation
95 For unverifiable generation of the generator I<g> this value is output during
96 generation of I<g>. Its value is the first integer larger than one that
122 =head2 FFC key generation parameters
124 The following key generation types are available for DSA and DHX algorithms:
[all …]
H A Dlife_cycle-pkey.pod49 =item key generation
53 =item parameter generation
126 …| generation |<---------------------------+ +--------------------------…
150 …ecover generation generation
177generation generation generation generation generation generation generation generat…
179generation
181generation generation generation generation generation generation generation generat…
183generation
185generation generation
187 …ecover generation generation
[all …]
H A DEVP_PKEY-DSA.pod10 parameter generation are also required for parameter validation.
16 As part of FIPS 140-3 DSA is not longer FIPS approved for key generation and
36 =head2 DSA key generation parameters
38 The B<DSA> key type supports the FFC key generation parameters (see
39 L<EVP_PKEY-FFC(7)/FFC key generation parameters>
111 =item A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function.
113 =item A.2.3 Generation of canonical generator g.
115 =item A.2.1 Unverifiable Generation of the Generator g.
131 DSA Key generation and signature generation are no longer FIPS approved in
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-genpkey.pod.in87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC,
90 Valid built-in algorithm names for parameter generation (see the B<-genparam>
100 implementation. See L</KEY GENERATION OPTIONS> and
101 L</PARAMETER GENERATION OPTIONS> below for more details.
134 =head1 KEY GENERATION OPTIONS
138 below. There are no key generation options defined for the X25519, X448, ED25519
141 =head2 RSA Key Generation Options
160 =head2 RSA-PSS Key Generation Options
186 =head2 EC Key Generation Options
188 The EC key generation options can also be used for parameter generation.
[all …]
/freebsd/sys/contrib/device-tree/Bindings/memory-controllers/
H A Dmediatek,smi-common.txt6 which generation the SoCs use:
7 generation 1: mt2701 and mt7623.
8 generation 2: mt2712, mt6779, mt8167, mt8173 and mt8183.
10 There's slight differences between the two SMI, for generation 2, the
12 for generation 1, the register is at smi ao base(smi always on register
14 SMI generation 1 to transform the smi clock into emi clock domain, but that is
15 not needed for SMI generation 2.
29 - clock-names : must contain 3 entries for generation 1 smi HW and 2 entries
30 for generation 2 smi HW as follows:
36 clock domain, this clock is only needed by generation 1 smi HW.
[all …]
H A Dmediatek,smi-common.yaml17 which generation the SoCs use:
18 generation 1: mt2701 and mt7623.
19 generation 2: mt2712, mt6779, mt8167, mt8173, mt8183, mt8186, mt8188, mt8192 and mt8195.
21 There's slight differences between the two SMI, for generation 2, the
23 for generation 1, the register is at smi ao base(smi always on register
25 SMI generation 1 to transform the smi clock into emi clock domain, but that is
26 not needed for SMI generation 2.
61 apb and smi are mandatory. the async is only for generation 1 smi HW.
/freebsd/sys/contrib/device-tree/Bindings/iommu/
H A Dmediatek,iommu.yaml14 this M4U have two generations of HW architecture. Generation one uses flat
15 pagetable, and only supports 4K size page mapping. Generation two uses the
73 - mediatek,mt2701-m4u # generation one
74 - mediatek,mt2712-m4u # generation two
75 - mediatek,mt6779-m4u # generation two
76 - mediatek,mt6795-m4u # generation two
77 - mediatek,mt8167-m4u # generation two
78 - mediatek,mt8173-m4u # generation two
79 - mediatek,mt8183-m4u # generation two
80 - mediatek,mt8186-iommu-mm # generation tw
[all...]
H A Dmediatek,iommu.txt4 this M4U have two generations of HW architecture. Generation one uses flat
5 pagetable, and only supports 4K size page mapping. Generation two uses the
59 "mediatek,mt2701-m4u" for mt2701 which uses generation one m4u HW.
60 "mediatek,mt2712-m4u" for mt2712 which uses generation two m4u HW.
61 "mediatek,mt6779-m4u" for mt6779 which uses generation two m4u HW.
63 generation one m4u HW.
64 "mediatek,mt8167-m4u" for mt8167 which uses generation two m4u HW.
65 "mediatek,mt8173-m4u" for mt8173 which uses generation two m4u HW.
66 "mediatek,mt8183-m4u" for mt8183 which uses generation two m4u HW.
/freebsd/sys/dev/qat/qat_api/include/lac/
H A Dcpa_cy_key.h13 * @defgroup cpaCyKeyGen Cryptographic Key and Mask Generation API
18 * These functions specify the API for key and mask generation
36 * SSL or TLS key generation random number length.
68 * SSL data for key generation functions
70 * This structure contains data for use in key generation operations for
71 * SSL. For specific SSL key generation operations, the structure fields
283 * TLS data for key generation functions
316 * TLS data for key generation functions
359 * TLS data for key generation functions
361 * This structure contains data for use in key generation operations for
[all …]
H A Dcpa_cy_dh.h37 * Diffie-Hellman Phase 1 Key Generation Data.
80 * Diffie-Hellman Phase 2 Secret Key Generation Data.
103 * generation operation. */
129 * generation requests. */
131 /**< Total number of Diffie-Hellman phase 1 key generation requests
134 /**< Total number of Diffie-Hellman phase 1 key generation operations
137 /**< Total number of Diffie-Hellman phase 1 key generation operations
141 * generation requests. */
143 /**< Total number of Diffie-Hellman phase 2 key generation requests
146 /**< Total number of Diffie-Hellman phase 2 key generation operations
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_keygen.pod12 - key and parameter generation and check functions
43 may want to set user provided generation parameters that further affect key
44 parameter or key generation, such as the desired key size.
47 generation is divided into an initialization of a key algorithm context,
49 key generation function itself.
55 for a key generation operation.
60 After initialization, generation parameters may be provided with
64 EVP_PKEY_generate() performs the generation operation, the resulting key
75 The function EVP_PKEY_set_cb() sets the key or parameter generation callback
77 generation callback.
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_PKEY_keygen.371 \&\- key and parameter generation and check functions
102 may want to set user provided generation parameters that further affect key
103 parameter or key generation, such as the desired key size.
106 generation is divided into an initialization of a key algorithm context,
108 key generation function itself.
114 for a key generation operation.
119 After initialization, generation parameters may be provided with
123 \&\fBEVP_PKEY_generate()\fR performs the generation operation, the resulting key
134 The function \fBEVP_PKEY_set_cb()\fR sets the key or parameter generation callback
136 generation callback.
[all …]
H A DEVP_PKEY_CTX_ctrl.3289 Key generation typically involves setting up parameters to be used and
292 In this case key generation is simply the process of setting up the
301 key generation. For example for EC keys this will set the curve name and for
357 RSA key generation to \fIbits\fR. If not specified 2048 bits is used.
360 generation to the value stored in \fIpubexp\fR. Currently it should be an odd
370 RSA key generation to \fIprimes\fR. If not specified 2 is used.
460 parameter generation to \fBnbits\fR. If not specified, 2048 is used.
463 parameter \fIq\fR for DSA parameter generation to \fIqbits\fR. If not specified, 224
468 parameter generation to \fImd\fR. If not specified, one of SHA\-1, SHA\-224, or
472 parameter generation using \fImd_name\fR and \fImd_properties\fR to retrieve the
[all …]
/freebsd/tools/uma/smrstress/
H A Dsmrstress.c55 int generation; member
67 printf("SMR ERROR: wr_seq %d, rd_seq %d, c_seq %d, generation %d, count %d ", in smrs_error()
69 zpcpu_get(smrs_smr)->c_seq, smrs->generation, smrs->count); in smrs_error()
85 if (cur->generation == -1) in smrs_read()
90 if (cur->generation == -1) in smrs_read()
162 if (smrs->generation != -1 && smrs->generation != 0) in smrs_ctor()
163 smrs_error(smrs, "ctor: Invalid smr generation on ctor\n"); in smrs_ctor()
166 smrs->generation = ++smr_generation; in smrs_ctor()
177 if (smrs->generation == -1) in smrs_dtor()
178 smrs_error(smrs, "dtor: Invalid generation"); in smrs_dtor()
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D20-test_dgst.t95 subtest "RSA signature generation and verification with `dgst` CLI" => sub {
101 subtest "RSA signature generation and verification with `sha512` CLI" => sub {
112 subtest "DSA signature generation and verification with `dgst` CLI" => sub {
123 subtest "ECDSA signature generation and verification with `dgst` CLI" => sub {
134 subtest "Ed25519 signature generation and verification with `dgst` CLI" => sub {
140 subtest "Ed448 signature generation and verification with `dgst` CLI" => sub {
151 subtest "ML-DSA-44 signature generation and verification with `dgst` CLI" => sub {
156 subtest "ML-DSA-65 signature generation and verification with `dgst` CLI" => sub {
161 subtest "ML-DSA-87 signature generation and verification with `dgst` CLI" => sub {
172 subtest "SHA1 generation by engine with `dgst` CLI" => sub {
[all …]
/freebsd/contrib/ntp/include/
H A Dntp_filegen.h17 * supported file generation types
29 * supported file generation flags
38 FILE * fp; /* file referring to current generation */
40 char * fname; /* filename prefix of generation file */
44 u_char type; /* type of file generation */
45 u_char flag; /* flags modifying processing of file generation */
/freebsd/tests/sys/fs/fusefs/
H A Dnfs.cc70 /* If the server returns a different generation number, then file is stale */
88 out.body.entry.generation = 1; in TEST_F()
100 out.body.entry.generation = 2; in TEST_F()
127 out.body.entry.generation = 1; in TEST_F()
139 out.body.entry.generation = 1; in TEST_F()
168 out.body.entry.generation = 1; in TEST_F()
198 out.body.entry.generation = 1; in TEST_F()
225 out.body.entry.generation = 1; in TEST_F()
237 out.body.entry.generation = 1; in TEST_F()
275 out.body.entry.generation = 1; in TEST_F()
[all …]

12345678910>>...65