/freebsd/sys/contrib/ck/include/ |
H A D | ck_fifo.h | 208 char *generation CK_CC_PACKED; 229 stub->next.generation = NULL; in ck_fifo_mpmc_init() 231 fifo->head.generation = fifo->tail.generation = NULL; in ck_fifo_mpmc_init() 257 entry->next.generation = 0; in ck_fifo_mpmc_enqueue() 261 tail.generation = ck_pr_load_ptr(&fifo->tail.generation); in ck_fifo_mpmc_enqueue() 264 next.generation = ck_pr_load_ptr(&tail.pointer->next.generation); in ck_fifo_mpmc_enqueue() 268 if (ck_pr_load_ptr(&fifo->tail.generation) != tail.generation) in ck_fifo_mpmc_enqueue() 279 update.generation = tail.generation + 1; in ck_fifo_mpmc_enqueue() 287 update.generation = next.generation + 1; in ck_fifo_mpmc_enqueue() 296 update.generation = tail.generation + 1; in ck_fifo_mpmc_enqueue() [all …]
|
H A D | ck_stack.h | 42 char *generation CK_CC_PACKED; 199 original.generation = ck_pr_load_ptr(&target->generation); in ck_stack_pop_mpmc() 208 update.generation = original.generation + 1; in ck_stack_pop_mpmc() 215 update.generation = original.generation + 1; in ck_stack_pop_mpmc() 233 original.generation = ck_pr_load_ptr(&target->generation); in ck_stack_trypop_mpmc() 239 update.generation = original.generation + 1; in ck_stack_trypop_mpmc() 257 * a generation count. 338 stack->generation = NULL; in ck_stack_init()
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 172 .IP "key generation" 4 173 .IX Item "key generation" 175 .IP "parameter generation" 4 176 .IX Item "parameter generation" 239 …| generation |<---------------------------+ +--------------------------… 255 …ecover generation generation 282 …generation generation generation generation generation generation generation generat… 284 … generation 286 …generation generation generation generation generation generation generation generat… 288 … generation [all …]
|
H A D | EVP_PKEY-FFC.7 | 155 specifies that the values used for \s-1FFC\s0 parameter generation are also required 198 An optional domain parameter \fIseed\fR value used during generation and validation 200 For validation this needs to set the \fIseed\fR that was produced during generation. 204 Sets the index to use for canonical generation and verification of the generator 208 is not set or is \-1 then unverifiable generation of the generator \fIg\fR will be 213 An optional domain parameter \fIcounter\fR value that is output during generation 218 For unverifiable generation of the generator \fIg\fR this value is output during 219 generation of \fIg\fR. Its value is the first integer larger than one that 245 .SS "\s-1FFC\s0 key generation parameters" 246 .IX Subsection "FFC key generation parameters" [all …]
|
H A D | EVP_PKEY-DH.7 | 192 Used for \s-1DH\s0 generation of safe primes using the old safe prime generator code. 200 .SS "\s-1DH\s0 and \s-1DHX\s0 domain parameter / key generation parameters" 201 .IX Subsection "DH and DHX domain parameter / key generation parameters" 202 In addition to the common \s-1FFC\s0 key generation parameters that all \s-1FFC\s0 key types 203 should support (see \*(L"\s-1FFC\s0 key generation parameters\*(R" in \s-1\fBEVP_PKEY\-FFC\s0\fR\|(… 208 Sets the type of parameter generation. For \fB\s-1DH\s0\fR valid values are: 221 These are described in \*(L"\s-1FFC\s0 key generation parameters\*(R" in \s-1\fBEVP_PKEY\-FFC\s0\fR… 254 values used for \s-1FFC\s0 parameter generation are also required for parameter 361 \&\fB\s-1DER\s0\fR data, additional values used during generation may be required to 423 .IP "5.5.1.1 \s-1FFC\s0 Domain Parameter Selection/Generation" 4 [all …]
|
H A D | EVP_PKEY-DSA.7 | 144 parameter generation are also required for parameter validation. 153 .SS "\s-1DSA\s0 key generation parameters" 154 .IX Subsection "DSA key generation parameters" 155 The \fB\s-1DSA\s0\fR key type supports the \s-1FFC\s0 key generation parameters (see 156 \&\*(L"\s-1FFC\s0 key generation parameters\*(R" in \s-1\fBEVP_PKEY\-FFC\s0\fR\|(7) 227 .IP "A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function." 4 228 .IX Item "A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function." 230 .IP "A.2.3 Generation of canonical generator g." 4 231 .IX Item "A.2.3 Generation of canonical generator g." 232 .IP "A.2.1 Unverifiable Generation of the Generator g." 4 [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-genpkey.1 | 196 Valid built-in algorithm names for private key generation are \s-1RSA,\s0 RSA-PSS, \s-1EC, 199 Valid built-in algorithm names for parameter generation (see the \fB\-genparam\fR 208 implementation. See \*(L"\s-1KEY GENERATION OPTIONS\*(R"\s0 and 209 \&\*(L"\s-1PARAMETER GENERATION OPTIONS\*(R"\s0 below for more details. 241 .SH "KEY GENERATION OPTIONS" 242 .IX Header "KEY GENERATION OPTIONS" 245 below. There are no key generation options defined for the X25519, X448, \s-1ED25519\s0 247 .SS "\s-1RSA\s0 Key Generation Options" 248 .IX Subsection "RSA Key Generation Options" 259 .SS "RSA-PSS Key Generation Options" [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-FFC.pod | 21 specifies that the values used for FFC parameter generation are also required 75 An optional domain parameter I<seed> value used during generation and validation 77 For validation this needs to set the I<seed> that was produced during generation. 81 Sets the index to use for canonical generation and verification of the generator 85 is not set or is -1 then unverifiable generation of the generator I<g> will be 90 An optional domain parameter I<counter> value that is output during generation 95 For unverifiable generation of the generator I<g> this value is output during 96 generation of I<g>. Its value is the first integer larger than one that 122 =head2 FFC key generation parameters 124 The following key generation types are available for DSA and DHX algorithms: [all …]
|
H A D | life_cycle-pkey.pod | 49 =item key generation 53 =item parameter generation 126 …| generation |<---------------------------+ +--------------------------… 150 …ecover generation generation 177 …generation generation generation generation generation generation generation generat… 179 … generation 181 …generation generation generation generation generation generation generation generat… 183 … generation 185 … generation generation 187 …ecover generation generation [all …]
|
H A D | EVP_PKEY-DSA.pod | 10 parameter generation are also required for parameter validation. 21 =head2 DSA key generation parameters 23 The B<DSA> key type supports the FFC key generation parameters (see 24 L<EVP_PKEY-FFC(7)/FFC key generation parameters> 96 =item A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function. 98 =item A.2.3 Generation of canonical generator g. 100 =item A.2.1 Unverifiable Generation of the Generator g.
|
H A D | EVP_PKEY-DH.pod | 70 Used for DH generation of safe primes using the old safe prime generator code. 81 =head2 DH and DHX domain parameter / key generation parameters 83 In addition to the common FFC key generation parameters that all FFC key types 84 should support (see L<EVP_PKEY-FFC(7)/FFC key generation parameters>) the 91 Sets the type of parameter generation. For B<DH> valid values are: 101 These are described in L<EVP_PKEY-FFC(7)/FFC key generation parameters> 136 values used for FFC parameter generation are also required for parameter 237 B<DER> data, additional values used during generation may be required to 302 =item 5.5.1.1 FFC Domain Parameter Selection/Generation 312 =item A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function. [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-genpkey.pod.in | 74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 77 Valid built-in algorithm names for parameter generation (see the B<-genparam> 87 implementation. See L</KEY GENERATION OPTIONS> and 88 L</PARAMETER GENERATION OPTIONS> below for more details. 116 =head1 KEY GENERATION OPTIONS 120 below. There are no key generation options defined for the X25519, X448, ED25519 123 =head2 RSA Key Generation Options 142 =head2 RSA-PSS Key Generation Options 168 =head2 EC Key Generation Options 170 The EC key generation options can also be used for parameter generation. [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/memory-controllers/ |
H A D | mediatek,smi-common.txt | 6 which generation the SoCs use: 7 generation 1: mt2701 and mt7623. 8 generation 2: mt2712, mt6779, mt8167, mt8173 and mt8183. 10 There's slight differences between the two SMI, for generation 2, the 12 for generation 1, the register is at smi ao base(smi always on register 14 SMI generation 1 to transform the smi clock into emi clock domain, but that is 15 not needed for SMI generation 2. 29 - clock-names : must contain 3 entries for generation 1 smi HW and 2 entries 30 for generation 2 smi HW as follows: 36 clock domain, this clock is only needed by generation 1 smi HW. [all …]
|
H A D | mediatek,smi-common.yaml | 17 which generation the SoCs use: 18 generation 1: mt2701 and mt7623. 19 generation 2: mt2712, mt6779, mt8167, mt8173, mt8183, mt8186, mt8188, mt8192 and mt8195. 21 There's slight differences between the two SMI, for generation 2, the 23 for generation 1, the register is at smi ao base(smi always on register 25 SMI generation 1 to transform the smi clock into emi clock domain, but that is 26 not needed for SMI generation 2. 61 apb and smi are mandatory. the async is only for generation 1 smi HW.
|
/freebsd/sys/contrib/device-tree/Bindings/iommu/ |
H A D | mediatek,iommu.yaml | 14 this M4U have two generations of HW architecture. Generation one uses flat 15 pagetable, and only supports 4K size page mapping. Generation two uses the 73 - mediatek,mt2701-m4u # generation one 74 - mediatek,mt2712-m4u # generation two 75 - mediatek,mt6779-m4u # generation two 76 - mediatek,mt6795-m4u # generation two 77 - mediatek,mt8167-m4u # generation two 78 - mediatek,mt8173-m4u # generation two 79 - mediatek,mt8183-m4u # generation two 80 - mediatek,mt8186-iommu-mm # generation tw [all...] |
H A D | mediatek,iommu.txt | 4 this M4U have two generations of HW architecture. Generation one uses flat 5 pagetable, and only supports 4K size page mapping. Generation two uses the 59 "mediatek,mt2701-m4u" for mt2701 which uses generation one m4u HW. 60 "mediatek,mt2712-m4u" for mt2712 which uses generation two m4u HW. 61 "mediatek,mt6779-m4u" for mt6779 which uses generation two m4u HW. 63 generation one m4u HW. 64 "mediatek,mt8167-m4u" for mt8167 which uses generation two m4u HW. 65 "mediatek,mt8173-m4u" for mt8173 which uses generation two m4u HW. 66 "mediatek,mt8183-m4u" for mt8183 which uses generation two m4u HW.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_keygen.pod | 12 - key and parameter generation and check functions 43 may want to set user provided generation parameters that further affect key 44 parameter or key generation, such as the desired key size. 47 generation is divided into an initialization of a key algorithm context, 49 key generation function itself. 55 for a key generation operation. 60 After initialization, generation parameters may be provided with 64 EVP_PKEY_generate() performs the generation operation, the resulting key 75 The function EVP_PKEY_set_cb() sets the key or parameter generation callback 77 generation callback. [all …]
|
/freebsd/sys/dev/qat/qat_api/include/lac/ |
H A D | cpa_cy_key.h | 46 * @defgroup cpaCyKeyGen Cryptographic Key and Mask Generation API 51 * These functions specify the API for key and mask generation 69 * SSL or TLS key generation random number length. 101 * SSL data for key generation functions 103 * This structure contains data for use in key generation operations for 104 * SSL. For specific SSL key generation operations, the structure fields 316 * TLS data for key generation functions 349 * TLS data for key generation functions 392 * TLS data for key generation functions 394 * This structure contains data for use in key generation operations for [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_PKEY_keygen.3 | 147 \&\- key and parameter generation and check functions 178 may want to set user provided generation parameters that further affect key 179 parameter or key generation, such as the desired key size. 182 generation is divided into an initialization of a key algorithm context, 184 key generation function itself. 190 for a key generation operation. 195 After initialization, generation parameters may be provided with 199 \&\fBEVP_PKEY_generate()\fR performs the generation operation, the resulting key 210 The function \fBEVP_PKEY_set_cb()\fR sets the key or parameter generation callback 212 generation callback. [all …]
|
/freebsd/tools/uma/smrstress/ |
H A D | smrstress.c | 56 int generation; member 68 printf("SMR ERROR: wr_seq %d, rd_seq %d, c_seq %d, generation %d, count %d ", in smrs_error() 70 zpcpu_get(smrs_smr)->c_seq, smrs->generation, smrs->count); in smrs_error() 86 if (cur->generation == -1) in smrs_read() 91 if (cur->generation == -1) in smrs_read() 163 if (smrs->generation != -1 && smrs->generation != 0) in smrs_ctor() 164 smrs_error(smrs, "ctor: Invalid smr generation on ctor\n"); in smrs_ctor() 167 smrs->generation = ++smr_generation; in smrs_ctor() 178 if (smrs->generation == -1) in smrs_dtor() 179 smrs_error(smrs, "dtor: Invalid generation"); in smrs_dtor() [all …]
|
/freebsd/contrib/ntp/include/ |
H A D | ntp_filegen.h | 17 * supported file generation types 29 * supported file generation flags 38 FILE * fp; /* file referring to current generation */ 40 char * fname; /* filename prefix of generation file */ 44 u_char type; /* type of file generation */ 45 u_char flag; /* flags modifying processing of file generation */
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_dgst.t | 95 subtest "RSA signature generation and verification with `dgst` CLI" => sub { 101 subtest "RSA signature generation and verification with `sha512` CLI" => sub { 112 subtest "DSA signature generation and verification with `dgst` CLI" => sub { 123 subtest "ECDSA signature generation and verification with `dgst` CLI" => sub { 136 subtest "Ed25519 signature generation and verification with `dgst` CLI" => sub { 142 subtest "Ed448 signature generation and verification with `dgst` CLI" => sub { 153 subtest "SHA1 generation by engine with `dgst` CLI" => sub { 168 subtest "HMAC generation with `dgst` CLI" => sub { 182 subtest "HMAC generation with `dgst` CLI, default digest" => sub { 196 subtest "HMAC generation with `dgst` CLI, key via option" => sub { [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/stat/ |
H A D | stat_001_pos.ksh | 32 # Ensure znode generation number is accessible. 36 # 2) Verify that the znode generation number can be obtained 37 # 3) Verify that the znode generation number is not empty 49 log_assert "Ensure znode generation number is accessible." 57 log_pass "Successfully obtained file znode generation number."
|
/freebsd/contrib/llvm-project/compiler-rt/lib/xray/ |
H A D | xray_buffer_queue.cpp | 109 // At this point we increment the generation number to associate the buffers in init() 110 // to the new generation. in init() 111 atomic_fetch_add(&Generation, 1, memory_order_acq_rel); in init() 128 Buf.Generation = generation(); in init() 157 Generation{0} { 179 Buf.Generation = generation(); in getBuffer() 190 if (Buf.Generation != generation() || LiveBuffers == 0) { in releaseBuffer()
|
H A D | xray_fdr_controller.h | 47 return B.Data != nullptr && B.Generation == BQ->generation() && in hasSpace() 154 if (B.Generation != BQ->generation()) in recordPreamble() 171 if (B.Generation != BQ->generation()) in recordPreamble() 191 if (B.Generation != BQ->generation()) in rewindRecords() 210 if (B.Generation != BQ->generation()) in rewindRecords() 217 if (B.Generation != BQ->generation()) in rewindRecords()
|