/freebsd/sys/contrib/ck/include/ |
H A D | ck_fifo.h | 208 char *generation CK_CC_PACKED; 229 stub->next.generation = NULL; in ck_fifo_mpmc_init() 231 fifo->head.generation = fifo->tail.generation = NULL; in ck_fifo_mpmc_init() 257 entry->next.generation = 0; in ck_fifo_mpmc_enqueue() 261 tail.generation = ck_pr_load_ptr(&fifo->tail.generation); in ck_fifo_mpmc_enqueue() 264 next.generation = ck_pr_load_ptr(&tail.pointer->next.generation); in ck_fifo_mpmc_enqueue() 268 if (ck_pr_load_ptr(&fifo->tail.generation) != tail.generation) in ck_fifo_mpmc_enqueue() 279 update.generation = tail.generation + 1; in ck_fifo_mpmc_enqueue() 287 update.generation = next.generation + 1; in ck_fifo_mpmc_enqueue() 296 update.generation = tail.generation + 1; in ck_fifo_mpmc_enqueue() [all …]
|
H A D | ck_stack.h | 42 char *generation CK_CC_PACKED; 199 original.generation = ck_pr_load_ptr(&target->generation); in ck_stack_pop_mpmc() 208 update.generation = original.generation + 1; in ck_stack_pop_mpmc() 215 update.generation = original.generation + 1; in ck_stack_pop_mpmc() 233 original.generation = ck_pr_load_ptr(&target->generation); in ck_stack_trypop_mpmc() 239 update.generation = original.generation + 1; in ck_stack_trypop_mpmc() 257 * a generation count. 338 stack->generation = NULL; in ck_stack_init()
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 96 .IP "key generation" 4 97 .IX Item "key generation" 99 .IP "parameter generation" 4 100 .IX Item "parameter generation" 163 …| generation |<---------------------------+ +--------------------------… 179 …ecover generation generation 206 …generation generation generation generation generation generation generation generat… 208 … generation 210 …generation generation generation generation generation generation generation generat… 212 … generation [all …]
|
H A D | EVP_PKEY-FFC.7 | 79 specifies that the values used for FFC parameter generation are also required 116 An optional domain parameter \fIseed\fR value used during generation and validation 118 For validation this needs to set the \fIseed\fR that was produced during generation. 121 Sets the index to use for canonical generation and verification of the generator 125 is not set or is \-1 then unverifiable generation of the generator \fIg\fR will be 129 An optional domain parameter \fIcounter\fR value that is output during generation 133 For unverifiable generation of the generator \fIg\fR this value is output during 134 generation of \fIg\fR. Its value is the first integer larger than one that 156 .SS "FFC key generation parameters" 157 .IX Subsection "FFC key generation parameters" [all …]
|
H A D | EVP_PKEY-DSA.7 | 68 parameter generation are also required for parameter validation. 74 As part of FIPS 140\-3 DSA is not longer FIPS approved for key generation and 89 .SS "DSA key generation parameters" 90 .IX Subsection "DSA key generation parameters" 91 The \fBDSA\fR key type supports the FFC key generation parameters (see 92 "FFC key generation parameters" in \fBEVP_PKEY\-FFC\fR\|(7) 163 .IP "A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function." 4 164 .IX Item "A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function." 166 .IP "A.2.3 Generation of canonical generator g." 4 167 .IX Item "A.2.3 Generation of canonical generator g." [all …]
|
H A D | EVP_PKEY-DH.7 | 114 Used for DH generation of safe primes using the old safe prime generator code. 122 .SS "DH and DHX domain parameter / key generation parameters" 123 .IX Subsection "DH and DHX domain parameter / key generation parameters" 124 In addition to the common FFC key generation parameters that all FFC key types 125 should support (see "FFC key generation parameters" in \fBEVP_PKEY\-FFC\fR\|(7)) the 129 Sets the type of parameter generation. For \fBDH\fR valid values are: 139 These are described in "FFC key generation parameters" in \fBEVP_PKEY\-FFC\fR\|(7) 168 values used for FFC parameter generation are also required for parameter 276 \&\fBDER\fR data, additional values used during generation may be required to 337 .IP "5.5.1.1 FFC Domain Parameter Selection/Generation" 4 [all …]
|
H A D | EVP_PKEY-HMAC.7 | 98 .SS "Common MAC key generation parameters" 99 .IX Subsection "Common MAC key generation parameters" 100 MAC key generation is unusual in that no new key is actually generated. Instead 106 .SS "CMAC key generation parameters" 107 .IX Subsection "CMAC key generation parameters" 108 In addition to the common MAC key generation parameters, the CMAC key generation
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-genpkey.1 | 133 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 136 Valid built-in algorithm names for parameter generation (see the \fB\-genparam\fR 145 implementation. See "KEY GENERATION OPTIONS" and 146 "PARAMETER GENERATION OPTIONS" below for more details. 186 .SH "KEY GENERATION OPTIONS" 187 .IX Header "KEY GENERATION OPTIONS" 190 below. There are no key generation options defined for the X25519, X448, ED25519 192 .SS "RSA Key Generation Options" 193 .IX Subsection "RSA Key Generation Options" 204 .SS "RSA-PSS Key Generation Options" [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-FFC.pod | 21 specifies that the values used for FFC parameter generation are also required 75 An optional domain parameter I<seed> value used during generation and validation 77 For validation this needs to set the I<seed> that was produced during generation. 81 Sets the index to use for canonical generation and verification of the generator 85 is not set or is -1 then unverifiable generation of the generator I<g> will be 90 An optional domain parameter I<counter> value that is output during generation 95 For unverifiable generation of the generator I<g> this value is output during 96 generation of I<g>. Its value is the first integer larger than one that 122 =head2 FFC key generation parameters 124 The following key generation types are available for DSA and DHX algorithms: [all …]
|
H A D | life_cycle-pkey.pod | 49 =item key generation 53 =item parameter generation 126 …| generation |<---------------------------+ +--------------------------… 150 …ecover generation generation 177 …generation generation generation generation generation generation generation generat… 179 … generation 181 …generation generation generation generation generation generation generation generat… 183 … generation 185 … generation generation 187 …ecover generation generation [all …]
|
H A D | EVP_PKEY-DSA.pod | 10 parameter generation are also required for parameter validation. 16 As part of FIPS 140-3 DSA is not longer FIPS approved for key generation and 36 =head2 DSA key generation parameters 38 The B<DSA> key type supports the FFC key generation parameters (see 39 L<EVP_PKEY-FFC(7)/FFC key generation parameters> 111 =item A.1.1.2 Generation of Probable Primes p and q Using an Approved Hash Function. 113 =item A.2.3 Generation of canonical generator g. 115 =item A.2.1 Unverifiable Generation of the Generator g. 131 DSA Key generation and signature generation are no longer FIPS approved in
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-genpkey.pod.in | 87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 90 Valid built-in algorithm names for parameter generation (see the B<-genparam> 100 implementation. See L</KEY GENERATION OPTIONS> and 101 L</PARAMETER GENERATION OPTIONS> below for more details. 134 =head1 KEY GENERATION OPTIONS 138 below. There are no key generation options defined for the X25519, X448, ED25519 141 =head2 RSA Key Generation Options 160 =head2 RSA-PSS Key Generation Options 186 =head2 EC Key Generation Options 188 The EC key generation options can also be used for parameter generation. [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/memory-controllers/ |
H A D | mediatek,smi-common.txt | 6 which generation the SoCs use: 7 generation 1: mt2701 and mt7623. 8 generation 2: mt2712, mt6779, mt8167, mt8173 and mt8183. 10 There's slight differences between the two SMI, for generation 2, the 12 for generation 1, the register is at smi ao base(smi always on register 14 SMI generation 1 to transform the smi clock into emi clock domain, but that is 15 not needed for SMI generation 2. 29 - clock-names : must contain 3 entries for generation 1 smi HW and 2 entries 30 for generation 2 smi HW as follows: 36 clock domain, this clock is only needed by generation 1 smi HW. [all …]
|
H A D | mediatek,smi-common.yaml | 17 which generation the SoCs use: 18 generation 1: mt2701 and mt7623. 19 generation 2: mt2712, mt6779, mt8167, mt8173, mt8183, mt8186, mt8188, mt8192 and mt8195. 21 There's slight differences between the two SMI, for generation 2, the 23 for generation 1, the register is at smi ao base(smi always on register 25 SMI generation 1 to transform the smi clock into emi clock domain, but that is 26 not needed for SMI generation 2. 61 apb and smi are mandatory. the async is only for generation 1 smi HW.
|
/freebsd/sys/contrib/device-tree/Bindings/iommu/ |
H A D | mediatek,iommu.yaml | 14 this M4U have two generations of HW architecture. Generation one uses flat 15 pagetable, and only supports 4K size page mapping. Generation two uses the 73 - mediatek,mt2701-m4u # generation one 74 - mediatek,mt2712-m4u # generation two 75 - mediatek,mt6779-m4u # generation two 76 - mediatek,mt6795-m4u # generation two 77 - mediatek,mt8167-m4u # generation two 78 - mediatek,mt8173-m4u # generation two 79 - mediatek,mt8183-m4u # generation two 80 - mediatek,mt8186-iommu-mm # generation tw [all...] |
H A D | mediatek,iommu.txt | 4 this M4U have two generations of HW architecture. Generation one uses flat 5 pagetable, and only supports 4K size page mapping. Generation two uses the 59 "mediatek,mt2701-m4u" for mt2701 which uses generation one m4u HW. 60 "mediatek,mt2712-m4u" for mt2712 which uses generation two m4u HW. 61 "mediatek,mt6779-m4u" for mt6779 which uses generation two m4u HW. 63 generation one m4u HW. 64 "mediatek,mt8167-m4u" for mt8167 which uses generation two m4u HW. 65 "mediatek,mt8173-m4u" for mt8173 which uses generation two m4u HW. 66 "mediatek,mt8183-m4u" for mt8183 which uses generation two m4u HW.
|
/freebsd/sys/dev/qat/qat_api/include/lac/ |
H A D | cpa_cy_key.h | 13 * @defgroup cpaCyKeyGen Cryptographic Key and Mask Generation API 18 * These functions specify the API for key and mask generation 36 * SSL or TLS key generation random number length. 68 * SSL data for key generation functions 70 * This structure contains data for use in key generation operations for 71 * SSL. For specific SSL key generation operations, the structure fields 283 * TLS data for key generation functions 316 * TLS data for key generation functions 359 * TLS data for key generation functions 361 * This structure contains data for use in key generation operations for [all …]
|
H A D | cpa_cy_dh.h | 37 * Diffie-Hellman Phase 1 Key Generation Data. 80 * Diffie-Hellman Phase 2 Secret Key Generation Data. 103 * generation operation. */ 129 * generation requests. */ 131 /**< Total number of Diffie-Hellman phase 1 key generation requests 134 /**< Total number of Diffie-Hellman phase 1 key generation operations 137 /**< Total number of Diffie-Hellman phase 1 key generation operations 141 * generation requests. */ 143 /**< Total number of Diffie-Hellman phase 2 key generation requests 146 /**< Total number of Diffie-Hellman phase 2 key generation operations [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_keygen.pod | 12 - key and parameter generation and check functions 43 may want to set user provided generation parameters that further affect key 44 parameter or key generation, such as the desired key size. 47 generation is divided into an initialization of a key algorithm context, 49 key generation function itself. 55 for a key generation operation. 60 After initialization, generation parameters may be provided with 64 EVP_PKEY_generate() performs the generation operation, the resulting key 75 The function EVP_PKEY_set_cb() sets the key or parameter generation callback 77 generation callback. [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_PKEY_keygen.3 | 71 \&\- key and parameter generation and check functions 102 may want to set user provided generation parameters that further affect key 103 parameter or key generation, such as the desired key size. 106 generation is divided into an initialization of a key algorithm context, 108 key generation function itself. 114 for a key generation operation. 119 After initialization, generation parameters may be provided with 123 \&\fBEVP_PKEY_generate()\fR performs the generation operation, the resulting key 134 The function \fBEVP_PKEY_set_cb()\fR sets the key or parameter generation callback 136 generation callback. [all …]
|
H A D | EVP_PKEY_CTX_ctrl.3 | 289 Key generation typically involves setting up parameters to be used and 292 In this case key generation is simply the process of setting up the 301 key generation. For example for EC keys this will set the curve name and for 357 RSA key generation to \fIbits\fR. If not specified 2048 bits is used. 360 generation to the value stored in \fIpubexp\fR. Currently it should be an odd 370 RSA key generation to \fIprimes\fR. If not specified 2 is used. 460 parameter generation to \fBnbits\fR. If not specified, 2048 is used. 463 parameter \fIq\fR for DSA parameter generation to \fIqbits\fR. If not specified, 224 468 parameter generation to \fImd\fR. If not specified, one of SHA\-1, SHA\-224, or 472 parameter generation using \fImd_name\fR and \fImd_properties\fR to retrieve the [all …]
|
/freebsd/tools/uma/smrstress/ |
H A D | smrstress.c | 55 int generation; member 67 printf("SMR ERROR: wr_seq %d, rd_seq %d, c_seq %d, generation %d, count %d ", in smrs_error() 69 zpcpu_get(smrs_smr)->c_seq, smrs->generation, smrs->count); in smrs_error() 85 if (cur->generation == -1) in smrs_read() 90 if (cur->generation == -1) in smrs_read() 162 if (smrs->generation != -1 && smrs->generation != 0) in smrs_ctor() 163 smrs_error(smrs, "ctor: Invalid smr generation on ctor\n"); in smrs_ctor() 166 smrs->generation = ++smr_generation; in smrs_ctor() 177 if (smrs->generation == -1) in smrs_dtor() 178 smrs_error(smrs, "dtor: Invalid generation"); in smrs_dtor() [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_dgst.t | 95 subtest "RSA signature generation and verification with `dgst` CLI" => sub { 101 subtest "RSA signature generation and verification with `sha512` CLI" => sub { 112 subtest "DSA signature generation and verification with `dgst` CLI" => sub { 123 subtest "ECDSA signature generation and verification with `dgst` CLI" => sub { 134 subtest "Ed25519 signature generation and verification with `dgst` CLI" => sub { 140 subtest "Ed448 signature generation and verification with `dgst` CLI" => sub { 151 subtest "ML-DSA-44 signature generation and verification with `dgst` CLI" => sub { 156 subtest "ML-DSA-65 signature generation and verification with `dgst` CLI" => sub { 161 subtest "ML-DSA-87 signature generation and verification with `dgst` CLI" => sub { 172 subtest "SHA1 generation by engine with `dgst` CLI" => sub { [all …]
|
/freebsd/contrib/ntp/include/ |
H A D | ntp_filegen.h | 17 * supported file generation types 29 * supported file generation flags 38 FILE * fp; /* file referring to current generation */ 40 char * fname; /* filename prefix of generation file */ 44 u_char type; /* type of file generation */ 45 u_char flag; /* flags modifying processing of file generation */
|
/freebsd/tests/sys/fs/fusefs/ |
H A D | nfs.cc | 70 /* If the server returns a different generation number, then file is stale */ 88 out.body.entry.generation = 1; in TEST_F() 100 out.body.entry.generation = 2; in TEST_F() 127 out.body.entry.generation = 1; in TEST_F() 139 out.body.entry.generation = 1; in TEST_F() 168 out.body.entry.generation = 1; in TEST_F() 198 out.body.entry.generation = 1; in TEST_F() 225 out.body.entry.generation = 1; in TEST_F() 237 out.body.entry.generation = 1; in TEST_F() 275 out.body.entry.generation = 1; in TEST_F() [all …]
|