| /freebsd/contrib/ntp/util/ |
| H A D | ntp-keygen.texi | 1 \input texinfo @c -*-texinfo-*- 3 @setfilename ntp-keygen.info 4 @settitle Ntp-keygen User's Manual 10 This file documents the use of the NTP Project's @code{ntp-keygen} 11 program, which generates various keys for @code{ntpd}, 15 * ntp-keygen: (ntp-keygen). NTP Key Generation 19 @title NTP Key Generation User's Manual 20 @subtitle ntp-keygen, version @value{VERSION}, @value{UPDATED} 31 * ntp-keygen Invocation:: Invoking ntp-keygen 38 @top NTP Key Generation Program User Manual [all …]
|
| H A D | invoke-ntp-keygen.texi | 1 @node ntp-keygen Invocation 2 @section Invoking ntp-keygen 3 @pindex ntp-keygen 4 @cindex Create a NTP host key 7 # EDIT THIS FILE WITH CAUTION (invoke-ntp-keygen.texi) 9 # It has been AutoGen-ed May 25, 2024 at 12:04:48 AM by AutoGen 5.18.16 10 # From the definitions ntp-keygen-opts.def 11 # and the template file agtexi-cm [all...] |
| H A D | ntp-keygen.html | 1 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> 3 <!-- Created by GNU Texinfo 6.6, http://www.gnu.org/software/texinfo/ --> 5 <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> 6 <title>Ntp-keygen User’s Manual</title> 8 <meta name="description" content="Ntp-keyge [all...] |
| /freebsd/crypto/heimdal/lib/hdb/ |
| H A D | common.c | 2 * Copyright (c) 1997-2002 Kungliga Tekniska Högskolan 10 * 1. Redistributions of source code must retain the above copyright 37 hdb_principal2key(krb5_context context, krb5_const_principal p, krb5_data *key) in hdb_principal2key() argument 48 ASN1_MALLOC_ENCODE(Principal, key->data, key->length, &new, &len, ret); in hdb_principal2key() 49 if (ret == 0 && key->length != len) in hdb_principal2key() 56 hdb_key2principal(krb5_context context, krb5_data *key, krb5_principal p) in hdb_key2principal() argument 58 return decode_Principal(key->data, key->length, p, NULL); in hdb_key2principal() 67 ASN1_MALLOC_ENCODE(hdb_entry, value->data, value->length, ent, &len, ret); in hdb_entry2value() 68 if (ret == 0 && value->length != len) in hdb_entry2value() 76 return decode_hdb_entry(value->data, value->length, ent, NULL); in hdb_value2entry() [all …]
|
| H A D | hdb-mitdb.c | 2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan 12 * 1. Redistributions of source code must retain the above copyright 53 key: krb5_unparse_name + NUL 72 for num key data times 84 read-of-data: key-encrypted, key-usage 0, master-key 87 version2 = salt in key_data->key_data_contents[1] 97 flags->postdate = !(attr & KRB5_KDB_DISALLOW_POSTDATED); in attr_to_flags() 98 flags->forwardable = !(attr & KRB5_KDB_DISALLOW_FORWARDABLE); in attr_to_flags() 99 flags->initial = !!(attr & KRB5_KDB_DISALLOW_TGT_BASED); in attr_to_flags() 100 flags->renewable = !(attr & KRB5_KDB_DISALLOW_RENEWABLE); in attr_to_flags() [all …]
|
| /freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/ |
| H A D | krb5_crypto.3 | 1 … cryptography functions" 3 "11 Jan 2012" "Version 1.5.2" "HeimdalKerberos5library" \" -*- nroff -*- 5 Heimdal Kerberos 5 cryptography functions \- 28 …IB_CALL \fBkrb5_crypto_init\fP (krb5_context context, const krb5_keyblock *key, krb5_enctype etype… 55 …ey\fP (krb5_context context, krb5_enctype type, const void *data, size_t size, krb5_keyblock *key)" 61 …b5_generate_subkey_extended\fP (krb5_context context, const krb5_keyblock *key, krb5_enctype etype… 82 …it\fP (krb5_context context, krb5_enctype type, const void *data, size_t size, krb5_keyblock *key)" 103 Return an error code or 0. 122 Return an error code for an failure or 0 on success. 134 \fIinblock\fP the key to copy 136 \fIto\fP the output key. [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/error_tables/ |
| H A D | krb5_err.et | 27 # The Kerberos v5 library error code table. 29 # code number; other error codes start at ERROR_TABLE_BASE_krb5 + 128. 35 # Note: the first 128 error codes are hard-coded and must match the error 36 # numbers defined in the Kerberos protocol specification, RFC-1510 or 45 error_code KRB5KDC_ERR_C_OLD_MAST_KVNO, "Client's key is encrypted in an old master key" 46 error_code KRB5KDC_ERR_S_OLD_MAST_KVNO, "Server's key is encrypted in an old master key" 50 error_code KRB5KDC_ERR_NULL_KEY, "Client or server has a null key" 62 error_code KRB5KDC_ERR_CLIENT_NOTYET, "Client not yet valid - try again later" 63 error_code KRB5KDC_ERR_SERVICE_NOTYET, "Server not yet valid - try again later" 67 error_code KRB5KDC_ERR_PREAUTH_REQUIRED, "Additional pre-authentication required" [all …]
|
| /freebsd/crypto/openssl/doc/designs/ |
| H A D | ml-dsa.md | 1 ML-DSA Design 4 This document covers OpenSSL specific ML-DSA implementation details. 5 FIPS 204 clearly states most of the requirements of ML-DSA and has comprehensive 6 pseudo code for all its algorithms. 8 The base code for OpenSSL has been derived from the BoringSSL C++ code. 9 As OpenSSL is C code, templates can not be used. The OpenSSL code instead uses 13 ML-DSA Parameters & Per algorithm Functions 14 ------------------------------------------- 19 The constants include key sizes and coefficient ranges. 21 OpenSSL uses 3 key managers and 3 signature functions corresponding to the algorithms [all …]
|
| /freebsd/sys/dev/gpio/ |
| H A D | gpiokeys.c | 1 /*- 2 * Copyright (c) 2015-2016 Oleksandr Tymoshenko <gonzo@freebsd.org> 8 * 1. Redistributions of source code must retain the above copyright 65 #define GPIOKEYS_LOCK(_sc) mtx_lock(&(_sc)->sc_mtx) 66 #define GPIOKEYS_UNLOCK(_sc) mtx_unlock(&(_sc)->sc_mtx) 68 mtx_init(&_sc->sc_mtx, device_get_nameunit((_sc)->sc_dev), \ 70 #define GPIOKEYS_LOCK_DESTROY(_sc) mtx_destroy(&(_sc)->sc_mtx); 71 #define GPIOKEYS_ASSERT_LOCKED(_sc) mtx_assert(&(_sc)->sc_mtx, MA_OWNED) 73 #define GPIOKEY_LOCK(_key) mtx_lock(&(_key)->mtx) 74 #define GPIOKEY_UNLOCK(_key) mtx_unlock(&(_key)->mtx) [all …]
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | aes-riscv64-zvkned.pl | 2 # This file is dual-licensed, meaning that you can use it under your 20 # 1. Redistributions of source code must retain the above copyright 38 # - RV64I 39 # - RISC-V Vector ('V') with VLEN >= 128 40 # - RISC-V Vector AES block cipher extension ('Zvkned') 57 my $code=<<___; 67 # Load all 11 round keys to v1-v11 registers. 71 my $code=<<___; 96 return $code; 99 # Load all 13 round keys to v1-v13 registers. [all …]
|
| H A D | aest4-sparcv9.pl | 2 # Copyright 2012-2021 The OpenSSL Project Authors. All Rights Reserved. 12 # The module is licensed under 2-clause BSD license. October 2012. 34 # fetching input from memory, xor-ing it with zero-round key and 36 # at 64-bit boundary!] deviates from this equation by less than 0.5%: 38 # 128-bit key 192- 256- 43 # Out-of-order execution logic managed to fully overlap "collateral" 46 # As with Intel AES-NI, question is if it's possible to improve 51 # cycle, they don't saturate the 2-way issue pipeline and therefore 52 # there is room for "collateral" calculations... Yet, 2x speed-up 55 # 128-bit key 192- 256- [all …]
|
| /freebsd/contrib/ncurses/man/ |
| H A D | curs_getch.3x | 3 .\" Copyright 2018-2023,2024 Thomas E. Dickey * 4 .\" Copyright 1998-2016,2017 Free Software Foundation, Inc. * 32 .TH curs_getch 3X 2024-04-20 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "Library calls" 59 \fB\%has_key\fP \- 79 gathers a key stroke from the terminal keyboard associated with a 87 returns an integer identifying the key stroke; 90 Use of the control key as a modifier often results in a distinct code. 97 then if the no-delay flag is set in the window 153 returns the character code for line feed instead. 158 (those corresponding to the ECMA-6 character set\(emsee [all …]
|
| /freebsd/contrib/ntp/ntpd/ |
| H A D | invoke-ntp.keys.texi | 4 @cindex NTP symmetric key file format 7 # EDIT THIS FILE WITH CAUTION (invoke-ntp.keys.texi) 9 # It has been AutoGen-ed May 25, 2024 at 12:03:59 AM by AutoGen 5.18.16 11 # and the template file agtexi-file.tpl 16 This document describes the format of an NTP symmetric key file. 20 @code{ntp.conf(5)} 23 @code{ntpd(8)} 25 @code{-k} 27 @code{key [all...] |
| H A D | invoke-ntp.conf.texi | 7 # EDIT THIS FILE WITH CAUTION (invoke-ntp.conf.texi) 9 # It has been AutoGen-ed May 25, 2024 at 12:03:56 AM by AutoGen 5.18.16 11 # and the template file agtexi-file.tpl 17 @code{ntp.conf} 19 @code{ntpd(1ntpdmdoc)} 27 @code{-c} 42 host addresses written in numeric, dotted-quad form, 77 @code{pool}, 78 @code{serve [all...] |
| H A D | ntp.keys.html | 1 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> 3 <!-- Created by GNU Texinfo 6.6, http://www.gnu.org/software/texinfo/ --> 5 <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> 6 <title>NTP Symmetric Key</title> 8 <meta name="description" content="NTP Symmetric Key"> [all...] |
| /freebsd/crypto/openssl/crypto/rc4/asm/ |
| H A D | rc4-s390x.pl | 2 # Copyright 2009-2020 The OpenSSL Project Authors. All Rights Reserved. 25 # Adapt for -m31 build. If kernel supports what's called "highgprs" 26 # feature on Linux [see /proc/cpuinfo], it's possible to use 64-bit 27 # instructions and achieve "64-bit" performance even in 31-bit legacy 29 # processor, as long as it's "z-CPU". Latter implies that the code 31 # 50% better than code generated by gcc 4.3. 50 $code=<<___; 55 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 59 $key="%r2"; 69 $code.=<<___; [all …]
|
| /freebsd/crypto/openssl/crypto/camellia/asm/ |
| H A D | cmllt4-sparcv9.pl | 2 # Copyright 2012-2021 The OpenSSL Project Authors. All Rights Reserved. 12 # The module is licensed under 2-clause BSD 20 # to critical path lengths for 3-cycle instruction latency: 22 # 128-bit key 192/256- 27 # As with Intel AES-NI, question is if it's possible to improve 35 # 128-bit key 192/256- 42 # improved by ... 0% for 128-bit key, and 11% for 192/256-bit one. 43 # So that out-of-order execution logic can take non-interleaved code 50 # one byte in 38 cycles with 128-bit key on same processor. 63 # single-round subroutines [all …]
|
| /freebsd/sys/contrib/device-tree/src/arm/nxp/imx/ |
| H A D | imx6dl-prtvt7.dts | 1 // SPDX-License-Identifier: GPL-2.0-or-later OR MIT 6 /dts-v1/; 8 #include "imx6qdl-prti6q.dtsi" 9 #include <dt-bindings/display/sdtv-standards.h> 10 #include <dt-bindings/input/input.h> 11 #include <dt-bindings/leds/common.h> 12 #include <dt-bindings/sound/fsl-imx-audmux.h> 23 backlight_lcd: backlight-lcd { 24 compatible = "pwm-backlight"; 26 brightness-levels = <0 20 81 248 1000>; [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/krb/ |
| H A D | key.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 36 /* Create a krb5_key from the enctype and key data in a keyblock. */ 41 krb5_key key = NULL; in krb5_k_create_key() local 42 krb5_error_code code; in krb5_k_create_key() local 46 key = malloc(sizeof(*key)); in krb5_k_create_key() 47 if (key == NULL) in krb5_k_create_key() 49 code = krb5int_c_copy_keyblock_contents(context, key_data, &key->keyblock); in krb5_k_create_key() 50 if (code) in krb5_k_create_key() 53 key->refcount = 1; in krb5_k_create_key() 54 key->derived = NULL; in krb5_k_create_key() [all …]
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/Support/ |
| H A D | AMDGPUMetadata.h | 1 //===--- AMDGPUMetadata.h ---------------------------------------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 10 /// AMDGPU metadata definitions and in-memory representations. 13 //===----------------------------------------------------------------------===// 27 //===----------------------------------------------------------------------===// 29 //===----------------------------------------------------------------------===// 32 /// HSA metadata major version for code object V3. 34 /// HSA metadata minor version for code object V3. 37 /// HSA metadata major version for code object V4. [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/input/ |
| H A D | pxa27x-keypad.txt | 4 - compatible : should be "marvell,pxa27x-keypad" 5 - reg : Address and length of the register set for the device 6 - interrupts : The interrupt for the keypad controller 7 - marvell,debounce-interval : How long time the key will be 9 is debounce interval for direct key and bit[15:0] is debounce 10 interval for matrix key. The value is in binary number of 2ms 13 Please refer to matrix-keymap.txt 16 - marvell,direct-key-count : How many direct keyes are used. 17 - marvell,direct-key-mask : The mask indicates which keyes 18 are used. If bit[X] of the mask is set, the direct key X [all …]
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_kentry.h | 2 * validator/val_kentry.h - validator key entry definition. 12 * Redistributions of source code must retain the above copyright notice, 39 * This file contains functions for dealing with validator key entries. 51 * A key entry for the validator. 52 * This may or may not be a trusted key. 53 * This is what is stored in the key cache. 54 * This is the key part for the cache; the key entry key. 59 /** name of the key */ 63 /** class of the key, host byteorder */ 68 * Key entry for the validator. [all …]
|
| /freebsd/contrib/bearssl/inc/ |
| H A D | bearssl_block.h | 48 * initialised with the encryption key. 63 * - `br_xxx_BLOCK_SIZE` 69 * - `br_xxx_cbcenc_keys` 71 * Context structure that contains the subkeys resulting from the key 76 * - `br_xxx_cbcenc_init(br_xxx_cbcenc_keys *ctx, const void *key, size_t len)` 78 * Perform key expansion: subkeys for CBC encryption are computed and 79 * written in the provided context structure. The key length MUST be 83 * - `br_xxx_cbcenc_run(const br_xxx_cbcenc_keys *ctx, void *iv, void *data, size_t len)` 91 * - `br_xxx_cbcdec_keys` 93 * Context structure that contains the subkeys resulting from the key [all …]
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | k5sealv3iov.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 27 #include "k5-int.h" 39 krb5_error_code code = 0; in gss_krb5int_make_seal_token_v3_iov() local 50 krb5_key key; in gss_krb5int_make_seal_token_v3_iov() local 54 assert(ctx->proto == 1); in gss_krb5int_make_seal_token_v3_iov() 56 acceptor_flag = ctx->initiate ? 0 : FLAG_SENDER_IS_ACCEPTOR; in gss_krb5int_make_seal_token_v3_iov() 58 ? (ctx->initiate in gss_krb5int_make_seal_token_v3_iov() 61 : (ctx->initiate in gss_krb5int_make_seal_token_v3_iov() 64 if (ctx->have_acceptor_subkey) { in gss_krb5int_make_seal_token_v3_iov() 65 key = ctx->acceptor_subkey; in gss_krb5int_make_seal_token_v3_iov() [all …]
|
| /freebsd/crypto/openssh/regress/ |
| H A D | agent.sh | 6 SSH_AUTH_SOCK=/nonexistent ${SSHADD} -l > /dev/null 2>&1 7 if [ $? -ne 2 ]; then 8 fail "ssh-add -l did not fail with exit code 2" 11 trace "start agent, args ${EXTRA_AGENT_ARGS} -s" 12 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s` >`ssh_logfile ssh-agent` 14 if [ $r -ne 0 ]; then 15 fatal "could not start ssh-agent: exit code $r" 18 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s | sed 's/SSH_/FW_SSH_/g'` > /dev/null 20 if [ $r -ne 0 ]; then 21 fatal "could not start second ssh-agent: exit code $r" [all …]
|