| /freebsd/sys/contrib/device-tree/Bindings/edac/ |
| H A D | altr,socfpga-ecc-manager.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 4 --- 5 $id: http://devicetree.org/schemas/edac/altr,socfpga-ecc-manager.yaml# 6 $schema: http://devicetree.org/meta-schemas/core.yaml# 8 title: Altera SoCFPGA ECC Manager 11 - Matthew Gerlach <matthew.gerlach@altera.com> 15 ECC Manager for the Cyclone5, Arria5, Arria10, Stratix10, and Agilex chip 22 - items: 23 - const: altr,socfpga-s10-ecc-manager 24 - const: altr,socfpga-a10-ecc-manager [all …]
|
| /freebsd/sys/dev/amd_ecc_inject/ |
| H A D | ecc_inject.c | 1 /*- 47 * See BKDG for AMD Family 15h Models 00h-0Fh Processors 48 * (publication 42301 Rev 3.08 - March 12, 2012): 49 * - 2.13.3.1 DRAM Error Injection 50 * - D18F3xB8 NB Array Address 51 * - D18F3xBC NB Array Data Port 52 * - D18F3xBC_x8 DRAM ECC 74 static int quadrant = 0; /* 0 - 3 */ 75 static int word_mask = 0x001; /* 9 bits: 8 + 1 for ECC */ 86 if (error || req->newptr == NULL) in sysctl_int_with_max() [all …]
|
| /freebsd/sys/dev/qat/qat_api/firmware/include/ |
| H A D | icp_qat_fw_mmp_ids.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 4 /* --- (Automatically generated (relocation v. 1.3), do not modify manually) --- */ 20 /**< Functionality ID for ECC SM2 point multiply [k]G 28 /**< Functionality ID for ECC SM2 point multiply [k]P 31 * icp_qat_fw_mmp_ecsm2_point_multiplication_input_s::x x @endlink @link 38 /**< Functionality ID for ECC SM2 point verify 39 * @li 2 input parameters : @link icp_qat_fw_mmp_ecsm2_point_verify_input_s::x x 44 /**< Functionality ID for ECC SM2 Sign RS 52 /**< Functionality ID for ECC SM2 Signature Verify [all …]
|
| H A D | icp_qat_fw_mmp.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 4 /* --- (Automatically generated (build v. 2.7), do not modify manually) --- */ 44 * Input parameter list for ECC P384 Variable Point Multiplication [k]P , 50 uint64_t xp; /**< xP = affine coordinate X of point P (6 qwords)*/ 58 * Input parameter list for ECC P384 Generator Point Multiplication [k]G , 70 * Input parameter list for ECC P384 ECDSA Sign RS , 85 * Input parameter list for ECC P256 Variable Point Multiplication [k]P , 91 uint64_t xp; /**< xP = affine coordinate X of point P (4 qwords)*/ 99 * Input parameter list for ECC P256 Generator Point Multiplication [k]G , [all …]
|
| /freebsd/sys/contrib/dev/iwlwifi/ |
| H A D | iwl-eeprom-read.c | |
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_mismatch_ecx.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 17 PrivateKey=Alice-25519 18 -----BEGIN PRIVATE KEY----- 20 -----END PRIVATE KEY----- 22 PrivateKey=Alice-448 23 -----BEGIN PRIVATE KEY----- 26 -----END PRIVATE KEY----- 28 PublicKey=P-256-PUBLIC 29 -----BEGIN PUBLIC KEY----- 31 x/iUJAcsJxl9eLM7kg6VzbZk6ZDc8M/qDZTiqOavnQ5YBW5lMQSSW5/myQ== [all …]
|
| H A D | evppkey_kas.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH # 23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs 25 PrivateKey=KAS-ECC-CDH_P-192_C0 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC 33 -----BEGIN PUBLIC KEY----- 36 -----END PUBLIC KEY----- 38 PrivPubKeyPair = KAS-ECC-CDH_P-192_C0:KAS-ECC-CDH_P-192_C0-PUBLIC [all …]
|
| H A D | evppkey_mismatch.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 17 PublicKey=P-256-PUBLIC 18 -----BEGIN PUBLIC KEY----- 20 x/iUJAcsJxl9eLM7kg6VzbZk6ZDc8M/qDZTiqOavnQ5YBW5lMQSSW5/myQ== 21 -----END PUBLIC KEY----- 23 PublicKey=KAS-ECC-CDH_K-163_C0-PUBLIC 24 -----BEGIN PUBLIC KEY----- 27 -----END PUBLIC KEY----- 29 PrivateKey = RSA-2048 30 -----BEGIN PRIVATE KEY----- [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/mtd/ |
| H A D | atmel-nand.txt | 4 Documentation/devicetree/bindings/memory-controllers/atmel,ebi.txt). 6 The NAND controller might be connected to an ECC engine. 11 - compatible: should be one of the following 12 "atmel,at91rm9200-nand-controller" 13 "atmel,at91sam9260-nand-controller" 14 "atmel,at91sam9261-nand-controller" 15 "atmel,at91sam9g45-nand-controller" 16 "atmel,sama5d3-nand-controller" 17 "microchip,sam9x60-nand-controller" 18 - ranges: empty ranges property to forward EBI ranges definitions. [all …]
|
| /freebsd/secure/caroot/trusted/ |
| H A D | Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem | 2 ## Atos TrustedRoot Root CA ECC TLS 2021 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE 24 Subject: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | GlobalSign_ECC_Root_CA_-_R4.pem | 2 ## GlobalSign ECC Root CA - R4 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA256 20 Issuer: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign 24 Subject: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (256 bit) 35 NIST CURVE: P-256 43 Signature Algorithm: ecdsa-with-SHA256 50 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | Trustwave_Global_ECC_P256_Certification_Authority.pem | 2 ## Trustwave Global ECC P256 Certification Authority 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA256 20 …linois, L = Chicago, O = "Trustwave Holdings, Inc.", CN = Trustwave Global ECC P256 Certification … 24 …linois, L = Chicago, O = "Trustwave Holdings, Inc.", CN = Trustwave Global ECC P256 Certification … 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (256 bit) 35 NIST CURVE: P-256 43 Signature Algorithm: ecdsa-with-SHA256 50 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | emSign_ECC_Root_CA_-_C3.pem | 2 ## emSign ECC Root CA - C3 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3 24 Subject: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | AffirmTrust_Premium_ECC.pem | 2 ## AffirmTrust Premium ECC 4 ## This is a single X.509 certificate for a public Certificate 18 Signature Algorithm: ecdsa-with-SHA384 19 Issuer: C = US, O = AffirmTrust, CN = AffirmTrust Premium ECC 23 Subject: C = US, O = AffirmTrust, CN = AffirmTrust Premium ECC 25 Public Key Algorithm: id-ecPublicKey 26 Public-Key: (384 bit) 36 NIST CURVE: P-384 44 Signature Algorithm: ecdsa-with-SHA384 53 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | Security_Communication_ECC_RootCA1.pem | 2 ## Security Communication ECC RootCA1 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: C = JP, O = "SECOM Trust Systems CO.,LTD.", CN = Security Communication ECC RootCA1 24 Subject: C = JP, O = "SECOM Trust Systems CO.,LTD.", CN = Security Communication ECC RootCA1 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | GlobalSign_ECC_Root_CA_-_R5.pem | 2 ## GlobalSign ECC Root CA - R5 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign 24 Subject: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | emSign_ECC_Root_CA_-_G3.pem | 2 ## emSign ECC Root CA - G3 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 … Issuer: C = IN, OU = emSign PKI, O = eMudhra Technologies Limited, CN = emSign ECC Root CA - G3 24 … Subject: C = IN, OU = emSign PKI, O = eMudhra Technologies Limited, CN = emSign ECC Root CA - G3 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | CommScope_Public_Trust_ECC_Root-01.pem | 2 ## CommScope Public Trust ECC Root-01 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-01 24 Subject: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-01 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | CommScope_Public_Trust_ECC_Root-02.pem | 2 ## CommScope Public Trust ECC Root-02 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-02 24 Subject: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-02 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | Microsoft_ECC_Root_Certificate_Authority_2017.pem | 2 ## Microsoft ECC Root Certificate Authority 2017 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 … Issuer: C = US, O = Microsoft Corporation, CN = Microsoft ECC Root Certificate Authority 2017 24 … Subject: C = US, O = Microsoft Corporation, CN = Microsoft ECC Root Certificate Authority 2017 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 47 Signature Algorithm: ecdsa-with-SHA384 56 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | COMODO_ECC_Certification_Authority.pem | 2 ## COMODO ECC Certification Authority 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 …, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Autho… 24 …, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Autho… 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| H A D | DigiCert_TLS_ECC_P384_Root_G5.pem | 2 ## DigiCert TLS ECC P384 Root G5 4 ## This is a single X.509 certificate for a public Certificate 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: C = US, O = "DigiCert, Inc.", CN = DigiCert TLS ECC P384 Root G5 24 Subject: C = US, O = "DigiCert, Inc.", CN = DigiCert TLS ECC P384 Root G5 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- [all …]
|
| /freebsd/sys/dev/flash/ |
| H A D | w25n.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 88 #define W25N_LOCK(_sc) mtx_lock(&(_sc)->sc_mtx) 89 #define W25N_UNLOCK(_sc) mtx_unlock(&(_sc)->sc_mtx) 91 mtx_init(&_sc->sc_mtx, device_get_nameunit(_sc->sc_dev), \ 93 #define W25N_LOCK_DESTROY(_sc) mtx_destroy(&_sc->sc_mtx); 94 #define W25N_ASSERT_LOCKED(_sc) mtx_assert(&_sc->sc_mtx, MA_OWNED); 95 #define W25N_ASSERT_UNLOCKED(_sc) mtx_assert(&_sc->sc_mtx, MA_NOTOWNED); 128 err = SPIBUS_TRANSFER(sc->sc_parent, sc->sc_dev, &cmd); in w25n_read_status_register() 163 err = SPIBUS_TRANSFER(sc->sc_parent, sc->sc_dev, &cmd); in w25n_set_page_address() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_CTX_set_security_level.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 35 .\" entries marked with X<> in POD. Of course, you'll have to process the 58 .TH SSL_CTX_SET_SECURITY_LEVEL 3ossl 2025-09-30 3.5.4 OpenSSL 64 …security_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data \- SSL/TLS security fra… 131 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits 140 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited. 146 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited. 152 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are 157 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited. 164 setting \fB\-DOPENSSL_TLS_SECURITY_LEVEL=level\fR. If not set then 2 is used. [all …]
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ec_key.c | 2 * Copyright 2002-2025 The OpenSSL Project Authors. All Rights Reserved. 51 ret->group = EC_GROUP_new_by_curve_name_ex(ctx, propq, nid); in EC_KEY_new_by_curve_name_ex() 52 if (ret->group == NULL) { in EC_KEY_new_by_curve_name_ex() 56 if (ret->meth->set_group != NULL in EC_KEY_new_by_curve_name_ex() 57 && ret->meth->set_group(ret, ret->group) == 0) { in EC_KEY_new_by_curve_name_ex() 78 CRYPTO_DOWN_REF(&r->references, &i); in EC_KEY_free() 84 if (r->meth != NULL && r->meth->finish != NULL) in EC_KEY_free() 85 r->meth->finish(r); in EC_KEY_free() 88 ENGINE_finish(r->engine); in EC_KEY_free() 91 if (r->group && r->group->meth->keyfinish) in EC_KEY_free() [all …]
|