Home
last modified time | relevance | path

Searched +full:x +full:- +full:ecc (Results 1 – 25 of 231) sorted by relevance

12345678910

/freebsd/sys/contrib/device-tree/Bindings/edac/
H A Daltr,socfpga-ecc-manager.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
4 ---
5 $id: http://devicetree.org/schemas/edac/altr,socfpga-ecc-manager.yaml#
6 $schema: http://devicetree.org/meta-schemas/core.yaml#
8 title: Altera SoCFPGA ECC Manager
11 - Matthew Gerlach <matthew.gerlach@altera.com>
15 ECC Manager for the Cyclone5, Arria5, Arria10, Stratix10, and Agilex chip
22 - items:
23 - const: altr,socfpga-s10-ecc-manager
24 - const: altr,socfpga-a10-ecc-manager
[all …]
/freebsd/sys/dev/amd_ecc_inject/
H A Decc_inject.c1 /*-
47 * See BKDG for AMD Family 15h Models 00h-0Fh Processors
48 * (publication 42301 Rev 3.08 - March 12, 2012):
49 * - 2.13.3.1 DRAM Error Injection
50 * - D18F3xB8 NB Array Address
51 * - D18F3xBC NB Array Data Port
52 * - D18F3xBC_x8 DRAM ECC
74 static int quadrant = 0; /* 0 - 3 */
75 static int word_mask = 0x001; /* 9 bits: 8 + 1 for ECC */
86 if (error || req->newptr == NULL) in sysctl_int_with_max()
[all …]
/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_fw_mmp_ids.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
4 /* --- (Automatically generated (relocation v. 1.3), do not modify manually) --- */
20 /**< Functionality ID for ECC SM2 point multiply [k]G
28 /**< Functionality ID for ECC SM2 point multiply [k]P
31 * icp_qat_fw_mmp_ecsm2_point_multiplication_input_s::x x @endlink @link
38 /**< Functionality ID for ECC SM2 point verify
39 * @li 2 input parameters : @link icp_qat_fw_mmp_ecsm2_point_verify_input_s::x x
44 /**< Functionality ID for ECC SM2 Sign RS
52 /**< Functionality ID for ECC SM2 Signature Verify
[all …]
H A Dicp_qat_fw_mmp.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
4 /* --- (Automatically generated (build v. 2.7), do not modify manually) --- */
44 * Input parameter list for ECC P384 Variable Point Multiplication [k]P ,
50 uint64_t xp; /**< xP = affine coordinate X of point P (6 qwords)*/
58 * Input parameter list for ECC P384 Generator Point Multiplication [k]G ,
70 * Input parameter list for ECC P384 ECDSA Sign RS ,
85 * Input parameter list for ECC P256 Variable Point Multiplication [k]P ,
91 uint64_t xp; /**< xP = affine coordinate X of point P (4 qwords)*/
99 * Input parameter list for ECC P256 Generator Point Multiplication [k]G ,
[all …]
/freebsd/sys/contrib/dev/iwlwifi/
H A Diwl-eeprom-read.c
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_mismatch_ecx.txt2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved.
17 PrivateKey=Alice-25519
18 -----BEGIN PRIVATE KEY-----
20 -----END PRIVATE KEY-----
22 PrivateKey=Alice-448
23 -----BEGIN PRIVATE KEY-----
26 -----END PRIVATE KEY-----
28 PublicKey=P-256-PUBLIC
29 -----BEGIN PUBLIC KEY-----
31 x/iUJAcsJxl9eLM7kg6VzbZk6ZDc8M/qDZTiqOavnQ5YBW5lMQSSW5/myQ==
[all …]
H A Devppkey_kas.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH #
23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs
25 PrivateKey=KAS-ECC-CDH_P-192_C0
26 -----BEGIN PRIVATE KEY-----
30 -----END PRIVATE KEY-----
32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC
33 -----BEGIN PUBLIC KEY-----
36 -----END PUBLIC KEY-----
38 PrivPubKeyPair = KAS-ECC-CDH_P-192_C0:KAS-ECC-CDH_P-192_C0-PUBLIC
[all …]
H A Devppkey_mismatch.txt2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved.
17 PublicKey=P-256-PUBLIC
18 -----BEGIN PUBLIC KEY-----
20 x/iUJAcsJxl9eLM7kg6VzbZk6ZDc8M/qDZTiqOavnQ5YBW5lMQSSW5/myQ==
21 -----END PUBLIC KEY-----
23 PublicKey=KAS-ECC-CDH_K-163_C0-PUBLIC
24 -----BEGIN PUBLIC KEY-----
27 -----END PUBLIC KEY-----
29 PrivateKey = RSA-2048
30 -----BEGIN PRIVATE KEY-----
[all …]
/freebsd/sys/contrib/device-tree/Bindings/mtd/
H A Datmel-nand.txt4 Documentation/devicetree/bindings/memory-controllers/atmel,ebi.txt).
6 The NAND controller might be connected to an ECC engine.
11 - compatible: should be one of the following
12 "atmel,at91rm9200-nand-controller"
13 "atmel,at91sam9260-nand-controller"
14 "atmel,at91sam9261-nand-controller"
15 "atmel,at91sam9g45-nand-controller"
16 "atmel,sama5d3-nand-controller"
17 "microchip,sam9x60-nand-controller"
18 - ranges: empty ranges property to forward EBI ranges definitions.
[all …]
/freebsd/secure/caroot/trusted/
H A DAtos_TrustedRoot_Root_CA_ECC_TLS_2021.pem2 ## Atos TrustedRoot Root CA ECC TLS 2021
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE
24 Subject: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DGlobalSign_ECC_Root_CA_-_R4.pem2 ## GlobalSign ECC Root CA - R4
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA256
20 Issuer: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign
24 Subject: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (256 bit)
35 NIST CURVE: P-256
43 Signature Algorithm: ecdsa-with-SHA256
50 -----BEGIN CERTIFICATE-----
[all …]
H A DTrustwave_Global_ECC_P256_Certification_Authority.pem2 ## Trustwave Global ECC P256 Certification Authority
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA256
20 …linois, L = Chicago, O = "Trustwave Holdings, Inc.", CN = Trustwave Global ECC P256 Certification …
24 …linois, L = Chicago, O = "Trustwave Holdings, Inc.", CN = Trustwave Global ECC P256 Certification …
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (256 bit)
35 NIST CURVE: P-256
43 Signature Algorithm: ecdsa-with-SHA256
50 -----BEGIN CERTIFICATE-----
[all …]
H A DemSign_ECC_Root_CA_-_C3.pem2 ## emSign ECC Root CA - C3
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3
24 Subject: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DAffirmTrust_Premium_ECC.pem2 ## AffirmTrust Premium ECC
4 ## This is a single X.509 certificate for a public Certificate
18 Signature Algorithm: ecdsa-with-SHA384
19 Issuer: C = US, O = AffirmTrust, CN = AffirmTrust Premium ECC
23 Subject: C = US, O = AffirmTrust, CN = AffirmTrust Premium ECC
25 Public Key Algorithm: id-ecPublicKey
26 Public-Key: (384 bit)
36 NIST CURVE: P-384
44 Signature Algorithm: ecdsa-with-SHA384
53 -----BEGIN CERTIFICATE-----
[all …]
H A DSecurity_Communication_ECC_RootCA1.pem2 ## Security Communication ECC RootCA1
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: C = JP, O = "SECOM Trust Systems CO.,LTD.", CN = Security Communication ECC RootCA1
24 Subject: C = JP, O = "SECOM Trust Systems CO.,LTD.", CN = Security Communication ECC RootCA1
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DGlobalSign_ECC_Root_CA_-_R5.pem2 ## GlobalSign ECC Root CA - R5
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign
24 Subject: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DemSign_ECC_Root_CA_-_G3.pem2 ## emSign ECC Root CA - G3
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 … Issuer: C = IN, OU = emSign PKI, O = eMudhra Technologies Limited, CN = emSign ECC Root CA - G3
24 … Subject: C = IN, OU = emSign PKI, O = eMudhra Technologies Limited, CN = emSign ECC Root CA - G3
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DCommScope_Public_Trust_ECC_Root-01.pem2 ## CommScope Public Trust ECC Root-01
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-01
24 Subject: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-01
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DCommScope_Public_Trust_ECC_Root-02.pem2 ## CommScope Public Trust ECC Root-02
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-02
24 Subject: C = US, O = CommScope, CN = CommScope Public Trust ECC Root-02
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DMicrosoft_ECC_Root_Certificate_Authority_2017.pem2 ## Microsoft ECC Root Certificate Authority 2017
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 … Issuer: C = US, O = Microsoft Corporation, CN = Microsoft ECC Root Certificate Authority 2017
24 … Subject: C = US, O = Microsoft Corporation, CN = Microsoft ECC Root Certificate Authority 2017
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
47 Signature Algorithm: ecdsa-with-SHA384
56 -----BEGIN CERTIFICATE-----
[all …]
H A DCOMODO_ECC_Certification_Authority.pem2 ## COMODO ECC Certification Authority
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 …, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Autho…
24 …, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Autho…
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
H A DDigiCert_TLS_ECC_P384_Root_G5.pem2 ## DigiCert TLS ECC P384 Root G5
4 ## This is a single X.509 certificate for a public Certificate
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: C = US, O = "DigiCert, Inc.", CN = DigiCert TLS ECC P384 Root G5
24 Subject: C = US, O = "DigiCert, Inc.", CN = DigiCert TLS ECC P384 Root G5
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
[all …]
/freebsd/sys/dev/flash/
H A Dw25n.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
88 #define W25N_LOCK(_sc) mtx_lock(&(_sc)->sc_mtx)
89 #define W25N_UNLOCK(_sc) mtx_unlock(&(_sc)->sc_mtx)
91 mtx_init(&_sc->sc_mtx, device_get_nameunit(_sc->sc_dev), \
93 #define W25N_LOCK_DESTROY(_sc) mtx_destroy(&_sc->sc_mtx);
94 #define W25N_ASSERT_LOCKED(_sc) mtx_assert(&_sc->sc_mtx, MA_OWNED);
95 #define W25N_ASSERT_UNLOCKED(_sc) mtx_assert(&_sc->sc_mtx, MA_NOTOWNED);
128 err = SPIBUS_TRANSFER(sc->sc_parent, sc->sc_dev, &cmd); in w25n_read_status_register()
163 err = SPIBUS_TRANSFER(sc->sc_parent, sc->sc_dev, &cmd); in w25n_set_page_address()
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_security_level.31 .\" -*- mode: troff; coding: utf-8 -*-
35 .\" entries marked with X<> in POD. Of course, you'll have to process the
58 .TH SSL_CTX_SET_SECURITY_LEVEL 3ossl 2025-09-30 3.5.4 OpenSSL
64 …security_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data \- SSL/TLS security fra…
131 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits
140 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited.
146 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited.
152 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are
157 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited.
164 setting \fB\-DOPENSSL_TLS_SECURITY_LEVEL=level\fR. If not set then 2 is used.
[all …]
/freebsd/crypto/openssl/crypto/ec/
H A Dec_key.c2 * Copyright 2002-2025 The OpenSSL Project Authors. All Rights Reserved.
51 ret->group = EC_GROUP_new_by_curve_name_ex(ctx, propq, nid); in EC_KEY_new_by_curve_name_ex()
52 if (ret->group == NULL) { in EC_KEY_new_by_curve_name_ex()
56 if (ret->meth->set_group != NULL in EC_KEY_new_by_curve_name_ex()
57 && ret->meth->set_group(ret, ret->group) == 0) { in EC_KEY_new_by_curve_name_ex()
78 CRYPTO_DOWN_REF(&r->references, &i); in EC_KEY_free()
84 if (r->meth != NULL && r->meth->finish != NULL) in EC_KEY_free()
85 r->meth->finish(r); in EC_KEY_free()
88 ENGINE_finish(r->engine); in EC_KEY_free()
91 if (r->group && r->group->meth->keyfinish) in EC_KEY_free()
[all …]

12345678910