/netbsd/external/gpl3/gcc/dist/libiberty/ |
H A D | physmem.c | 96 struct pst_static pss; in physmem_total() local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) in physmem_total() 99 double pages = pss.physical_memory; in physmem_total() 100 double pagesize = pss.page_size; in physmem_total() 200 struct pst_static pss; in physmem_available() local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) in physmem_available() 206 double pagesize = pss.page_size; in physmem_available()
|
/netbsd/external/gpl3/gcc/dist/libgcc/ |
H A D | generic-morestack.c | 438 pss->prev = NULL; in allocate_segment() 439 pss->next = NULL; in allocate_segment() 443 pss->extra = NULL; in allocate_segment() 445 return pss; in allocate_segment() 492 pss = *pp; in __morestack_release_segments() 493 while (pss != NULL) in __morestack_release_segments() 498 next = pss->next; in __morestack_release_segments() 522 pss = next; in __morestack_release_segments() 819 for (pss = __morestack_current_segment; pss != NULL; pss = pss->prev) in __generic_findstack() 822 && (char *) pss + pss->size > (char *) stack) in __generic_findstack() [all …]
|
/netbsd/external/gpl3/gcc/dist/gcc/ |
H A D | tree-ssa-strlen.cc | 3281 stridx_strlenloc *pss = strlen_to_stridx->get (len); in handle_builtin_stxncpy_strncat() local 3282 if (!pss || pss->first <= 0) in handle_builtin_stxncpy_strncat() 3293 strinfo *silen = get_strinfo (pss->first); in handle_builtin_stxncpy_strncat() 3331 location_t strlenloc = pss->second; in handle_builtin_stxncpy_strncat()
|
H A D | modulo-sched.cc | 1873 auto_sbitmap pss (ps->g->num_nodes); in get_sched_window() local 1883 bitmap_clear (pss); in get_sched_window() 1885 pss_not_empty = bitmap_and (pss, u_node_succs, sched_nodes); in get_sched_window()
|
H A D | tree-ssa-strlen.c | 3393 stridx_strlenloc *pss = strlen_to_stridx->get (len); in handle_builtin_stxncpy_strncat() local 3394 if (!pss || pss->first <= 0) in handle_builtin_stxncpy_strncat() 3405 strinfo *silen = get_strinfo (pss->first); in handle_builtin_stxncpy_strncat() 3434 location_t strlenloc = pss->second; in handle_builtin_stxncpy_strncat()
|
/netbsd/external/gpl3/gcc/dist/gcc/fortran/ |
H A D | trans-array.cc | 4085 gfc_ss *ss, *pss; in gfc_trans_preloop_setup() local 4122 pss = ss->parent; in gfc_trans_preloop_setup() 4126 gcc_assert (ss_info == pss->info); in gfc_trans_preloop_setup() 4131 pss = ss; in gfc_trans_preloop_setup() 4169 add_array_offset (pblock, ploop, ss, ar, pss->dim[i], i); in gfc_trans_preloop_setup()
|
/netbsd/external/gpl3/gcc.old/dist/gcc/ |
H A D | tree-ssa-strlen.c | 3393 stridx_strlenloc *pss = strlen_to_stridx->get (len); in handle_builtin_stxncpy_strncat() local 3394 if (!pss || pss->first <= 0) in handle_builtin_stxncpy_strncat() 3405 strinfo *silen = get_strinfo (pss->first); in handle_builtin_stxncpy_strncat() 3434 location_t strlenloc = pss->second; in handle_builtin_stxncpy_strncat()
|
/netbsd/external/gpl3/gcc.old/dist/ |
H A D | MD5SUMS | 84401 4964b318f863948a2719997de22b158f libgo/go/crypto/rsa/pss.go 84405 164dcaca31277eda4b7aaeec705a46c8 libgo/go/crypto/rsa/testdata/pss-vect.txt.bz2
|
/netbsd/doc/ |
H A D | CHANGES.prev | 8018 pss(4): Remove the pss(4) driver. It has never been workable.
|
/netbsd/external/gpl3/gcc/dist/ |
H A D | MD5SUMS | 84401 4964b318f863948a2719997de22b158f libgo/go/crypto/rsa/pss.go 84405 164dcaca31277eda4b7aaeec705a46c8 libgo/go/crypto/rsa/testdata/pss-vect.txt.bz2
|
/netbsd/distrib/sets/lists/man/ |
H A D | mi | 1655 ./usr/share/man/cat4/pss.0 man-obsolete obsolete 8209 ./usr/share/man/man4/pss.4 man-obsolete obsolete
|
/netbsd/crypto/external/bsd/openssl/dist/test/certs/ |
H A D | setup.sh | 404 ./mkcert.sh genee PSS-SHA1 ee-key ee-pss-sha1-cert ca-key ca-cert \ 405 -sha1 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest 407 ./mkcert.sh genee PSS-SHA256 ee-key ee-pss-sha256-cert ca-key ca-cert \ 408 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest 410 ./mkcert.sh genca "CA-PSS" ca-pss-key ca-pss-cert root-key root-cert \ 411 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 412 ./mkcert.sh genee "EE-PSS" ee-key ee-pss-cert ca-pss-key ca-pss-cert \ 413 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 422 -newkey rsa-pss -keyout server-pss-restrict-key.pem \ 425 server-pss-restrict-cert rootkey rootcert
|
/netbsd/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
H A D | rsa_sig.c | 423 const RSA_PSS_PARAMS_30 *pss = in rsa_signverify_init() local 426 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { in rsa_signverify_init() 427 int md_nid = ossl_rsa_pss_params_30_hashalg(pss); in rsa_signverify_init() 428 int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); in rsa_signverify_init() 429 int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss); in rsa_signverify_init()
|
/netbsd/crypto/external/bsd/openssl/dist/crypto/err/ |
H A D | openssl.txt | 1065 PROV_R_PSS_SALTLEN_TOO_SMALL:172:pss saltlen too small 1177 RSA_R_INVALID_PSS_PARAMETERS:149:invalid pss parameters 1178 RSA_R_INVALID_PSS_SALTLEN:146:invalid pss saltlen 1204 RSA_R_PSS_SALTLEN_TOO_SMALL:164:pss saltlen too small
|
/netbsd/crypto/external/bsd/openssl/dist/test/ssl-tests/ |
H A D | 20-cert-select.cnf | 457 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 916 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 918 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 942 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 944 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 969 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 971 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 1097 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 1099 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 1121 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem [all …]
|
H A D | 20-cert-select.cnf.in | 26 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 27 "PSS.PrivateKey" => test_pem("server-pss-key.pem"), 38 "Certificate" => test_pem("server-pss-cert.pem"), 39 "PrivateKey" => test_pem("server-pss-key.pem"), 43 "Certificate" => test_pem("server-pss-restrict-cert.pem"), 44 "PrivateKey" => test_pem("server-pss-restrict-key.pem"), 56 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 57 "PSS.PrivateKey" => test_pem("server-pss-key.pem"),
|
/netbsd/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 256 Ctrl = rsa_padding_mode:pss 289 Ctrl = rsa_padding_mode:pss 295 Ctrl = rsa_padding_mode:pss 301 Ctrl = rsa_padding_mode:pss 307 Ctrl = rsa_padding_mode:pss 313 Ctrl = rsa_padding_mode:pss 319 Ctrl = rsa_padding_mode:pss 334 Ctrl = rsa_padding_mode:pss 340 Ctrl = rsa_padding_mode:pss 346 Ctrl = rsa_padding_mode:pss [all …]
|
H A D | evppkey_rsa_common.txt | 360 Ctrl = rsa_padding_mode:pss 367 Ctrl = rsa_padding_mode:pss 375 Ctrl = rsa_padding_mode:pss 382 Ctrl = rsa_padding_mode:pss 391 Ctrl = rsa_padding_mode:pss 400 Ctrl = rsa_padding_mode:pss 409 Ctrl = rsa_padding_mode:pss 417 Ctrl = rsa_padding_mode:pss 477 Ctrl = rsa_padding_mode:pss 483 Ctrl = rsa_padding_mode:pss [all …]
|
/netbsd/crypto/external/bsd/openssl/dist/test/ |
H A D | acvp_test.inc | 1224 "pss", 1876 "pss", 1887 "pss",
|
/netbsd/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
H A D | encode_key2any.c | 832 const RSA_PSS_PARAMS_30 *pss = ossl_rsa_get0_pss_params_30((RSA *)rsa); in prepare_rsa_params() local 842 if (ossl_rsa_pss_params_30_is_unrestricted(pss)) { in prepare_rsa_params() 865 if (!ossl_DER_w_RSASSA_PSS_params(&pkt, -1, pss) in prepare_rsa_params()
|
/netbsd/crypto/external/bsd/openssl/dist/providers/common/include/prov/ |
H A D | der_rsa.h.in | 25 const RSA_PSS_PARAMS_30 *pss); 30 const RSA_PSS_PARAMS_30 *pss);
|
/netbsd/crypto/external/bsd/openssl/dist/providers/common/der/ |
H A D | der_rsa_key.c | 248 const RSA_PSS_PARAMS_30 *pss) in DER_w_MaskGenAlgorithm() argument 250 if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { in DER_w_MaskGenAlgorithm() 284 const RSA_PSS_PARAMS_30 *pss) in ossl_DER_w_RSASSA_PSS_params() argument 300 if (!ossl_assert(pss != NULL in ossl_DER_w_RSASSA_PSS_params() 301 && !ossl_rsa_pss_params_30_is_unrestricted(pss))) in ossl_DER_w_RSASSA_PSS_params() 304 hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); in ossl_DER_w_RSASSA_PSS_params() 305 saltlen = ossl_rsa_pss_params_30_saltlen(pss); in ossl_DER_w_RSASSA_PSS_params() 306 trailerfield = ossl_rsa_pss_params_30_trailerfield(pss); in ossl_DER_w_RSASSA_PSS_params() 352 && DER_w_MaskGenAlgorithm(pkt, 1, pss) in ossl_DER_w_RSASSA_PSS_params() 387 || ossl_rsa_pss_params_30_is_unrestricted(pss) in ossl_DER_w_algorithmIdentifier_RSA_PSS() [all …]
|
/netbsd/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | rsa.h | 71 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 77 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss); 78 int ossl_rsa_pss_get_param_unverified(const RSA_PSS_PARAMS *pss,
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | EVP_SIGNATURE-RSA.pod | 39 =item "pss" (B<OSSL_PKEY_RSA_PAD_MODE_PSS>) 45 The digest algorithm name to use for the maskGenAlgorithm used by "pss" mode. 54 The "pss" mode minimum salt length. The value can either be an integer,
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 236 for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS. 249 For B<pss> mode only sign and verify are supported and the digest type must be 254 For B<pss> mode only this option specifies the salt length. Three special 284 restrictions. The padding mode can only be set to B<pss> which is the
|