| /freebsd-src/sbin/md5/ |
| H A D | Makefile | 2 PROG= md5 4 LINKS= ${BINDIR}/md5 ${BINDIR}/md5sum \ 5 ${BINDIR}/md5 ${BINDIR}/rmd160 \ 6 ${BINDIR}/md5 ${BINDIR}/rmd160sum \ 7 ${BINDIR}/md5 ${BINDIR}/sha1 \ 8 ${BINDIR}/md5 ${BINDIR}/sha1sum \ 9 ${BINDIR}/md5 ${BINDIR}/sha224 \ 10 ${BINDIR}/md5 ${BINDIR}/sha224sum \ 11 ${BINDIR}/md5 ${BINDIR}/sha256 \ 12 ${BINDIR}/md5 [all...] |
| H A D | md5.1 | 5 .Nm md5 , sha1 , sha224 , sha256 , sha384 , 57 .Nm md5 , sha1 , sha224 , sha256 , sha384 , sha512 , sha512t224 , sha512t256 , 99 The MD5 and SHA-1 algorithms have been proven to be vulnerable to practical 282 .Nm md5 , sha1 , sha224 , sha256 , sha384 , sha512 , 303 Calculate the MD5 checksum of the string 306 $ md5 -s Hello 307 MD5 ("Hello") = 8b1a9953c4611296a827abf8c47804d7 313 $ echo -n Hello | md5 319 $ md5 -r /boot/loader.conf /etc/rc.conf 349 $ md5 /boot/loader.conf > digest && md5 -c $(cut -f2 -d= digest) /boot/loader.conf [all …]
|
| /freebsd-src/contrib/netbsd-tests/sbin/resize_ffs/ |
| H A D | testdata.md5 | 1 MD5 (1024) = eadce85bc513cc7b9b46c027ce07ccdb 2 MD5 (1025) = 3cf2a95b3af7377ca81ff08265534334 3 MD5 (131072) = 3bf5f82ad5e1f8878caa699548cc0955 4 MD5 (131073) = 3423d2f10e3abb20e1ceae4b055f5071 5 MD5 (16384) = 933f03c66d4e2da32089ed994c9b34bd 6 MD5 (16385) = d0b296920f44ef298880a2d963066026 7 MD5 (2048) = fb03fb8916dd57f9648f89a06bb46f06 8 MD5 (2049) = f2e489640fc3af5f09352d27717d832e 9 MD5 (32768) = d940d6ccf83aeb00e71b9bbeaf860962 10 MD5 (32769) = 760e060cefd844c082a10b3bef1408f7 [all …]
|
| /freebsd-src/crypto/openssl/crypto/rc4/asm/ |
| H A D | rc4-md5-x86_64.pl | 19 # This is RC4+MD5 "stitch" implementation. The idea, as spelled in 26 # and Jim Guilford of Intel. MD5 is fresh implementation aiming to 28 # weaved into it, one RC4 round per one MD5 round. In addition to the 34 # RC4 MD5 RC4+MD5 stitch gain 50 my ($rc4,$md5)=(1,1); # what to generate? 51 my $D="#" if (!$md5); # if set to "#", MD5 is stitched into RC4(), 74 if ($rc4 && !$md5) { 77 } elsif ($md5 && !$rc4) { 88 # const void *inp, # MD5 input 112 my @V=("%r8d","%r9d","%r10d","%r11d"); # MD5 registers [all …]
|
| /freebsd-src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmd_md.txt | 83 Title = MD5 tests 85 Digest = MD5 89 Digest = MD5 93 Digest = MD5 97 Digest = MD5 101 Digest = MD5 105 Digest = MD5 109 Digest = MD5 113 Title = MD5-SHA1 115 Digest = MD5-SHA1 [all …]
|
| /freebsd-src/crypto/openssl/crypto/md5/ |
| H A D | build.info | 5 $MD5ASM_x86=md5-586.S 6 $MD5ASM_x86_64=md5-x86_64.s 7 $MD5ASM_sparcv9=md5-sparcv9.S 21 # without conditioning this on dso. The issue is MD5 which is needed in the 35 GENERATE[md5-586.S]=asm/md5-586.pl 37 GENERATE[md5-x86_64.s]=asm/md5-x86_64.pl 39 GENERATE[md5-sparcv9.S]=asm/md5-sparcv9.pl 40 INCLUDE[md5-sparcv9.o]=..
|
| /freebsd-src/contrib/ntp/html/ |
| H A D | authentic.html | 51 RSA Message Digest 5 (MD5) algorithm commonly called keyed-MD5. 54 server. The MD5 message digest algorithm is included in the 115 such as MD5, SHA, or AES-128 CMAC. When authentication is specified, 146 permitted key type is MD5.</p> 156 1 MD5 L";Nw<`.I<f4U0)247"i # MD5 key 157 2 MD5 &>l0%XXK9O'51VwV<xq~ # MD5 key 158 3 MD5 lb4zLW~d^!K:]RsD'qb6 # MD5 key 159 4 MD5 Yue:tL[+vR)M`n~bY,'? # MD5 key 160 5 MD5 B;fxlKgr/&4ZTbL6=RxA # MD5 key 161 6 MD5 4eYwa`o}3i@@V@..R9!l # MD5 key [all …]
|
| H A D | keygen.html | 31 …<p id="intro"><tt>ntp-keygen [ -deGHIMPT ] [ -b <i>modulus</i> ] [ -c [ RSA-MD2 | RSA-MD5 | RSA-SHA 47 containing ten pseudo-random printable ASCII strings suitable for the MD5 98 default RSA host key and matching RSA-MD5 certificate with expiration 115 default, the signature message digest type is MD5, but any combination 137 …<dt><tt>-c [ RSA-MD2 | RSA-MD5 | RSA-SHA | RSA-SHA1 | RSA-MDC2 | RSA-RIPEMD160 | DSA-SHA | DSA-SHA… 141 option is <tt>RSA-MD5</tt>. If compatibility with FIPS 140-2 is 185 <dd>Generate a new keys file containing 10 MD5 keys and 10 SHA keys. 186 An MD5 key is a string of 20 random printable ASCII characters, 292 1 MD5 L";Nw<`.I<f4U0)247"i # MD5 key 293 2 MD5 &>l0%XXK9O'51VwV<xq~ # MD5 key [all …]
|
| /freebsd-src/contrib/wpa/wpa_supplicant/ |
| H A D | eap_testing.txt | 52 EAP-MD5 + - - + + + + + - - + + 60 EAP-PEAPv0/MD5 + - - + + + + + - - + - 71 EAP-PEAPv1/MD5 - - - + + +1 + +5 - - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 106 EAP-FAST/MD5(aprov) - - - - - + - - - - + - 111 EAP-FAST/MD5(auth) - - - - - + - - - - + - 142 - EAP-MD5-Challenge 148 - EAP-PEAPv0 / MD5-Challenge 150 - EAP-TTLS / EAP-MD5-Challenge 166 - EAP-MD5 [all …]
|
| /freebsd-src/contrib/ntp/util/ |
| H A D | ntp-keygen.texi | 72 MD5 message digest algorithm included in the distribution. 135 default RSA host key and matching RSA-MD5 certificate with expiration 157 message digest type is MD5, but any combination of sign key type and 243 1 MD5 "]!ghT%O;3)WJ,/Nc:>I # MD5 key 244 2 MD5 lu+H^tF46BKR-6~p{V_5 # MD5 key 245 3 MD5 :lnoVsE%Y}z*avh%EtNC # MD5 key 246 4 MD5 |fdZrf0sF~@PHZ;w-i^V # MD5 key 247 5 MD5 IyAG>O"}y"LmCRS!*bHC # MD5 key 248 6 MD5 ">e\A@>hT/661ri52,,H # MD5 key 249 7 MD5 c9x=M'CfLxax9v)PV-si # MD5 key [all …]
|
| /freebsd-src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_md5.c | 2 * hostapd / EAP-MD5 server 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); in eap_md5_buildReq() 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); in eap_md5_check() 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " in eap_md5_check() 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " in eap_md5_process() 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN); in eap_md5_process() 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); in eap_md5_process() 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success"); in eap_md5_process() [all …]
|
| /freebsd-src/share/man/man9/ |
| H A D | MD5.9 | |
| /freebsd-src/contrib/wpa/src/eap_peer/ |
| H A D | eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); in eap_md5_process() 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", in eap_md5_process() 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process() 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", in eap_md5_process() 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); in eap_md5_process() 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); in eap_md5_process() 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); in eap_md5_process() 107 EAP_VENDOR_IETF, EAP_TYPE_MD5, "MD5"); in eap_peer_md5_register()
|
| /freebsd-src/tests/sys/geom/class/shsec/ |
| H A D | 2_test.sh | 24 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 31 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then 38 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then 45 if [ `md5 -q ${src}` = `md5 -q ${dst}` ]; then
|
| /freebsd-src/contrib/llvm-project/llvm/include/llvm/Support/ |
| H A D | MD5.h | 5 * MD5 Message-Digest Algorithm (RFC 1321). 8 * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5 25 * See md5.c for more information. 41 class MD5 { 47 // Our MD5 implementation returns the result in little endian, so the low in low() 63 MD5(); 78 /// This is suitable for getting the MD5 at any time without invalidating the 108 /// Helper to compute and return lower 64 bits of the given string's MD5 hash. 112 MD5 Hash; in MD5Hash() 114 MD5::MD5Result Result; in MD5Hash()
|
| /freebsd-src/tests/sys/geom/class/mirror/ |
| H A D | 2_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 32 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 38 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 45 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
| H A D | 7_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
| H A D | 4_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
| H A D | 5_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
| H A D | 3_test.sh | 26 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 34 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 42 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then 50 if [ `md5 -q ${src}` != `md5 -q ${dst}` ]; then
|
| /freebsd-src/crypto/openssl/doc/man3/ |
| H A D | EVP_md5.pod | 7 - MD5 For EVP 18 MD5 is a cryptographic hash function standardized in RFC 1321 and designed by 21 The CMU Software Engineering Institute considers MD5 unsuitable for further 28 The MD5 algorithm which produces a 128-bit output from a given input. 32 A hash algorithm of SSL v3 that combines MD5 with SHA-1 as described in RFC 43 L<EVP_MD_fetch(3)> with L<EVP_MD-MD5(7)> or L<EVP_MD-MD5-SHA1(7)> instead.
|
| H A D | MD5.pod | 5 MD2, MD4, MD5, MD2_Init, MD2_Update, MD2_Final, MD4_Init, MD4_Update, 6 MD4_Final, MD5_Init, MD5_Update, MD5_Final - MD2, MD4, and MD5 hash functions 39 #include <openssl/md5.h> 41 unsigned char *MD5(const unsigned char *d, unsigned long n, unsigned char *md); 53 MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. 55 MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest 81 MD2, MD4, and MD5 are recommended only for compatibility with existing 87 MD2(), MD4(), and MD5() return pointers to the hash value.
|
| /freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
| H A D | send-c_volume.ksh | |
| /freebsd-src/contrib/wpa/src/crypto/ |
| H A D | md5.c | 2 * MD5 hash implementation and interface functions 12 #include "md5.h" 17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104) 43 /* if key is longer than 64 bytes reset it to key = MD5(key) */ in hmac_md5_vector() 53 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5_vector() 68 /* perform inner MD5 */ in hmac_md5_vector() 84 /* perform outer MD5 */ in hmac_md5_vector() 97 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104)
|
| /freebsd-src/contrib/llvm-project/llvm/lib/Support/ |
| H A D | MD5.cpp | 5 * MD5 Message-Digest Algorithm (RFC 1321). 8 * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5 40 #include "llvm/Support/MD5.h" 50 // The basic MD5 functions. 60 // The MD5 transformation for all four rounds. 79 const uint8_t *MD5::body(ArrayRef<uint8_t> Data) { in body() 186 MD5::MD5() = default; 189 void MD5::update(ArrayRef<uint8_t> Data) { in update() 227 void MD5::update(StringRef Str) { in update() 234 void MD5::final(MD5Result &Result) { in final() [all …]
|