/freebsd/contrib/netbsd-tests/sbin/gpt/ |
H A D | gpt.backup | 5 <key>GPT_HDR</key> 7 <key>entries</key> 9 <key>guid</key> 11 <key>revision</key> 14 <key>GPT_TBL</key> 16 <key>gpt_array</key> 19 <key>attributes</key> 21 <key>end</key> 23 <key>guid</key> 25 <key>index</key> [all …]
|
/freebsd/usr.sbin/bluetooth/hcsecd/ |
H A D | parser.y | 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; variable 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 84 memset(key, 0, sizeof(*key)); 88 if (get_key(&key->bdaddr, 1) != NULL) { 91 bt_ntoa(&key->bdaddr, NULL)); 92 free_key(key); 94 LIST_INSERT_HEAD(&link_keys, key, next); 96 key = NULL; [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_ccm_cavs.txt | 14 Key = 4ae701103c63deca5b5a3939d7d05992 22 Key = 4ae701103c63deca5b5a3939d7d05992 32 Key = 4ae701103c63deca5b5a3939d7d05992 42 Key = 4ae701103c63deca5b5a3939d7d05992 52 Key = 4ae701103c63deca5b5a3939d7d05992 60 Key = 4ae701103c63deca5b5a3939d7d05992 70 Key = 4ae701103c63deca5b5a3939d7d05992 80 Key = 4ae701103c63deca5b5a3939d7d05992 90 Key = 4ae701103c63deca5b5a3939d7d05992 100 Key = 4ae701103c63deca5b5a3939d7d05992 [all …]
|
H A D | evppkey_brainpool.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 30 -----BEGIN PRIVATE KEY----- 32 -----END PRIVATE KEY----- 35 -----BEGIN PUBLIC KEY----- 38 -----END PUBLIC KEY----- 55 -----BEGIN PRIVATE KEY----- 57 -----END PRIVATE KEY----- [all …]
|
H A D | evppkey_ecdh.txt | 15 # Public key algorithm tests 24 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 30 -----BEGIN PUBLIC KEY----- 33 -----END PUBLIC KEY----- 39 -----BEGIN PRIVATE KEY----- 42 -----END PRIVATE KEY----- 45 -----BEGIN PUBLIC KEY----- 48 -----END PUBLIC KEY----- 68 -----BEGIN PRIVATE KEY----- [all …]
|
H A D | evppkey_ecc.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 36 -----BEGIN PUBLIC KEY----- 39 -----END PUBLIC KEY----- 71 -----BEGIN PUBLIC KEY----- 74 -----END PUBLIC KEY----- [all …]
|
H A D | evpciph_idea.txt | 14 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 21 Key = 0700d603a1c514e46b6191ba430a3a0c 28 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 35 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 42 Key = b6f9afbfe5a1562bba1368fc72ac9d9c 49 Key = bbe7b7ba07124ff1ae7c3416fe8b465e 56 Key = 89a553730433f7e6d67d16d373bd5360 63 Key = c491ca31f91708458e29a925ec558d78 70 Key = f6e87d71b0104d6eb06a68dc6a71f498 77 Key = 2c14413751c31e2730570ba3361c786b [all …]
|
H A D | evpciph_aes_common.txt | 19 Key = 000102030405060708090A0B0C0D0E0F 27 Key = 000102030405060708090A0B0C0D0E0F1011121314151617 36 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F 76 # AES-bits-ECB:key::plaintext:ciphertext:encdec 82 Key = 2B7E151628AED2A6ABF7158809CF4F3C 87 Key = 2B7E151628AED2A6ABF7158809CF4F3C 92 Key = 2B7E151628AED2A6ABF7158809CF4F3C 97 Key = 2B7E151628AED2A6ABF7158809CF4F3C 103 Key = 8E73B0F7DA0E6452C810F32B809079E562F8EAD2522C6B7B 108 Key = 8E73B0F7DA0E6452C810F32B809079E562F8EAD2522C6B7B [all …]
|
H A D | evppkey_kas.txt | 16 # Public key algorithm tests 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 33 -----BEGIN PUBLIC KEY----- 36 -----END PUBLIC KEY----- 42 -----BEGIN PUBLIC KEY----- 45 -----END PUBLIC KEY----- 60 -----BEGIN PRIVATE KEY----- 64 -----END PRIVATE KEY----- 67 -----BEGIN PUBLIC KEY----- [all …]
|
H A D | evppkey_ecx.txt | 15 # Public key algorithm tests 22 -----BEGIN PRIVATE KEY----- 24 -----END PRIVATE KEY----- 27 -----BEGIN PUBLIC KEY----- 29 -----END PUBLIC KEY----- 34 -----BEGIN PRIVATE KEY----- 36 -----END PRIVATE KEY----- 39 -----BEGIN PUBLIC KEY----- 41 -----END PUBLIC KEY----- 75 # Illegal sign/verify operations with X25519 key [all …]
|
H A D | evpciph_cast5.txt | 13 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 20 Key = 0700d603a1c514e46b6191ba430a3a0c 27 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 34 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 41 Key = b6f9afbfe5a1562bba1368fc72ac9d9c 48 Key = bbe7b7ba07124ff1ae7c3416fe8b465e 55 Key = 89a553730433f7e6d67d16d373bd5360 62 Key = c491ca31f91708458e29a925ec558d78 69 Key = f6e87d71b0104d6eb06a68dc6a71f498 76 Key = 2c14413751c31e2730570ba3361c786b [all …]
|
H A D | evpciph_camellia.txt | 17 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec 19 Key = 0123456789abcdeffedcba9876543210 24 Key = 0123456789abcdeffedcba98765432100011223344556677 29 Key = 0123456789abcdeffedcba987654321000112233445566778899aabbccddeeff 35 Key = 000102030405060708090A0B0C0D0E0F 41 Key = 000102030405060708090A0B0C0D0E0F1011121314151617 47 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F 55 Key = 2B7E151628AED2A6ABF7158809CF4F3C 60 Key = 2B7E151628AED2A6ABF7158809CF4F3C 65 Key = 2B7E151628AED2A6ABF7158809CF4F3C [all …]
|
H A D | evpmac_poly1305.txt | 17 Key = 0000000000000000000000000000000000000000000000000000000000000000 23 Key = 0000000000000000000000000000000036e5f6b5c5e06070f0efca96227a863e 29 Key = 36e5f6b5c5e06070f0efca96227a863e00000000000000000000000000000000 35 Key = 1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0 42 Key = 0200000000000000000000000000000000000000000000000000000000000000 49 Key = 02000000000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF 56 Key = 0100000000000000000000000000000000000000000000000000000000000000 63 Key = 0100000000000000000000000000000000000000000000000000000000000000 70 Key = 0200000000000000000000000000000000000000000000000000000000000000 80 Key = 85d6be7857556d337f4452fe42d506a80103808afb0db2fd4abff6af4149f51b [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
H A D | hcrypto_des.3 | 10 .RI "void \fBDES_set_odd_parity\fP (DES_cblock *key)" 13 .RI "int HC_DEPRECATED \fBDES_check_key_parity\fP (DES_cblock *key)" 16 .RI "int \fBDES_is_weak_key\fP (DES_cblock *key)" 19 .RI "int HC_DEPRECATED \fBDES_set_key\fP (DES_cblock *key, DES_key_schedule *ks)" 22 .RI "int \fBDES_set_key_unchecked\fP (DES_cblock *key, DES_key_schedule *ks)" 25 .RI "int \fBDES_set_key_checked\fP (DES_cblock *key, DES_key_schedule *ks)" 28 .RI "int \fBDES_key_sched\fP (DES_cblock *key, DES_key_schedule *ks)" 55 .RI "void \fBDES_string_to_key\fP (const char *str, DES_cblock *key)" 58 .RI "int HC_DEPRECATED \fBDES_new_random_key\fP (DES_cblock *key)" 64 .RI "void HC_DEPRECATED \fBDES_random_key\fP (DES_cblock *key)" [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ 55 * crypto_rsa_import_public_key - Import an RSA public key 56 * @buf: Key buffer (DER encoded RSA public key) 57 * @len: Key buffer length in bytes 58 * Returns: Pointer to the public key or %NULL on failure 63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local 67 key = os_zalloc(sizeof(*key)); in crypto_rsa_import_public_key() 68 if (key == NULL) in crypto_rsa_import_public_key() 71 key->n = bignum_init(); in crypto_rsa_import_public_key() 72 key->e = bignum_init(); in crypto_rsa_import_public_key() [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/crypto/ |
H A D | aes_ccm_test.txt | 8 key: bedcfb5a011ebc84600fcb296c15af0d 19 key: 384ea416ac3c2f51a76e7d8226346d4e 30 key: cae31cd9f55526eb038241fc44cac1e5 41 key: ffdf4228361ea1f8165852136b3480f7 52 key: c15ed227dd2e237ecd087eaaaad19ea4 63 key: a8ee11b26d7ceb7f17eaa1e4b83a2cf6 74 key: 1655bf662f7ee685615701fd3779d628 85 key: 3fd50741ec47ddbfc2fc090975d154f0 96 key: e12260fcd355a51a0d01bb1f6fa538c2 107 key: 42e38abef2dd7573248c5aefb3ecca54 [all …]
|
H A D | aes_gcm_test.txt | 8 key: 5b9604fe14eadba931b0ccf34843dab9 19 key: 5b9604fe14eadba931b0ccf34843dab9 30 key: aa023d0478dcb2b2312498293d9a9129 41 key: bedcfb5a011ebc84600fcb296c15af0d 52 key: 384ea416ac3c2f51a76e7d8226346d4e 63 key: cae31cd9f55526eb038241fc44cac1e5 74 key: dd6197cd63c963919cf0c273ef6b28bf 85 key: ffdf4228361ea1f8165852136b3480f7 96 key: c15ed227dd2e237ecd087eaaaad19ea4 107 key: a8ee11b26d7ceb7f17eaa1e4b83a2cf6 [all …]
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 44 # 768-bit key 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth [all …]
|
/freebsd/contrib/ldns/ldns/ |
H A D | keys.h | 5 * priv key definitions 17 * Addendum to \ref dnssec.h, this module contains key and algorithm definitions and functions. 113 * General key structure, can contain all types of keys that 119 * signatures generated by signing with this key, for instance the 124 /** Whether to use this key when signing */ 131 /* The key can be an OpenSSL EVP Key 133 EVP_PKEY *key; member 137 * The key can be an HMAC key 140 unsigned char *key; member 143 /** the key structure can also just point to some external [all …]
|
/freebsd/contrib/unbound/sldns/ |
H A D | keyraw.h | 2 * keyraw.h -- raw key and signature access and conversion 13 * raw key and signature access and conversion 33 * \param[in] keydata the raw key data 35 * \param[in] alg the cryptographic algorithm this is a key for 42 * Calculates keytag of DNSSEC key, operates on wireformat rdata. 43 * \param[in] key the key as uncompressed wireformat rdata. 44 * \param[in] keysize length of key data. 47 uint16_t sldns_calc_keytag_raw(uint8_t* key, size_t keysize); 63 * \param[in] key the uncompressed wireformat of the key. 64 * \param[in] len length of key data [all …]
|
/freebsd/lib/libsecureboot/openpgp/ |
H A D | opgp_key.c | 60 * @brief decode a key packet 67 decode_key(int tag, unsigned char **pptr, size_t len, OpenPGP_key *key) in decode_key() argument 86 key->key = NULL; in decode_key() 90 /* comput key fingerprint and id @sa rfc4880:12.2 */ in decode_key() 109 key->id = octets2hex(&mdata[mlen - 8], 8); in decode_key() 115 key->sig_alg = *ptr++; in decode_key() 116 if (key->sig_alg == 1) { /* RSA */ in decode_key() 118 key->key = NEW(br_rsa_public_key); in decode_key() 119 if (!key->key) in decode_key() 121 key->key->n = mpi2bn(&ptr, &key->key->nlen); in decode_key() [all …]
|
/freebsd/contrib/libxo/tests/core/saved/ |
H A D | test_01.X.out | 1 …key="key">GRO-000-415</sku><name key="key">gum</name><sold>1412</sold><in-stock>54</in-stock><on-o…
|
H A D | test_01.XP.out | 28 <sku test3="value3" key="key">GRO-000-415</sku> 29 <name key="key">gum</name> 35 <sku test3="value3" key="key">HRD-000-212</sku> 36 <name key="key">rope</name> 42 <sku test3="value3" key="key">HRD-000-517</sku> 43 <name key="key">ladder</name> 49 <sku test3="value3" key="key">HRD-000-632</sku> 50 <name key="key">bolt</name> 56 <sku test3="value3" key="key">GRO-000-2331</sku> 57 <name key="key">water</name> [all …]
|
/freebsd/contrib/ncurses/man/ |
H A D | curs_getch.3x | 79 gathers a key stroke from the terminal keyboard associated with a 87 returns an integer identifying the key stroke; 90 Use of the control key as a modifier often results in a distinct code. 166 the term \*(``function key\*('' includes but is not limited to keycaps 173 symbols listed in subsection \*(``Predefined Key Codes\*('' below; 198 A variable intended to hold a function key code must thus be of type 207 cannot know whether the terminal has sent an ESC key stroke or the 208 beginning of a function key's character sequence without waiting to see 221 it returns the function key code corresponding to the unique sequence 236 Because function key sequences usually begin with an escape character, [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key* 14 # Make a "wrong key" 15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \ 17 || fatal "couldn't generate key" 18 WRONG=$OBJ/wrong-key.pub 20 # Make a CA key. 21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \ 22 || fatal "couldn't generate key" 23 CA_PRIV=$OBJ/sigca-key 24 CA_PUB=$OBJ/sigca-key.pub [all …]
|