Home
last modified time | relevance | path

Searched +full:p +full:- +full:384 (Results 1 – 25 of 262) sorted by relevance

1234567891011

/freebsd/crypto/openssl/test/ssl-tests/
H A D28-seclevel.cnf5 test-0 = 0-SECLEVEL 3 with default key
6 test-1 = 1-SECLEVEL 4 with ED448 key
7 test-2 = 2-SECLEVEL 5 server with ED448 key
8 test-3 = 3-SECLEVEL 5 client with ED448 key
9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE
10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2
13 [0-SECLEVEL 3 with default key]
14 ssl_conf = 0-SECLEVEL 3 with default key-ssl
16 [0-SECLEVEL 3 with default key-ssl]
17 server = 0-SECLEVEL 3 with default key-server
[all …]
H A D20-cert-select.cnf.in1 # -*- mode: perl; -*-
16 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
17 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
18 "Ed25519.Certificate" => test_pem("server-ed25519-cer
[all...]
H A D20-cert-select.cnf5 test-0 = 0-ECDSA CipherString Selection
6 test-1 = 1-ECDSA CipherString Selection
7 test-2 = 2-ECDSA CipherString Selection
8 test-3 = 3-RSA CipherString Selection
9 test-4 = 4-
[all...]
/freebsd/crypto/openssl/demos/certs/apps/
H A Dmkxcerts.sh2 # Create certificates using various algorithms to test multi-certificate
6 CN="OpenSSL Test RSA SHA-1 cert" $OPENSSL req \
7 -config apps.cnf -extensions usr_cert -x509 -nodes \
8 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1
9 CN="OpenSSL Test RSA SHA-256 cert" $OPENSSL req \
10 -config apps.cnf -extensions usr_cert -x509 -nodes \
11 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256
12 CN="OpenSSL Test RSA SHA-512 cert" $OPENSSL req \
13 -config apps.cnf -extensions usr_cert -x509 -nodes \
14 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512
[all …]
/freebsd/secure/caroot/trusted/
H A DCertum_EC-384_CA.pem2 ## Certum EC-384 CA
19 Signature Algorithm: ecdsa-with-SHA384
20 …r: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA
24 …t: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
68 -----END CERTIFICATE-----
H A DGTS_Root_R4.pem19 Signature Algorithm: ecdsa-with-SHA384
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
65 p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD
66 -----END CERTIFICATE-----
H A DemSign_ECC_Root_CA_-_C3.pem2 ## emSign ECC Root CA - C3
19 Signature Algorithm: ecdsa-with-SHA384
20 Issuer: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3
24 Subject: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3
26 Public Key Algorithm: id-ecPublicKey
27 Public-Key: (384 bit)
37 NIST CURVE: P-384
45 Signature Algorithm: ecdsa-with-SHA384
54 -----BEGIN CERTIFICATE-----
67 -----END CERTIFICATE-----
H A DAffirmTrust_Premium_ECC.pem18 Signature Algorithm: ecdsa-with-SHA384
25 Public Key Algorithm: id-ecPublicKey
26 Public-Key: (384 bit)
36 NIST CURVE: P-384
44 Signature Algorithm: ecdsa-with-SHA384
53 -----BEGIN CERTIFICATE-----
65 -----END CERTIFICATE-----
/freebsd/contrib/bearssl/test/x509/
H A Dalltests.txt2 ; root -> ica1 -> ica2 -> ee
4 ; "ee" is "end-entity", i.e. the client or server certificate itself
7 ; as a self-signed certificate.
10 name = root-rsa2048
16 name = root-p256
18 curve = P-256
22 name = root-p384
24 curve = P-384
28 name = root-p521
30 curve = P-521
[all …]
/freebsd/contrib/unbound/sldns/
H A Dkeyraw.c2 * keyraw.c - raw key operations and conversions
4 * (c) NLnet Labs, 2004-2008
75 return (len - exp - 3)*8; in sldns_rr_dnskey_key_size_raw()
81 return (len-exp-1)*8; in sldns_rr_dnskey_key_size_raw()
95 return 384; in sldns_rr_dnskey_key_size_raw()
119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw()
149 meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1); in sldns_key_EVP_load_gost_id()
173 meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1); in sldns_key_EVP_load_gost_id()
200 sldns_key_dsa_buf_bignum(unsigned char* key, size_t len, BIGNUM** p, in sldns_key_dsa_buf_bignum() argument
222 *p = BN_bin2bn(key+offset, (int)length, NULL); in sldns_key_dsa_buf_bignum()
[all …]
/freebsd/contrib/unbound/compat/
H A Dsha512.c3 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
5 * Copyright (c) 2000-2001, Aaron D. Gifford
9 * system-defined SHA code.
11 * - Renamed (external) functions and constants to fit ldns style
12 * - Removed _End and _Data functions
13 * - Added ldns_shaX(data, len, digest) convenience functions
14 * - Removed prototypes of _Transform functions and made those static
66 /*** SHA-256/384/512 Machine Architecture Definitions *****************/
71 * architecture is little-endian, make sure it also defines
81 * And for little-endian machines, add:
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
19 # EC P-256 key
21 PrivateKey=P-256
22 -----BEGIN PRIVATE KEY-----
26 -----END PRIVATE KEY-----
30 PublicKey=P-256-PUBLIC
31 -----BEGIN PUBLIC KEY-----
34 -----END PUBLIC KEY-----
36 PrivPubKeyPair = P-256:P-256-PUBLIC
40 Verify = P-256
[all …]
/freebsd/contrib/wpa/wpa_supplicant/examples/
H A Ddpp-qrcode.py71 print("QR Code URI accepted - ID=%d" % id)
98 print("Bootstrap information - ID=%d" % id)
112 parser.add_argument('-d', const=logging.DEBUG, default=logging.INFO,
115 parser.add_argument('--curve', '-c',
116 …help='set a specific curve (P-256, P-384, P-521, BP-256R1, BP-384R1, BP-512R1) for key generation')
/freebsd/contrib/bearssl/tools/
H A Dnames.c39 { "sha1", &br_sha1_vtable, "SHA-1" },
40 { "sha224", &br_sha224_vtable, "SHA-224" },
41 { "sha256", &br_sha256_vtable, "SHA-256" },
42 { "sha384", &br_sha384_vtable, "SHA-384" },
43 { "sha512", &br_sha512_vtable, "SHA-512" },
65 "ECDHE with ECDSA, AES-128/GCM encryption (TLS 1.2+)"
71 "ECDHE with RSA, AES-128/GCM encryption (TLS 1.2+)"
77 "ECDHE with ECDSA, AES-256/GCM encryption (TLS 1.2+)"
83 "ECDHE with RSA, AES-256/GCM encryption (TLS 1.2+)"
89 "ECDHE with ECDSA, AES-128/CCM encryption (TLS 1.2+)"
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_MD-SHA2.718 .\" Set up some character translations and predefined strings. \*(-- will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
38 . ds PI \(*p
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
/freebsd/crypto/openssl/demos/bio/
H A Dconnect.cnf10 # Protocol = ALL, -TLSv1.2
12 Curves = P-521:P-384:P-256
H A Daccept.cnf10 # Protocol = ALL, -TLSv1.2
12 Curves = P-521:P-384:P-256
H A Dcmod.cnf22 Curves = P-521:P-384:P-256
27 ECDSA.Certificate=server-ec.pem
/freebsd/contrib/ofed/libibmad/
H A Dfields.c2 * Copyright (c) 2004-2009 Voltaire Inc. All rights reserved.
4 * Copyright (c) 2009-2011 Mellanox Technologies LTD. All rights reserved.
16 * - Redistributions of source code must retain the above
20 * - Redistributions in binary form must reproduce the above
48 * encoded in the IB spec - IB headers are encoded such that the bit offsets
53 #define BITSOFFS(o, w) (((o) & ~31) | ((32 - ((o) & 31) - (w)))), (w)
55 #define BE_TO_BITSOFFS(o, w) (((o) & ~31) | ((32 - ((o) & 31) - (w))))
58 {0, 0}, /* IB_NO_FIELD - reserved as invalid */
65 * SMP: Subnet Management packets - lid routed (IB spec 14.2.1.1)
66 * DSMP: Subnet Management packets - direct route (IB spec 14.2.1.2)
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set1_curves.pod9 - EC supported curve functions
54 names, for example "P-521:P-384:P-256:X25519:ffdhe2048". Currently supported
55 groups for B<TLSv1.3> are B<P-256>, B<P-384>, B<P-521>, B<X25519>, B<X448>,
72 server-side SSL B<ssl>. If B<n> is -1 then the total number of shared groups is
82 reflects the state of the current connection, though in the case of PSK-only
86 current, non-resumption, connection). This can be called by either client or
113 is -1.
116 returns -1.
134 Copyright 2013-2021 The OpenSSL Project Authors. All Rights Reserved.
/freebsd/contrib/libfido2/man/
H A Des384_pk_new.326 .\" SPDX-License-Identifier: BSD-2-Clause
56 (COSE) RFC to ECDSA over P-384 with SHA-384.
/freebsd/crypto/openssl/ssl/
H A Ds3_cbc.c2 * Copyright 2012-2021 The OpenSSL Project Authors. All Rights Reserved.
21 * MD5 and SHA-1 low level APIs are deprecated for public use, but still ok for
69 * length field. (SHA-384/512 have 128-bit length.)
75 * Currently SHA-384/512 has a 128-byte block size and that's the largest
82 * u32toLE serializes an unsigned, 32-bit number (n) as four bytes at (p) in
83 * little-endian order. The value of p is advanced by four.
85 # define u32toLE(n, p) \ argument
86 (*((p)++)=(unsigned char)(n), \
87 *((p)++)=(unsigned char)(n>>8), \
88 *((p)++)=(unsigned char)(n>>16), \
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_ec.h50 * [IANA](http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8).
53 * range, it is convenient to encode support of some curves in a 32-bit
59 * - `supported_curves`
61 * A 32-bit word that documents the identifiers of the curves supported
64 * - `generator()`
69 * - `order()`
72 * that curve. That value uses unsigned big-endian encoding.
74 * - `xoff()`
79 * - `mul()`
83 * - `mulgen()`
[all …]
/freebsd/sbin/setkey/
H A Dsetkey.877 .Bl -tag -width indent
81 .Fl P ,
86 .Fl P ,
92 .Fl P
98 .Fl P
133 .Bl -tag -width indent
200 .Ar src_range Ar dst_range Ar upperspec Fl P Ar direction
223 Meta-arguments are as follows:
225 .Bl -tag -compact -width indent
254 .Bl -tag -width Fl -compact
[all …]
/freebsd/sys/contrib/device-tree/Bindings/crypto/
H A Dintel,keembay-ocs-ecc.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/intel,keembay-ocs-ecc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Daniele Alessandrelli <daniele.alessandrelli@intel.com>
11 - Prabhjot Khurana <prabhjot.khurana@intel.com>
16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
20 const: intel,keembay-ocs-ecc
32 - compatible
33 - reg
[all …]

1234567891011