Home
last modified time | relevance | path

Searched +full:key +full:- (Results 1 – 25 of 1118) sorted by relevance

12345678910>>...45

/freebsd/contrib/netbsd-tests/sbin/gpt/
H A Dgpt.backup1 <?xml version="1.0" encoding="UTF-8"?>
2 <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyLi…
5 <key>GPT_HDR</key>
7 <key>entries</key>
9 <key>guid</key>
10 <string>00000000-0000-0000-0000-000000000000</string>
11 <key>revision</key>
14 <key>GPT_TBL</key>
16 <key>gpt_array</key>
19 <key>attributes</key>
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa_rfc6979.txt15 Title = RFC 6979 P-192 deterministic ECDSA tests
17 PrivateKey=P-192_PRIV
18 -----BEGIN PRIVATE KEY-----
21 -----END PRIVATE KEY-----
23 PublicKey=P-192_PUB
24 -----BEGIN PUBLIC KEY-----
27 -----END PUBLIC KEY-----
29 PrivPubKeyPair=P-192_PRIV:P-192_PUB
32 Key = P-192_PRIV
38 Key = P-192_PUB
[all …]
H A Devppkey_brainpool.txt2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
17 -----BEGIN PRIVATE KEY-----
19 -----END PRIVATE KEY-----
22 -----BEGIN PUBLIC KEY-----
25 -----END PUBLIC KEY-----
30 -----BEGIN PRIVATE KEY-----
32 -----END PRIVATE KEY-----
35 -----BEGIN PUBLIC KEY-----
38 -----END PUBLIC KEY-----
55 -----BEGIN PRIVATE KEY-----
[all …]
H A Devppkey_ecdh.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
15 # Public key algorithm tests
24 -----BEGIN PRIVATE KEY-----
27 -----END PRIVATE KEY-----
30 -----BEGIN PUBLIC KEY-----
33 -----END PUBLIC KEY-----
39 -----BEGIN PRIVATE KEY-----
42 -----END PRIVATE KEY-----
45 -----BEGIN PUBLIC KEY-----
48 -----END PUBLIC KEY-----
[all …]
H A Devpciph_aes_ccm_cavs.txt2 # Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
9 # Tests from NIST CCM Test Vectors (SP800-38C)
11 Title = NIST CCM 128 Decryption-Verification Process Tests
13 Cipher = aes-128-ccm
14 Key = 4ae701103c63deca5b5a3939d7d05992
21 Cipher = aes-128-ccm
22 Key = 4ae701103c63deca5b5a3939d7d05992
31 Cipher = aes-128-ccm
32 Key = 4ae701103c63deca5b5a3939d7d05992
41 Cipher = aes-128-ccm
[all …]
H A Devpciph_aes_siv.txt2 # Copyright 2018-2025 The OpenSSL Project Authors. All Rights Reserved.
14 Title = RFC5297 AES-SIV
16 Cipher = aes-128-siv
17 Key = fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
23 Cipher = aes-128-siv
24 Key = fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
29 Cipher = aes-128-siv
30 Key = fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
36 Cipher = aes-128-siv
37 Key = 7f7e7d7c7b7a79787776757473727170404142434445464748494a4b4c4d4e4f
[all …]
H A Devpciph_aes_common.txt2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved.
16 Title = AES (from FIPS-197 test vectors)
18 Cipher = AES-128-ECB
19 Key = 000102030405060708090A0B0C0D0E0F
24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt)
26 Cipher = AES-192-ECB
27 Key = 000102030405060708090A0B0C0D0E0F1011121314151617
33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt)
35 Cipher = AES-256-ECB
36 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F
[all …]
H A Devppkey_ecc.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
17 -----BEGIN PRIVATE KEY-----
19 -----END PRIVATE KEY-----
22 -----BEGIN PUBLIC KEY-----
25 -----END PUBLIC KEY-----
31 -----BEGIN PRIVATE KEY-----
33 -----END PRIVATE KEY-----
36 -----BEGIN PUBLIC KEY-----
39 -----END PUBLIC KEY-----
71 -----BEGIN PUBLIC KEY-----
[all …]
H A Devppkey_kas.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
16 # Public key algorithm tests
20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH #
23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs
25 PrivateKey=KAS-ECC-CDH_P-192_C0
26 -----BEGIN PRIVATE KEY-----
30 -----END PRIVATE KEY-----
32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC
33 -----BEGIN PUBLIC KEY-----
36 -----END PUBLIC KEY-----
[all …]
H A Devpciph_idea.txt13 Cipher = IDEA-CBC
14 Key = 1f8e4973953f3fb0bd6b16662e9a3c17
20 Cipher = IDEA-CBC
21 Key = 0700d603a1c514e46b6191ba430a3a0c
27 Cipher = IDEA-CBC
28 Key = 3348aa51e9a45c2dbe33ccc47f96e8de
34 Cipher = IDEA-CBC
35 Key = b7f3c9576e12dd0db63e8f8fac2b9a39
41 Cipher = IDEA-CBC
42 Key = b6f9afbfe5a1562bba1368fc72ac9d9c
[all …]
H A Devpciph_camellia.txt2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved.
17 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec
18 Cipher = CAMELLIA-128-ECB
19 Key = 0123456789abcdeffedcba9876543210
23 Cipher = CAMELLIA-192-ECB
24 Key = 0123456789abcdeffedcba98765432100011223344556677
28 Cipher = CAMELLIA-256-ECB
29 Key = 0123456789abcdeffedcba987654321000112233445566778899aabbccddeeff
33 # ECB-CAMELLIA128.Encrypt
34 Cipher = CAMELLIA-128-ECB
[all …]
H A Devpciph_cast5.txt12 Cipher = CAST5-CBC
13 Key = 1f8e4973953f3fb0bd6b16662e9a3c17
19 Cipher = CAST5-CBC
20 Key = 0700d603a1c514e46b6191ba430a3a0c
26 Cipher = CAST5-CBC
27 Key = 3348aa51e9a45c2dbe33ccc47f96e8de
33 Cipher = CAST5-CBC
34 Key = b7f3c9576e12dd0db63e8f8fac2b9a39
40 Cipher = CAST5-CBC
41 Key = b6f9afbfe5a1562bba1368fc72ac9d9c
[all …]
H A Devpmac_common.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
20 Key = 0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
29 Key = "Jefe"
37 Key = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
49 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
57 Key = 000102030405060708090A0B0C0D0E0F10111213
64 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
72 Algorithm = SHA256-192
74 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
81 Algorithm = SHA256-192
[all …]
/freebsd/usr.sbin/bluetooth/hcsecd/
H A Dparser.y2 /*-
5 * SPDX-License-Identifier: BSD-2-Clause
7 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com>
51 static void free_key (link_key_p key);
59 static link_key_p key = NULL; variable
77 key = (link_key_p) malloc(sizeof(*key));
78 if (key == NULL) {
84 memset(key, 0, sizeof(*key));
88 if (get_key(&key->bdaddr, 1) != NULL) {
91 bt_ntoa(&key->bdaddr, NULL));
[all …]
/freebsd/crypto/openssl/crypto/slh_dsa/
H A Dslh_dsa_key.c2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
23 static void slh_dsa_key_hash_cleanup(SLH_DSA_KEY *key) in slh_dsa_key_hash_cleanup() argument
25 OPENSSL_free(key->propq); in slh_dsa_key_hash_cleanup()
26 if (key->md_big != key->md) in slh_dsa_key_hash_cleanup()
27 EVP_MD_free(key->md_big); in slh_dsa_key_hash_cleanup()
28 key->md_big = NULL; in slh_dsa_key_hash_cleanup()
29 EVP_MD_free(key->md); in slh_dsa_key_hash_cleanup()
30 EVP_MAC_free(key->hmac); in slh_dsa_key_hash_cleanup()
31 key->md = NULL; in slh_dsa_key_hash_cleanup()
34 static int slh_dsa_key_hash_init(SLH_DSA_KEY *key) in slh_dsa_key_hash_init() argument
[all …]
/freebsd/crypto/openssl/test/certs/
H A Dsetup.sh3 # Primary root: root-cert
4 ./mkcert.sh genroot "Root CA" root-key root-cert
6 ./mkcert.sh genss "Root CA" root-key root-nonca
7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired
11 ./mkcert.sh genroot "Cross Root" cross-key cross-root
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
13 # trust variants: +serverAuth -serverAuth +clientAuth -clientAuth
14 openssl x509 -in root-cert.pem -trustout \
[all …]
/freebsd/contrib/wpa/src/tls/
H A Drsa.c3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
18 int private_key; /* whether private key is set */
25 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */
26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */
39 if (asn1_get_next(pos, end - pos, &hdr) < 0 || in crypto_rsa_parse_integer()
55 * crypto_rsa_import_public_key - Import an RSA public key
56 * @buf: Key buffer (DER encoded RSA public key)
57 * @len: Key buffer length in bytes
58 * Returns: Pointer to the public key or %NULL on failure
63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local
[all …]
/freebsd/crypto/openssl/crypto/ml_dsa/
H A Dml_dsa_key.c2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
21 const ML_DSA_PARAMS *ossl_ml_dsa_key_params(const ML_DSA_KEY *key) in ossl_ml_dsa_key_params() argument
23 return key->params; in ossl_ml_dsa_key_params()
27 const uint8_t *ossl_ml_dsa_key_get_seed(const ML_DSA_KEY *key) in ossl_ml_dsa_key_get_seed() argument
29 return key->seed; in ossl_ml_dsa_key_get_seed()
32 int ossl_ml_dsa_key_get_prov_flags(const ML_DSA_KEY *key) in ossl_ml_dsa_key_get_prov_flags() argument
34 return key->prov_flags; in ossl_ml_dsa_key_get_prov_flags()
37 int ossl_ml_dsa_set_prekey(ML_DSA_KEY *key, int flags_set, int flags_clr, in ossl_ml_dsa_set_prekey() argument
43 if (key == NULL in ossl_ml_dsa_set_prekey()
44 || key->pub_encoding != NULL in ossl_ml_dsa_set_prekey()
[all …]
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/
H A Dhcrypto_des.31 .TH "DES crypto functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
5 DES crypto functions \-
10 .RI "void \fBDES_set_odd_parity\fP (DES_cblock *key)"
13 .RI "int HC_DEPRECATED \fBDES_check_key_parity\fP (DES_cblock *key)"
16 .RI "int \fBDES_is_weak_key\fP (DES_cblock *key)"
19 .RI "int HC_DEPRECATED \fBDES_set_key\fP (DES_cblock *key, DES_key_schedule *ks)"
22 .RI "int \fBDES_set_key_unchecked\fP (DES_cblock *key, DES_key_schedule *ks)"
25 .RI "int \fBDES_set_key_checked\fP (DES_cblock *key, DES_key_schedule *ks)"
28 .RI "int \fBDES_key_sched\fP (DES_cblock *key, DES_key_schedule *ks)"
55 .RI "void \fBDES_string_to_key\fP (const char *str, DES_cblock *key)"
[all …]
/freebsd/crypto/openssl/providers/implementations/keymgmt/
H A Dmlx_kmgmt.c2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
47 { "EC", "P-256", 65, 32, 32, 1, EVP_PKEY_ML_KEM_768 },
48 { "EC", "P-384", 97, 48, 48, 1, EVP_PKEY_ML_KEM_1024 },
64 MLX_KEY *key = vkey; in mlx_kem_key_free() local
66 if (key == NULL) in mlx_kem_key_free()
68 OPENSSL_free(key->propq); in mlx_kem_key_free()
69 EVP_PKEY_free(key->mkey); in mlx_kem_key_free()
70 EVP_PKEY_free(key->xkey); in mlx_kem_key_free()
71 OPENSSL_free(key); in mlx_kem_key_free()
78 MLX_KEY *key = NULL; in mlx_kem_key_new() local
[all …]
/freebsd/contrib/libxo/tests/core/saved/
H A Dtest_01.X.out1-level><type>ethernet</type><type>bridge</type><type>18u</type><type>24</type><address>0x0</addres…
H A Dtest_01.XP.out1 <top-level>
12 <used-percent>12</used-percent>
15 <host>my-box</host>
17 <host>my-box</host>
20 <max-chaos>very</max-chaos>
21 <min-chaos>42</min-chaos>
22 <some-chaos>[42]</some-chaos>
23 <sku test-attr="attr-value">gum-000-1412</sku>
24 <host>my-box</host>
28 <sku test3="value3" key="key">GRO-000-415</sku>
[all …]
/freebsd/crypto/openssh/regress/
H A Dsshsig.sh9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key*
11 sig_namespace="test-$$"
12 sig_principal="user-$$@example.com"
14 # Make a "wrong key"
15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \
16 -C "wrong trousers, Grommit" -N '' \
17 || fatal "couldn't generate key"
18 WRONG=$OBJ/wrong-key.pub
20 # Make a CA key.
21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \
[all …]
/freebsd/crypto/openssl/doc/HOWTO/
H A Dkeys.txt6 Keys are the basis of public key algorithms and PKI. Keys usually
7 come in pairs, with one half being the public key and the other half
8 being the private key. With OpenSSL, the private key contains the
9 public key information as well, so a public key doesn't need to be
17 2. To generate an RSA key
19 An RSA key can be used both for encryption and for signing.
21 Generating a key for the RSA algorithm is quite easy, all you have to
24 openssl genrsa -des3 -out privkey.pem 2048
27 you don't want your key to be protected by a password, remove the flag
28 '-des3' from the command line above.
[all …]
/freebsd/lib/libsecureboot/openpgp/
H A Dopgp_key.c1 /*-
27 #include "../libsecureboot-priv.h"
33 * @brief decode user-id packet
45 user->id = malloc(len + 1); in decode_user()
46 strncpy(user->id, (char *)*pptr, len); in decode_user()
47 user->id[len] = '\0'; in decode_user()
48 user->name = user->id; in decode_user()
49 cp = strchr(user->id, '<'); in decode_user()
50 if (cp > user->id) { in decode_user()
51 user->id = strdup(user->id); in decode_user()
[all …]

12345678910>>...45