| /freebsd/contrib/netbsd-tests/sbin/gpt/ |
| H A D | gpt.backup | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyLi… 5 <key>GPT_HDR</key> 7 <key>entries</key> 9 <key>guid</key> 10 <string>00000000-0000-0000-0000-000000000000</string> 11 <key>revision</key> 14 <key>GPT_TBL</key> 16 <key>gpt_array</key> 19 <key>attributes</key> [all …]
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_ecdsa_rfc6979.txt | 15 Title = RFC 6979 P-192 deterministic ECDSA tests 17 PrivateKey=P-192_PRIV 18 -----BEGIN PRIVATE KEY----- 21 -----END PRIVATE KEY----- 23 PublicKey=P-192_PUB 24 -----BEGIN PUBLIC KEY----- 27 -----END PUBLIC KEY----- 29 PrivPubKeyPair=P-192_PRIV:P-192_PUB 32 Key = P-192_PRIV 38 Key = P-192_PUB [all …]
|
| H A D | evppkey_brainpool.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 30 -----BEGIN PRIVATE KEY----- 32 -----END PRIVATE KEY----- 35 -----BEGIN PUBLIC KEY----- 38 -----END PUBLIC KEY----- 55 -----BEGIN PRIVATE KEY----- [all …]
|
| H A D | evppkey_ecdh.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 15 # Public key algorithm tests 24 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 30 -----BEGIN PUBLIC KEY----- 33 -----END PUBLIC KEY----- 39 -----BEGIN PRIVATE KEY----- 42 -----END PRIVATE KEY----- 45 -----BEGIN PUBLIC KEY----- 48 -----END PUBLIC KEY----- [all …]
|
| H A D | evpciph_aes_ccm_cavs.txt | 2 # Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. 9 # Tests from NIST CCM Test Vectors (SP800-38C) 11 Title = NIST CCM 128 Decryption-Verification Process Tests 13 Cipher = aes-128-ccm 14 Key = 4ae701103c63deca5b5a3939d7d05992 21 Cipher = aes-128-ccm 22 Key = 4ae701103c63deca5b5a3939d7d05992 31 Cipher = aes-128-ccm 32 Key = 4ae701103c63deca5b5a3939d7d05992 41 Cipher = aes-128-ccm [all …]
|
| H A D | evpciph_aes_siv.txt | 2 # Copyright 2018-2025 The OpenSSL Project Authors. All Rights Reserved. 14 Title = RFC5297 AES-SIV 16 Cipher = aes-128-siv 17 Key = fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff 23 Cipher = aes-128-siv 24 Key = fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff 29 Cipher = aes-128-siv 30 Key = fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff 36 Cipher = aes-128-siv 37 Key = 7f7e7d7c7b7a79787776757473727170404142434445464748494a4b4c4d4e4f [all …]
|
| H A D | evpciph_aes_common.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 16 Title = AES (from FIPS-197 test vectors) 18 Cipher = AES-128-ECB 19 Key = 000102030405060708090A0B0C0D0E0F 24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt) 26 Cipher = AES-192-ECB 27 Key = 000102030405060708090A0B0C0D0E0F1011121314151617 33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 35 Cipher = AES-256-ECB 36 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F [all …]
|
| H A D | evppkey_ecc.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 36 -----BEGIN PUBLIC KEY----- 39 -----END PUBLIC KEY----- 71 -----BEGIN PUBLIC KEY----- [all …]
|
| H A D | evppkey_kas.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 16 # Public key algorithm tests 20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH # 23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs 25 PrivateKey=KAS-ECC-CDH_P-192_C0 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC 33 -----BEGIN PUBLIC KEY----- 36 -----END PUBLIC KEY----- [all …]
|
| H A D | evpciph_idea.txt | 13 Cipher = IDEA-CBC 14 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 20 Cipher = IDEA-CBC 21 Key = 0700d603a1c514e46b6191ba430a3a0c 27 Cipher = IDEA-CBC 28 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 34 Cipher = IDEA-CBC 35 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 41 Cipher = IDEA-CBC 42 Key = b6f9afbfe5a1562bba1368fc72ac9d9c [all …]
|
| H A D | evpciph_camellia.txt | 2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. 17 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec 18 Cipher = CAMELLIA-128-ECB 19 Key = 0123456789abcdeffedcba9876543210 23 Cipher = CAMELLIA-192-ECB 24 Key = 0123456789abcdeffedcba98765432100011223344556677 28 Cipher = CAMELLIA-256-ECB 29 Key = 0123456789abcdeffedcba987654321000112233445566778899aabbccddeeff 33 # ECB-CAMELLIA128.Encrypt 34 Cipher = CAMELLIA-128-ECB [all …]
|
| H A D | evpciph_cast5.txt | 12 Cipher = CAST5-CBC 13 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 19 Cipher = CAST5-CBC 20 Key = 0700d603a1c514e46b6191ba430a3a0c 26 Cipher = CAST5-CBC 27 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 33 Cipher = CAST5-CBC 34 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 40 Cipher = CAST5-CBC 41 Key = b6f9afbfe5a1562bba1368fc72ac9d9c [all …]
|
| H A D | evpmac_common.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 20 Key = 0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b 29 Key = "Jefe" 37 Key = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA 49 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… 57 Key = 000102030405060708090A0B0C0D0E0F10111213 64 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… 72 Algorithm = SHA256-192 74 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… 81 Algorithm = SHA256-192 [all …]
|
| /freebsd/usr.sbin/bluetooth/hcsecd/ |
| H A D | parser.y | 2 /*- 5 * SPDX-License-Identifier: BSD-2-Clause 7 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com> 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; variable 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 84 memset(key, 0, sizeof(*key)); 88 if (get_key(&key->bdaddr, 1) != NULL) { 91 bt_ntoa(&key->bdaddr, NULL)); [all …]
|
| /freebsd/crypto/openssl/crypto/slh_dsa/ |
| H A D | slh_dsa_key.c | 2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved. 23 static void slh_dsa_key_hash_cleanup(SLH_DSA_KEY *key) in slh_dsa_key_hash_cleanup() argument 25 OPENSSL_free(key->propq); in slh_dsa_key_hash_cleanup() 26 if (key->md_big != key->md) in slh_dsa_key_hash_cleanup() 27 EVP_MD_free(key->md_big); in slh_dsa_key_hash_cleanup() 28 key->md_big = NULL; in slh_dsa_key_hash_cleanup() 29 EVP_MD_free(key->md); in slh_dsa_key_hash_cleanup() 30 EVP_MAC_free(key->hmac); in slh_dsa_key_hash_cleanup() 31 key->md = NULL; in slh_dsa_key_hash_cleanup() 34 static int slh_dsa_key_hash_init(SLH_DSA_KEY *key) in slh_dsa_key_hash_init() argument [all …]
|
| /freebsd/crypto/openssl/test/certs/ |
| H A D | setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 13 # trust variants: +serverAuth -serverAuth +clientAuth -clientAuth 14 openssl x509 -in root-cert.pem -trustout \ [all …]
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | rsa.c | 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 18 int private_key; /* whether private key is set */ 25 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ 39 if (asn1_get_next(pos, end - pos, &hdr) < 0 || in crypto_rsa_parse_integer() 55 * crypto_rsa_import_public_key - Import an RSA public key 56 * @buf: Key buffer (DER encoded RSA public key) 57 * @len: Key buffer length in bytes 58 * Returns: Pointer to the public key or %NULL on failure 63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local [all …]
|
| /freebsd/crypto/openssl/crypto/ml_dsa/ |
| H A D | ml_dsa_key.c | 2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved. 21 const ML_DSA_PARAMS *ossl_ml_dsa_key_params(const ML_DSA_KEY *key) in ossl_ml_dsa_key_params() argument 23 return key->params; in ossl_ml_dsa_key_params() 27 const uint8_t *ossl_ml_dsa_key_get_seed(const ML_DSA_KEY *key) in ossl_ml_dsa_key_get_seed() argument 29 return key->seed; in ossl_ml_dsa_key_get_seed() 32 int ossl_ml_dsa_key_get_prov_flags(const ML_DSA_KEY *key) in ossl_ml_dsa_key_get_prov_flags() argument 34 return key->prov_flags; in ossl_ml_dsa_key_get_prov_flags() 37 int ossl_ml_dsa_set_prekey(ML_DSA_KEY *key, int flags_set, int flags_clr, in ossl_ml_dsa_set_prekey() argument 43 if (key == NULL in ossl_ml_dsa_set_prekey() 44 || key->pub_encoding != NULL in ossl_ml_dsa_set_prekey() [all …]
|
| /freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
| H A D | hcrypto_des.3 | 1 .TH "DES crypto functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*- 5 DES crypto functions \- 10 .RI "void \fBDES_set_odd_parity\fP (DES_cblock *key)" 13 .RI "int HC_DEPRECATED \fBDES_check_key_parity\fP (DES_cblock *key)" 16 .RI "int \fBDES_is_weak_key\fP (DES_cblock *key)" 19 .RI "int HC_DEPRECATED \fBDES_set_key\fP (DES_cblock *key, DES_key_schedule *ks)" 22 .RI "int \fBDES_set_key_unchecked\fP (DES_cblock *key, DES_key_schedule *ks)" 25 .RI "int \fBDES_set_key_checked\fP (DES_cblock *key, DES_key_schedule *ks)" 28 .RI "int \fBDES_key_sched\fP (DES_cblock *key, DES_key_schedule *ks)" 55 .RI "void \fBDES_string_to_key\fP (const char *str, DES_cblock *key)" [all …]
|
| /freebsd/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | mlx_kmgmt.c | 2 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved. 47 { "EC", "P-256", 65, 32, 32, 1, EVP_PKEY_ML_KEM_768 }, 48 { "EC", "P-384", 97, 48, 48, 1, EVP_PKEY_ML_KEM_1024 }, 64 MLX_KEY *key = vkey; in mlx_kem_key_free() local 66 if (key == NULL) in mlx_kem_key_free() 68 OPENSSL_free(key->propq); in mlx_kem_key_free() 69 EVP_PKEY_free(key->mkey); in mlx_kem_key_free() 70 EVP_PKEY_free(key->xkey); in mlx_kem_key_free() 71 OPENSSL_free(key); in mlx_kem_key_free() 78 MLX_KEY *key = NULL; in mlx_kem_key_new() local [all …]
|
| /freebsd/contrib/libxo/tests/core/saved/ |
| H A D | test_01.X.out | 1 …-level><type>ethernet</type><type>bridge</type><type>18u</type><type>24</type><address>0x0</addres…
|
| H A D | test_01.XP.out | 1 <top-level> 12 <used-percent>12</used-percent> 15 <host>my-box</host> 17 <host>my-box</host> 20 <max-chaos>very</max-chaos> 21 <min-chaos>42</min-chaos> 22 <some-chaos>[42]</some-chaos> 23 <sku test-attr="attr-value">gum-000-1412</sku> 24 <host>my-box</host> 28 <sku test3="value3" key="key">GRO-000-415</sku> [all …]
|
| /freebsd/crypto/openssh/regress/ |
| H A D | sshsig.sh | 9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key* 11 sig_namespace="test-$$" 12 sig_principal="user-$$@example.com" 14 # Make a "wrong key" 15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \ 16 -C "wrong trousers, Grommit" -N '' \ 17 || fatal "couldn't generate key" 18 WRONG=$OBJ/wrong-key.pub 20 # Make a CA key. 21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \ [all …]
|
| /freebsd/crypto/openssl/doc/HOWTO/ |
| H A D | keys.txt | 6 Keys are the basis of public key algorithms and PKI. Keys usually 7 come in pairs, with one half being the public key and the other half 8 being the private key. With OpenSSL, the private key contains the 9 public key information as well, so a public key doesn't need to be 17 2. To generate an RSA key 19 An RSA key can be used both for encryption and for signing. 21 Generating a key for the RSA algorithm is quite easy, all you have to 24 openssl genrsa -des3 -out privkey.pem 2048 27 you don't want your key to be protected by a password, remove the flag 28 '-des3' from the command line above. [all …]
|
| /freebsd/lib/libsecureboot/openpgp/ |
| H A D | opgp_key.c | 1 /*- 27 #include "../libsecureboot-priv.h" 33 * @brief decode user-id packet 45 user->id = malloc(len + 1); in decode_user() 46 strncpy(user->id, (char *)*pptr, len); in decode_user() 47 user->id[len] = '\0'; in decode_user() 48 user->name = user->id; in decode_user() 49 cp = strchr(user->id, '<'); in decode_user() 50 if (cp > user->id) { in decode_user() 51 user->id = strdup(user->id); in decode_user() [all …]
|