Home
last modified time | relevance | path

Searched +full:key +full:- +full:1 (Results 1 – 25 of 1113) sorted by relevance

12345678910>>...45

/freebsd/crypto/openssl/test/certs/
H A Dsetup.sh3 # Primary root: root-cert
4 ./mkcert.sh genroot "Root CA" root-key root-cert
6 ./mkcert.sh genss "Root CA" root-key root-nonca
7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired
11 ./mkcert.sh genroot "Cross Root" cross-key cross-root
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
13 # trust variants: +serverAuth -serverAuth +clientAuth -clientAuth
14 openssl x509 -in root-cert.pem -trustout \
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecc.txt2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved.
17 -----BEGIN PRIVATE KEY-----
19 -----END PRIVATE KEY-----
22 -----BEGIN PUBLIC KEY-----
25 -----END PUBLIC KEY-----
31 -----BEGIN PRIVATE KEY-----
33 -----END PRIVATE KEY-----
36 -----BEGIN PUBLIC KEY-----
39 -----END PUBLIC KEY-----
60 Ctrl=ecdh_cofactor_mode:1
[all …]
H A Devppkey_ecx.txt2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
15 # Public key algorithm tests
21 PrivateKey=Alice-25519
22 -----BEGIN PRIVATE KEY-----
24 -----END PRIVATE KEY-----
26 PublicKey=Alice-25519-PUBLIC
27 -----BEGIN PUBLIC KEY-----
29 -----END PUBLIC KEY-----
31 PrivPubKeyPair = Alice-25519:Alice-25519-PUBLIC
33 PrivateKey=Bob-25519
[all …]
H A Devppkey_kas.txt2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
16 # Public key algorithm tests
20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH #
23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs
25 PrivateKey=KAS-ECC-CDH_P-192_C0
26 -----BEGIN PRIVATE KEY-----
30 -----END PRIVATE KEY-----
32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC
33 -----BEGIN PUBLIC KEY-----
36 -----END PUBLIC KEY-----
[all …]
H A Devpmac_poly1305.txt2 # Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved.
17 Key = 0000000000000000000000000000000000000000000000000000000000000000
20 NoReinit = 1
23 Key = 0000000000000000000000000000000036e5f6b5c5e06070f0efca96227a863e
26 NoReinit = 1
29 Key = 36e5f6b5c5e06070f0efca96227a863e00000000000000000000000000000000
32 NoReinit = 1
35 Key = 1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0
38 NoReinit = 1
40 # If one uses 130-bit partial reduction, does the code handle the case where partially reduced fina…
[all …]
H A Devpciph_aes_ccm_cavs.txt2 # Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
9 # Tests from NIST CCM Test Vectors (SP800-38C)
11 Title = NIST CCM 128 Decryption-Verfication Process Tests
13 Cipher = aes-128-ccm
14 Key = 4ae701103c63deca5b5a3939d7d05992
21 Cipher = aes-128-ccm
22 Key = 4ae701103c63deca5b5a3939d7d05992
31 Cipher = aes-128-ccm
32 Key = 4ae701103c63deca5b5a3939d7d05992
41 Cipher = aes-128-ccm
[all …]
H A Devpmac_common.txt2 # Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved.
20 Key = 0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
29 Key = "Jefe"
37 Key = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
49 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
57 Key = 000102030405060708090A0B0C0D0E0F10111213
64 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
73 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
81 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B
87 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2…
[all …]
H A Devpciph_idea.txt13 Cipher = IDEA-CBC
14 Key = 1f8e4973953f3fb0bd6b16662e9a3c17
20 Cipher = IDEA-CBC
21 Key = 0700d603a1c514e46b6191ba430a3a0c
27 Cipher = IDEA-CBC
28 Key = 3348aa51e9a45c2dbe33ccc47f96e8de
34 Cipher = IDEA-CBC
35 Key = b7f3c9576e12dd0db63e8f8fac2b9a39
41 Cipher = IDEA-CBC
42 Key = b6f9afbfe5a1562bba1368fc72ac9d9c
[all …]
/freebsd/usr.sbin/bluetooth/hcsecd/
H A Dparser.y2 /*-
5 * SPDX-License-Identifier: BSD-2-Clause
7 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com>
13 * 1. Redistributions of source code must retain the above copyright
51 static void free_key (link_key_p key);
59 static link_key_p key = NULL; variable
77 key = (link_key_p) malloc(sizeof(*key));
78 if (key == NULL) {
81 exit(1);
84 memset(key, 0, sizeof(*key));
[all …]
/freebsd/contrib/wpa/src/tls/
H A Drsa.c3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
18 int private_key; /* whether private key is set */
25 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */
26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */
27 struct bignum *iqmp; /* 1 / q mod p; CRT coefficient */
39 if (asn1_get_next(pos, end - pos, &hdr) < 0 || in crypto_rsa_parse_integer()
55 * crypto_rsa_import_public_key - Import an RSA public key
56 * @buf: Key buffer (DER encoded RSA public key)
57 * @len: Key buffer length in bytes
58 * Returns: Pointer to the public key or %NULL on failure
[all …]
/freebsd/crypto/openssh/regress/
H A Dsshsig.sh9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key*
11 sig_namespace="test-$$"
12 sig_principal="user-$$@example.com"
14 # Make a "wrong key"
15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \
16 -C "wrong trousers, Grommit" -N '' \
17 || fatal "couldn't generate key"
18 WRONG=$OBJ/wrong-key.pub
20 # Make a CA key.
21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \
[all …]
/freebsd/sys/contrib/openzfs/contrib/pyzfs/libzfs_core/test/
H A Dtest_nvlist.py8 # http://www.apache.org/licenses/LICENSE-2.0
48 for key in dict1.keys():
49 self.assertEqual(int(dict1[key]), int(dict2[key]))
55 for key in dict1.keys():
56 val1 = dict1[key]
57 val2 = dict2[key]
69 self._dict_to_nvlist_to_dict({1: None})
73 self._dict_to_nvlist_to_dict({b"key": (1, 2)})
77 self._dict_to_nvlist_to_dict({b"key": set(1, 2)})
81 self._dict_to_nvlist_to_dict({b"key": [(1, 2), (3, 4)]})
[all …]
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_chk.c2 * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved.
22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument
26 int ret = 1, ex_primes = 0, idx; in rsa_validate_keypair_multiprime()
29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime()
30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime()
35 /* multi-prime? */ in rsa_validate_keypair_multiprime()
36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime()
37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime()
39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime()
50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime()
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_PKEY_new.318 .\" Set up some character translations and predefined strings. \*(-- will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
62 . tm Index:\\$1\t\\n%\t"\\$2"
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
/freebsd/contrib/dialog/samples/copifuncs/
H A Difpatch1 --- ifgate/message.c.orig Mon Jul 24 15:17:47 1995
3 @@ -48,12 +48,26 @@
4 if (!strcasecmp(msg->key,"X-UUCP-From")) return 0;
5 if (!strcasecmp(msg->key,"X-Body-Start")) return 0;
6 if (!strncasecmp(msg->key,"X-FTN-",6)) return 0;
7 - if (!strcasecmp(msg->key,"Path")) return isftnpath(msg->val)?0:1;
8 + if (!strcasecmp(msg->key,"Path"))
13 + return isftnpath(msg->val)?0:1;
16 if (!strcasecmp(msg->key,"Newsgroups")) return newsmode?0:2;
17 if (!strcasecmp(msg->key,"Xref")) return 0;
[all …]
/freebsd/lib/libc/db/test/btree.tests/
H A Dmain.c1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
13 * 1. Redistributions of source code must retain the above copyright
83 "a", 2, 1, append, "append key def", "append key with data def",
85 "c", 1, 1, cursor, "cursor word", "move cursor to word",
86 "delc", 0, 0, delcur, "delcur", "delete key the cursor references",
87 "dele", 1, 1, delete, "delete word", "delete word",
90 "g", 1, 1, get, "get key", "locate key",
92 "ia", 2, 1, iafter, "iafter key data", "insert data after key",
93 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key",
[all …]
/freebsd/crypto/openssl/crypto/evp/
H A De_rc4_hmac_md5.c2 * Copyright 2011-2021 The OpenSSL Project Authors. All Rights Reserved.
37 # define NO_PAYLOAD_LENGTH ((size_t)-1)
39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out,
48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local
54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key()
57 key->tail = key->head; in rc4_hmac_md5_init_key()
58 key->md = key->head; in rc4_hmac_md5_init_key()
60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key()
62 return 1; in rc4_hmac_md5_init_key()
[all …]
H A De_aes_cbc_hmac_sha1.c2 * Copyright 2011-2021 The OpenSSL Project Authors. All Rights Reserved.
41 #define NO_PAYLOAD_LENGTH ((size_t)-1)
47 # define AESNI_CAPABLE (1<<(57-32))
50 AES_KEY *key);
52 AES_KEY *key);
57 const AES_KEY *key, unsigned char *ivec, int enc);
60 const AES_KEY *key, unsigned char iv[16],
64 const AES_KEY *key, unsigned char iv[16],
73 EVP_AES_HMAC_SHA1 *key = data(ctx); in aesni_cbc_hmac_sha1_init_key() local
79 &key->ks); in aesni_cbc_hmac_sha1_init_key()
[all …]
H A De_aes_cbc_hmac_sha256.c2 * Copyright 2013-2021 The OpenSSL Project Authors. All Rights Reserved.
41 # define NO_PAYLOAD_LENGTH ((size_t)-1)
47 # define AESNI_CAPABLE (1<<(57-32))
50 AES_KEY *key);
52 AES_KEY *key);
57 const AES_KEY *key, unsigned char *ivec, int enc);
60 const AES_KEY *key, unsigned char iv[16],
69 EVP_AES_HMAC_SHA256 *key = data(ctx); in aesni_cbc_hmac_sha256_init_key() local
75 &key->ks); in aesni_cbc_hmac_sha256_init_key()
79 &key->ks); in aesni_cbc_hmac_sha256_init_key()
[all …]
/freebsd/sys/geom/eli/
H A Dg_eli_key.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2005-2011 Pawel Jakub Dawidek <pawel@dawidek.net>
10 * 1. Redistributions of source code must retain the above copyright
50 * Verify if the given 'key' is correct.
51 * Return 1 if it is correct and 0 otherwise.
54 g_eli_mkey_verify(const unsigned char *mkey, const unsigned char *key) in g_eli_mkey_verify() argument
56 const unsigned char *odhmac; /* On-disk HMAC. */ in g_eli_mkey_verify()
58 unsigned char hmkey[SHA512_MDLEN]; /* Key for HMAC. */ in g_eli_mkey_verify()
61 * The key for HMAC calculations is: hmkey = HMAC_SHA512(Derived-Key, 0) in g_eli_mkey_verify()
[all …]
/freebsd/share/man/man4/
H A Dkeyboard.416 virtual console with the same number as the function key is then
23 then enter a decimal number from 0-255 via the numerical keypad, then
31 pressing the scroll-lock key.
40 .Bl -tag -width "Modifier Key" -compact
41 .It "Normal key"
42 Enter the ASCII value associated with the key.
43 .It "Function key"
45 .It "Switch Key"
47 .It "Modifier Key"
48 Change the meaning of another key.
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto.h3 * Copyright (c) 2004-2017, Jouni Malinen <j@w1.fi>
11 * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
13 * non-TLS needs, too, in order to save space by not implementing these
27 * md4_vector - MD4 hash for data vector
32 * Returns: 0 on success, -1 on failure
37 * md5_vector - MD5 hash for data vector
42 * Returns: 0 on success, -1 on failure
48 * sha1_vector - SHA-1 hash for data vector
53 * Returns: 0 on success, -1 on failure
59 * fips186_2-prf - NIST FIPS Publication 186-2 change notice 1 PRF
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A D28-seclevel.cnf5 test-0 = 0-SECLEVEL 3 with default key
6 test-1 = 1-SECLEVEL 4 with ED448 key
7 test-2 = 2-SECLEVEL 5 server with ED448 key
8 test-3 = 3-SECLEVEL 5 client with ED448 key
9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE
10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2
13 [0-SECLEVEL 3 with default key]
14 ssl_conf = 0-SECLEVEL 3 with default key-ssl
16 [0-SECLEVEL 3 with default key-ssl]
17 server = 0-SECLEVEL 3 with default key-server
[all …]
/freebsd/crypto/openssl/crypto/ec/
H A Dec_key.c2 * Copyright 2002-2022 The OpenSSL Project Authors. All Rights Reserved.
50 ret->group = EC_GROUP_new_by_curve_name_ex(ctx, propq, nid); in EC_KEY_new_by_curve_name_ex()
51 if (ret->group == NULL) { in EC_KEY_new_by_curve_name_ex()
55 if (ret->meth->set_group != NULL in EC_KEY_new_by_curve_name_ex()
56 && ret->meth->set_group(ret, ret->group) == 0) { in EC_KEY_new_by_curve_name_ex()
77 CRYPTO_DOWN_REF(&r->references, &i, r->lock); in EC_KEY_free()
83 if (r->meth != NULL && r->meth->finish != NULL) in EC_KEY_free()
84 r->meth->finish(r); in EC_KEY_free()
87 ENGINE_finish(r->engine); in EC_KEY_free()
90 if (r->group && r->group->meth->keyfinish) in EC_KEY_free()
[all …]
/freebsd/lib/libsecureboot/openpgp/
H A Dopgp_key.c1 /*-
7 * 1. Redistributions of source code must retain the above copyright
27 #include "../libsecureboot-priv.h"
33 * @brief decode user-id packet
45 user->id = malloc(len + 1); in decode_user()
46 strncpy(user->id, (char *)*pptr, len); in decode_user()
47 user->id[len] = '\0'; in decode_user()
48 user->name = user->id; in decode_user()
49 cp = strchr(user->id, '<'); in decode_user()
50 if (cp > user->id) { in decode_user()
[all …]

12345678910>>...45