/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 13 # trust variants: +serverAuth -serverAuth +clientAuth -clientAuth 14 openssl x509 -in root-cert.pem -trustout \ [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecc.txt | 2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 36 -----BEGIN PUBLIC KEY----- 39 -----END PUBLIC KEY----- 60 Ctrl=ecdh_cofactor_mode:1 [all …]
|
H A D | evppkey_ecx.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 15 # Public key algorithm tests 21 PrivateKey=Alice-25519 22 -----BEGIN PRIVATE KEY----- 24 -----END PRIVATE KEY----- 26 PublicKey=Alice-25519-PUBLIC 27 -----BEGIN PUBLIC KEY----- 29 -----END PUBLIC KEY----- 31 PrivPubKeyPair = Alice-25519:Alice-25519-PUBLIC 33 PrivateKey=Bob-25519 [all …]
|
H A D | evppkey_kas.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 16 # Public key algorithm tests 20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH # 23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs 25 PrivateKey=KAS-ECC-CDH_P-192_C0 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC 33 -----BEGIN PUBLIC KEY----- 36 -----END PUBLIC KEY----- [all …]
|
H A D | evpmac_poly1305.txt | 2 # Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved. 17 Key = 0000000000000000000000000000000000000000000000000000000000000000 20 NoReinit = 1 23 Key = 0000000000000000000000000000000036e5f6b5c5e06070f0efca96227a863e 26 NoReinit = 1 29 Key = 36e5f6b5c5e06070f0efca96227a863e00000000000000000000000000000000 32 NoReinit = 1 35 Key = 1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0 38 NoReinit = 1 40 # If one uses 130-bit partial reduction, does the code handle the case where partially reduced fina… [all …]
|
H A D | evpciph_aes_ccm_cavs.txt | 2 # Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. 9 # Tests from NIST CCM Test Vectors (SP800-38C) 11 Title = NIST CCM 128 Decryption-Verfication Process Tests 13 Cipher = aes-128-ccm 14 Key = 4ae701103c63deca5b5a3939d7d05992 21 Cipher = aes-128-ccm 22 Key = 4ae701103c63deca5b5a3939d7d05992 31 Cipher = aes-128-ccm 32 Key = 4ae701103c63deca5b5a3939d7d05992 41 Cipher = aes-128-ccm [all …]
|
H A D | evpmac_common.txt | 2 # Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved. 20 Key = 0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b 29 Key = "Jefe" 37 Key = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA 49 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… 57 Key = 000102030405060708090A0B0C0D0E0F10111213 64 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… 73 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… 81 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B 87 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2… [all …]
|
H A D | evpciph_idea.txt | 13 Cipher = IDEA-CBC 14 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 20 Cipher = IDEA-CBC 21 Key = 0700d603a1c514e46b6191ba430a3a0c 27 Cipher = IDEA-CBC 28 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 34 Cipher = IDEA-CBC 35 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 41 Cipher = IDEA-CBC 42 Key = b6f9afbfe5a1562bba1368fc72ac9d9c [all …]
|
/freebsd/usr.sbin/bluetooth/hcsecd/ |
H A D | parser.y | 2 /*- 5 * SPDX-License-Identifier: BSD-2-Clause 7 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com> 13 * 1. Redistributions of source code must retain the above copyright 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; variable 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 81 exit(1); 84 memset(key, 0, sizeof(*key)); [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | rsa.c | 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 18 int private_key; /* whether private key is set */ 25 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ 27 struct bignum *iqmp; /* 1 / q mod p; CRT coefficient */ 39 if (asn1_get_next(pos, end - pos, &hdr) < 0 || in crypto_rsa_parse_integer() 55 * crypto_rsa_import_public_key - Import an RSA public key 56 * @buf: Key buffer (DER encoded RSA public key) 57 * @len: Key buffer length in bytes 58 * Returns: Pointer to the public key or %NULL on failure [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key* 11 sig_namespace="test-$$" 12 sig_principal="user-$$@example.com" 14 # Make a "wrong key" 15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \ 16 -C "wrong trousers, Grommit" -N '' \ 17 || fatal "couldn't generate key" 18 WRONG=$OBJ/wrong-key.pub 20 # Make a CA key. 21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \ [all …]
|
/freebsd/sys/contrib/openzfs/contrib/pyzfs/libzfs_core/test/ |
H A D | test_nvlist.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 48 for key in dict1.keys(): 49 self.assertEqual(int(dict1[key]), int(dict2[key])) 55 for key in dict1.keys(): 56 val1 = dict1[key] 57 val2 = dict2[key] 69 self._dict_to_nvlist_to_dict({1: None}) 73 self._dict_to_nvlist_to_dict({b"key": (1, 2)}) 77 self._dict_to_nvlist_to_dict({b"key": set(1, 2)}) 81 self._dict_to_nvlist_to_dict({b"key": [(1, 2), (3, 4)]}) [all …]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_chk.c | 2 * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved. 22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() argument 26 int ret = 1, ex_primes = 0, idx; in rsa_validate_keypair_multiprime() 29 if (key->p == NULL || key->q == NULL || key->n == NULL in rsa_validate_keypair_multiprime() 30 || key->e == NULL || key->d == NULL) { in rsa_validate_keypair_multiprime() 35 /* multi-prime? */ in rsa_validate_keypair_multiprime() 36 if (key->version == RSA_ASN1_VERSION_MULTI) { in rsa_validate_keypair_multiprime() 37 ex_primes = sk_RSA_PRIME_INFO_num(key->prime_infos); in rsa_validate_keypair_multiprime() 39 || (ex_primes + 2) > ossl_rsa_multip_cap(BN_num_bits(key->n))) { in rsa_validate_keypair_multiprime() 50 ctx = BN_CTX_new_ex(key->libctx); in rsa_validate_keypair_multiprime() [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_PKEY_new.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 62 . tm Index:\\$1\t\\n%\t"\\$2" 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" [all …]
|
/freebsd/contrib/dialog/samples/copifuncs/ |
H A D | ifpatch | 1 --- ifgate/message.c.orig Mon Jul 24 15:17:47 1995 3 @@ -48,12 +48,26 @@ 4 if (!strcasecmp(msg->key,"X-UUCP-From")) return 0; 5 if (!strcasecmp(msg->key,"X-Body-Start")) return 0; 6 if (!strncasecmp(msg->key,"X-FTN-",6)) return 0; 7 - if (!strcasecmp(msg->key,"Path")) return isftnpath(msg->val)?0:1; 8 + if (!strcasecmp(msg->key,"Path")) 13 + return isftnpath(msg->val)?0:1; 16 if (!strcasecmp(msg->key,"Newsgroups")) return newsmode?0:2; 17 if (!strcasecmp(msg->key,"Xref")) return 0; [all …]
|
/freebsd/lib/libc/db/test/btree.tests/ |
H A D | main.c | 1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 13 * 1. Redistributions of source code must retain the above copyright 83 "a", 2, 1, append, "append key def", "append key with data def", 85 "c", 1, 1, cursor, "cursor word", "move cursor to word", 86 "delc", 0, 0, delcur, "delcur", "delete key the cursor references", 87 "dele", 1, 1, delete, "delete word", "delete word", 90 "g", 1, 1, get, "get key", "locate key", 92 "ia", 2, 1, iafter, "iafter key data", "insert data after key", 93 "ib", 2, 1, ibefore, "ibefore key data", "insert data before key", [all …]
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 2 * Copyright 2011-2021 The OpenSSL Project Authors. All Rights Reserved. 37 # define NO_PAYLOAD_LENGTH ((size_t)-1) 39 void rc4_md5_enc(RC4_KEY *key, const void *in0, void *out, 48 EVP_RC4_HMAC_MD5 *key = data(ctx); in rc4_hmac_md5_init_key() local 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 56 MD5_Init(&key->head); /* handy when benchmarking */ in rc4_hmac_md5_init_key() 57 key->tail = key->head; in rc4_hmac_md5_init_key() 58 key->md = key->head; in rc4_hmac_md5_init_key() 60 key->payload_length = NO_PAYLOAD_LENGTH; in rc4_hmac_md5_init_key() 62 return 1; in rc4_hmac_md5_init_key() [all …]
|
H A D | e_aes_cbc_hmac_sha1.c | 2 * Copyright 2011-2021 The OpenSSL Project Authors. All Rights Reserved. 41 #define NO_PAYLOAD_LENGTH ((size_t)-1) 47 # define AESNI_CAPABLE (1<<(57-32)) 50 AES_KEY *key); 52 AES_KEY *key); 57 const AES_KEY *key, unsigned char *ivec, int enc); 60 const AES_KEY *key, unsigned char iv[16], 64 const AES_KEY *key, unsigned char iv[16], 73 EVP_AES_HMAC_SHA1 *key = data(ctx); in aesni_cbc_hmac_sha1_init_key() local 79 &key->ks); in aesni_cbc_hmac_sha1_init_key() [all …]
|
H A D | e_aes_cbc_hmac_sha256.c | 2 * Copyright 2013-2021 The OpenSSL Project Authors. All Rights Reserved. 41 # define NO_PAYLOAD_LENGTH ((size_t)-1) 47 # define AESNI_CAPABLE (1<<(57-32)) 50 AES_KEY *key); 52 AES_KEY *key); 57 const AES_KEY *key, unsigned char *ivec, int enc); 60 const AES_KEY *key, unsigned char iv[16], 69 EVP_AES_HMAC_SHA256 *key = data(ctx); in aesni_cbc_hmac_sha256_init_key() local 75 &key->ks); in aesni_cbc_hmac_sha256_init_key() 79 &key->ks); in aesni_cbc_hmac_sha256_init_key() [all …]
|
/freebsd/sys/geom/eli/ |
H A D | g_eli_key.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2005-2011 Pawel Jakub Dawidek <pawel@dawidek.net> 10 * 1. Redistributions of source code must retain the above copyright 50 * Verify if the given 'key' is correct. 51 * Return 1 if it is correct and 0 otherwise. 54 g_eli_mkey_verify(const unsigned char *mkey, const unsigned char *key) in g_eli_mkey_verify() argument 56 const unsigned char *odhmac; /* On-disk HMAC. */ in g_eli_mkey_verify() 58 unsigned char hmkey[SHA512_MDLEN]; /* Key for HMAC. */ in g_eli_mkey_verify() 61 * The key for HMAC calculations is: hmkey = HMAC_SHA512(Derived-Key, 0) in g_eli_mkey_verify() [all …]
|
/freebsd/share/man/man4/ |
H A D | keyboard.4 | 16 virtual console with the same number as the function key is then 23 then enter a decimal number from 0-255 via the numerical keypad, then 31 pressing the scroll-lock key. 40 .Bl -tag -width "Modifier Key" -compact 41 .It "Normal key" 42 Enter the ASCII value associated with the key. 43 .It "Function key" 45 .It "Switch Key" 47 .It "Modifier Key" 48 Change the meaning of another key. [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | crypto.h | 3 * Copyright (c) 2004-2017, Jouni Malinen <j@w1.fi> 11 * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the 13 * non-TLS needs, too, in order to save space by not implementing these 27 * md4_vector - MD4 hash for data vector 32 * Returns: 0 on success, -1 on failure 37 * md5_vector - MD5 hash for data vector 42 * Returns: 0 on success, -1 on failure 48 * sha1_vector - SHA-1 hash for data vector 53 * Returns: 0 on success, -1 on failure 59 * fips186_2-prf - NIST FIPS Publication 186-2 change notice 1 PRF [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf | 5 test-0 = 0-SECLEVEL 3 with default key 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 8 test-3 = 3-SECLEVEL 5 client with ED448 key 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 13 [0-SECLEVEL 3 with default key] 14 ssl_conf = 0-SECLEVEL 3 with default key-ssl 16 [0-SECLEVEL 3 with default key-ssl] 17 server = 0-SECLEVEL 3 with default key-server [all …]
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ec_key.c | 2 * Copyright 2002-2022 The OpenSSL Project Authors. All Rights Reserved. 50 ret->group = EC_GROUP_new_by_curve_name_ex(ctx, propq, nid); in EC_KEY_new_by_curve_name_ex() 51 if (ret->group == NULL) { in EC_KEY_new_by_curve_name_ex() 55 if (ret->meth->set_group != NULL in EC_KEY_new_by_curve_name_ex() 56 && ret->meth->set_group(ret, ret->group) == 0) { in EC_KEY_new_by_curve_name_ex() 77 CRYPTO_DOWN_REF(&r->references, &i, r->lock); in EC_KEY_free() 83 if (r->meth != NULL && r->meth->finish != NULL) in EC_KEY_free() 84 r->meth->finish(r); in EC_KEY_free() 87 ENGINE_finish(r->engine); in EC_KEY_free() 90 if (r->group && r->group->meth->keyfinish) in EC_KEY_free() [all …]
|
/freebsd/lib/libsecureboot/openpgp/ |
H A D | opgp_key.c | 1 /*- 7 * 1. Redistributions of source code must retain the above copyright 27 #include "../libsecureboot-priv.h" 33 * @brief decode user-id packet 45 user->id = malloc(len + 1); in decode_user() 46 strncpy(user->id, (char *)*pptr, len); in decode_user() 47 user->id[len] = '\0'; in decode_user() 48 user->name = user->id; in decode_user() 49 cp = strchr(user->id, '<'); in decode_user() 50 if (cp > user->id) { in decode_user() [all …]
|