| /freebsd/contrib/sendmail/src/ |
| H A D | udb.c | 2 * Copyright (c) 1998-2003, 2006 Proofpoint, Inc. and its suppliers. 4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved. 18 SM_RCSID("@(#)$Id: udb.c,v 8.166 2013-11-22 20:51:57 ca Exp $ (with USERDB)") 20 SM_RCSID("@(#)$Id: udb.c,v 8.166 2013-11-22 20:51:57 ca Exp $ (without USERDB)") 38 ** UDB.C -- interface between sendmail and Berkeley User Data Base. 52 /* type UE_REMOTE -- do remote call for lookup */ 62 /* type UE_FORWARD -- forward message to remote */ 70 /* type UE_FETCH -- look up in local database */ 84 # define UDB_REMOTE 2 /* look up in remote database */ 85 # define UDB_DBFETCH 3 /* look up in local database */ [all …]
|
| /freebsd/tests/sys/net/if_ovpn/ |
| H A D | if_ovpn.sh | 2 # SPDX-License-Identifier: BSD-2-Clause 45 jexec a ifconfig ${l}a 192.0.2.1/24 up 47 jexec b ifconfig ${l}b 192.0.2.2/24 up 50 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 54 dev-type tun 57 cipher AES-256-GCM 64 key $(atf_get_srcdir)/server.key 68 script-security 2 69 auth-user-pass-verify /usr/bin/true via-env 76 dev-type tun [all …]
|
| /freebsd/share/termcap/ |
| H A D | termcap.5 | 31 .\" * ncurses is copyright (C) 1992-1995 * 32 .\" * Zeyd M. Ben-Halim * 77 consist of a number of `:'-separated fields. 89 The particular piece of hardware making up the terminal 98 in 132-column mode would be 99 .Dq vt100-w . 101 .Bl -column indent "With automatic margins (usually default)xx" -offset indent 103 -w Wide mode (more than 80 columns) vt100-w 104 -am With automatic margins (usually default) vt100-am 105 -nam Without automatic margins vt100-nam [all …]
|
| /freebsd/crypto/krb5/src/plugins/kdb/db2/libdb2/btree/ |
| H A D | bt_seq.c | 25 /*- 73 #include "db-int.h" 87 * tree or from any specific key. A scan request before any scanning is 92 * __bt_seq -- 97 * key: key for positioning and return value 102 * RET_ERROR, RET_SUCCESS or RET_SPECIAL if there's no next key. 105 __bt_seq(const DB *dbp, DBT *key, DBT *data, u_int flags) in __bt_seq() argument 111 t = dbp->internal; in __bt_seq() 114 if (t->bt_pinned != NULL) { in __bt_seq() 115 mpool_put(t->bt_mp, t->bt_pinned, 0); in __bt_seq() [all …]
|
| /freebsd/crypto/openssl/fuzz/ |
| H A D | ml-kem.c | 12 * Test ml-kem operation. 24 * @brief Consumes an 8-bit unsigned integer from a buffer. 26 * This function extracts an 8-bit unsigned integer from the provided buffer, 31 * @param val Pointer to store the extracted 8-bit value. 41 *len -= sizeof(uint8_t); in consume_uint8t() 46 * @brief Selects a key type and size from a buffer. 48 * This function reads a key size value from the buffer, determines the 49 * corresponding key type and length, and updates the buffer pointer 51 * key sizes; otherwise, it includes some invalid sizes for testing. 55 * @param keytype Pointer to store the selected key type string. [all …]
|
| H A D | ml-dsa.c | 11 /* Test ML-DSA operation. */ 22 * @brief Consumes an 8-bit unsigned integer from a buffer. 24 * This function extracts an 8-bit unsigned integer from the provided buffer, 29 * @param val Pointer to store the extracted 8-bit value. 39 *len -= sizeof(uint8_t); in consume_uint8_t() 61 *len -= sizeof(size_t); in consume_size_t() 66 * @brief Selects a key type and size from a buffer. 68 * This function reads a key size value from the buffer, determines the 69 * corresponding key type and length, and updates the buffer pointer 70 * accordingly. If `only_valid` is set, it restricts selection to valid key [all …]
|
| H A D | slh-dsa.c | 12 * Test slh-dsa operation. 25 * @brief Consumes an 8-bit unsigned integer from a buffer. 27 * This function extracts an 8-bit unsigned integer from the provided buffer, 32 * @param val Pointer to store the extracted 8-bit value. 42 *len -= sizeof(uint8_t); in consume_uint8t() 47 * @brief Generates a DSA key pair using OpenSSL EVP API. 49 * This function creates a DSA key pair based on the specified key size and 52 * @param name The name of the key type (e.g., "DSA"). 53 * @param keysize The desired key size in bits. 54 * @param params Optional OpenSSL parameters for key generation. [all …]
|
| /freebsd/contrib/ntp/ntpd/ |
| H A D | ntp.keys.html | 1 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> 3 <!-- Created by GNU Texinfo 6.6, http://www.gnu.org/software/texinfo/ --> 5 <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> 6 <title>NTP Symmetric Key</title> 8 <meta name="description" content="NTP Symmetric Key"> [all...] |
| /freebsd/contrib/ntp/util/ |
| H A D | ntp-keygen.html | 1 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> 3 <!-- Created by GNU Texinfo 6.6, http://www.gnu.org/software/texinfo/ --> 5 <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> 6 <title>Ntp-keygen User’s Manual</title> 8 <meta name="description" content="Ntp-keyge [all...] |
| /freebsd/tests/sys/net/ |
| H A D | if_wg.sh | 2 # SPDX-License-Identifier: BSD-2-Clause 60 jexec wgtest1 ifconfig ${epair}a ${endpoint1}/24 up 61 jexec wgtest2 ifconfig ${epair}b ${endpoint2}/24 up 64 echo "$pri1" | jexec wgtest1 wg set $wg1 listen-port 12345 \ 65 private-key /dev/stdin 66 pub1=$(jexec wgtest1 wg show $wg1 public-key) 68 echo "$pri2" | jexec wgtest2 wg set $wg2 listen-port 12345 \ 69 private-key /dev/stdin 70 pub2=$(jexec wgtest2 wg show $wg2 public-key) 72 atf_check -s exit:0 -o ignore \ [all …]
|
| /freebsd/crypto/openssl/crypto/ec/curve448/ |
| H A D | ed448.h | 2 * Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved. 3 * Copyright 2015-2016 Cryptography Research, Inc. 18 /* Number of bytes in an EdDSA public key. */ 21 /* Number of bytes in an EdDSA private key. */ 35 * EdDSA key generation. This function uses a different (non-Decaf) encoding. 37 * pubkey (out): The public key. 38 * privkey (in): The private key. 51 * privkey (in): The private key. 52 * pubkey (in): The public key. 57 * context (in): A "context" for this signature of up to 255 bytes. [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/input/ |
| H A D | gpio-keys.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only 3 --- 4 $id: http://devicetree.org/schemas/input/gpio-keys.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Ro [all...] |
| /freebsd/contrib/libfido2/tools/ |
| H A D | assert_get.c | 2 * Copyright (c) 2018-2023 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 16 #include "../openbsd-compat/openbsd-compat.h" 20 fido_opt_t up; member 46 char *key; in parse_toggle() local 163 char *key = NULL; print_assert() local [all...] |
| /freebsd/usr.sbin/bsdconfig/include/ |
| H A D | usage.hlp | 4 [press the PageDown key to go to the next screen when you finish 10 KEY ACTION 11 --- ------ 14 UP ARROW Move to previous item (or up, in a text display box). 18 SHIFT-TAB Move to previous item or group. 19 LEFT ARROW Move to previous item or group (same as SHIFT-TAB). 20 PAGE UP In text display boxes, scrolls up one page. 24 If you see small "^(-)" or "v(+)" symbols at the edges of a menu, it 29 Up/Down arrow keys will cause the object to scroll by line. The 37 Most screens offer a Help button - USE IT! It generally offers useful [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_asn1_get_count.pod | 10 - enumerate public key ASN.1 methods 28 EVP_PKEY_asn1_count() returns a count of the number of public key 32 EVP_PKEY_asn1_get0() returns the public key ASN.1 method B<idx>. 34 - 1. 36 EVP_PKEY_asn1_find() looks up the B<EVP_PKEY_ASN1_METHOD> with NID 38 If B<pe> isn't B<NULL>, then it will look up an engine implementing a 42 EVP_PKEY_asn1_find_str() looks up the B<EVP_PKEY_ASN1_METHOD> with PEM 45 look up an engine implementing a B<EVP_PKEY_ASN1_METHOD> for the NID 49 EVP_PKEY_asn1_get0_info() returns the public key ID, base public key 51 associated with the public key ASN.1 method B<*ameth>. [all …]
|
| H A D | X509_get_pubkey.pod | 7 X509_REQ_get_X509_PUBKEY - get or set certificate or certificate request 8 public key 26 X509_get_pubkey() attempts to decode the public key for certificate B<x>. If 27 successful it returns the public key as an B<EVP_PKEY> pointer with its 28 reference count incremented: this means the returned key must be freed up 30 the reference count of the returned B<EVP_PKEY> so it must not be freed up 35 must not be freed up after use. 37 X509_set_pubkey() attempts to set the public key for certificate B<x> to 38 B<pkey>. The key B<pkey> should be freed up after use. 45 The first time a public key is decoded the B<EVP_PKEY> structure is [all …]
|
| /freebsd/crypto/heimdal/doc/ |
| H A D | setup.texi | 3 @node Setting up a realm, Applications, Building and Installing, Top 5 @chapter Setting up a realm 26 * Credential cache server - KCM:: 29 * Setting up DNS:: 32 * Setting up PK-INIT:: 36 @node Configuration file, Creating the database, Setting up a realm, Setting up a realm 48 @samp{[@samp{section-name}]}. A binding consists of a left hand side, an equal sign 51 @samp{@{} as the first non-whitespace character after the equal sign. All 57 a-subsection = @{ 59 other-var = value with @{@} [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/keytab/ |
| H A D | t_keytab.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* lib/krb5/keytab/t_keytab.c - Tests for keytab interface */ 27 #include "k5-int.h" 76 /* Now allocate space - without the null... */ in test_misc() 114 /* The buffer is allocated too small - to allow for valgrind test of in kt_test() 119 CHECK_ERR(kret, KRB5_KT_NAME_TOOLONG, "get_name - size 1"); in kt_test() 126 /* Try to lookup unknown principal - when keytab does not exist*/ in kt_test() 134 CHECK_ERR(kret, KRB5_KT_NOTFOUND, "Getting non-existent entry"); in kt_test() 144 * enctype e1, kvno 1, key = "1" in kt_test() 145 * enctype e2, kvno 1, key = "1" in kt_test() [all …]
|
| /freebsd/contrib/ncurses/include/ |
| H A D | Caps.uwin | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 2001-2015,2016 Free Software Foundation, Inc. # 43 # This file has three major sections; a standard-capabilities table, two 44 # extension-capability tables, and a section of aliases declarations. 53 # Column 5: KEY_xxx name, if any, `-' otherwise 54 # Column 6: value for KEY_xxx name, if any, `-' otherwise 56 # translations, `-' otherwise 59 # The codes following [Y-] in column 7 describe the versions of termcap which 63 # lot of old termcap-using programs). The codes read as follows: 95 # as an already-supported one. The compiler will handle aliasing, emitting [all …]
|
| H A D | Caps.keys | 2 # Copyright 2019-2023,2024 Thomas E. Dickey # 3 # Copyright 2001-2015,2016 Free Software Foundation, Inc. # 36 # is illustrates an experimental extension to describe alt-, shift- and 37 # control-modifiers applied to function and normal keys, as done on IBM pc's. 45 # This file has three major sections; a standard-capabilities table, two 46 # extension-capability tables, and a section of aliases declarations. 55 # Column 5: KEY_xxx name, if any, `-' otherwise 56 # Column 6: value for KEY_xxx name, if any, `-' otherwise 58 # translations, `-' otherwise 61 # The codes following [Y-] in column 7 describe the versions of termcap which [all …]
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_kdf_test.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 28 * implements the key derivation function from RFC 8636. */ 30 #include "k5-platform.h" 38 {0, sizeof(s)-1, (char *) s} 41 /* values from test vectors in the pkinit-alg-agility draft */ 91 /* set up a 256-byte, ALL-ZEROS secret */ in main() 100 /* set-up the partyUInfo and partyVInfo principals */ in main() 110 /* The test vectors in RFC 8636 implicitly use NT-PRINCIPAL names. */ in main() 111 u_principal->type = KRB5_NT_PRINCIPAL; in main() 112 v_principal->type = KRB5_NT_PRINCIPAL; in main() [all …]
|
| /freebsd/tests/sys/netpfil/pf/ |
| H A D | killstate.sh | 2 # SPDX-License-Identifier: BSD-2-Clause 33 jail=${1:-alcatraz} 34 ip=${2:-192.0.2.2} 36 jexec ${jail} pfctl -ss | grep icmp | grep ${ip} 41 jexec alcatraz pfctl -ss | grep icmp | grep 2001:db8::2 58 ifconfig ${epair}a 192.0.2.1/24 up 61 jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up 62 jexec alcatraz pfctl -e 69 atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \ 70 --sendif ${epair}a \ [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_PKEY_asn1_get_count.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH EVP_PKEY_ASN1_GET_COUNT 3ossl 2025-09-30 3.5.4 OpenSSL 69 \&\- enumerate public key ASN.1 methods 87 \&\fBEVP_PKEY_asn1_count()\fR returns a count of the number of public key 91 \&\fBEVP_PKEY_asn1_get0()\fR returns the public key ASN.1 method \fBidx\fR. 93 \&\- 1. 95 \&\fBEVP_PKEY_asn1_find()\fR looks up the \fBEVP_PKEY_ASN1_METHOD\fR with NID 97 If \fBpe\fR isn't \fBNULL\fR, then it will look up an engine implementing a 101 \&\fBEVP_PKEY_asn1_find_str()\fR looks up the \fBEVP_PKEY_ASN1_METHOD\fR with PEM 104 look up an engine implementing a \fBEVP_PKEY_ASN1_METHOD\fR for the NID [all …]
|
| H A D | X509_get_pubkey.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH X509_GET_PUBKEY 3ossl 2025-09-30 3.5.4 OpenSSL 66 X509_REQ_get_X509_PUBKEY \- get or set certificate or certificate request 67 public key 85 \&\fBX509_get_pubkey()\fR attempts to decode the public key for certificate \fBx\fR. If 86 successful it returns the public key as an \fBEVP_PKEY\fR pointer with its 87 reference count incremented: this means the returned key must be freed up 89 the reference count of the returned \fBEVP_PKEY\fR so it must not be freed up 94 must not be freed up after use. 96 \&\fBX509_set_pubkey()\fR attempts to set the public key for certificate \fBx\fR to [all …]
|
| /freebsd/lib/libsys/ |
| H A D | _umtx_op.2 | 49 .St -p1003.1-2001 57 All objects require ABI-mandated alignment, but this is not currently 61 .Bl -tag -width indent 63 Allow selection of the process-shared sleep queue for the thread sleep 66 The process-shared or process-private sleep queue is selected based on 70 Otherwise, if the flag is not specified, the process-private sleep queue 77 .Bl -hang -offset indent 79 .Bd -literal 95 .Bl -tag -width indent 104 The robust mutex is in a non-recoverable state. [all …]
|