Home
last modified time | relevance | path

Searched +full:key +full:- +full:up (Results 1 – 25 of 1129) sorted by relevance

12345678910>>...46

/freebsd/contrib/sendmail/src/
H A Dudb.c2 * Copyright (c) 1998-2003, 2006 Proofpoint, Inc. and its suppliers.
4 * Copyright (c) 1983, 1995-1997 Eric P. Allman. All rights reserved.
18 SM_RCSID("@(#)$Id: udb.c,v 8.166 2013-11-22 20:51:57 ca Exp $ (with USERDB)")
20 SM_RCSID("@(#)$Id: udb.c,v 8.166 2013-11-22 20:51:57 ca Exp $ (without USERDB)")
38 ** UDB.C -- interface between sendmail and Berkeley User Data Base.
52 /* type UE_REMOTE -- do remote call for lookup */
62 /* type UE_FORWARD -- forward message to remote */
70 /* type UE_FETCH -- look up in local database */
84 # define UDB_REMOTE 2 /* look up in remote database */
85 # define UDB_DBFETCH 3 /* look up in local database */
[all …]
/freebsd/tests/sys/net/if_ovpn/
H A Dif_ovpn.sh2 # SPDX-License-Identifier: BSD-2-Clause
45 jexec a ifconfig ${l}a 192.0.2.1/24 up
47 jexec b ifconfig ${l}b 192.0.2.2/24 up
50 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
54 dev-type tun
57 cipher AES-256-GCM
64 key $(atf_get_srcdir)/server.key
68 script-security 2
69 auth-user-pass-verify /usr/bin/true via-env
76 dev-type tun
[all …]
/freebsd/share/termcap/
H A Dtermcap.531 .\" * ncurses is copyright (C) 1992-1995 *
32 .\" * Zeyd M. Ben-Halim *
77 consist of a number of `:'-separated fields.
89 The particular piece of hardware making up the terminal
98 in 132-column mode would be
99 .Dq vt100-w .
101 .Bl -column indent "With automatic margins (usually default)xx" -offset indent
103 -w Wide mode (more than 80 columns) vt100-w
104 -am With automatic margins (usually default) vt100-am
105 -nam Without automatic margins vt100-nam
[all …]
/freebsd/crypto/krb5/src/plugins/kdb/db2/libdb2/btree/
H A Dbt_seq.c25 /*-
73 #include "db-int.h"
87 * tree or from any specific key. A scan request before any scanning is
92 * __bt_seq --
97 * key: key for positioning and return value
102 * RET_ERROR, RET_SUCCESS or RET_SPECIAL if there's no next key.
105 __bt_seq(const DB *dbp, DBT *key, DBT *data, u_int flags) in __bt_seq() argument
111 t = dbp->internal; in __bt_seq()
114 if (t->bt_pinned != NULL) { in __bt_seq()
115 mpool_put(t->bt_mp, t->bt_pinned, 0); in __bt_seq()
[all …]
/freebsd/crypto/openssl/fuzz/
H A Dml-kem.c12 * Test ml-kem operation.
24 * @brief Consumes an 8-bit unsigned integer from a buffer.
26 * This function extracts an 8-bit unsigned integer from the provided buffer,
31 * @param val Pointer to store the extracted 8-bit value.
41 *len -= sizeof(uint8_t); in consume_uint8t()
46 * @brief Selects a key type and size from a buffer.
48 * This function reads a key size value from the buffer, determines the
49 * corresponding key type and length, and updates the buffer pointer
51 * key sizes; otherwise, it includes some invalid sizes for testing.
55 * @param keytype Pointer to store the selected key type string.
[all …]
H A Dml-dsa.c11 /* Test ML-DSA operation. */
22 * @brief Consumes an 8-bit unsigned integer from a buffer.
24 * This function extracts an 8-bit unsigned integer from the provided buffer,
29 * @param val Pointer to store the extracted 8-bit value.
39 *len -= sizeof(uint8_t); in consume_uint8_t()
61 *len -= sizeof(size_t); in consume_size_t()
66 * @brief Selects a key type and size from a buffer.
68 * This function reads a key size value from the buffer, determines the
69 * corresponding key type and length, and updates the buffer pointer
70 * accordingly. If `only_valid` is set, it restricts selection to valid key
[all …]
H A Dslh-dsa.c12 * Test slh-dsa operation.
25 * @brief Consumes an 8-bit unsigned integer from a buffer.
27 * This function extracts an 8-bit unsigned integer from the provided buffer,
32 * @param val Pointer to store the extracted 8-bit value.
42 *len -= sizeof(uint8_t); in consume_uint8t()
47 * @brief Generates a DSA key pair using OpenSSL EVP API.
49 * This function creates a DSA key pair based on the specified key size and
52 * @param name The name of the key type (e.g., "DSA").
53 * @param keysize The desired key size in bits.
54 * @param params Optional OpenSSL parameters for key generation.
[all …]
/freebsd/contrib/ntp/ntpd/
H A Dntp.keys.html1 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
3 <!-- Created by GNU Texinfo 6.6, http://www.gnu.org/software/texinfo/ -->
5 <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
6 <title>NTP Symmetric Key</title>
8 <meta name="description" content="NTP Symmetric Key">
[all...]
/freebsd/contrib/ntp/util/
H A Dntp-keygen.html1 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
3 <!-- Created by GNU Texinfo 6.6, http://www.gnu.org/software/texinfo/ -->
5 <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
6 <title>Ntp-keygen User&rsquo;s Manual</title>
8 <meta name="description" content="Ntp-keyge
[all...]
/freebsd/tests/sys/net/
H A Dif_wg.sh2 # SPDX-License-Identifier: BSD-2-Clause
60 jexec wgtest1 ifconfig ${epair}a ${endpoint1}/24 up
61 jexec wgtest2 ifconfig ${epair}b ${endpoint2}/24 up
64 echo "$pri1" | jexec wgtest1 wg set $wg1 listen-port 12345 \
65 private-key /dev/stdin
66 pub1=$(jexec wgtest1 wg show $wg1 public-key)
68 echo "$pri2" | jexec wgtest2 wg set $wg2 listen-port 12345 \
69 private-key /dev/stdin
70 pub2=$(jexec wgtest2 wg show $wg2 public-key)
72 atf_check -s exit:0 -o ignore \
[all …]
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Ded448.h2 * Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright 2015-2016 Cryptography Research, Inc.
18 /* Number of bytes in an EdDSA public key. */
21 /* Number of bytes in an EdDSA private key. */
35 * EdDSA key generation. This function uses a different (non-Decaf) encoding.
37 * pubkey (out): The public key.
38 * privkey (in): The private key.
51 * privkey (in): The private key.
52 * pubkey (in): The public key.
57 * context (in): A "context" for this signature of up to 255 bytes.
[all …]
/freebsd/sys/contrib/device-tree/Bindings/input/
H A Dgpio-keys.yaml1 # SPDX-License-Identifier: GPL-2.0-only
3 ---
4 $id: http://devicetree.org/schemas/input/gpio-keys.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Ro
[all...]
/freebsd/contrib/libfido2/tools/
H A Dassert_get.c2 * Copyright (c) 2018-2023 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
16 #include "../openbsd-compat/openbsd-compat.h"
20 fido_opt_t up; member
46 char *key; in parse_toggle() local
163 char *key = NULL; print_assert() local
[all...]
/freebsd/usr.sbin/bsdconfig/include/
H A Dusage.hlp4 [press the PageDown key to go to the next screen when you finish
10 KEY ACTION
11 --- ------
14 UP ARROW Move to previous item (or up, in a text display box).
18 SHIFT-TAB Move to previous item or group.
19 LEFT ARROW Move to previous item or group (same as SHIFT-TAB).
20 PAGE UP In text display boxes, scrolls up one page.
24 If you see small "^(-)" or "v(+)" symbols at the edges of a menu, it
29 Up/Down arrow keys will cause the object to scroll by line. The
37 Most screens offer a Help button - USE IT! It generally offers useful
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_asn1_get_count.pod10 - enumerate public key ASN.1 methods
28 EVP_PKEY_asn1_count() returns a count of the number of public key
32 EVP_PKEY_asn1_get0() returns the public key ASN.1 method B<idx>.
34 - 1.
36 EVP_PKEY_asn1_find() looks up the B<EVP_PKEY_ASN1_METHOD> with NID
38 If B<pe> isn't B<NULL>, then it will look up an engine implementing a
42 EVP_PKEY_asn1_find_str() looks up the B<EVP_PKEY_ASN1_METHOD> with PEM
45 look up an engine implementing a B<EVP_PKEY_ASN1_METHOD> for the NID
49 EVP_PKEY_asn1_get0_info() returns the public key ID, base public key
51 associated with the public key ASN.1 method B<*ameth>.
[all …]
H A DX509_get_pubkey.pod7 X509_REQ_get_X509_PUBKEY - get or set certificate or certificate request
8 public key
26 X509_get_pubkey() attempts to decode the public key for certificate B<x>. If
27 successful it returns the public key as an B<EVP_PKEY> pointer with its
28 reference count incremented: this means the returned key must be freed up
30 the reference count of the returned B<EVP_PKEY> so it must not be freed up
35 must not be freed up after use.
37 X509_set_pubkey() attempts to set the public key for certificate B<x> to
38 B<pkey>. The key B<pkey> should be freed up after use.
45 The first time a public key is decoded the B<EVP_PKEY> structure is
[all …]
/freebsd/crypto/heimdal/doc/
H A Dsetup.texi3 @node Setting up a realm, Applications, Building and Installing, Top
5 @chapter Setting up a realm
26 * Credential cache server - KCM::
29 * Setting up DNS::
32 * Setting up PK-INIT::
36 @node Configuration file, Creating the database, Setting up a realm, Setting up a realm
48 @samp{[@samp{section-name}]}. A binding consists of a left hand side, an equal sign
51 @samp{@{} as the first non-whitespace character after the equal sign. All
57 a-subsection = @{
59 other-var = value with @{@}
[all …]
/freebsd/crypto/krb5/src/lib/krb5/keytab/
H A Dt_keytab.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2 /* lib/krb5/keytab/t_keytab.c - Tests for keytab interface */
27 #include "k5-int.h"
76 /* Now allocate space - without the null... */ in test_misc()
114 /* The buffer is allocated too small - to allow for valgrind test of in kt_test()
119 CHECK_ERR(kret, KRB5_KT_NAME_TOOLONG, "get_name - size 1"); in kt_test()
126 /* Try to lookup unknown principal - when keytab does not exist*/ in kt_test()
134 CHECK_ERR(kret, KRB5_KT_NOTFOUND, "Getting non-existent entry"); in kt_test()
144 * enctype e1, kvno 1, key = "1" in kt_test()
145 * enctype e2, kvno 1, key = "1" in kt_test()
[all …]
/freebsd/contrib/ncurses/include/
H A DCaps.uwin2 # Copyright 2019-2023,2024 Thomas E. Dickey #
3 # Copyright 2001-2015,2016 Free Software Foundation, Inc. #
43 # This file has three major sections; a standard-capabilities table, two
44 # extension-capability tables, and a section of aliases declarations.
53 # Column 5: KEY_xxx name, if any, `-' otherwise
54 # Column 6: value for KEY_xxx name, if any, `-' otherwise
56 # translations, `-' otherwise
59 # The codes following [Y-] in column 7 describe the versions of termcap which
63 # lot of old termcap-using programs). The codes read as follows:
95 # as an already-supported one. The compiler will handle aliasing, emitting
[all …]
H A DCaps.keys2 # Copyright 2019-2023,2024 Thomas E. Dickey #
3 # Copyright 2001-2015,2016 Free Software Foundation, Inc. #
36 # is illustrates an experimental extension to describe alt-, shift- and
37 # control-modifiers applied to function and normal keys, as done on IBM pc's.
45 # This file has three major sections; a standard-capabilities table, two
46 # extension-capability tables, and a section of aliases declarations.
55 # Column 5: KEY_xxx name, if any, `-' otherwise
56 # Column 6: value for KEY_xxx name, if any, `-' otherwise
58 # translations, `-' otherwise
61 # The codes following [Y-] in column 7 describe the versions of termcap which
[all …]
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_kdf_test.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
28 * implements the key derivation function from RFC 8636. */
30 #include "k5-platform.h"
38 {0, sizeof(s)-1, (char *) s}
41 /* values from test vectors in the pkinit-alg-agility draft */
91 /* set up a 256-byte, ALL-ZEROS secret */ in main()
100 /* set-up the partyUInfo and partyVInfo principals */ in main()
110 /* The test vectors in RFC 8636 implicitly use NT-PRINCIPAL names. */ in main()
111 u_principal->type = KRB5_NT_PRINCIPAL; in main()
112 v_principal->type = KRB5_NT_PRINCIPAL; in main()
[all …]
/freebsd/tests/sys/netpfil/pf/
H A Dkillstate.sh2 # SPDX-License-Identifier: BSD-2-Clause
33 jail=${1:-alcatraz}
34 ip=${2:-192.0.2.2}
36 jexec ${jail} pfctl -ss | grep icmp | grep ${ip}
41 jexec alcatraz pfctl -ss | grep icmp | grep 2001:db8::2
58 ifconfig ${epair}a 192.0.2.1/24 up
61 jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
62 jexec alcatraz pfctl -e
69 atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
70 --sendif ${epair}a \
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_PKEY_asn1_get_count.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH EVP_PKEY_ASN1_GET_COUNT 3ossl 2025-09-30 3.5.4 OpenSSL
69 \&\- enumerate public key ASN.1 methods
87 \&\fBEVP_PKEY_asn1_count()\fR returns a count of the number of public key
91 \&\fBEVP_PKEY_asn1_get0()\fR returns the public key ASN.1 method \fBidx\fR.
93 \&\- 1.
95 \&\fBEVP_PKEY_asn1_find()\fR looks up the \fBEVP_PKEY_ASN1_METHOD\fR with NID
97 If \fBpe\fR isn't \fBNULL\fR, then it will look up an engine implementing a
101 \&\fBEVP_PKEY_asn1_find_str()\fR looks up the \fBEVP_PKEY_ASN1_METHOD\fR with PEM
104 look up an engine implementing a \fBEVP_PKEY_ASN1_METHOD\fR for the NID
[all …]
H A DX509_get_pubkey.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH X509_GET_PUBKEY 3ossl 2025-09-30 3.5.4 OpenSSL
66 X509_REQ_get_X509_PUBKEY \- get or set certificate or certificate request
67 public key
85 \&\fBX509_get_pubkey()\fR attempts to decode the public key for certificate \fBx\fR. If
86 successful it returns the public key as an \fBEVP_PKEY\fR pointer with its
87 reference count incremented: this means the returned key must be freed up
89 the reference count of the returned \fBEVP_PKEY\fR so it must not be freed up
94 must not be freed up after use.
96 \&\fBX509_set_pubkey()\fR attempts to set the public key for certificate \fBx\fR to
[all …]
/freebsd/lib/libsys/
H A D_umtx_op.249 .St -p1003.1-2001
57 All objects require ABI-mandated alignment, but this is not currently
61 .Bl -tag -width indent
63 Allow selection of the process-shared sleep queue for the thread sleep
66 The process-shared or process-private sleep queue is selected based on
70 Otherwise, if the flag is not specified, the process-private sleep queue
77 .Bl -hang -offset indent
79 .Bd -literal
95 .Bl -tag -width indent
104 The robust mutex is in a non-recoverable state.
[all …]

12345678910>>...46