/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.texi | 1 \input texinfo @c -*-texinfo-*- 3 @setfilename ntp-keygen.info 4 @settitle Ntp-keygen User's Manual 10 This file documents the use of the NTP Project's @code{ntp-keygen} 15 * ntp-keygen: (ntp-keygen). NTP Key Generation 19 @title NTP Key Generation User's Manual 20 @subtitle ntp-keygen, version @value{VERSION}, @value{UPDATED} 31 * ntp-keygen Invocation:: Invoking ntp-keygen 38 @top NTP Key Generation Program User Manual 40 This document describes the use of the NTP Project's @code{ntp-keygen} [all …]
|
H A D | ntp-keygen.mdoc.in | 4 .\" EDIT THIS FILE WITH CAUTION (ntp-keygen-opts.mdoc) 6 .\" It has been AutoGen-ed May 25, 2024 at 12:04:46 AM by AutoGen 5.18.16 7 .\" From the definitions ntp-keygen-opts.def 8 .\" and the template file agmdoc-cmd.tpl 10 .Nm ntp-keygen 11 .Nd Create a NTP host key 17 .Op Fl \-option\-nam [all...] |
H A D | ntp-keygen.1ntp-keygenmdoc | 2 .Dt NTP_KEYGEN 1ntp-keygenmdoc User Commands 4 .\" EDIT THIS FILE WITH CAUTION (ntp-keygen-opts.mdoc) 6 .\" It has been AutoGen-ed May 25, 2024 at 12:04:46 AM by AutoGen 5.18.16 7 .\" From the definitions ntp-keygen-opts.def 8 .\" and the template file agmdoc-cmd.tpl 10 .Nm ntp-keygen 11 .Nd Create a NTP host key 17 .Op Fl \-optio [all...] |
H A D | ntp-keygen-opts.def | 1 /* -*- Mode: Text -*- */ 7 #include autogen-version.def 9 prog-name = "ntp-keygen"; 10 prog-title = "create a Network Time Protocol host key"; 19 arg-type = number; 20 arg-name = imbits; 21 arg-range = '256->2048'; 24 doc = <<- _EndOfDoc_ 32 arg-type = string; 33 arg-name = scheme; [all …]
|
H A D | ntp-keygen.1ntp-keygenman | 2 . it 1 an-trap 6 .ds B-Font [CB] 7 .ds I-Font [CI] 8 .ds R-Font [CR] 10 .ds B-Font B 11 .ds I-Font I 12 .ds R-Font R 13 .TH ntp-keygen 1ntp-keygenman "25 May 2024" "ntp (4.2.8p18)" "User Commands" 15 .\" EDIT THIS FILE WITH CAUTION (in-me [all...] |
H A D | ntp-keygen.man.in | 2 . it 1 an-trap 6 .ds B-Font [CB] 7 .ds I-Font [CI] 8 .ds R-Font [CR] 10 .ds B-Font B 11 .ds I-Font I 12 .ds R-Font R 13 .TH ntp-keygen @NTP_KEYGEN_MS@ "25 May 2024" "ntp (4.2.8p18)" "User Commands" 15 .\" EDIT THIS FILE WITH CAUTION (in-mem file) 17 .\" It has been AutoGen-e [all...] |
H A D | invoke-ntp-keygen.texi | 1 @node ntp-keygen Invocation 2 @section Invoking ntp-keygen 3 @pindex ntp-keygen 4 @cindex Create a NTP host key 7 # EDIT THIS FILE WITH CAUTION (invoke-ntp-keygen.texi) 9 # It has been AutoGen-ed May 25, 2024 at 12:04:48 AM by AutoGen 5.18.16 10 # From the definitions ntp-keygen-opts.def 11 # and the template file agtexi-cm [all...] |
/freebsd/contrib/kyua/utils/config/ |
H A D | tree.cpp | 12 // documentation and/or other materials provided with the distribution. 48 /// Constructor with a non-empty root. 71 dynamic_cast< detail::static_inner_node* >(_root->deep_copy()); in deep_copy() 78 /// By combination we understand a new tree that contains the full key space of 80 /// right-hand side (aka "other") tree. 82 /// Any nodes marked as dynamic "win" over non-dynamic nodes and the resulting 90 /// example, if a single key represents an inner node in one tree but a leaf 91 /// node in the other one. 101 _root->combine(detail::tree_key(), other_root)); in combine() 108 /// This operation creates the given key as an inner node. Further set [all …]
|
H A D | nodes.cpp | 12 // documentation and/or other materials provided with the distribution. 73 node->_dynamic = _dynamic; in copy_into() 76 base_node* new_node = (*iter).second->deep_copy(); in copy_into() 78 node->_children[(*iter).first] = new_node; in copy_into() 90 /// for invoking this twice so that the two key sets are combined if they happen 93 /// \param key Key to this node. 101 const tree_key& key, in combine_children_into() argument 109 if (node->_children.find(name) != node->_children.end()) { in combine_children_into() 117 new_node.reset((*iter1).second->deep_copy()); in combine_children_into() 119 tree_key child_key = key; in combine_children_into() [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_dense_map.h | 1 //===- sanitizer_dense_map.h - Dense probed hash table ----------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 14 //===----------------------------------------------------------------------===// 54 P->getFirst() = EmptyKey; in clear() 58 if (!KeyInfoT::isEqual(P->getFirst(), EmptyKey)) { in clear() 59 if (!KeyInfoT::isEqual(P->getFirst(), TombstoneKey)) { in clear() 60 P->getSecond().~ValueT(); in clear() 61 --NumEntries; in clear() 63 P->getFirst() = EmptyKey; in clear() [all …]
|
/freebsd/contrib/ncurses/man/ |
H A D | curs_getch.3x | 3 .\" Copyright 2018-2023,2024 Thomas E. Dickey * 4 .\" Copyright 1998-2016,2017 Free Software Foundation, Inc. * 21 .\" DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR * 23 .\" THE USE OR OTHER DEALINGS IN THE SOFTWARE. * 27 .\" sale, use or other dealings in this Software without prior written * 32 .TH curs_getch 3X 2024-04-20 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "Library calls" 59 \fB\%has_key\fP \- 79 gathers a key stroke from the terminal keyboard associated with a 87 returns an integer identifying the key stroke; 90 Use of the control key as a modifier often results in a distinct code. [all …]
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 13 # trust variants: +serverAuth -serverAuth +clientAuth -clientAuth 14 openssl x509 -in root-cert.pem -trustout \ [all …]
|
/freebsd/contrib/ntp/html/ |
H A D | keygen.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 6 <title>ntp-keygen - generate public and private keys</title> 10 <h3><tt>ntp-keygen</tt> - generate public and private keys</h3> 12 <p>Alice holds the key.</p> 14 <!-- #BeginDate format:En2m -->24-Jul-2018 07:27<!-- #EndDate --> 31 …<p id="intro"><tt>ntp-keygen [ -deGHIMPT ] [ -b <i>modulus</i> ] [ -c [ RSA-MD2 | RSA-MD5 | RSA-SHA 32 | RSA-SHA1 | RSA-MDC2 | RSA-RIPEMD160 | DSA-SHA | DSA-SHA1 ] ] 33 [ -C <i>cipher</i> ] [-i <i>group</i> ] [ -l <em>days</em>] 34 [ -m <i>modulus</i> ] [ -p <i>passwd1</i> ] [ -q <i>passwd2</i> ] [all …]
|
/freebsd/share/termcap/ |
H A D | termcap.5 | 11 .\" documentation and/or other materials provided with the distribution. 31 .\" * ncurses is copyright (C) 1992-1995 * 32 .\" * Zeyd M. Ben-Halim * 77 consist of a number of `:'-separated fields. 98 in 132-column mode would be 99 .Dq vt100-w . 101 .Bl -column indent "With automatic margins (usually default)xx" -offset indent 103 -w Wide mode (more than 80 columns) vt100-w 104 -am With automatic margins (usually default) vt100-am 105 -nam Without automatic margins vt100-nam [all …]
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_block.h | 19 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 21 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 39 * This file documents the API for block ciphers and other symmetric 48 * initialised with the encryption key. 63 * - `br_xxx_BLOCK_SIZE` 69 * - `br_xxx_cbcenc_keys` 71 * Context structure that contains the subkeys resulting from the key 76 * - `br_xxx_cbcenc_init(br_xxx_cbcenc_keys *ctx, const void *key, size_t len)` 78 * Perform key expansion: subkeys for CBC encryption are computed and 79 * written in the provided context structure. The key length MUST be [all …]
|
/freebsd/contrib/llvm-project/llvm/include/llvm/ADT/ |
H A D | DenseMap.h | 1 //===- llvm/ADT/DenseMap.h - Dense probed hash table ------------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 12 //===----------------------------------------------------------------------===// 81 return makeIterator(getBucketsEnd() - 1, getBuckets(), *this); in begin() 91 return makeConstIterator(getBucketsEnd() - 1, getBuckets(), *this); in begin() 125 P->getFirst() = EmptyKey; in clear() 129 if (!KeyInfoT::isEqual(P->getFirst(), EmptyKey)) { in clear() 130 if (!KeyInfoT::isEqual(P->getFirst(), TombstoneKey)) { in clear() 131 P->getSecond().~ValueT(); in clear() [all …]
|
H A D | StringMap.h | 1 //===- StringMap.h - String Hash table map interface ------------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 12 //===----------------------------------------------------------------------===// 30 /// StringMapImpl - This is the base class of StringMap that is shared among 59 /// LookupBucketFor - Look up the bucket that the specified string should end 60 /// up in. If it already exists as a key in the map, the Item pointer for the 61 /// specified bucket will be non-null. Otherwise, it will be null. In either 64 unsigned LookupBucketFor(StringRef Key) { in LookupBucketFor() argument 65 return LookupBucketFor(Key, hash(Key)); in LookupBucketFor() [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | provider-keymgmt.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "PROVIDER-KEYMGMT 7ossl" 58 .TH PROVIDER-KEYMGMT 7ossl 2025-07-01 3.5.1 OpenSSL 64 provider\-keymgmt \- The KEYMGMT library <\-> provider functions 76 \& /* Key object (keydata) creation and destruction */ 93 \& /* Key loading by object reference, also a constructor */ 96 \& /* Key object information */ 102 \& /* Key object content checks */ 110 \& /* Key object import and export functions */ 119 \& /* Key object duplication, a constructor */ [all …]
|
/freebsd/usr.bin/enigma/ |
H A D | enigma.1 | 31 .Dq secret-key 38 stream again through the engine (using the same secret key) will 41 There are several ways to provide the secret key to the program. 44 the key, using 48 Alternatively, the key can be provided as the sole command-line 52 Obviously, this way the key can easily be 53 spotted by other users running 59 and it will take the key from the environment variable 65 Thus this option is mainly provided for compatibility with other 73 little more secure, but incompatible with other implementations. [all …]
|
/freebsd/lib/libthr/thread/ |
H A D | thr_pshared.c | 1 /*- 14 * documentation and/or other materials provided with the distribution. 34 #include "un-namespace.h" 40 void *key; member 47 #define PSHARED_KEY_HASH(key) (((unsigned long)(key) >> 8) % HASH_SIZE) argument 48 /* XXXKIB: lock could be split to per-hash chain, if appears contested */ 70 curthread->locklevel++; in pshared_rlock() 78 curthread->locklevel++; in pshared_wlock() 87 curthread->locklevel--; in pshared_unlock() 93 * pthread_lock_destroy(). Other processes still have the hash and [all …]
|
/freebsd/crypto/openssl/demos/keyexch/ |
H A D | ecdh.c | 2 * Copyright 2023-2024 The OpenSSL Project Authors. All Rights Reserved. 17 * This is a demonstration of key exchange using ECDH. 19 * EC key exchange requires 2 parties (peers) to first agree on shared group 21 * key pair using the shared curve name. Each peer then gives their public key 22 * to the other peer. A peer can then derive the same shared secret using their 23 * private key and the other peers public key. 31 EVP_PKEY *pub; /* public key to send to other peer */ 37 * The public key needs to be given to the other peer 38 * The following code extracts the public key data from the private key 39 * and then builds an EVP_KEY public key. [all …]
|
/freebsd/share/man/man4/ |
H A D | gbde.4 |
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-verification-options.1 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OPENSSL-VERIFICATION-OPTIONS 1ossl" 58 .TH OPENSSL-VERIFICATION-OPTIONS 1ossl 2025-07-01 3.5.1 OpenSSL 64 openssl\-verification\-options \- generic X.509 certificate verification options 85 is a high-level specification of the intended use of the target certificate, 91 DANE support is documented in \fBopenssl\-s_client\fR\|(1), 97 any public key and related subject distinguished name (DN) that 102 where their essential fields are the public key and the subject DN. 106 In particular, the subject key identifier extension, if present, 110 all self-signed "root" CA certificates that are placed in the \fItrust store\fR, [all …]
|
/freebsd/crypto/krb5/src/lib/crypto/builtin/des/doc/ |
H A D | libdes.doc | 9 --------------- (PC8086) 14 | /projects/auth/ibm/lib/libdes.a (PC8086 cross-compilation environment) 16 3) For each key that may be simultaneously active, 20 4) Create key schedules, as needed, prior to using the encryption 30 /* ---------------------------------------------------------------- */ 32 Routine Interfaces-- 34 /* ----------------------------------------------------------------- */ 41 Calculates a key schedule from (all) eight bytes of the input key, and 44 Make sure to pass valid eight bytes, no padding or other processing 47 The key schedule is then used in subsequent encryption/decryption [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-keymgmt.pod | 5 provider-keymgmt - The KEYMGMT library E<lt>-E<gt> provider functions 17 /* Key object (keydata) creation and destruction */ 34 /* Key loading by object reference, also a constructor */ 37 /* Key object information */ 43 /* Key object content checks */ 51 /* Key object import and export functions */ 60 /* Key object duplication, a constructor */ 63 /* Key object validation */ 70 in tandem with operations that use private/public key pairs. 77 provider side key data for the OpenSSL library EVP_PKEY structure. [all …]
|