/freebsd/lib/libc++/ |
H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 5 { include: [ "<__algorithm/binary_search.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 8 { include: [ "<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 10 { include: [ "<__algorithm/copy_backward.h>", "private", "<algorithm>", "public" ] }, 11 { include: [ "<__algorithm/copy_if.h>", "private", "<algorithm>", "public" ] }, [all …]
|
/freebsd/contrib/libarchive/libarchive/test/ |
H A D | test_open_failure.c | 43 struct my_data *private = (struct my_data *)_private; in my_read() 46 assertEqualInt(MAGIC, private->magic); in my_read() 47 ++private->read_called; in my_read() 48 return (private->read_return); in my_read() 54 struct my_data *private = (struct my_data *)_private; in my_write() 58 assertEqualInt(MAGIC, private->magic); in my_write() 59 ++private->write_called; in my_write() 60 return (private->write_return); in my_write() 66 struct my_data *private = (struct my_data *)_private; in my_open() 68 assertEqualInt(MAGIC, private in my_open() 44 struct my_data *private = (struct my_data *)_private; my_read() local 55 struct my_data *private = (struct my_data *)_private; my_write() local 67 struct my_data *private = (struct my_data *)_private; my_open() local 77 struct my_data *private = (struct my_data *)_private; my_close() local 88 struct my_data private; DEFINE_TEST() local [all...] |
H A D | test_write_format_zip_large.c | 87 struct fileblocks *private = _private; in memory_write() local 95 private->last->gap_size += (int64_t)size; in memory_write() 104 if (private->last == NULL) { in memory_write() 105 private->first = private->last = block; in memory_write() 107 private->last->next = block; in memory_write() 108 private->last = block; in memory_write() 112 private->filesize += size; in memory_write() 119 struct fileblocks *private = _private; in memory_read() local 124 while (private->current != NULL && private->buff == NULL && private->gap_remaining == 0) { in memory_read() 125 private->current = private->current->next; in memory_read() [all …]
|
H A D | test_tar_large.c | 83 struct memdata *private = _private; in memory_write() local 98 private->last->filebytes += (int64_t)size; in memory_write() 107 if (private->last == NULL) { in memory_write() 108 private->first = private->last = block; in memory_write() 110 private->last->next = block; in memory_write() 111 private->last = block; in memory_write() 121 struct memdata *private = _private; in memory_read() local 127 free(private->buff); in memory_read() 128 private->buff = NULL; in memory_read() 129 if (private->first == NULL) { in memory_read() [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_brainpool.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 30 -----BEGIN PRIVATE KEY----- 32 -----END PRIVATE KEY----- 55 -----BEGIN PRIVATE KEY----- 57 -----END PRIVATE KEY----- 68 -----BEGIN PRIVATE KEY----- 70 -----END PRIVATE KEY----- 93 -----BEGIN PRIVATE KEY----- 96 -----END PRIVATE KEY----- [all …]
|
H A D | evppkey_ecdh.txt | 17 # Private keys used for PKEY operations. 24 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 39 -----BEGIN PRIVATE KEY----- 42 -----END PRIVATE KEY----- 68 -----BEGIN PRIVATE KEY----- 71 -----END PRIVATE KEY----- 83 -----BEGIN PRIVATE KEY----- 86 -----END PRIVATE KEY----- 114 -----BEGIN PRIVATE KEY----- [all …]
|
H A D | evppkey_ecc.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 95 -----BEGIN PRIVATE KEY----- 97 -----END PRIVATE KEY----- 109 -----BEGIN PRIVATE KEY----- 111 -----END PRIVATE KEY----- 173 -----BEGIN PRIVATE KEY----- 175 -----END PRIVATE KEY----- [all …]
|
H A D | evppkey_kas.txt | 17 # Private keys used for PKEY operations. 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 60 -----BEGIN PRIVATE KEY----- 64 -----END PRIVATE KEY----- 89 -----BEGIN PRIVATE KEY----- 93 -----END PRIVATE KEY----- 118 -----BEGIN PRIVATE KEY----- 122 -----END PRIVATE KEY----- 147 -----BEGIN PRIVATE KEY----- [all …]
|
H A D | evppkey_ecx.txt | 17 # Private keys used for PKEY operations. 22 -----BEGIN PRIVATE KEY----- 24 -----END PRIVATE KEY----- 34 -----BEGIN PRIVATE KEY----- 36 -----END PRIVATE KEY----- 88 -----BEGIN PRIVATE KEY----- 91 -----END PRIVATE KEY----- 102 -----BEGIN PRIVATE KEY----- 105 -----END PRIVATE KEY----- 165 -----BEGIN PRIVATE KEY----- [all …]
|
H A D | evppkey_dsa.txt | 15 # Private keys used for PKEY operations. 19 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 101 -----BEGIN PRIVATE KEY----- 108 -----END PRIVATE KEY----- 134 -----BEGIN PRIVATE KEY----- 143 -----END PRIVATE KEY----- 146 -----BEGIN PRIVATE KEY----- 160 -----END PRIVATE KEY----- 163 -----BEGIN PRIVATE KEY----- [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_use_certificate.pod | 54 These functions load the certificates and private keys into the SSL_CTX 91 SSL_CTX_use_PrivateKey() adds B<pkey> as private key to B<ctx>. 92 SSL_CTX_use_RSAPrivateKey() adds the private key B<rsa> of type RSA 93 to B<ctx>. SSL_use_PrivateKey() adds B<pkey> as private key to B<ssl>; 94 SSL_use_RSAPrivateKey() adds B<rsa> as private key of type RSA to B<ssl>. 95 If a certificate has already been set and the private key does not belong 96 to the certificate an error is returned. To change a [certificate/private-key] 98 SSL_CTX_use_certificate() before setting the private key with 103 certificate B<x>, private key B<key>, and certificate B<chain> onto the 104 corresponding B<ssl> or B<ctx>. The B<pkey> argument must be the private [all...] |
H A D | EVP_PKEY_new.pod | 18 - public/private key allocation and raw key handling functions 68 Conceptually, an B<EVP_PKEY> internal key may hold a private key, a public 71 be made; for example, signing normally requires the presence of a private key, 74 =for comment ED signature require both the private and public key... 82 used by OpenSSL to store public and private keys. The reference count is set to 97 string for a public key algorithm that supports raw private keys, i.e one of 98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key 101 automatically derived from the given private key data (if appropriate for the 109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>, 121 private key information. Algorithm types that support raw public keys are [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_CTX_use_certificate.3 | 189 These functions load the certificates and private keys into the \s-1SSL_CTX\s0 226 \&\fBSSL_CTX_use_PrivateKey()\fR adds \fBpkey\fR as private key to \fBctx\fR. 227 \&\fBSSL_CTX_use_RSAPrivateKey()\fR adds the private key \fBrsa\fR of type \s-1RSA\s0 228 to \fBctx\fR. \fBSSL_use_PrivateKey()\fR adds \fBpkey\fR as private key to \fBssl\fR; 229 \&\fBSSL_use_RSAPrivateKey()\fR adds \fBrsa\fR as private key of type \s-1RSA\s0 to \fBssl\fR. 230 If a certificate has already been set and the private key does not belong 231 to the certificate an error is returned. To change a [certificate/private\-key] 233 \&\fBSSL_CTX_use_certificate()\fR before setting the private key with 237 certificate \fBx\fR, private key \fBkey\fR, and certificate \fBchain\fR onto the 238 corresponding \fBssl\fR or \fBctx\fR. The \fBpkey\fR argument must be the private [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-pkcs8.pod.in | 6 openssl-pkcs8 - PKCS#8 format private key conversion command 35 This command processes private keys in PKCS#8 format. It can handle 49 Normally a PKCS#8 private key is expected on input and a private key will be 51 reversed: it reads a private key and writes a PKCS#8 format key. 63 unencrypted private key in PKCS#8 format. If the B<-traditional> option is 64 used then a traditional format private key is written instead. 67 unencrypted private key in traditional DER format. 69 If B<-topk8> is used then any supported private key can be used for the input 76 When this option is present and B<-topk8> is not a traditional format private 113 This option does not encrypt private keys at all and should only be used [all …]
|
H A D | openssl-pkcs12.pod.in | 84 Conversely, the options regarding encryption of private keys when outputting 101 The password source for the input, and for encrypting any private keys that 124 No private keys will be output. 145 in the build. The default algorithm for private key encryption is 3DES_CBC. 147 and the default encryption algorithm for both certificates and private keys is 172 The filename to write certificates and private keys to, standard output by 194 Use AES to encrypt private keys before outputting. 198 Use ARIA to encrypt private keys before outputting. 202 Use Camellia to encrypt private keys before outputting. 206 Use DES to encrypt private keys before outputting. [all …]
|
H A D | openssl-ec.pod.in | 40 private key format specified in 'SEC 1: Elliptic Curve Cryptography' 41 (http://www.secg.org/). To convert an OpenSSL EC private key into the 42 PKCS#8 private key format use the L<openssl-pkcs8(1)> command. 62 Private keys are an SEC1 private key or PKCS#8 format. 86 These options encrypt the private key with the DES, triple DES, IDEA or 97 Prints out the public, private key components and parameters. 109 By default, a private key is read from the input file. With this option a 114 By default a private key is output. With this option a public 140 This option omits the public key components from the private key output. 144 This option checks the consistency of an EC private or public key. [all …]
|
H A D | openssl-pkey.pod.in | 10 openssl-pkey - public or private key processing command 37 This command processes public or private keys. They can be 56 This option checks the consistency of a key pair for both public and private 91 By default a private key is read from the input. 115 Encrypt the PEM encoded private key with the supplied cipher. Any algorithm 128 Normally a private key is written using standard format: this is PKCS#8 form 134 By default the private and public key is output; 152 Output in text form only the public key components (also for private keys). 169 This option only applies to elliptic curve based public and private keys. 183 To remove the pass phrase on a private key: [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | drbgtest.c | 171 * |primary|, |public|, |private|: pointers to the three shared DRBGs 183 EVP_RAND_CTX *private, in test_drbg_reseed() argument 210 || !TEST_int_ne(private_reseed = reseed_counter(private), 0)) in test_drbg_reseed() 220 /* Generate random output from the public and private DRBG */ in test_drbg_reseed() 237 || !TEST_int_eq(state(private), expected_state)) in test_drbg_reseed() 256 if (!TEST_int_ge(reseed_counter(private), private_reseed) in test_drbg_reseed() 257 || !TEST_uint_ge(reseed_counter(private), in test_drbg_reseed() 270 || !TEST_time_t_ge(reseed_time(private), reseed_time(primary))) in test_drbg_reseed() 292 int private; /* true if the private drbg was used */ member 308 /* separate public and private results */ in compare_drbg_fork_result() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | ssl | 16 # Note: called "ASCII armored RSA Private Key" by TrID 17 0 string -----BEGIN\040RSA\040PRIVATE PEM RSA private key 19 !:mime text/x-ssl-private-key 21 0 string -----BEGIN\040RSA\040PRIVATE PEM RSA private key 23 0 string -----BEGIN\040DSA\040PRIVATE PEM DSA private key 25 0 string -----BEGIN\040EC\040PRIVATE PEM EC private key 27 0 string -----BEGIN\040ECDSA\040PRIVATE PEM ECDSA private key
|
H A D | ssh | 6 0 string SSH\040PRIVATE\040KEY OpenSSH RSA1 private key, 8 0 string -----BEGIN\040OPENSSH\040PRIVATE\040KEY----- OpenSSH private key 11 0 string -----BEGIN\040PRIVATE\040KEY----- OpenSSH private key (no password) 13 !:mime text/x-ssh-private-key 15 0 string -----BEGIN\040ENCRYPTED\040PRIVATE\040KEY----- OpenSSH private key (with password) 72 0 string PuTTY-User-Key-File- PuTTY Private Key File 75 !:mime application/x-putty-private-key
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_rsa.h | 49 * RSA public and private keys consist in lists of big integers. All 52 * there is no dedicated "sign bit"). Public and private key structures 63 * RSA private keys, as defined in 68 * - the private exponent (`d`); 84 * memory access pattern may depend on the _lengths_ of the private 89 * - They support only private keys with two prime factors. RSA private 174 * \brief RSA private key. 176 * The structure references the private factors, reduced private 193 /** \brief First reduced private exponent. */ 195 /** \brief First reduced private exponent length (in bytes). */ [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-pkcs8.1 | 140 openssl\-pkcs8 \- PKCS#8 format private key conversion command 171 This command processes private keys in PKCS#8 format. It can handle 181 Normally a PKCS#8 private key is expected on input and a private key will be 183 reversed: it reads a private key and writes a PKCS#8 format key. 194 unencrypted private key in PKCS#8 format. If the \fB\-traditional\fR option is 195 used then a traditional format private key is written instead. 198 unencrypted private key in traditional \s-1DER\s0 format. 200 If \fB\-topk8\fR is used then any supported private key can be used for the input 206 When this option is present and \fB\-topk8\fR is not a traditional format private 237 This option does not encrypt private keys at all and should only be used [all …]
|
H A D | openssl-pkcs12.1 | 224 Conversely, the options regarding encryption of private keys when outputting 237 The password source for the input, and for encrypting any private keys that 256 No private keys will be output. 274 in the build. The default algorithm for private key encryption is 3DES_CBC. 276 and the default encryption algorithm for both certificates and private keys is 305 The filename to write certificates and private keys to, standard output by 322 Use \s-1AES\s0 to encrypt private keys before outputting. 325 Use \s-1ARIA\s0 to encrypt private keys before outputting. 328 Use Camellia to encrypt private keys before outputting. 331 Use \s-1DES\s0 to encrypt private keys before outputting. [all …]
|
/freebsd/crypto/heimdal/lib/gssapi/ |
H A D | Makefile.am | 49 krb5/gsskrb5-private.h \ 168 spnego/spnego-private.h 187 ntlm/ntlm-private.h \ 203 $(srcdir)/ntlm/ntlm-private.h: 204 …rl ../../cf/make-proto.pl -q -P comment -p ntlm/ntlm-private.h $(ntlmsrc) || rm -f ntlm/ntlm-priva… 238 ntlm/ntlm-private.h \ 239 spnego/spnego-private.h \ 240 krb5/gsskrb5-private.h 266 $(srcdir)/krb5/gsskrb5-private.h \ 267 $(srcdir)/spnego/spnego-private.h \ [all …]
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | fixed-keys.h | 6 "-----BEGIN OPENSSH PRIVATE KEY-----\n"\ 32 "-----END OPENSSH PRIVATE KEY-----\n" 38 "-----BEGIN OPENSSH PRIVATE KEY-----\n"\ 58 "-----END OPENSSH PRIVATE KEY-----\n" 64 "-----BEGIN OPENSSH PRIVATE KEY-----\n"\ 71 "-----END OPENSSH PRIVATE KEY-----\n" 77 "-----BEGIN OPENSSH PRIVATE KEY-----\n"\ 83 "-----END OPENSSH PRIVATE KEY-----\n" 89 "-----BEGIN OPENSSH PRIVATE KEY-----\n"\ 102 "-----END OPENSSH PRIVATE KEY-----\n" [all …]
|