| /freebsd/lib/libc++/ |
| H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 5 { include: [ "<__algorithm/binary_search.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 8 { include: [ "<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 10 { include: [ "<__algorithm/copy_backward.h>", "private", "<algorithm>", "public" ] }, 11 { include: [ "<__algorithm/copy_if.h>", "private", "<algorithm>", "public" ] }, [all …]
|
| /freebsd/contrib/libarchive/libarchive/test/ |
| H A D | test_open_failure.c | 43 struct my_data *private = (struct my_data *)_private; in my_read() 46 assertEqualInt(MAGIC, private->magic); in my_read() 47 ++private->read_called; in my_read() 48 return (private->read_return); in my_read() 54 struct my_data *private = (struct my_data *)_private; in my_write() 58 assertEqualInt(MAGIC, private->magic); in my_write() 59 ++private->write_called; in my_write() 60 return (private->write_return); in my_write() 66 struct my_data *private = (struct my_data *)_private; in my_open() 68 assertEqualInt(MAGIC, private in my_open() 44 struct my_data *private = (struct my_data *)_private; my_read() local 55 struct my_data *private = (struct my_data *)_private; my_write() local 67 struct my_data *private = (struct my_data *)_private; my_open() local 77 struct my_data *private = (struct my_data *)_private; my_close() local 88 struct my_data private; DEFINE_TEST() local [all...] |
| H A D | test_write_format_zip_large.c | 68 struct fileblocks *private = _private; in memory_write() local 76 private->last->gap_size += (int64_t)size; in memory_write() 85 if (private->last == NULL) { in memory_write() 86 private->first = private->last = block; in memory_write() 88 private->last->next = block; in memory_write() 89 private->last = block; in memory_write() 93 private->filesize += size; in memory_write() 100 struct fileblocks *private = _private; in memory_read() local 105 while (private->current != NULL && private->buff == NULL && private->gap_remaining == 0) { in memory_read() 106 private->current = private->current->next; in memory_read() [all …]
|
| H A D | test_tar_large.c | 83 struct memdata *private = _private; in memory_write() local 98 private->last->filebytes += (int64_t)size; in memory_write() 107 if (private->last == NULL) { in memory_write() 108 private->first = private->last = block; in memory_write() 110 private->last->next = block; in memory_write() 111 private->last = block; in memory_write() 121 struct memdata *private = _private; in memory_read() local 127 free(private->buff); in memory_read() 128 private->buff = NULL; in memory_read() 129 if (private->first == NULL) { in memory_read() [all …]
|
| /freebsd/crypto/krb5/src/lib/ |
| H A D | krb5_32.def | 12 ; PRIVATE - Private entrypoint. It should not be called by anything other 14 ; GSSAPI - Private entrypoint used by gssapi32.dll. 261 decode_krb5_ap_req @2 ; PRIVATE GSSAPI k5-int.h KRB5_CALLCONV_WRONG 262 krb5_ser_pack_bytes @234 ; PRIVATE GSSAPI k5-int.h 263 krb5_ser_pack_int32 @235 ; PRIVATE GSSAPI k5-int.h 264 krb5_ser_unpack_bytes @237 ; PRIVATE GSSAPI k5-int.h 265 krb5_ser_unpack_int32 @238 ; PRIVATE GSSAPI k5-int.h 266 krb5int_cc_default @268 ; PRIVATE GSSAPI k5-int.h 268 krb5_free_ap_req @119 ; PRIVATE GSSAPI krb5.hin 269 krb5_get_tgs_ktypes @177 ; PRIVATE GSSAPI krb5.hin [all …]
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_brainpool.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 30 -----BEGIN PRIVATE KEY----- 32 -----END PRIVATE KEY----- 55 -----BEGIN PRIVATE KEY----- 57 -----END PRIVATE KEY----- 68 -----BEGIN PRIVATE KEY----- 70 -----END PRIVATE KEY----- 93 -----BEGIN PRIVATE KEY----- 96 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_ecdh.txt | 17 # Private keys used for PKEY operations. 24 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 39 -----BEGIN PRIVATE KEY----- 42 -----END PRIVATE KEY----- 68 -----BEGIN PRIVATE KEY----- 71 -----END PRIVATE KEY----- 83 -----BEGIN PRIVATE KEY----- 86 -----END PRIVATE KEY----- 114 -----BEGIN PRIVATE KEY----- [all …]
|
| H A D | evppkey_ecc.txt | 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 95 -----BEGIN PRIVATE KEY----- 97 -----END PRIVATE KEY----- 109 -----BEGIN PRIVATE KEY----- 111 -----END PRIVATE KEY----- 173 -----BEGIN PRIVATE KEY----- 175 -----END PRIVATE KEY----- [all …]
|
| H A D | evppkey_ml_kem_1024_decap.txt | 713 # Private key not reduced 721 # Private key not reduced 729 # Private key not reduced 737 # Private key not reduced 745 # Private key not reduced 753 # Private key not reduced 761 # Private key not reduced 769 # Private key not reduced 777 # Private key not reduced 785 # Private key not reduced [all …]
|
| H A D | evppkey_ml_kem_768_decap.txt | 713 # Private key not reduced 721 # Private key not reduced 729 # Private key not reduced 737 # Private key not reduced 745 # Private key not reduced 753 # Private key not reduced 761 # Private key not reduced 769 # Private key not reduced 777 # Private key not reduced 785 # Private key not reduced [all …]
|
| H A D | evppkey_kas.txt | 17 # Private keys used for PKEY operations. 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 60 -----BEGIN PRIVATE KEY----- 64 -----END PRIVATE KEY----- 89 -----BEGIN PRIVATE KEY----- 93 -----END PRIVATE KEY----- 118 -----BEGIN PRIVATE KEY----- 122 -----END PRIVATE KEY----- 147 -----BEGIN PRIVATE KEY----- [all …]
|
| H A D | evppkey_ecx.txt | 18 # Private keys used for PKEY operations. 23 -----BEGIN PRIVATE KEY----- 25 -----END PRIVATE KEY----- 35 -----BEGIN PRIVATE KEY----- 37 -----END PRIVATE KEY----- 101 -----BEGIN PRIVATE KEY----- 104 -----END PRIVATE KEY----- 115 -----BEGIN PRIVATE KEY----- 118 -----END PRIVATE KEY----- 191 -----BEGIN PRIVATE KEY----- [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_CTX_use_certificate.3 | 113 These functions load the certificates and private keys into the SSL_CTX 150 \&\fBSSL_CTX_use_PrivateKey()\fR adds \fBpkey\fR as private key to \fBctx\fR. \fBctx\fR \fBMUST NOT… 151 \&\fBSSL_CTX_use_RSAPrivateKey()\fR adds the private key \fBrsa\fR of type RSA 152 to \fBctx\fR. \fBSSL_use_PrivateKey()\fR adds \fBpkey\fR as private key to \fBssl\fR; 153 \&\fBSSL_use_RSAPrivateKey()\fR adds \fBrsa\fR as private key of type RSA to \fBssl\fR. 154 If a certificate has already been set and the private key does not belong 155 to the certificate an error is returned. To change a [certificate/private\-key] 157 \&\fBSSL_CTX_use_certificate()\fR before setting the private key with 162 certificate \fBx\fR, private key \fBkey\fR, and certificate \fBchain\fR onto the 163 corresponding \fBssl\fR or \fBctx\fR. The \fBpkey\fR argument must be the private [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_use_certificate.pod | 54 These functions load the certificates and private keys into the SSL_CTX 91 SSL_CTX_use_PrivateKey() adds B<pkey> as private key to B<ctx>. B<ctx> B<MUST NOT> be NULL. 92 SSL_CTX_use_RSAPrivateKey() adds the private key B<rsa> of type RSA 93 to B<ctx>. SSL_use_PrivateKey() adds B<pkey> as private key to B<ssl>; 94 SSL_use_RSAPrivateKey() adds B<rsa> as private key of type RSA to B<ssl>. 95 If a certificate has already been set and the private key does not belong 96 to the certificate an error is returned. To change a [certificate/private-key] 98 SSL_CTX_use_certificate() before setting the private key with 103 certificate B<x>, private key B<key>, and certificate B<chain> onto the 104 corresponding B<ssl> or B<ctx>. The B<pkey> argument must be the private [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-pkcs8.pod.in | 6 openssl-pkcs8 - PKCS#8 format private key conversion command 36 This command processes private keys in PKCS#8 format. It can handle 50 Normally a PKCS#8 private key is expected on input and a private key will be 52 reversed: it reads a private key and writes a PKCS#8 format key. 64 unencrypted private key in PKCS#8 format. If the B<-traditional> option is 65 used then a traditional format private key is written instead. 68 unencrypted private key in traditional DER format. 70 If B<-topk8> is used then any supported private key can be used for the input 77 When this option is present and B<-topk8> is not a traditional format private 118 This option does not encrypt private keys at all and should only be used [all …]
|
| H A D | openssl-ec.pod.in | 40 private key format specified in 'SEC 1: Elliptic Curve Cryptography' 41 (http://www.secg.org/). To convert an OpenSSL EC private key into the 42 PKCS#8 private key format use the L<openssl-pkcs8(1)> command. 62 Private keys are an SEC1 private key or PKCS#8 format. 86 These options encrypt the private key with the DES, triple DES, IDEA or 97 Prints out the public, private key components and parameters. 109 By default a private key is read from the input. 111 If the input contains no public key but a private key, its public part is used. 115 By default a private key is output. With this option a public 141 This option omits the public key components from the private key output. [all …]
|
| H A D | openssl-pkcs12.pod.in | 90 Conversely, the options regarding encryption of private keys when outputting 107 The password source for the input, and for encrypting any private keys that 130 No private keys will be output. 151 in the build. The default algorithm for private key encryption is 3DES_CBC. 153 and the default encryption algorithm for both certificates and private keys is 178 The filename to write certificates and private keys to, standard output by 200 Use AES to encrypt private keys before outputting. 204 Use ARIA to encrypt private keys before outputting. 208 Use Camellia to encrypt private keys before outputting. 212 Use DES to encrypt private keys before outputting. [all …]
|
| H A D | openssl-pkey.pod.in | 10 openssl-pkey - public or private key processing command 37 This command processes public or private keys. They can be 56 This option checks the consistency of a key pair for both public and private 92 By default a private key is read from the input. 94 If the input contains no public key but a private key, its public part is used. 121 Encrypt the PEM encoded private key with the supplied cipher. Any algorithm 134 Normally a private key is written using standard format: this is PKCS#8 form 140 By default the private and public key is output; 158 Output in text form only the public key components (also for private keys). 175 This option only applies to elliptic curve based public and private keys. [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-pkcs8.1 | 64 openssl\-pkcs8 \- PKCS#8 format private key conversion command 97 This command processes private keys in PKCS#8 format. It can handle 107 Normally a PKCS#8 private key is expected on input and a private key will be 109 reversed: it reads a private key and writes a PKCS#8 format key. 120 unencrypted private key in PKCS#8 format. If the \fB\-traditional\fR option is 121 used then a traditional format private key is written instead. 124 unencrypted private key in traditional DER format. 126 If \fB\-topk8\fR is used then any supported private key can be used for the input 132 When this option is present and \fB\-topk8\fR is not a traditional format private 167 This option does not encrypt private keys at all and should only be used [all …]
|
| H A D | openssl-pkcs12.1 | 153 Conversely, the options regarding encryption of private keys when outputting 166 The password source for the input, and for encrypting any private keys that 185 No private keys will be output. 203 in the build. The default algorithm for private key encryption is 3DES_CBC. 205 and the default encryption algorithm for both certificates and private keys is 236 The filename to write certificates and private keys to, standard output by 253 Use AES to encrypt private keys before outputting. 256 Use ARIA to encrypt private keys before outputting. 259 Use Camellia to encrypt private keys before outputting. 262 Use DES to encrypt private keys before outputting. [all …]
|
| H A D | openssl-pkey.1 | 64 openssl\-pkey \- public or private key processing command 93 This command processes public or private keys. They can be 119 This option checks the consistency of a key pair for both public and private 146 By default a private key is read from the input. 148 If the input contains no public key but a private key, its public part is used. 168 Encrypt the PEM encoded private key with the supplied cipher. Any algorithm 179 Normally a private key is written using standard format: this is PKCS#8 form 184 By default the private and public key is output; 199 Output in text form only the public key components (also for private keys). 214 This option only applies to elliptic curve based public and private keys. [all …]
|
| H A D | openssl-ec.1 | 96 private key format specified in 'SEC 1: Elliptic Curve Cryptography' 97 (http://www.secg.org/). To convert an OpenSSL EC private key into the 98 PKCS#8 private key format use the \fBopenssl\-pkcs8\fR\|(1) command. 113 Private keys are an SEC1 private key or PKCS#8 format. 133 These options encrypt the private key with the DES, triple DES, IDEA or 143 Prints out the public, private key components and parameters. 152 By default a private key is read from the input. 154 If the input contains no public key but a private key, its public part is used. 157 By default a private key is output. With this option a public 180 This option omits the public key components from the private key output. [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | drbgtest.c | 165 * |primary|, |public|, |private|: pointers to the three shared DRBGs 177 EVP_RAND_CTX *private, in test_drbg_reseed() argument 204 || !TEST_int_ne(private_reseed = reseed_counter(private), 0)) in test_drbg_reseed() 214 /* Generate random output from the public and private DRBG */ in test_drbg_reseed() 231 || !TEST_int_eq(state(private), expected_state)) in test_drbg_reseed() 250 if (!TEST_int_ge(reseed_counter(private), private_reseed) in test_drbg_reseed() 251 || !TEST_uint_ge(reseed_counter(private), in test_drbg_reseed() 264 || !TEST_time_t_ge(reseed_time(private), reseed_time(primary))) in test_drbg_reseed() 286 int private; /* true if the private drbg was used */ member 302 /* separate public and private results */ in compare_drbg_fork_result() [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | ssl | 16 # Note: called "ASCII armored RSA Private Key" by TrID 17 0 string -----BEGIN\040RSA\040PRIVATE PEM RSA private key 19 !:mime text/x-ssl-private-key 21 0 string -----BEGIN\040RSA\040PRIVATE PEM RSA private key 23 0 string -----BEGIN\040DSA\040PRIVATE PEM DSA private key 25 0 string -----BEGIN\040EC\040PRIVATE PEM EC private key 27 0 string -----BEGIN\040ECDSA\040PRIVATE PEM ECDSA private key
|
| /freebsd/contrib/bearssl/inc/ |
| H A D | bearssl_rsa.h | 49 * RSA public and private keys consist in lists of big integers. All 52 * there is no dedicated "sign bit"). Public and private key structures 63 * RSA private keys, as defined in 68 * - the private exponent (`d`); 84 * memory access pattern may depend on the _lengths_ of the private 89 * - They support only private keys with two prime factors. RSA private 174 * \brief RSA private key. 176 * The structure references the private factors, reduced private 193 /** \brief First reduced private exponent. */ 195 /** \brief First reduced private exponent length (in bytes). */ [all …]
|