/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf | 5 test-0 = 0-SECLEVEL 3 with default key 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 8 test-3 = 3-SECLEVEL 5 client with ED448 key 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 13 [0-SECLEVEL 3 with default key] 14 ssl_conf = 0-SECLEVEL 3 with default key-ssl 16 [0-SECLEVEL 3 with default key-ssl] 17 server = 0-SECLEVEL 3 with default key-server [all …]
|
H A D | 20-cert-select.cnf.in | 1 # -*- mode: perl; -*- 16 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 17 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 18 "Ed25519.Certificate" => test_pem("server-ed25519-cer [all...] |
H A D | 20-cert-select.cnf | 5 test-0 = 0-ECDSA CipherString Selection 6 test-1 = 1-ECDSA CipherString Selection 7 test-2 = 2-ECDSA CipherString Selection 8 test-3 = 3-RSA CipherString Selection 9 test-4 = 4- [all...] |
/freebsd/crypto/openssl/demos/certs/apps/ |
H A D | mkxcerts.sh | 2 # Create certificates using various algorithms to test multi-certificate 6 CN="OpenSSL Test RSA SHA-1 cert" $OPENSSL req \ 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 8 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1 9 CN="OpenSSL Test RSA SHA-256 cert" $OPENSSL req \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 11 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256 12 CN="OpenSSL Test RSA SHA-512 cert" $OPENSSL req \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 14 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512 [all …]
|
/freebsd/secure/caroot/trusted/ |
H A D | Certum_EC-384_CA.pem | 2 ## Certum EC-384 CA 19 Signature Algorithm: ecdsa-with-SHA384 20 …r: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA 24 …t: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- 68 -----END CERTIFICATE-----
|
H A D | GTS_Root_R4.pem | 19 Signature Algorithm: ecdsa-with-SHA384 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- 65 p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD 66 -----END CERTIFICATE-----
|
H A D | emSign_ECC_Root_CA_-_C3.pem | 2 ## emSign ECC Root CA - C3 19 Signature Algorithm: ecdsa-with-SHA384 20 Issuer: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3 24 Subject: C = US, OU = emSign PKI, O = eMudhra Inc, CN = emSign ECC Root CA - C3 26 Public Key Algorithm: id-ecPublicKey 27 Public-Key: (384 bit) 37 NIST CURVE: P-384 45 Signature Algorithm: ecdsa-with-SHA384 54 -----BEGIN CERTIFICATE----- 67 -----END CERTIFICATE-----
|
H A D | AffirmTrust_Premium_ECC.pem | 18 Signature Algorithm: ecdsa-with-SHA384 25 Public Key Algorithm: id-ecPublicKey 26 Public-Key: (384 bit) 36 NIST CURVE: P-384 44 Signature Algorithm: ecdsa-with-SHA384 53 -----BEGIN CERTIFICATE----- 65 -----END CERTIFICATE-----
|
/freebsd/contrib/bearssl/test/x509/ |
H A D | alltests.txt | 2 ; root -> ica1 -> ica2 -> ee 4 ; "ee" is "end-entity", i.e. the client or server certificate itself 7 ; as a self-signed certificate. 10 name = root-rsa2048 16 name = root-p256 18 curve = P-256 22 name = root-p384 24 curve = P-384 28 name = root-p521 30 curve = P-521 [all …]
|
/freebsd/contrib/unbound/sldns/ |
H A D | keyraw.c | 2 * keyraw.c - raw key operations and conversions 4 * (c) NLnet Labs, 2004-2008 75 return (len - exp - 3)*8; in sldns_rr_dnskey_key_size_raw() 81 return (len-exp-1)*8; in sldns_rr_dnskey_key_size_raw() 95 return 384; in sldns_rr_dnskey_key_size_raw() 119 memmove(&ac16, key + keysize - 3, 2); in sldns_calc_keytag_raw() 149 meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1); in sldns_key_EVP_load_gost_id() 173 meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1); in sldns_key_EVP_load_gost_id() 200 sldns_key_dsa_buf_bignum(unsigned char* key, size_t len, BIGNUM** p, in sldns_key_dsa_buf_bignum() argument 222 *p = BN_bin2bn(key+offset, (int)length, NULL); in sldns_key_dsa_buf_bignum() [all …]
|
/freebsd/contrib/unbound/compat/ |
H A D | sha512.c | 3 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/ 5 * Copyright (c) 2000-2001, Aaron D. Gifford 9 * system-defined SHA code. 11 * - Renamed (external) functions and constants to fit ldns style 12 * - Removed _End and _Data functions 13 * - Added ldns_shaX(data, len, digest) convenience functions 14 * - Removed prototypes of _Transform functions and made those static 66 /*** SHA-256/384/512 Machine Architecture Definitions *****************/ 71 * architecture is little-endian, make sure it also defines 81 * And for little-endian machines, add: [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecdsa.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 19 # EC P-256 key 21 PrivateKey=P-256 22 -----BEGIN PRIVATE KEY----- 26 -----END PRIVATE KEY----- 30 PublicKey=P-256-PUBLIC 31 -----BEGIN PUBLIC KEY----- 34 -----END PUBLIC KEY----- 36 PrivPubKeyPair = P-256:P-256-PUBLIC 40 Verify = P-256 [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/examples/ |
H A D | dpp-qrcode.py | 71 print("QR Code URI accepted - ID=%d" % id) 98 print("Bootstrap information - ID=%d" % id) 112 parser.add_argument('-d', const=logging.DEBUG, default=logging.INFO, 115 parser.add_argument('--curve', '-c', 116 …help='set a specific curve (P-256, P-384, P-521, BP-256R1, BP-384R1, BP-512R1) for key generation')
|
/freebsd/contrib/bearssl/tools/ |
H A D | names.c | 39 { "sha1", &br_sha1_vtable, "SHA-1" }, 40 { "sha224", &br_sha224_vtable, "SHA-224" }, 41 { "sha256", &br_sha256_vtable, "SHA-256" }, 42 { "sha384", &br_sha384_vtable, "SHA-384" }, 43 { "sha512", &br_sha512_vtable, "SHA-512" }, 65 "ECDHE with ECDSA, AES-128/GCM encryption (TLS 1.2+)" 71 "ECDHE with RSA, AES-128/GCM encryption (TLS 1.2+)" 77 "ECDHE with ECDSA, AES-256/GCM encryption (TLS 1.2+)" 83 "ECDHE with RSA, AES-256/GCM encryption (TLS 1.2+)" 89 "ECDHE with ECDSA, AES-128/CCM encryption (TLS 1.2+)" [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_MD-SHA2.7 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 38 . ds PI \(*p 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" [all …]
|
/freebsd/crypto/openssl/demos/bio/ |
H A D | connect.cnf | 10 # Protocol = ALL, -TLSv1.2 12 Curves = P-521:P-384:P-256
|
H A D | accept.cnf | 10 # Protocol = ALL, -TLSv1.2 12 Curves = P-521:P-384:P-256
|
H A D | cmod.cnf | 22 Curves = P-521:P-384:P-256 27 ECDSA.Certificate=server-ec.pem
|
/freebsd/contrib/ofed/libibmad/ |
H A D | fields.c | 2 * Copyright (c) 2004-2009 Voltaire Inc. All rights reserved. 4 * Copyright (c) 2009-2011 Mellanox Technologies LTD. All rights reserved. 16 * - Redistributions of source code must retain the above 20 * - Redistributions in binary form must reproduce the above 48 * encoded in the IB spec - IB headers are encoded such that the bit offsets 53 #define BITSOFFS(o, w) (((o) & ~31) | ((32 - ((o) & 31) - (w)))), (w) 55 #define BE_TO_BITSOFFS(o, w) (((o) & ~31) | ((32 - ((o) & 31) - (w)))) 58 {0, 0}, /* IB_NO_FIELD - reserved as invalid */ 65 * SMP: Subnet Management packets - lid routed (IB spec 14.2.1.1) 66 * DSMP: Subnet Management packets - direct route (IB spec 14.2.1.2) [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set1_curves.pod | 9 - EC supported curve functions 54 names, for example "P-521:P-384:P-256:X25519:ffdhe2048". Currently supported 55 groups for B<TLSv1.3> are B<P-256>, B<P-384>, B<P-521>, B<X25519>, B<X448>, 72 server-side SSL B<ssl>. If B<n> is -1 then the total number of shared groups is 82 reflects the state of the current connection, though in the case of PSK-only 86 current, non-resumption, connection). This can be called by either client or 113 is -1. 116 returns -1. 134 Copyright 2013-2021 The OpenSSL Project Authors. All Rights Reserved.
|
/freebsd/contrib/libfido2/man/ |
H A D | es384_pk_new.3 | 26 .\" SPDX-License-Identifier: BSD-2-Clause 56 (COSE) RFC to ECDSA over P-384 with SHA-384.
|
/freebsd/crypto/openssl/ssl/ |
H A D | s3_cbc.c | 2 * Copyright 2012-2021 The OpenSSL Project Authors. All Rights Reserved. 21 * MD5 and SHA-1 low level APIs are deprecated for public use, but still ok for 69 * length field. (SHA-384/512 have 128-bit length.) 75 * Currently SHA-384/512 has a 128-byte block size and that's the largest 82 * u32toLE serializes an unsigned, 32-bit number (n) as four bytes at (p) in 83 * little-endian order. The value of p is advanced by four. 85 # define u32toLE(n, p) \ argument 86 (*((p)++)=(unsigned char)(n), \ 87 *((p)++)=(unsigned char)(n>>8), \ 88 *((p)++)=(unsigned char)(n>>16), \ [all …]
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_ec.h | 50 * [IANA](http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8). 53 * range, it is convenient to encode support of some curves in a 32-bit 59 * - `supported_curves` 61 * A 32-bit word that documents the identifiers of the curves supported 64 * - `generator()` 69 * - `order()` 72 * that curve. That value uses unsigned big-endian encoding. 74 * - `xoff()` 79 * - `mul()` 83 * - `mulgen()` [all …]
|
/freebsd/sbin/setkey/ |
H A D | setkey.8 | 77 .Bl -tag -width indent 81 .Fl P , 86 .Fl P , 92 .Fl P 98 .Fl P 133 .Bl -tag -width indent 200 .Ar src_range Ar dst_range Ar upperspec Fl P Ar direction 223 Meta-arguments are as follows: 225 .Bl -tag -compact -width indent 254 .Bl -tag -width Fl -compact [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/crypto/ |
H A D | intel,keembay-ocs-ecc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/intel,keembay-ocs-ecc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Daniele Alessandrelli <daniele.alessandrelli@intel.com> 11 - Prabhjot Khurana <prabhjot.khurana@intel.com> 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves. 20 const: intel,keembay-ocs-ecc 32 - compatible 33 - reg [all …]
|