/freebsd/contrib/netbsd-tests/sbin/gpt/ |
H A D | gpt.backup | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyLi… 5 <key>GPT_HDR</key> 7 <key>entries</key> 9 <key>guid</key> 10 <string>00000000-0000-0000-0000-000000000000</string> 11 <key>revision</key> 14 <key>GPT_TBL</key> 16 <key>gpt_array</key> 19 <key>attributes</key> [all …]
|
/freebsd/usr.sbin/bluetooth/hcsecd/ |
H A D | parser.y | 2 /*- 5 * SPDX-License-Identifier: BSD-2-Clause 7 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com> 51 static void free_key (link_key_p key); 59 static link_key_p key = NULL; variable 77 key = (link_key_p) malloc(sizeof(*key)); 78 if (key == NULL) { 84 memset(key, 0, sizeof(*key)); 88 if (get_key(&key->bdaddr, 1) != NULL) { 91 bt_ntoa(&key->bdaddr, NULL)); [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_brainpool.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 30 -----BEGIN PRIVATE KEY----- 32 -----END PRIVATE KEY----- 35 -----BEGIN PUBLIC KEY----- 38 -----END PUBLIC KEY----- 55 -----BEGIN PRIVATE KEY----- [all …]
|
H A D | evppkey_ecdh.txt | 2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. 15 # Public key algorithm tests 24 -----BEGIN PRIVATE KEY----- 27 -----END PRIVATE KEY----- 30 -----BEGIN PUBLIC KEY----- 33 -----END PUBLIC KEY----- 39 -----BEGIN PRIVATE KEY----- 42 -----END PRIVATE KEY----- 45 -----BEGIN PUBLIC KEY----- 48 -----END PUBLIC KEY----- [all …]
|
H A D | evpciph_aes_ccm_cavs.txt | 2 # Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. 9 # Tests from NIST CCM Test Vectors (SP800-38C) 11 Title = NIST CCM 128 Decryption-Verfication Process Tests 13 Cipher = aes-128-ccm 14 Key = 4ae701103c63deca5b5a3939d7d05992 21 Cipher = aes-128-ccm 22 Key = 4ae701103c63deca5b5a3939d7d05992 31 Cipher = aes-128-ccm 32 Key = 4ae701103c63deca5b5a3939d7d05992 41 Cipher = aes-128-ccm [all …]
|
H A D | evppkey_ecc.txt | 2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. 17 -----BEGIN PRIVATE KEY----- 19 -----END PRIVATE KEY----- 22 -----BEGIN PUBLIC KEY----- 25 -----END PUBLIC KEY----- 31 -----BEGIN PRIVATE KEY----- 33 -----END PRIVATE KEY----- 36 -----BEGIN PUBLIC KEY----- 39 -----END PUBLIC KEY----- 71 -----BEGIN PUBLIC KEY----- [all …]
|
H A D | evppkey_kas.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 16 # Public key algorithm tests 20 # http://csrc.nist.gov/groups/STM/cavp/component-testing.html#ECCCDH # 23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs 25 PrivateKey=KAS-ECC-CDH_P-192_C0 26 -----BEGIN PRIVATE KEY----- 30 -----END PRIVATE KEY----- 32 PublicKey=KAS-ECC-CDH_P-192_C0-PUBLIC 33 -----BEGIN PUBLIC KEY----- 36 -----END PUBLIC KEY----- [all …]
|
H A D | evpciph_aes_common.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 16 Title = AES (from FIPS-197 test vectors) 18 Cipher = AES-128-ECB 19 Key = 000102030405060708090A0B0C0D0E0F 24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt) 26 Cipher = AES-192-ECB 27 Key = 000102030405060708090A0B0C0D0E0F1011121314151617 33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 35 Cipher = AES-256-ECB 36 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F [all …]
|
H A D | evpciph_idea.txt | 13 Cipher = IDEA-CBC 14 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 20 Cipher = IDEA-CBC 21 Key = 0700d603a1c514e46b6191ba430a3a0c 27 Cipher = IDEA-CBC 28 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 34 Cipher = IDEA-CBC 35 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 41 Cipher = IDEA-CBC 42 Key = b6f9afbfe5a1562bba1368fc72ac9d9c [all …]
|
H A D | evppkey_ecx.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 15 # Public key algorithm tests 21 PrivateKey=Alice-25519 22 -----BEGIN PRIVATE KEY----- 24 -----END PRIVATE KEY----- 26 PublicKey=Alice-25519-PUBLIC 27 -----BEGIN PUBLIC KEY----- 29 -----END PUBLIC KEY----- 31 PrivPubKeyPair = Alice-25519:Alice-25519-PUBLIC 33 PrivateKey=Bob-25519 [all …]
|
H A D | evpciph_camellia.txt | 2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. 17 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec 18 Cipher = CAMELLIA-128-ECB 19 Key = 0123456789abcdeffedcba9876543210 23 Cipher = CAMELLIA-192-ECB 24 Key = 0123456789abcdeffedcba98765432100011223344556677 28 Cipher = CAMELLIA-256-ECB 29 Key = 0123456789abcdeffedcba987654321000112233445566778899aabbccddeeff 33 # ECB-CAMELLIA128.Encrypt 34 Cipher = CAMELLIA-128-ECB [all …]
|
H A D | evpciph_cast5.txt | 12 Cipher = CAST5-CBC 13 Key = 1f8e4973953f3fb0bd6b16662e9a3c17 19 Cipher = CAST5-CBC 20 Key = 0700d603a1c514e46b6191ba430a3a0c 26 Cipher = CAST5-CBC 27 Key = 3348aa51e9a45c2dbe33ccc47f96e8de 33 Cipher = CAST5-CBC 34 Key = b7f3c9576e12dd0db63e8f8fac2b9a39 40 Cipher = CAST5-CBC 41 Key = b6f9afbfe5a1562bba1368fc72ac9d9c [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | rsa.c | 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 18 int private_key; /* whether private key is set */ 25 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ 39 if (asn1_get_next(pos, end - pos, &hdr) < 0 || in crypto_rsa_parse_integer() 55 * crypto_rsa_import_public_key - Import an RSA public key 56 * @buf: Key buffer (DER encoded RSA public key) 57 * @len: Key buffer length in bytes 58 * Returns: Pointer to the public key or %NULL on failure 63 struct crypto_rsa_key *key; in crypto_rsa_import_public_key() local [all …]
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 11 ./mkcert.sh genroot "Cross Root" cross-key cross-root 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 13 # trust variants: +serverAuth -serverAuth +clientAuth -clientAuth 14 openssl x509 -in root-cert.pem -trustout \ [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
H A D | hcrypto_des.3 | 1 .TH "DES crypto functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*- 5 DES crypto functions \- 10 .RI "void \fBDES_set_odd_parity\fP (DES_cblock *key)" 13 .RI "int HC_DEPRECATED \fBDES_check_key_parity\fP (DES_cblock *key)" 16 .RI "int \fBDES_is_weak_key\fP (DES_cblock *key)" 19 .RI "int HC_DEPRECATED \fBDES_set_key\fP (DES_cblock *key, DES_key_schedule *ks)" 22 .RI "int \fBDES_set_key_unchecked\fP (DES_cblock *key, DES_key_schedule *ks)" 25 .RI "int \fBDES_set_key_checked\fP (DES_cblock *key, DES_key_schedule *ks)" 28 .RI "int \fBDES_key_sched\fP (DES_cblock *key, DES_key_schedule *ks)" 55 .RI "void \fBDES_string_to_key\fP (const char *str, DES_cblock *key)" [all …]
|
/freebsd/contrib/libxo/tests/core/saved/ |
H A D | test_01.X.out | 1 …-level><type>ethernet</type><type>bridge</type><type>18u</type><type>24</type><address>0x0</addres…
|
H A D | test_01.XP.out | 1 <top-level> 12 <used-percent>12</used-percent> 15 <host>my-box</host> 17 <host>my-box</host> 20 <max-chaos>very</max-chaos> 21 <min-chaos>42</min-chaos> 22 <some-chaos>[42]</some-chaos> 23 <sku test-attr="attr-value">gum-000-1412</sku> 24 <host>my-box</host> 28 <sku test3="value3" key="key">GRO-000-415</sku> [all …]
|
H A D | test_10.X.out | 1 …-ul</data><data>triple</data><data>inv-ul</data><data>underline</data><data>plain</data><item><sku…
|
H A D | test_10.XP.out | 4 <data>bold-ul</data> 6 <data>inv-ul</data> 10 <sku test3="value3" key="key">GRO-000-415</sku> 11 <name key="key">gum</name> 13 <in-stock>54</in-stock> 14 <on-order>10</on-order> 17 <sku test3="value3" key="key">HRD-000-212</sku> 18 <name key="key">rope</name> 20 <in-stock>4</in-stock> 21 <on-order>2</on-order> [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key* 11 sig_namespace="test-$$" 12 sig_principal="user-$$@example.com" 14 # Make a "wrong key" 15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \ 16 -C "wrong trousers, Grommit" -N '' \ 17 || fatal "couldn't generate key" 18 WRONG=$OBJ/wrong-key.pub 20 # Make a CA key. 21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \ [all …]
|
/freebsd/lib/libsecureboot/openpgp/ |
H A D | opgp_key.c | 1 /*- 27 #include "../libsecureboot-priv.h" 33 * @brief decode user-id packet 45 user->id = malloc(len + 1); in decode_user() 46 strncpy(user->id, (char *)*pptr, len); in decode_user() 47 user->id[len] = '\0'; in decode_user() 48 user->name = user->id; in decode_user() 49 cp = strchr(user->id, '<'); in decode_user() 50 if (cp > user->id) { in decode_user() 51 user->id = strdup(user->id); in decode_user() [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf | 5 test-0 = 0-SECLEVEL 3 with default key 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 8 test-3 = 3-SECLEVEL 5 client with ED448 key 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 13 [0-SECLEVEL 3 with default key] 14 ssl_conf = 0-SECLEVEL 3 with default key-ssl 16 [0-SECLEVEL 3 with default key-ssl] 17 server = 0-SECLEVEL 3 with default key-server [all …]
|
/freebsd/share/man/man4/ |
H A D | keyboard.4 | 16 virtual console with the same number as the function key is then 23 then enter a decimal number from 0-255 via the numerical keypad, then 31 pressing the scroll-lock key. 40 .Bl -tag -width "Modifier Key" -compact 41 .It "Normal key" 42 Enter the ASCII value associated with the key. 43 .It "Function key" 45 .It "Switch Key" 47 .It "Modifier Key" 48 Change the meaning of another key. [all …]
|
/freebsd/contrib/ncurses/man/ |
H A D | curs_getch.3x | 3 .\" Copyright 2018-2023,2024 Thomas E. Dickey * 4 .\" Copyright 1998-2016,2017 Free Software Foundation, Inc. * 32 .TH curs_getch 3X 2024-04-20 "ncurses @NCURSES_MAJOR@.@NCURSES_MINOR@" "Library calls" 59 \fB\%has_key\fP \- 79 gathers a key stroke from the terminal keyboard associated with a 87 returns an integer identifying the key stroke; 90 Use of the control key as a modifier often results in a distinct code. 97 then if the no-delay flag is set in the window 158 (those corresponding to the ECMA-6 character set\(emsee 166 the term \*(``function key\*('' includes but is not limited to keycaps [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | ssl_test.tmpl | 1 [{-$testname-}] 2 ssl_conf = {-$testname-}-ssl 4 [{-$testname-}-ssl] 5 server = {-$testname-}-server 6 client = {-$testname-}-client{- 10 $OUT .= "\nserver2 = $testname-server2"; 12 $OUT .= "\nserver2 = $testname-server"; 15 $OUT .= "\nresume-server = $testname-resume-server"; 17 $OUT .= "\nresume-server = $testname-server"; 20 $OUT .= "\nresume-client = $testname-resume-client"; [all …]
|