| /netbsd-src/crypto/external/bsd/openssl.old/lib/libcrypto/man/ |
| H A D | openssl_mdc2.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | MDC2_Init.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | EVP_DigestSignInit.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | openssl.1 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | EVP_VerifyInit.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | EVP_DigestVerifyInit.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | EVP_SignInit.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| /netbsd-src/tests/crypto/libcrypto/ |
| H A D | t_hashes.sh | 18 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 35 atf_check -o ignore -e ignore "$(atf_get_srcdir)/h_hmactest" 45 atf_check -o ignore -e ignore "$(atf_get_srcdir)/h_md2test" 48 atf_test_case mdc2 51 atf_set "descr" "Checks MDC2 digest" 55 atf_check -o ignore -e ignore "$(atf_get_srcdir)/h_mdc2test" 62 atf_add_test_case mdc2
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| H A D | evppkey_rsa.txt | 2 # Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. 21 PrivateKey = RSA-2048 22 -----BEGIN PRIVATE KEY----- 49 -----END PRIVATE KEY----- 53 PublicKey = RSA-2048-PUBLIC 54 -----BEGIN PUBLIC KEY----- 62 -----END PUBLIC KEY----- 64 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 68 Sign = RSA-2048 74 Sign = RSA-2048 [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| H A D | rsa_sign.c | 2 * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. 32 # include <openssl/mdc2.h> /* uses MDC2_DIGEST_LENGTH */ 44 * To remove the dependency RSASSA-PKCS1-v1_5 DigestInfo encodings can be 48 * The EMSA-PKCS1-v1_5 encoding method includes an ASN.1 value of type 57 * {PKCS1-v1-5DigestAlgorithms} 107 /* MDC-2 (2 5 8 3 101) */ 128 /* SHA-1 (1 3 14 3 2 26) */ 158 MD_CASE(mdc2) in ossl_rsa_digestinfo_encoding() 198 MD_NID_CASE(mdc2, MDC2_DIGEST_LENGTH) in digest_sz_from_nid() 235 * described in EMSA-PKCS1-v1_5-ENCODE, RFC 3447 section 9.2 step 2. This [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | EVP_DigestSignInit.pod | 6 EVP_DigestSign - EVP signing functions 23 The EVP signature routines are a high-level interface to digital signatures. 38 No B<EVP_PKEY_CTX> will be created by EVP_DigestSignInit() if the passed B<ctx> 43 "signing". Built-in EVP_PKEY types supported by these functions are CMAC, 58 =item RSA with no padding 60 Supports no digests (the digest B<type> must be NULL) 68 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2, 69 SHA3-224, SHA3-256, SHA3-384, SHA3-512 73 Support no digests (the digest B<type> must be NULL) 85 If RSA-PSS is used and restrictions apply then the digest must match. [all …]
|
| H A D | EVP_DigestVerifyInit.pod | 6 EVP_DigestVerify - EVP signature verification functions 22 The EVP signature routines are a high-level interface to digital signatures. 35 No B<EVP_PKEY_CTX> will be created by EVP_DigestSignInit() if the passed B<ctx> 65 preference to the low-level interfaces. This is because the code then becomes 76 needed to be used to sign using SHA1 and DSA. This is no longer necessary and 96 L<MD5(3)>, L<MDC2(3)>, L<RIPEMD160(3)>, 107 Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved.
|
| /netbsd-src/crypto/external/bsd/openssl.old/lib/libcrypto/ |
| H A D | Makefile | 9 # be of use. There is absolutely NO WARRANTY. 15 # Please send copies of changes and bug-fixes to: 22 USE_FIPS= no 23 #DBG=-g 30 CWARNFLAGS.clang+= -Wno-empty-body -Wno-unused-value -Wno-parentheses -Wno-implicit-int-float-conve… 32 CWARNFLAGS.clang+= -Wno-atomic-alignment 34 LINTFLAGS+= -X 161 # constant in conditional context 35 LINTFLAGS+= -X 129 # expression has null effect 36 LINTFLAGS+= -X 117 # bitwise '>>' on signed value possibly nonportable 37 LINTFLAGS+= -X 231 # argument '%s' unused in function '%s' [all …]
|
| /netbsd-src/tests/crypto/libcrypto/mdc2/ |
| H A D | Makefile | 4 HELPER_DIR= mdc2 8 LDADD+= -Wl,--no-fatal-warnings
|
| /netbsd-src/crypto/external/bsd/openssl/lib/libcrypto/ |
| H A D | Makefile | 9 # be of use. There is absolutely NO WARRANTY. 15 # Please send copies of changes and bug-fixes to: 22 USE_FIPS= no 23 #DBG=-g 28 CPPFLAGS+= -Dlib${LIB} -I. -I${OPENSSLSRC}/crypto -I${OPENSSLSRC} 29 CPPFLAGS+= -I${OPENSSLSRC}/include -I${OPENSSLSRC}/crypto/include 30 CPPFLAGS+= -I${OPENSSLSRC}/crypto/asn1 -I${OPENSSLSRC}/crypto/evp 31 CPPFLAGS+= -I${OPENSSLSRC}/crypto/modes 32 CPPFLAGS+= -I${OPENSSLSRC}/../include 43 CPPFLAGS+= -I${.CURDIR}/../libdefault [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | EVP_DigestVerifyInit.pod | 6 EVP_DigestVerifyFinal, EVP_DigestVerify - EVP signature verification functions 26 The EVP signature routines are a high-level interface to digital signatures. 60 No B<EVP_PKEY_CTX> will be created by EVP_DigestVerifyInit_ex() if the 76 =item RSA with no padding 78 Supports no digests (the digest B<type> must be NULL) 86 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2, 87 SHA3-224, SHA3-256, SHA3-384, SHA3-512 91 Support no digests (the digest B<type> must be NULL) 103 If RSA-PSS is used and restrictions apply then the digest must match. 137 preference to the low-level interfaces. This is because the code then becomes [all …]
|
| H A D | EVP_DigestSignInit.pod | 6 EVP_DigestSignFinal, EVP_DigestSign - EVP signing functions 27 The EVP signature routines are a high-level interface to digital signatures. 64 No B<EVP_PKEY_CTX> will be created by EVP_DigestSignInit_ex() if the 70 "signing". Built-in EVP_PKEY types supported by these functions are CMAC, 85 =item RSA with no padding 87 Supports no digests (the digest I<type> must be NULL) 95 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2, 96 SHA3-224, SHA3-256, SHA3-384, SHA3-512 100 Support no digests (the digest I<type> must be NULL) 112 If RSA-PSS is used and restrictions apply then the digest must match. [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/ |
| H A D | appveyor.yml | 2 - Visual Studio 2017 5 - x64 6 - x86 11 - VSVER: 15 14 - shared 15 - plain 16 - minimal 19 - ps: >- 20 Install-Module VSSetup -Scope CurrentUser 21 - ps: >- [all …]
|
| /netbsd-src/external/bsd/ntp/dist/html/ |
| H A D | keygen.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 6 <title>ntp-keygen - generate public and private keys</title> 10 <h3><tt>ntp-keygen</tt> - generate public and private keys</h3> 14 <!-- #BeginDate format:En2m -->24-Jul-2018 07:27<!-- #EndDate --> 31 …<p id="intro"><tt>ntp-keygen [ -deGHIMPT ] [ -b <i>modulus</i> ] [ -c [ RSA-MD2 | RSA-MD5 | RSA-SHA 32 | RSA-SHA1 | RSA-MDC2 | RSA-RIPEMD160 | DSA-SHA | DSA-SHA1 ] ] 33 [ -C <i>cipher</i> ] [-i <i>group</i> ] [ -l <em>days</em>] 34 [ -m <i>modulus</i> ] [ -p <i>passwd1</i> ] [ -q <i>passwd2</i> ] 35 [ -S [ RSA | DSA ] ] [ -s <i>host</i> ] [ -V <i>nkeys</i> ]</tt></p> [all …]
|
| H A D | authopt.html | 1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> 7 <!-- Changed by: stenn, 25-May-2018 --> 12 font-weight: bold; 21 <!-- #BeginDate format:En2m -->24-Jul-2018 07:27<!-- #EndDate --> 36 …standard protocol defined in RFC-1305. The <tt><i>keyid</i></tt> argument is the key ID for a <a … 52 …he current selections are: <tt>MD2</tt>, <tt>MD4</tt>, <tt>MD5,</tt> <tt>MDC2</tt>, <tt>RIPEMD160… 54 key message digest algorithm. Note: If compliance with FIPS 140-2 is required, 58 …<dd><span class="style1">Note: In the latest Autokey version, this option has no effect other tha… 61 …<dd><span class="style1">Note: In the latest Autokey version, this option has no effect other tha… [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/ |
| H A D | README-PROVIDERS.md | 4 - [Standard Providers](#standard-providers) 5 - [The Default Provider](#the-default-provider) 6 - [The Legacy Provider](#the-legacy-provider) 7 - [The FIPS Provider](#the-fips-provider) 8 - [The Base Provider](#the-base-provider) 9 - [The Null Provider](#the-null-provider) 10 - [Loading Providers](#loading-providers) 26 -------------------- 28 The default provider collects together all of the standard built-in OpenSSL 32 get an algorithm from a provider if no other provider has been loaded yet. [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
| H A D | openssl.pod | 5 openssl - OpenSSL command line tool 14 …<list> [ B<standard-commands> | B<digest-commands> | B<cipher-commands> | B<cipher-algorithms> | B… 16 B<openssl> B<no->I<XXX> [ I<arbitrary options> ] 44 (e.g., L<x509(1)> or L<openssl-x509(1)>). 47 arguments and have a B<-config> option to specify that file. 55 The list parameters B<standard-commands>, B<digest-commands>, 56 and B<cipher-commands> output a list (one entry per line) of the names 60 The list parameters B<cipher-algorithms> and 61 B<digest-algorithms> list all cipher and message digest names, one entry per line. Aliases are list… 65 The list parameter B<public-key-algorithms> lists all supported public [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| H A D | rsa_sign.c | 2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. 24 * described in EMSA-PKCS1-v1_5-ENCODE, RFC 3447 section 9.2 step 2. This 42 sig.algor->algorithm = OBJ_nid2obj(type); in encode_pkcs1() 43 if (sig.algor->algorithm == NULL) { in encode_pkcs1() 47 if (OBJ_length(sig.algor->algorithm) == 0) { in encode_pkcs1() 54 sig.algor->parameter = ¶meter; in encode_pkcs1() 57 sig.digest->data = (unsigned char *)m; in encode_pkcs1() 58 sig.digest->length = m_len; in encode_pkcs1() 76 if (rsa->meth->rsa_sign) { in RSA_sign() 77 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign() [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
| H A D | openssl.pod | 5 openssl - OpenSSL command line program 14 B<openssl> B<no->I<XXX> [ I<options> ] 43 (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list 46 The command B<no->I<XXX> tests whether a command of the 47 specified name is available. If no command named I<XXX> exists, it 48 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1 53 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is 54 not able to detect pseudo-commands such as B<quit>, 55 B<list>, or B<no->I<XXX> itself.) 60 arguments and have a B<-config> option to specify that file. [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
| H A D | provider-digest.pod | 5 provider-digest - The digest library E<lt>-E<gt> provider functions 61 (see L<provider-base(7)/Provider Functions>). 74 macros in L<openssl-core_dispatch.h(7)>, as follows: 137 No provider side digest context is used. 173 Parameters currently recognised by built-in digests with this function 201 This digest method is an extensible-output function (XOF) and supports 264 L<provider(7)>, L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-default(7)>, 265 L<OSSL_PROVIDER-legacy(7)>, 266 L<EVP_MD-common(7)>, L<EVP_MD-BLAKE2(7)>, L<EVP_MD-MD2(7)>, 267 L<EVP_MD-MD4(7)>, L<EVP_MD-MD5(7)>, L<EVP_MD-MD5-SHA1(7)>, [all …]
|