/openbsd-current/regress/sys/crypto/hmac/ |
H A D | hmac_test.c | 40 HMAC_SHA256_CTX sha256; local 75 HMAC_SHA256_Init(&sha256, "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", 16); 76 HMAC_SHA256_Update(&sha256, "Hi There", 8); 77 HMAC_SHA256_Final(output, &sha256); 80 HMAC_SHA256_Init(&sha256, "Jefe", 4); 81 HMAC_SHA256_Update(&sha256, "what do ya want for nothing?", 28); 82 HMAC_SHA256_Final(output, &sha256); 85 HMAC_SHA256_Init(&sha256, "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA", 16); 87 HMAC_SHA256_Update(&sha256, data, sizeof data); 88 HMAC_SHA256_Final(output, &sha256); [all...] |
/openbsd-current/regress/lib/libcrypto/sha2/ |
H A D | Makefile | 13 sha256 \ 16 sha256 \
|
/openbsd-current/regress/bin/md5/ |
H A D | Makefile | 3 REGRESS_TARGETS=cksum md5 sha1 sha224 sha256 sha384 sha512 md5_string_vs_files 18 sha256: 19 sha256 -x | cmp -s ${.CURDIR}/testsuite.sha256 /dev/stdin
|
/openbsd-current/bin/md5/ |
H A D | Makefile | 7 ${BINDIR}/md5 ${BINDIR}/sha256 \
|
/openbsd-current/lib/libcrypto/arch/powerpc/ |
H A D | Makefile.inc | 17 SSLASM+= sha sha512-ppc sha256-ppc
|
/openbsd-current/regress/lib/libcrypto/CA/ |
H A D | Makefile | 25 -new -x509 -days 365 -sha256 -extensions v3_ca -out root.cert.pem 34 openssl req -batch -config ${.CURDIR}/intermediate.cnf -new -sha256 \ 42 -extensions v3_intermediate_ca -days 10 -notext -md sha256 \ 61 openssl req -batch -config ${.CURDIR}/intermediate.cnf -new -sha256 \ 69 -extensions server_cert -days 5 -notext -md sha256 \ 79 openssl req -batch -config ${.CURDIR}/intermediate.cnf -new -sha256 \ 87 -extensions usr_cert -days 5 -notext -md sha256 \
|
/openbsd-current/regress/lib/libssl/certs/ |
H A D | make-certs.sh | 49 default_md = sha256 108 openssl req -new -days 3650 -nodes ${key_args} -sha256 -x509 \ 119 openssl req -new -days 3650 -nodes ${key_args} -sha256 \ 133 openssl req -new -days 3650 -nodes ${key_args} -sha256 \ 137 -CAkey "${TMPDIR}/${issuer_file}.key" -CAcreateserial -sha256 \ 147 openssl req -new -days 3650 -nodes ${key_args} -sha256 \ 162 openssl req -new -days 3650 -nodes ${key_args} -sha256 \
|
/openbsd-current/libexec/reorder_kernel/ |
H A D | reorder_kernel.sh | 55 if ! sha256 -C $SHA256 /bsd; then 61 sha256 -h $SHA256 /bsd
|
/openbsd-current/lib/libcrypto/arch/hppa/ |
H A D | Makefile.inc | 20 SSLASM+= sha sha512-parisc sha256-parisc
|
/openbsd-current/lib/libcrypto/arch/arm/ |
H A D | Makefile.inc | 22 SSLASM+= sha sha256-armv4
|
/openbsd-current/lib/libcrypto/arch/sparc64/ |
H A D | Makefile.inc | 17 SSLASM+= sha sha512-sparcv9 sha256-sparcv9
|
/openbsd-current/regress/usr.sbin/snmpd/ |
H A D | snmpd.conf | 21 user auth_sha256 authkey testpass auth hmac-sha256 30 user authpriv_sha256_des authkey testpass auth hmac-sha256 enckey testpass enc des 31 user authpriv_sha256_aes authkey testpass auth hmac-sha256 enckey testpass enc aes
|
/openbsd-current/lib/libcrypto/arch/amd64/ |
H A D | Makefile.inc | 59 SRCS+= sha256-x86_64.S 60 GENERATED+= sha256-x86_64.S 61 sha256-x86_64.S: ${LCRYPTO_SRC}/sha/asm/sha512-x86_64.pl ${EXTRA_PL}
|
/openbsd-current/regress/lib/libcrypto/certs/ |
H A D | make-certs.sh | 49 default_md = sha256 90 openssl req -new -days 3650 -nodes -newkey rsa:2048 -sha256 -x509 \ 99 openssl req -new -days 3650 -nodes -newkey rsa:2048 -sha256 \ 113 openssl req -new -days 3650 -nodes -newkey rsa:2048 -sha256 \ 125 openssl req -new -days 3650 -nodes -newkey rsa:2048 -sha256 \ 138 openssl req -new -days 3650 -nodes -newkey rsa:2048 -sha256 \ 150 openssl req -new -days 3650 -nodes -newkey rsa:2048 -sha256 \
|
/openbsd-current/regress/usr.bin/ssh/ |
H A D | sshfp-connect.sh | 10 # sshtest: valid sha1 and sha256 fingerprints. 13 # sshtest-bad: invalid sha1 fingerprint and good sha256 fingerprint 19 # sshtest-sha256 IN SSHFP 1 2 E30D6B9EB7A4DE495324E4D5870B8220577993EA6AF417E8E4A4F1C5 BF01A9B6 23 # sshtest-sha256-bad IN SSHFP 1 2 E30D6B9EB7A4DE495324E4D5870B8220577993EA6AF417E8E4A4F1C5 BF01A9B5 46 for n in sshtest sshtest-sha1 sshtest-sha256; do
|
H A D | keygen-sshfp.sh | 16 fail "keygen fingerprint sha256" 33 fp=`${SSHKEYGEN} -Ohashalg=sha256 -r test -f ${SRC}/ed25519_openssh.pub` 46 fail "keygen fingerprint sha256"
|
H A D | keygen-comment.sh | 11 if ! ${SSHKEYGEN} -l -E sha256 -f $file > $OBJ/$t-fgp ; then
|
H A D | krl.sh | 102 touch $OBJ/revoked-sha1 $OBJ/revoked-sha256 $OBJ/revoked-hash 105 (printf "sha256: "; cat $rkey) >> $OBJ/revoked-sha256 124 $SSHKEYGEN $OPTS -kf $OBJ/krl-sha256 $OBJ/revoked-sha256 \ 186 check_krl $f $OBJ/krl-sha256 $HASH_RESULT "$TAG"
|
/openbsd-current/lib/libcrypto/arch/mips64/ |
H A D | Makefile.inc | 19 SSLASM+= sha sha512-mips sha256-mips
|
/openbsd-current/usr.sbin/pkg_add/OpenBSD/ |
H A D | Paths.pm | 59 sub sha256($) { '/bin/sha256' } subroutine
|
/openbsd-current/regress/usr.sbin/rpki-client/libressl/ |
H A D | Makefile | 21 sha256 -c ${.CURDIR}/test-http.sum
|
/openbsd-current/regress/usr.bin/signify/ |
H A D | signify.sh | 25 sha256 $pubkey $seckey > HASH
|
/openbsd-current/lib/libcrypto/arch/i386/ |
H A D | Makefile.inc | 39 SSLASM+= sha sha256-586
|
/openbsd-current/regress/usr.sbin/ocspcheck/ |
H A D | Makefile | 20 /usr/bin/openssl ocsp -port 127.0.0.1:2560 -text -sha256 -index ${.CURDIR}/index.txt -CA ${.CURDIR}/chain.pem -rkey ${.CURDIR}/ocsp-localhost.key.pem -rsigner ${.CURDIR}/ocsp-localhost.pem -nmin 1 > /dev/null 2>&1 &
|
/openbsd-current/usr.sbin/unbound/smallapp/ |
H A D | unbound-control-setup.sh.in | 52 HASH=sha256
|