/freebsd-current/crypto/openssh/regress/ |
H A D | hostkey-rotate.sh | 73 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub" 113 mv $OBJ/hkr.${secondary}.pub $OBJ/hkr.${secondary}.pub.old 120 check_key_present ${secondary} $OBJ/hkr.${secondary}.pub.old && \ 134 check_key_present ${primary} $OBJ/hkr.${primary}-new.pub || fail "new key missing" 139 mv $OBJ/hkr.${primary}.pub $OBJ/hkr.${primary}.pub.old 140 mv $OBJ/hkr.${primary}-new.pub $OBJ/hkr.${primary}.pub 145 check_key_present ${primary} $OBJ/hkr.${primary}.pub [all...] |
H A D | keygen-change.sh | 21 rm -f $OBJ/$t-key $OBJ/$t-key.pub
|
H A D | keygen-comment.sh | 41 check_fingerprint $OBJ/$t-key.pub "${comment}" 44 rm -f $OBJ/$t-key.pub
|
H A D | Makefile | 127 ed25519-agent.pub ed25519 ed25519.pub empty.in \ 133 key.ed25519-512.pub key.rsa-* keys-command-args kh.* askpass \ 137 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \ 146 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \ 147 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \ 148 t8.out t8.out.pub t9.out t9.out.pub \ [all...] |
H A D | keys-command.sh | 15 expected_key_text=`awk '{ print $2 }' < $OBJ/ssh-ed25519.pub` 16 expected_key_fp=`$SSHKEYGEN -lf $OBJ/ssh-ed25519.pub | awk '{ print $2 }'`
|
H A D | cfgmatchlisten.sh | 95 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 198 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | keytype.sh | 72 cat $OBJ/key.$ht.pub 74 cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
|
H A D | limit-keytype.sh | 48 mv $OBJ/user_key3-cert.pub $OBJ/cert_user_key3.pub 53 certopts="$opts -i $OBJ/user_key3 -oCertificateFile=$OBJ/cert_user_key3.pub" 56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 64 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
|
H A D | agent-restrict.sh | 23 $SSHKEYGEN -q -s $OBJ/host_ca -I $id -n $id -h $OBJ/host_${h}.pub || \ 62 (printf "host_$h " ; cat $OBJ/host_${h}.pub) >> $OBJ/known_hosts 64 (printf "@cert-authority host_* " ; cat $OBJ/host_ca.pub) >> $OBJ/known_hosts 78 echo "HostCertificate $OBJ/host_${h}-cert.pub" \ 94 cat $OBJ/user_$h.pub) >> $OBJ/authorized_keys_$USER 99 _key="$OBJ/${1}.pub" 228 cut -d " " -f-2 $OBJ/user_${u}.pub >> $OBJ/expect_list.pre 262 cut -d " " -f-2 $OBJ/user_x.pub > $OBJ/expect_list 368 cut -d" " -f-2 $OBJ/user_${h}.pub >> $OBJ/expect_keys 377 (printf "publickey " ; cut -d" " -f-2 $OBJ/user_a.pub) >> [all...] |
H A D | cert-userkey.sh | 71 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub" 160 cat $OBJ/user_ca_key.pub 172 cat $OBJ/user_ca_key.pub 187 cat $OBJ/user_ca_key.pub 191 extra_sshd="TrustedUserCAKeys $OBJ/user_ca_key.pub" 223 cp $OBJ/cert_user_key_${ktype}.pub \ 233 $OBJ/cert_user_key_${ktype}.pub 252 echo "RevokedKeys $OBJ/user_ca_key.pub" 297 cat $OBJ/user_ca_key.pub 301 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub" \ [all...] |
/freebsd-current/tests/sys/netinet/libalias/ |
H A D | 3_natin.c | 65 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd); 86 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd); 107 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234); 128 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, cgn, 0x1234); 201 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234); 218 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234); 243 UDP_UNNAT_FAIL(p, u, pub, 0x5678, pub, 0xabcd); 245 LibAliasSetAddress(la, pub); 246 UDP_UNNAT_CHECK(p, u, pub, [all...] |
H A D | 2_natout.c | 56 NAT_CHECK(pip, pub, ext, masq); 77 NAT_CHECK(pip, pub, ext, pub); 89 NAT_CHECK(pip, pub, ext, pub); 110 NAT_CHECK(pip, pub, ext, pub); 122 NAT_CHECK(pip, pub, ext, pub); 273 case 1: s = prv2; d = pub; brea [all...] |
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 145 krb5_data pub; local 156 ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length, 162 if (pub.length != size) 167 free(pub.data); 173 free(pub.data); 178 otherinfo.suppPubInfo = &pub; 184 free(pub.data);
|
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/testdata/ |
H A D | create-agent-corpus.sh | 23 ssh-add -T *.pub
|
/freebsd-current/crypto/openssh/ |
H A D | authfile.c | 278 /* try .pub suffix */ 279 if (asprintf(&pubfile, "%s.pub", filename) == -1) 303 struct sshkey *pub = NULL; local 310 if (asprintf(&file, "%s-cert.pub", filename) == -1) 315 sshkey_free(pub); 385 struct sshkey *pub = NULL; local 394 sshkey_free(pub); 395 pub = NULL; 410 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) { 414 switch (r = sshkey_read(pub, [all...] |
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | asn1.h | 29 int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub); 30 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk); 73 int (*set_pub_key) (EVP_PKEY *pk, const unsigned char *pub, size_t len); 75 int (*get_pub_key) (const EVP_PKEY *pk, unsigned char *pub, size_t *len);
|
/freebsd-current/contrib/wireguard-tools/ |
H A D | curve25519.c | 88 void curve25519_generate_public(uint8_t pub[static CURVE25519_KEY_SIZE], const uint8_t secret[static CURVE25519_KEY_SIZE]) 92 curve25519(pub, secret, basepoint);
|
/freebsd-current/contrib/llvm-project/lldb/source/Plugins/SymbolFile/NativePDB/ |
H A D | PdbSymUid.cpp | 37 uint64_t pub : 1; member in struct:__anon2964::GlobalSymIdRepr 88 repr.pub = gsid.is_public; 139 result.is_public = repr.pub;
|
/freebsd-current/crypto/openssh/.github/ |
H A D | run_test.sh | 17 for key in $sshconf/ssh_host*key*.pub; do
|
/freebsd-current/crypto/openssl/crypto/dh/ |
H A D | dh_backend.c | 112 const BIGNUM *priv = NULL, *pub = NULL; local 117 DH_get0_key(dh, &pub, &priv); 122 if (pub != NULL 123 && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PUB_KEY, pub))
|
/freebsd-current/usr.bin/ssh-copy-id/ |
H A D | ssh-copy-id.sh | 74 if [ -r "${OPTARG}.pub" ]; then 75 keys="$(cat -- "${OPTARG}.pub")$nl$keys"
|
/freebsd-current/crypto/openssl/test/ |
H A D | ffc_internal_test.c | 445 BIGNUM *pub = NULL; local 448 if (!TEST_ptr(pub = BN_new())) 455 if (!TEST_true(BN_set_word(pub, 1))) 457 BN_set_negative(pub, 1); 459 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res))) 463 if (!TEST_true(BN_set_word(pub, 0))) 466 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res))) 475 if (!TEST_true(BN_add_word(pub, 2))) 478 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res))) 481 if (!TEST_ptr(BN_copy(pub, param [all...] |
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_nettle.c | 339 mpz_t pub; local 347 mpz_init(pub); 348 mpz_import(pub, pubkey_len, 1, 1, 1, 0, pubkey); 349 if (mpz_cmp_d(pub, 1) <= 0) 360 mpz_powm(tmp, pub, q, p); 370 mpz_clear(pub);
|
/freebsd-current/crypto/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 429 unsigned char pub[32]; member in struct:__anon4193::__anon4194 437 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); 451 unsigned char pub[64]; member in struct:__anon4195::__anon4196 461 memcpy(param.ed448.pub, edkey->pubkey, 57); 462 s390x_flip_endian64(param.ed448.pub, param.ed448.pub);
|
/freebsd-current/usr.sbin/keyserv/ |
H A D | setkey.c | 457 writecache(char *pub, char *sec, des_block *deskey) argument 465 memcpy(new->public, pub, sizeof (keybuf)); 476 readcache(char *pub, char *sec, des_block *deskey) argument 481 #define cachehit(pub, sec, list) \ 482 (memcmp(pub, (list)->public, sizeof (keybuf)) == 0 && \ 485 for (l = &g_cachedkeys; (*l) != NULL && !cachehit(pub, sec, *l);
|