Searched refs:pub (Results 26 - 50 of 116) sorted by relevance

12345

/freebsd-current/crypto/openssh/regress/
H A Dhostkey-rotate.sh73 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub"
113 mv $OBJ/hkr.${secondary}.pub $OBJ/hkr.${secondary}.pub.old
120 check_key_present ${secondary} $OBJ/hkr.${secondary}.pub.old && \
134 check_key_present ${primary} $OBJ/hkr.${primary}-new.pub || fail "new key missing"
139 mv $OBJ/hkr.${primary}.pub $OBJ/hkr.${primary}.pub.old
140 mv $OBJ/hkr.${primary}-new.pub $OBJ/hkr.${primary}.pub
145 check_key_present ${primary} $OBJ/hkr.${primary}.pub
[all...]
H A Dkeygen-change.sh21 rm -f $OBJ/$t-key $OBJ/$t-key.pub
H A Dkeygen-comment.sh41 check_fingerprint $OBJ/$t-key.pub "${comment}"
44 rm -f $OBJ/$t-key.pub
H A DMakefile127 ed25519-agent.pub ed25519 ed25519.pub empty.in \
133 key.ed25519-512.pub key.rsa-* keys-command-args kh.* askpass \
137 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \
146 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \
147 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \
148 t8.out t8.out.pub t9.out t9.out.pub \
[all...]
H A Dkeys-command.sh15 expected_key_text=`awk '{ print $2 }' < $OBJ/ssh-ed25519.pub`
16 expected_key_fp=`$SSHKEYGEN -lf $OBJ/ssh-ed25519.pub | awk '{ print $2 }'`
H A Dcfgmatchlisten.sh95 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
198 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dkeytype.sh72 cat $OBJ/key.$ht.pub
74 cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
H A Dlimit-keytype.sh48 mv $OBJ/user_key3-cert.pub $OBJ/cert_user_key3.pub
53 certopts="$opts -i $OBJ/user_key3 -oCertificateFile=$OBJ/cert_user_key3.pub"
56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
64 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
H A Dagent-restrict.sh23 $SSHKEYGEN -q -s $OBJ/host_ca -I $id -n $id -h $OBJ/host_${h}.pub || \
62 (printf "host_$h " ; cat $OBJ/host_${h}.pub) >> $OBJ/known_hosts
64 (printf "@cert-authority host_* " ; cat $OBJ/host_ca.pub) >> $OBJ/known_hosts
78 echo "HostCertificate $OBJ/host_${h}-cert.pub" \
94 cat $OBJ/user_$h.pub) >> $OBJ/authorized_keys_$USER
99 _key="$OBJ/${1}.pub"
228 cut -d " " -f-2 $OBJ/user_${u}.pub >> $OBJ/expect_list.pre
262 cut -d " " -f-2 $OBJ/user_x.pub > $OBJ/expect_list
368 cut -d" " -f-2 $OBJ/user_${h}.pub >> $OBJ/expect_keys
377 (printf "publickey " ; cut -d" " -f-2 $OBJ/user_a.pub) >>
[all...]
H A Dcert-userkey.sh71 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
160 cat $OBJ/user_ca_key.pub
172 cat $OBJ/user_ca_key.pub
187 cat $OBJ/user_ca_key.pub
191 extra_sshd="TrustedUserCAKeys $OBJ/user_ca_key.pub"
223 cp $OBJ/cert_user_key_${ktype}.pub \
233 $OBJ/cert_user_key_${ktype}.pub
252 echo "RevokedKeys $OBJ/user_ca_key.pub"
297 cat $OBJ/user_ca_key.pub
301 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub" \
[all...]
/freebsd-current/tests/sys/netinet/libalias/
H A D3_natin.c65 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd);
86 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd);
107 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234);
128 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, cgn, 0x1234);
201 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234);
218 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234);
243 UDP_UNNAT_FAIL(p, u, pub, 0x5678, pub, 0xabcd);
245 LibAliasSetAddress(la, pub);
246 UDP_UNNAT_CHECK(p, u, pub,
[all...]
H A D2_natout.c56 NAT_CHECK(pip, pub, ext, masq);
77 NAT_CHECK(pip, pub, ext, pub);
89 NAT_CHECK(pip, pub, ext, pub);
110 NAT_CHECK(pip, pub, ext, pub);
122 NAT_CHECK(pip, pub, ext, pub);
273 case 1: s = prv2; d = pub; brea
[all...]
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dcrypto-pk.c145 krb5_data pub; local
156 ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length,
162 if (pub.length != size)
167 free(pub.data);
173 free(pub.data);
178 otherinfo.suppPubInfo = &pub;
184 free(pub.data);
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/testdata/
H A Dcreate-agent-corpus.sh23 ssh-add -T *.pub
/freebsd-current/crypto/openssh/
H A Dauthfile.c278 /* try .pub suffix */
279 if (asprintf(&pubfile, "%s.pub", filename) == -1)
303 struct sshkey *pub = NULL; local
310 if (asprintf(&file, "%s-cert.pub", filename) == -1)
315 sshkey_free(pub);
385 struct sshkey *pub = NULL; local
394 sshkey_free(pub);
395 pub = NULL;
410 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) {
414 switch (r = sshkey_read(pub,
[all...]
/freebsd-current/crypto/openssl/include/crypto/
H A Dasn1.h29 int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub);
30 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk);
73 int (*set_pub_key) (EVP_PKEY *pk, const unsigned char *pub, size_t len);
75 int (*get_pub_key) (const EVP_PKEY *pk, unsigned char *pub, size_t *len);
/freebsd-current/contrib/wireguard-tools/
H A Dcurve25519.c88 void curve25519_generate_public(uint8_t pub[static CURVE25519_KEY_SIZE], const uint8_t secret[static CURVE25519_KEY_SIZE])
92 curve25519(pub, secret, basepoint);
/freebsd-current/contrib/llvm-project/lldb/source/Plugins/SymbolFile/NativePDB/
H A DPdbSymUid.cpp37 uint64_t pub : 1; member in struct:__anon2964::GlobalSymIdRepr
88 repr.pub = gsid.is_public;
139 result.is_public = repr.pub;
/freebsd-current/crypto/openssh/.github/
H A Drun_test.sh17 for key in $sshconf/ssh_host*key*.pub; do
/freebsd-current/crypto/openssl/crypto/dh/
H A Ddh_backend.c112 const BIGNUM *priv = NULL, *pub = NULL; local
117 DH_get0_key(dh, &pub, &priv);
122 if (pub != NULL
123 && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PUB_KEY, pub))
/freebsd-current/usr.bin/ssh-copy-id/
H A Dssh-copy-id.sh74 if [ -r "${OPTARG}.pub" ]; then
75 keys="$(cat -- "${OPTARG}.pub")$nl$keys"
/freebsd-current/crypto/openssl/test/
H A Dffc_internal_test.c445 BIGNUM *pub = NULL; local
448 if (!TEST_ptr(pub = BN_new()))
455 if (!TEST_true(BN_set_word(pub, 1)))
457 BN_set_negative(pub, 1);
459 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
463 if (!TEST_true(BN_set_word(pub, 0)))
466 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
475 if (!TEST_true(BN_add_word(pub, 2)))
478 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res)))
481 if (!TEST_ptr(BN_copy(pub, param
[all...]
/freebsd-current/contrib/wpa/src/crypto/
H A Dcrypto_nettle.c339 mpz_t pub; local
347 mpz_init(pub);
348 mpz_import(pub, pubkey_len, 1, 1, 1, 0, pubkey);
349 if (mpz_cmp_d(pub, 1) <= 0)
360 mpz_powm(tmp, pub, q, p);
370 mpz_clear(pub);
/freebsd-current/crypto/openssl/providers/implementations/signature/
H A Deddsa_sig.c429 unsigned char pub[32]; member in struct:__anon4193::__anon4194
437 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey);
451 unsigned char pub[64]; member in struct:__anon4195::__anon4196
461 memcpy(param.ed448.pub, edkey->pubkey, 57);
462 s390x_flip_endian64(param.ed448.pub, param.ed448.pub);
/freebsd-current/usr.sbin/keyserv/
H A Dsetkey.c457 writecache(char *pub, char *sec, des_block *deskey) argument
465 memcpy(new->public, pub, sizeof (keybuf));
476 readcache(char *pub, char *sec, des_block *deskey) argument
481 #define cachehit(pub, sec, list) \
482 (memcmp(pub, (list)->public, sizeof (keybuf)) == 0 && \
485 for (l = &g_cachedkeys; (*l) != NULL && !cachehit(pub, sec, *l);

Completed in 200 milliseconds

12345