/freebsd-current/contrib/libfido2/src/ |
H A D | eddsa.c | 30 EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, unsigned char *pub, argument 34 (void)pub;
|
/freebsd-current/crypto/openssh/regress/ |
H A D | sshsig.sh | 18 WRONG=$OBJ/wrong-key.pub 24 CA_PUB=$OBJ/sigca-key.pub 41 SIGNKEYS="$SIGNKEYS ${t}-cert.pub" 46 keybase=`basename $t .pub` 47 privkey=${OBJ}/`basename $t -cert.pub` 50 pubkey=${OBJ}/${keybase}.pub 51 cert=${OBJ}/${keybase}-cert.pub 90 < $DATA | cut -d' ' -f1-2 > ${OBJ}/${keybase}-fromsig.pub || \ 92 cut -d' ' -f1-2 ${OBJ}/${keybase}.pub > ${OBJ}/${keybase}-strip.pub [all...] |
H A D | forcecommand.sh | 14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | cfgmatch.sh | 77 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
/freebsd-current/crypto/openssl/test/ |
H A D | acvp_test.c | 151 const unsigned char *pub, size_t pub_len, 165 pub, pub_len) > 0) 190 tst->pub, tst->pub_len, tst->pass))) 286 tst->pub, tst->pub_len, 1))) 374 unsigned char *priv = NULL, *pub = NULL; local 388 &pub, &pub_len))) 390 test_output_memory("y", pub, pub_len); 394 OPENSSL_free(pub); 396 pub = priv = NULL; 401 OPENSSL_free(pub); 150 ecdsa_create_pkey(EVP_PKEY **pkey, const char *curve_name, const unsigned char *pub, size_t pub_len, int expected) argument 448 dsa_create_pkey(EVP_PKEY **pkey, const unsigned char *p, size_t p_len, const unsigned char *q, size_t q_len, const unsigned char *g, size_t g_len, const unsigned char *seed, size_t seed_len, int counter, int validate_pq, int validate_g, const unsigned char *pub, size_t pub_len, BN_CTX *bn_ctx) argument 894 dh_create_pkey(EVP_PKEY **pkey, const char *group_name, const unsigned char *pub, size_t pub_len, const unsigned char *priv, size_t priv_len, BN_CTX *bn_ctx, int pass) argument 948 unsigned char *pub = NULL; local [all...] |
H A D | dsatest.c | 332 BIGNUM *p = NULL, *q = NULL, *g = NULL, *priv = NULL, *pub = NULL, *priv2 = NULL; local 356 || !TEST_ptr(pub = BN_bin2bn(out_pub, sizeof(out_pub), NULL)) 370 if (!TEST_true(DSA_set0_key(dsa, pub, priv))) 372 pub = priv = NULL; 405 BN_free(pub); 419 BIGNUM *p = NULL, *q = NULL, *g = NULL, *priv = NULL, *pub = NULL; local 442 || !TEST_ptr(pub = BN_bin2bn(out_pub, sizeof(out_pub), NULL)) 451 if (!TEST_true(DSA_set0_key(dsa, pub, priv))) 453 pub = priv = NULL; 477 BN_free(pub); [all...] |
H A D | evp_libctx_test.c | 496 static int rsa_keygen(int bits, EVP_PKEY **pub, EVP_PKEY **priv) argument 513 if (!TEST_ptr(d2i_PublicKey(EVP_PKEY_RSA, pub, &pp, len))) 525 EVP_PKEY *pub = NULL; local 534 ret = TEST_true(rsa_keygen(bits, &pub, &priv)) 535 && TEST_ptr(sctx = EVP_PKEY_CTX_new_from_pkey(libctx, pub, NULL)) 553 EVP_PKEY_free(pub); 591 EVP_PKEY *pub = NULL; local 598 ret = TEST_true(rsa_keygen(2048, &pub, &priv)) 599 && TEST_ptr(pubctx = EVP_PKEY_CTX_new_from_pkey(libctx, pub, NULL)) 653 EVP_PKEY_free(pub); [all...] |
/freebsd-current/tests/sys/netinet/libalias/ |
H A D | util.c | 43 struct in_addr pub = { htonl(0x0102dead) }; variable in typeref:struct:in_addr
|
H A D | util.h | 44 extern struct in_addr masq, pub, prv1, prv2, prv3, cgn, ext, ANY_ADDR;
|
/freebsd-current/crypto/openssl/crypto/asn1/ |
H A D | ameth_lib.c | 284 const X509_PUBKEY *pub), 285 int (*pub_encode) (X509_PUBKEY *pub, 417 const unsigned char *pub, 433 unsigned char *pub, 282 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub), int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp) (const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size) (const EVP_PKEY *pk), int (*pkey_bits) (const EVP_PKEY *pk)) argument 415 EVP_PKEY_asn1_set_set_pub_key(EVP_PKEY_ASN1_METHOD *ameth, int (*set_pub_key) (EVP_PKEY *pk, const unsigned char *pub, size_t len)) argument 431 EVP_PKEY_asn1_set_get_pub_key(EVP_PKEY_ASN1_METHOD *ameth, int (*get_pub_key) (const EVP_PKEY *pk, unsigned char *pub, size_t *len)) argument
|
/freebsd-current/crypto/openssl/crypto/ct/ |
H A D | ct_sct.c | 294 X509_PUBKEY *pub = NULL, *log_pkey = NULL; local 334 if (X509_PUBKEY_set(&pub, issuer_pkey) != 1) 336 if (SCT_CTX_set1_issuer_pubkey(sctx, pub) != 1) 369 X509_PUBKEY_free(pub);
|
/freebsd-current/contrib/netbsd-tests/lib/librumphijack/ |
H A D | t_tcpip.sh | 91 cp $(atf_get_srcdir)/ssh_host_key.pub . 93 atf_check -s eq:0 -o empty -e empty chmod 444 ssh_host_key.pub 106 cp ssh_user_key.pub authorized_keys 108 "$(cat $(atf_get_srcdir)/ssh_host_key.pub)" >known_hosts || \
|
/freebsd-current/contrib/netbsd-tests/fs/psshfs/ |
H A D | t_psshfs.sh | 79 cp $(atf_get_srcdir)/ssh_host_key.pub . 81 atf_check -s eq:0 -o empty -e empty chmod 444 ssh_host_key.pub 93 cp ssh_user_key.pub authorized_keys 95 "$(cat $(atf_get_srcdir)/ssh_host_key.pub)" >known_hosts || \
|
/freebsd-current/crypto/openssl/crypto/x509/ |
H A D | x_pubkey.c | 1004 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, argument 1008 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval)) 1011 OPENSSL_free(pub->public_key->data); 1012 pub->public_key->data = penc; 1013 pub->public_key->length = penclen; 1015 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 1016 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT; 1023 X509_ALGOR **pa, const X509_PUBKEY *pub) 1026 *ppkalg = pub->algor->algorithm; 1028 *pk = pub 1021 X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, int *ppklen, X509_ALGOR **pa, const X509_PUBKEY *pub) argument [all...] |
/freebsd-current/crypto/openssh/ |
H A D | kex.h | 254 void kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) 258 const u_char pub[CURVE25519_SIZE], struct sshbuf *out) 262 const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int)
|
/freebsd-current/contrib/wpa/src/ap/ |
H A D | ieee802_11.c | 1770 struct wpabuf *data, int pub); 1777 struct wpabuf *data, int pub)) 1798 struct wpabuf *pub; local 1830 pub = crypto_ecdh_get_pubkey(sta->fils_ecdh, 1); 1831 if (!pub) { 1837 elem_len = wpabuf_len(pub); 1838 wpabuf_free(pub); 1997 int pub = 0; local 2000 NULL, 0, &pub); 2007 cb(hapd, sta, resp, data, pub); 1772 handle_auth_fils(struct hostapd_data *hapd, struct sta_info *sta, const u8 *pos, size_t len, u16 auth_alg, u16 auth_transaction, u16 status_code, void (*cb)(struct hostapd_data *hapd, struct sta_info *sta, u16 resp, struct wpabuf *data, int pub)) argument 2028 struct wpabuf *pub = NULL; local 2224 handle_auth_fils_finish(struct hostapd_data *hapd, struct sta_info *sta, u16 resp, struct wpabuf *data, int pub) argument 2265 int pub = 0; local 4178 struct wpabuf *secret, *pub, *hkey; local 4400 struct wpabuf *pub; local 5196 struct wpabuf *pub; local 5369 struct wpabuf *pub; local [all...] |
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ecx_meth.c | 280 static int ecx_set_pub_key(EVP_PKEY *pkey, const unsigned char *pub, size_t len) argument 288 ecx = ossl_ecx_key_op(NULL, pub, len, pkey->ameth->pkey_id, 319 static int ecx_get_pub_key(const EVP_PKEY *pkey, unsigned char *pub, argument 324 if (pub == NULL) { 334 memcpy(pub, key->pubkey, *len); 1285 unsigned char pub[32]; member in struct:__anon3861::__anon3862 1302 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); 1317 unsigned char pub[64]; member in struct:__anon3863::__anon3864 1336 memcpy(param.ed448.pub, edkey->pubkey, 57); 1337 s390x_flip_endian64(param.ed448.pub, para [all...] |
H A D | ec_ameth.c | 286 unsigned char *priv = NULL, *pub = NULL; local 297 publen = EC_KEY_key2buf(x, EC_KEY_get_conv_form(x), &pub, NULL); 331 if (ASN1_buf_print(bp, pub, publen, off + 4) == 0) 342 OPENSSL_free(pub);
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_gnutls.c | 318 gcry_mpi_t pub = NULL; local 326 if (gcry_mpi_scan(&pub, GCRYMPI_FMT_USG, pubkey, pubkey_len, NULL) != 328 gcry_mpi_cmp_ui(pub, 1) <= 0) 343 gcry_mpi_powm(tmp, pub, q, p); 356 gcry_mpi_release(pub);
|
/freebsd-current/crypto/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2text.c | 346 && !print_labeled_bignum(out, "pub: ", pub_key)) 495 unsigned char *priv = NULL, *pub = NULL; local 536 pub_len = EC_KEY_key2buf(ec, EC_KEY_get_conv_form(ec), &pub, NULL); 547 if (pub != NULL 548 && !print_labeled_buf(out, "pub:", pub, pub_len)) 554 OPENSSL_free(pub); 614 if (!print_labeled_buf(out, "pub:", ecx->pubkey, ecx->keylen))
|
/freebsd-current/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 4037 struct wpabuf *pub = NULL; local 4076 pub = crypto_ecdh_get_pubkey(sm->fils_ecdh, 1); 4077 if (!pub) 4080 pub); 4081 sm->fils_dh_elem_len = wpabuf_len(pub); 4086 (pub ? wpabuf_len(pub) : 0)); 4104 wpabuf_put_buf(buf, pub); 4159 wpabuf_free(pub); 4179 struct wpabuf *pub local 5027 struct wpabuf *ie = NULL, *pub = NULL; local 5075 struct wpabuf *secret, *pub, *hkey; local [all...] |
/freebsd-current/contrib/wpa/src/wps/ |
H A D | wps_common.c | 648 struct wpabuf *priv = NULL, *pub = NULL; local 651 dh_ctx = dh5_init(&priv, &pub); 654 pub = wpabuf_zeropad(pub, 192); 655 if (pub == NULL) { 660 wpa_hexdump_buf(MSG_DEBUG, "WPS: Generated new DH pubkey", pub); 664 *pubkey = pub;
|
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 345 u8 pub[EAP_EKE_MAX_DH_LEN]; local 357 * no need to do extra padding for y (= pub). 365 os_memcpy(pub, dhpub, dh_len); 366 if (aes_128_cbc_encrypt(key, iv, pub, dh_len) < 0) 369 os_memcpy(ret_dhcomp + AES_BLOCK_SIZE, pub, dh_len);
|
/freebsd-current/crypto/openssh/contrib/ |
H A D | ssh-copy-id | 65 DEFAULT_PUB_ID_FILE=$(ls -t "${HOME}"/.ssh/id*.pub 2>/dev/null | grep -v -- '-cert.pub$' | head -n 1) 93 if expr "$L_ID_FILE" : '.*\.pub$' >/dev/null ; then 96 PUB_ID_FILE="$L_ID_FILE.pub" 99 [ "$FORCED" ] || PRIV_ID_FILE=$(dirname "$PUB_ID_FILE")/$(basename "$PUB_ID_FILE" .pub) 201 # find if only given the contents of the .pub file in an unrelated tmpfile
|
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 101 const BIGNUM *priv = NULL, *pub = NULL; local 106 DSA_get0_key(dsa, &pub, &priv); 111 if (pub != NULL 112 && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PUB_KEY, pub))
|