/freebsd-10-stable/usr.sbin/bsnmpd/modules/snmp_atm/ |
H A D | atm_sys.c | 74 return (&aif->pub); 79 atm_if2node(struct atmif *pub) argument 81 struct atmif_priv *aif = (struct atmif_priv *)pub; 95 free(aif->pub.mib); 114 ost = aif->pub.carrier; 124 aif->pub.carrier = ATMIF_CARRIER_ON; 126 aif->pub.carrier = ATMIF_CARRIER_OFF; 128 if (ost != aif->pub.carrier) 170 if ((aif->pub.mib = malloc(sizeof(*aif->pub [all...] |
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | keygen-convert.sh | 17 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \ 20 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \ 27 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub 28 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \ 31 rm -f $OBJ/$t-key $OBJ/$t-key.pub $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub \ 32 $OBJ/$t-rfc-imported $OBJ/$t-key-nocomment.pub
|
H A D | cert-hostkey.sh | 53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 60 cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca 72 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub \ 84 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 85 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 95 $OBJ/cert_host_key_${ktype}-cert.pub || \ 97 cat $OBJ/cert_host_key_${ktype}-cert.pub >> [all...] |
H A D | ssh-com-client.sh | 36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub 41 rm -f ${OBJ}/$t ${OBJ}/$t.pub 49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub 50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub 87 cp ${HK}.$key.pub ${HK}.pub 127 for i in ssh2_config random_seed dsa.pub dsa host.dsa \ 128 id.list id.com id.com.pub i [all...] |
H A D | hostkey-rotate.sh | 41 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub" 74 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old 80 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present" 92 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa-new.pub || fail "new key missing" 97 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old 98 mv $OBJ/hkr.ssh-rsa-new.pub $OBJ/hkr.ssh-rsa.pub 103 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub [all...] |
H A D | multipubkey.sh | 26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub 40 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub" 46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 56 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \ 63 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
|
H A D | brokenkeys.sh | 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | Makefile | 95 ed25519-agent.pub empty.in expect failed-regress.log \ 98 key.dsa-* key.ecdsa-* key.ed25519-512 key.ed25519-512.pub \ 102 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa1 \ 103 rsa1-agent rsa1-agent.pub rsa1.pub rsa_ssh2_cr.prv \ 110 t10.out t10.out.pub t12.out t12.out.pub t2.out t3.out \ 111 t6.out1 t6.out2 t7.out t7.out.pub t8.out t8.out.pub \ [all...] |
H A D | ssh-com.sh | 45 PublicHostKeyFile ${SRC}/dsa_ssh2.pub 59 rm -f ${OBJ}/dsa ${OBJ}/dsa.pub 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 74 ${SSHKEYGEN} -if ${SRC}/dsa_ssh2.pub 117 sshd2_config dsa.pub dsa ssh_config_com; do
|
H A D | ssh-com-keygen.sh | 31 COMPUB=${COMPRV}.pub 33 OPENSSHPUB=${OPENSSHPRV}.pub
|
H A D | forcecommand.sh | 11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | keygen-change.sh | 27 rm -f $OBJ/$t-key $OBJ/$t-key.pub
|
/freebsd-10-stable/usr.sbin/ctm/mkCTM/ |
H A D | ctm_conf.gnats | 6 set CTMdest $CTMSW/../CTM-pub/$CTMname
|
/freebsd-10-stable/contrib/ngatm/snmp_atm/ |
H A D | snmp_atm.c | 78 if (strcmp(aif->pub.ifp->name, name) == 0) 79 return (&aif->pub); 93 return (&aif->pub); 109 r0->func(&aif->pub, code, arg, r0->data); 164 enum atmif_carrier_state ost = aif->pub.carrier; 167 strcpy(ifmr.ifm_name, aif->pub.ifp->name); 170 aif->pub.carrier = ATMIF_CARRIER_UNKNOWN; 174 aif->pub.carrier = ATMIF_CARRIER_UNKNOWN; 178 aif->pub.carrier = ATMIF_CARRIER_ON; 180 aif->pub 593 atm_notify_aif(struct atmif *pub, const struct lmodule *mod, atmif_event_f func, void *arg) argument [all...] |
/freebsd-10-stable/crypto/openssh/regress/unittests/hostkeys/ |
H A D | mktestdata.sh | 44 hentries "sisyphus.example.com" "*_5.pub" 45 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_6.pub" 53 hentries "sisyphus.example.com" "*_1.pub" 56 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_2.pub" 59 hentries "*.example.com,192.0.2.*,2001:*" "*_3.pub" 67 printf "@revoked sisyphus.example.com " ; cat rsa1_4.pub 68 printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub 69 printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub 70 printf "@cert-authority *.example.com " ; cat dsa_4.pub 75 printf "@what sisyphus.example.com " ; cat rsa1_1.pub [all...] |
/freebsd-10-stable/usr.sbin/lpr/common_source/ |
H A D | ctlinfo.c | 69 struct cjobinfo pub; member in struct:cjprivate 238 if ((cpriv == NULL) || (cpriv != cpriv->pub.cji_priv)) { 244 FREESTR(cpriv->pub.cji_accthost); 245 FREESTR(cpriv->pub.cji_acctuser); 246 FREESTR(cpriv->pub.cji_class); 247 FREESTR(cpriv->pub.cji_curqueue); 248 /* [cpriv->pub.cji_fname is part of cpriv-malloced area] */ 249 FREESTR(cpriv->pub.cji_jobname); 250 FREESTR(cpriv->pub.cji_mailto); 251 FREESTR(cpriv->pub [all...] |
/freebsd-10-stable/crypto/openssh/contrib/redhat/ |
H A D | sshd.init | 10 # config: /etc/ssh/ssh_host_key.pub 43 /sbin/restorecon /etc/ssh/ssh_host_key.pub 44 /sbin/restorecon /etc/ssh/ssh_host_rsa_key.pub 45 /sbin/restorecon /etc/ssh/ssh_host_dsa_key.pub 46 /sbin/restorecon /etc/ssh/ssh_host_ecdsa_key.pub
|
/freebsd-10-stable/sys/geom/uzip/ |
H A D | g_uzip_lzma.c | 44 struct g_uzip_dapi pub; member in struct:g_uzip_lzma 112 lzp->pub.max_blen = LZ4_compressBound(blksz); 113 lzp->pub.decompress = &g_uzip_lzma_decompress; 114 lzp->pub.free = &g_uzip_lzma_free; 115 lzp->pub.rewind = &g_uzip_lzma_nop; 116 lzp->pub.pvt = lzp; 117 return (&lzp->pub);
|
H A D | g_uzip_zlib.c | 44 struct g_uzip_dapi pub; member in struct:g_uzip_zlib 119 zp->pub.max_blen = z_compressBound(blksz); 120 zp->pub.decompress = &g_uzip_zlib_decompress; 121 zp->pub.free = &g_uzip_zlib_free; 122 zp->pub.rewind = &g_uzip_zlib_rewind; 123 zp->pub.pvt = (void *)zp; 124 return (&zp->pub);
|
/freebsd-10-stable/crypto/openssh/ |
H A D | authfile.c | 340 struct sshkey *pub = NULL; local 370 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) 372 if ((r = sshkey_try_load_public(pub, filename, commentp)) == 0) { 374 *keyp = pub; 377 sshkey_free(pub); 381 if ((pub = sshkey_new(KEY_RSA1)) == NULL) 383 if ((r = sshkey_try_load_public(pub, filename, commentp)) == 0) { 385 *keyp = pub; 388 sshkey_free(pub); 392 /* try .pub suffi 412 struct sshkey *pub = NULL; local 505 struct sshkey *pub = NULL; local [all...] |
H A D | kexc25519.c | 54 kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) argument 59 crypto_scalarmult_curve25519(pub, key, basepoint); 64 const u_char pub[CURVE25519_SIZE], struct sshbuf *out) 71 if (timingsafe_bcmp(pub, shared_key, CURVE25519_SIZE) == 0) 74 crypto_scalarmult_curve25519(shared_key, key, pub); 63 kexc25519_shared_key(const u_char key[CURVE25519_SIZE], const u_char pub[CURVE25519_SIZE], struct sshbuf *out) argument
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | x_pubkey.c | 343 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, 347 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval)) 350 if (pub->public_key->data) 351 OPENSSL_free(pub->public_key->data); 352 pub->public_key->data = penc; 353 pub->public_key->length = penclen; 355 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 356 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT; 363 X509_ALGOR **pa, X509_PUBKEY *pub) 366 *ppkalg = pub [all...] |
/freebsd-10-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | mktestdata.sh | 49 awk '/^priv:$/,/^pub:/' | \ 52 awk '/^pub:/,/^P:/' | #\ 53 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 57 for x in priv pub g ; do 70 awk '/^priv:$/,/^pub:/' | \ 73 awk '/^pub:/,/^ASN1 OID:/' | #\ 74 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 78 for x in priv pub curve ; do 95 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb 143 -V 19990101:20110101 -z 1 rsa_1.pub [all...] |
/freebsd-10-stable/tools/tools/bus_autoconf/ |
H A D | bus_usb.c | 330 struct usb_blob *pub; local 345 pub = malloc(sizeof(*pub)); 346 if (pub == NULL) 349 memset(pub, 0, sizeof(*pub)); 351 usb_import_entry(&pub->temp, section, 354 TAILQ_INSERT_TAIL(&usb_blob_head, pub, entry); 365 struct usb_blob *pub; local 375 TAILQ_FOREACH(pub, [all...] |
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 145 krb5_data pub; local 156 ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length, 162 if (pub.length != size) 167 free(pub.data); 173 free(pub.data); 178 otherinfo.suppPubInfo = &pub; 184 free(pub.data);
|