Searched refs:pub (Results 1 - 25 of 72) sorted by relevance

123

/freebsd-10-stable/usr.sbin/bsnmpd/modules/snmp_atm/
H A Datm_sys.c74 return (&aif->pub);
79 atm_if2node(struct atmif *pub) argument
81 struct atmif_priv *aif = (struct atmif_priv *)pub;
95 free(aif->pub.mib);
114 ost = aif->pub.carrier;
124 aif->pub.carrier = ATMIF_CARRIER_ON;
126 aif->pub.carrier = ATMIF_CARRIER_OFF;
128 if (ost != aif->pub.carrier)
170 if ((aif->pub.mib = malloc(sizeof(*aif->pub
[all...]
/freebsd-10-stable/crypto/openssh/regress/
H A Dkeygen-convert.sh17 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \
20 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \
27 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub
28 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \
31 rm -f $OBJ/$t-key $OBJ/$t-key.pub $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub \
32 $OBJ/$t-rfc-imported $OBJ/$t-key-nocomment.pub
H A Dcert-hostkey.sh53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
60 cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca
72 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub \
84 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
85 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
95 $OBJ/cert_host_key_${ktype}-cert.pub || \
97 cat $OBJ/cert_host_key_${ktype}-cert.pub >>
[all...]
H A Dssh-com-client.sh36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub
41 rm -f ${OBJ}/$t ${OBJ}/$t.pub
49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub
50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub
87 cp ${HK}.$key.pub ${HK}.pub
127 for i in ssh2_config random_seed dsa.pub dsa host.dsa \
128 id.list id.com id.com.pub i
[all...]
H A Dhostkey-rotate.sh41 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub"
74 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old
80 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present"
92 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa-new.pub || fail "new key missing"
97 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old
98 mv $OBJ/hkr.ssh-rsa-new.pub $OBJ/hkr.ssh-rsa.pub
103 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub
[all...]
H A Dmultipubkey.sh26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub
40 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
56 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \
63 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
H A Dbrokenkeys.sh15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A DMakefile95 ed25519-agent.pub empty.in expect failed-regress.log \
98 key.dsa-* key.ecdsa-* key.ed25519-512 key.ed25519-512.pub \
102 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa1 \
103 rsa1-agent rsa1-agent.pub rsa1.pub rsa_ssh2_cr.prv \
110 t10.out t10.out.pub t12.out t12.out.pub t2.out t3.out \
111 t6.out1 t6.out2 t7.out t7.out.pub t8.out t8.out.pub \
[all...]
H A Dssh-com.sh45 PublicHostKeyFile ${SRC}/dsa_ssh2.pub
59 rm -f ${OBJ}/dsa ${OBJ}/dsa.pub
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
74 ${SSHKEYGEN} -if ${SRC}/dsa_ssh2.pub
117 sshd2_config dsa.pub dsa ssh_config_com; do
H A Dssh-com-keygen.sh31 COMPUB=${COMPRV}.pub
33 OPENSSHPUB=${OPENSSHPRV}.pub
H A Dforcecommand.sh11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dkeygen-change.sh27 rm -f $OBJ/$t-key $OBJ/$t-key.pub
/freebsd-10-stable/usr.sbin/ctm/mkCTM/
H A Dctm_conf.gnats6 set CTMdest $CTMSW/../CTM-pub/$CTMname
/freebsd-10-stable/contrib/ngatm/snmp_atm/
H A Dsnmp_atm.c78 if (strcmp(aif->pub.ifp->name, name) == 0)
79 return (&aif->pub);
93 return (&aif->pub);
109 r0->func(&aif->pub, code, arg, r0->data);
164 enum atmif_carrier_state ost = aif->pub.carrier;
167 strcpy(ifmr.ifm_name, aif->pub.ifp->name);
170 aif->pub.carrier = ATMIF_CARRIER_UNKNOWN;
174 aif->pub.carrier = ATMIF_CARRIER_UNKNOWN;
178 aif->pub.carrier = ATMIF_CARRIER_ON;
180 aif->pub
593 atm_notify_aif(struct atmif *pub, const struct lmodule *mod, atmif_event_f func, void *arg) argument
[all...]
/freebsd-10-stable/crypto/openssh/regress/unittests/hostkeys/
H A Dmktestdata.sh44 hentries "sisyphus.example.com" "*_5.pub"
45 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_6.pub"
53 hentries "sisyphus.example.com" "*_1.pub"
56 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_2.pub"
59 hentries "*.example.com,192.0.2.*,2001:*" "*_3.pub"
67 printf "@revoked sisyphus.example.com " ; cat rsa1_4.pub
68 printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub
69 printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub
70 printf "@cert-authority *.example.com " ; cat dsa_4.pub
75 printf "@what sisyphus.example.com " ; cat rsa1_1.pub
[all...]
/freebsd-10-stable/usr.sbin/lpr/common_source/
H A Dctlinfo.c69 struct cjobinfo pub; member in struct:cjprivate
238 if ((cpriv == NULL) || (cpriv != cpriv->pub.cji_priv)) {
244 FREESTR(cpriv->pub.cji_accthost);
245 FREESTR(cpriv->pub.cji_acctuser);
246 FREESTR(cpriv->pub.cji_class);
247 FREESTR(cpriv->pub.cji_curqueue);
248 /* [cpriv->pub.cji_fname is part of cpriv-malloced area] */
249 FREESTR(cpriv->pub.cji_jobname);
250 FREESTR(cpriv->pub.cji_mailto);
251 FREESTR(cpriv->pub
[all...]
/freebsd-10-stable/crypto/openssh/contrib/redhat/
H A Dsshd.init10 # config: /etc/ssh/ssh_host_key.pub
43 /sbin/restorecon /etc/ssh/ssh_host_key.pub
44 /sbin/restorecon /etc/ssh/ssh_host_rsa_key.pub
45 /sbin/restorecon /etc/ssh/ssh_host_dsa_key.pub
46 /sbin/restorecon /etc/ssh/ssh_host_ecdsa_key.pub
/freebsd-10-stable/sys/geom/uzip/
H A Dg_uzip_lzma.c44 struct g_uzip_dapi pub; member in struct:g_uzip_lzma
112 lzp->pub.max_blen = LZ4_compressBound(blksz);
113 lzp->pub.decompress = &g_uzip_lzma_decompress;
114 lzp->pub.free = &g_uzip_lzma_free;
115 lzp->pub.rewind = &g_uzip_lzma_nop;
116 lzp->pub.pvt = lzp;
117 return (&lzp->pub);
H A Dg_uzip_zlib.c44 struct g_uzip_dapi pub; member in struct:g_uzip_zlib
119 zp->pub.max_blen = z_compressBound(blksz);
120 zp->pub.decompress = &g_uzip_zlib_decompress;
121 zp->pub.free = &g_uzip_zlib_free;
122 zp->pub.rewind = &g_uzip_zlib_rewind;
123 zp->pub.pvt = (void *)zp;
124 return (&zp->pub);
/freebsd-10-stable/crypto/openssh/
H A Dauthfile.c340 struct sshkey *pub = NULL; local
370 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL)
372 if ((r = sshkey_try_load_public(pub, filename, commentp)) == 0) {
374 *keyp = pub;
377 sshkey_free(pub);
381 if ((pub = sshkey_new(KEY_RSA1)) == NULL)
383 if ((r = sshkey_try_load_public(pub, filename, commentp)) == 0) {
385 *keyp = pub;
388 sshkey_free(pub);
392 /* try .pub suffi
412 struct sshkey *pub = NULL; local
505 struct sshkey *pub = NULL; local
[all...]
H A Dkexc25519.c54 kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) argument
59 crypto_scalarmult_curve25519(pub, key, basepoint);
64 const u_char pub[CURVE25519_SIZE], struct sshbuf *out)
71 if (timingsafe_bcmp(pub, shared_key, CURVE25519_SIZE) == 0)
74 crypto_scalarmult_curve25519(shared_key, key, pub);
63 kexc25519_shared_key(const u_char key[CURVE25519_SIZE], const u_char pub[CURVE25519_SIZE], struct sshbuf *out) argument
/freebsd-10-stable/crypto/openssl/crypto/asn1/
H A Dx_pubkey.c343 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj,
347 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval))
350 if (pub->public_key->data)
351 OPENSSL_free(pub->public_key->data);
352 pub->public_key->data = penc;
353 pub->public_key->length = penclen;
355 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
356 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT;
363 X509_ALGOR **pa, X509_PUBKEY *pub)
366 *ppkalg = pub
[all...]
/freebsd-10-stable/crypto/openssh/regress/unittests/sshkey/
H A Dmktestdata.sh49 awk '/^priv:$/,/^pub:/' | \
52 awk '/^pub:/,/^P:/' | #\
53 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub
57 for x in priv pub g ; do
70 awk '/^priv:$/,/^pub:/' | \
73 awk '/^pub:/,/^ASN1 OID:/' | #\
74 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub
78 for x in priv pub curve ; do
95 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb
143 -V 19990101:20110101 -z 1 rsa_1.pub
[all...]
/freebsd-10-stable/tools/tools/bus_autoconf/
H A Dbus_usb.c330 struct usb_blob *pub; local
345 pub = malloc(sizeof(*pub));
346 if (pub == NULL)
349 memset(pub, 0, sizeof(*pub));
351 usb_import_entry(&pub->temp, section,
354 TAILQ_INSERT_TAIL(&usb_blob_head, pub, entry);
365 struct usb_blob *pub; local
375 TAILQ_FOREACH(pub,
[all...]
/freebsd-10-stable/crypto/heimdal/lib/krb5/
H A Dcrypto-pk.c145 krb5_data pub; local
156 ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length,
162 if (pub.length != size)
167 free(pub.data);
173 free(pub.data);
178 otherinfo.suppPubInfo = &pub;
184 free(pub.data);

Completed in 210 milliseconds

123