/freebsd-10.3-release/usr.sbin/bsnmpd/modules/snmp_atm/ |
H A D | atm_sys.c | 74 return (&aif->pub); 79 atm_if2node(struct atmif *pub) argument 81 struct atmif_priv *aif = (struct atmif_priv *)pub; 95 free(aif->pub.mib); 114 ost = aif->pub.carrier; 124 aif->pub.carrier = ATMIF_CARRIER_ON; 126 aif->pub.carrier = ATMIF_CARRIER_OFF; 128 if (ost != aif->pub.carrier) 170 if ((aif->pub.mib = malloc(sizeof(*aif->pub [all...] |
/freebsd-10.3-release/crypto/openssh/regress/ |
H A D | keygen-convert.sh | 17 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \ 20 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \ 27 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub 28 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \ 31 rm -f $OBJ/$t-key $OBJ/$t-key.pub $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub \ 32 $OBJ/$t-rfc-imported $OBJ/$t-key-nocomment.pub
|
H A D | ssh-com-client.sh | 36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub 41 rm -f ${OBJ}/$t ${OBJ}/$t.pub 49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub 50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub 87 cp ${HK}.$key.pub ${HK}.pub 127 for i in ssh2_config random_seed dsa.pub dsa host.dsa \ 128 id.list id.com id.com.pub i [all...] |
H A D | hostkey-rotate.sh | 41 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub" 74 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old 80 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present" 92 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa-new.pub || fail "new key missing" 97 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old 98 mv $OBJ/hkr.ssh-rsa-new.pub $OBJ/hkr.ssh-rsa.pub 103 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub [all...] |
H A D | multipubkey.sh | 26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub 40 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub" 46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 56 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \ 63 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
|
H A D | brokenkeys.sh | 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | Makefile | 89 CLEANFILES= t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub copy.1 copy.2 \ 90 t8.out t8.out.pub t9.out t9.out.pub t10.out t10.out.pub \ 91 t12.out t12.out.pub \ 94 rsa.pub rsa rsa1.pub rsa1 host.rsa host.rsa1 \ 95 rsa-agent rsa-agent.pub rsa1-agent rsa1-agent.pub \ 107 data ed25519-agent ed25519-agent.pub ke [all...] |
H A D | cert-hostkey.sh | 39 cat $OBJ/host_ca_key.pub 47 cp $OBJ/host_ca_key.pub $OBJ/host_revoked_ca 55 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub \ 67 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 68 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 74 $OBJ/cert_host_key_${ktype}-cert.pub || \ 76 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert 108 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub 137 cat $OBJ/host_ca_key.pub 139 test -f "$OBJ/cert_host_key_${ktype}.pub" || fata [all...] |
H A D | ssh-com.sh | 45 PublicHostKeyFile ${SRC}/dsa_ssh2.pub 59 rm -f ${OBJ}/dsa ${OBJ}/dsa.pub 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 74 ${SSHKEYGEN} -if ${SRC}/dsa_ssh2.pub 117 sshd2_config dsa.pub dsa ssh_config_com; do
|
H A D | forcecommand.sh | 11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | ssh-com-keygen.sh | 31 COMPUB=${COMPRV}.pub 33 OPENSSHPUB=${OPENSSHPRV}.pub
|
H A D | cert-file.sh | 25 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub 29 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub 34 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER 45 opts3="$opts2 -oCertificateFile=$OBJ/cert_user_key1_2.pub" 54 opts3="$opts3 -oCertificateFile=$OBJ/cert_user_key1_1.pub" 62 opts3="$opts2 -oCertificateFile=$OBJ/cert_user_key1_1.pub" 70 opts3="$opts2 -oCertificateFile=$OBJ/cert_user_key1_2.pub" 71 opts3="$opts3 -oCertificateFile=$OBJ/cert_user_key1_1.pub" [all...] |
H A D | keygen-change.sh | 27 rm -f $OBJ/$t-key $OBJ/$t-key.pub
|
/freebsd-10.3-release/usr.sbin/ctm/mkCTM/ |
H A D | ctm_conf.gnats | 6 set CTMdest $CTMSW/../CTM-pub/$CTMname
|
/freebsd-10.3-release/contrib/ngatm/snmp_atm/ |
H A D | snmp_atm.c | 78 if (strcmp(aif->pub.ifp->name, name) == 0) 79 return (&aif->pub); 93 return (&aif->pub); 109 r0->func(&aif->pub, code, arg, r0->data); 164 enum atmif_carrier_state ost = aif->pub.carrier; 167 strcpy(ifmr.ifm_name, aif->pub.ifp->name); 170 aif->pub.carrier = ATMIF_CARRIER_UNKNOWN; 174 aif->pub.carrier = ATMIF_CARRIER_UNKNOWN; 178 aif->pub.carrier = ATMIF_CARRIER_ON; 180 aif->pub 593 atm_notify_aif(struct atmif *pub, const struct lmodule *mod, atmif_event_f func, void *arg) argument [all...] |
/freebsd-10.3-release/crypto/openssh/regress/unittests/hostkeys/ |
H A D | mktestdata.sh | 44 hentries "sisyphus.example.com" "*_5.pub" 45 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_6.pub" 53 hentries "sisyphus.example.com" "*_1.pub" 56 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_2.pub" 59 hentries "*.example.com,192.0.2.*,2001:*" "*_3.pub" 67 printf "@revoked sisyphus.example.com " ; cat rsa1_4.pub 68 printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub 69 printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub 70 printf "@cert-authority *.example.com " ; cat dsa_4.pub 75 printf "@what sisyphus.example.com " ; cat rsa1_1.pub [all...] |
/freebsd-10.3-release/usr.sbin/lpr/common_source/ |
H A D | ctlinfo.c | 69 struct cjobinfo pub; member in struct:cjprivate 238 if ((cpriv == NULL) || (cpriv != cpriv->pub.cji_priv)) { 244 FREESTR(cpriv->pub.cji_accthost); 245 FREESTR(cpriv->pub.cji_acctuser); 246 FREESTR(cpriv->pub.cji_class); 247 FREESTR(cpriv->pub.cji_curqueue); 248 /* [cpriv->pub.cji_fname is part of cpriv-malloced area] */ 249 FREESTR(cpriv->pub.cji_jobname); 250 FREESTR(cpriv->pub.cji_mailto); 251 FREESTR(cpriv->pub [all...] |
/freebsd-10.3-release/crypto/openssh/contrib/redhat/ |
H A D | sshd.init | 10 # config: /etc/ssh/ssh_host_key.pub 43 /sbin/restorecon /etc/ssh/ssh_host_key.pub 44 /sbin/restorecon /etc/ssh/ssh_host_rsa_key.pub 45 /sbin/restorecon /etc/ssh/ssh_host_dsa_key.pub 46 /sbin/restorecon /etc/ssh/ssh_host_ecdsa_key.pub
|
H A D | sshd.init.old | 10 # config: /etc/ssh/ssh_host_key.pub 69 chmod 644 $RSA1_KEY.pub 84 chmod 644 $RSA_KEY.pub 99 chmod 644 $DSA_KEY.pub
|
/freebsd-10.3-release/crypto/openssh/ |
H A D | authfile.c | 335 struct sshkey *pub = NULL; local 365 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) 367 if ((r = sshkey_try_load_public(pub, filename, commentp)) == 0) { 369 *keyp = pub; 372 sshkey_free(pub); 376 if ((pub = sshkey_new(KEY_RSA1)) == NULL) 378 if ((r = sshkey_try_load_public(pub, filename, commentp)) == 0) { 380 *keyp = pub; 383 sshkey_free(pub); 387 /* try .pub suffi 407 struct sshkey *pub = NULL; local 495 struct sshkey *pub = NULL; local [all...] |
H A D | kexc25519.c | 54 kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) argument 59 crypto_scalarmult_curve25519(pub, key, basepoint); 64 const u_char pub[CURVE25519_SIZE], struct sshbuf *out) 71 if (timingsafe_bcmp(pub, shared_key, CURVE25519_SIZE) == 0) 74 crypto_scalarmult_curve25519(shared_key, key, pub); 63 kexc25519_shared_key(const u_char key[CURVE25519_SIZE], const u_char pub[CURVE25519_SIZE], struct sshbuf *out) argument
|
/freebsd-10.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_pubkey.c | 343 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, 347 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval)) 350 if (pub->public_key->data) 351 OPENSSL_free(pub->public_key->data); 352 pub->public_key->data = penc; 353 pub->public_key->length = penclen; 355 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 356 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT; 363 X509_ALGOR **pa, X509_PUBKEY *pub) 366 *ppkalg = pub [all...] |
/freebsd-10.3-release/crypto/openssh/regress/unittests/sshkey/ |
H A D | mktestdata.sh | 49 awk '/^priv:$/,/^pub:/' | \ 52 awk '/^pub:/,/^P:/' | #\ 53 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 57 for x in priv pub g ; do 70 awk '/^priv:$/,/^pub:/' | \ 73 awk '/^pub:/,/^ASN1 OID:/' | #\ 74 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 78 for x in priv pub curve ; do 95 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb 143 -V 19990101:20110101 -z 1 rsa_1.pub [all...] |
/freebsd-10.3-release/tools/tools/bus_autoconf/ |
H A D | bus_usb.c | 330 struct usb_blob *pub; local 345 pub = malloc(sizeof(*pub)); 346 if (pub == NULL) 349 memset(pub, 0, sizeof(*pub)); 351 usb_import_entry(&pub->temp, section, 354 TAILQ_INSERT_TAIL(&usb_blob_head, pub, entry); 365 struct usb_blob *pub; local 375 TAILQ_FOREACH(pub, [all...] |
/freebsd-10.3-release/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 145 krb5_data pub; local 156 ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length, 162 if (pub.length != size) 167 free(pub.data); 173 free(pub.data); 178 otherinfo.suppPubInfo = &pub; 184 free(pub.data);
|