Searched refs:pub (Results 1 - 25 of 86) sorted by relevance

1234

/openbsd-current/regress/usr.bin/ssh/
H A Dagent-pkcs11-cert.sh18 $SSHKEYGEN -qs $OBJ/ca -I "ecdsa_key" -n $USER -z 1 ${SSH_SOFTHSM_DIR}/EC.pub ||
20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub ||
22 $SSHKEYGEN -qs $OBJ/ca -I "ca_ca" -n $USER -z 3 $OBJ/ca.pub ||
44 $OBJ/ca.pub \
45 ${SSH_SOFTHSM_DIR}/EC.pub \
46 ${SSH_SOFTHSM_DIR}/EC-cert.pub \
47 ${SSH_SOFTHSM_DIR}/RSA.pub \
48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub ||
52 ${SSH_SOFTHSM_DIR}/EC.pub \
53 ${SSH_SOFTHSM_DIR}/RSA.pub \
[all...]
H A Dkeygen-sshfp.sh7 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \
12 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \
20 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | wc -l`
27 fp=`${SSHKEYGEN} -Ohashalg=sha1 -r test -f ${SRC}/ed25519_openssh.pub`
33 fp=`${SSHKEYGEN} -Ohashalg=sha256 -r test -f ${SRC}/ed25519_openssh.pub`
39 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="1"{print $6}'`
43 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="2"{print $6}'`
H A Dkeygen-convert.sh28 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \
31 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \
38 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub
39 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \
49 ${SSHKEYGEN} -y -f $OBJ/$t-key >$OBJ/$t-key-nocomment.pub
50 cmp $OBJ/$t-key.pub $OBJ/$t-key-nocomment.pub || \
53 rm -f $OBJ/$t-key $OBJ/$t-key.pub
[all...]
H A Dagent-pkcs11.sh30 pub=$(cat $k.pub)
31 ${SSHADD} -L | grep -q "$pub" || \
33 ${SSHADD} -T $k.pub || fail "ssh-add -T with $k failed"
36 cat $k.pub > $OBJ/authorized_keys_$USER
H A Dcert-hostkey.sh64 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
71 cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca
83 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub \
95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
106 $OBJ/cert_host_key_${ktype}-cert.pub || \
108 cat $OBJ/cert_host_key_${ktype}-cert.pub >>
[all...]
H A Dssh-com-client.sh36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub
41 rm -f ${OBJ}/$t ${OBJ}/$t.pub
49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub
50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub
87 cp ${HK}.$key.pub ${HK}.pub
127 for i in ssh2_config random_seed dsa.pub dsa host.dsa \
128 id.list id.com id.com.pub i
[all...]
H A Dmultipubkey.sh26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub
38 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
64 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \
72 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
H A Dbrokenkeys.sh15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dcert-file.sh32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub
36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub
40 rm $OBJ/user_key3.pub # to test use of private key w/o public half.
44 rm $OBJ/user_key4 $OBJ/user_key4.pub # to test no matching pub/private key case.
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
57 # Key with no .pub should work - finding the equivalent *-cert.pub
[all...]
H A Dagent.sh29 rm -f $OBJ/user_ca_key $OBJ/user_ca_key.pub
38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub*
43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed"
46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER
60 cp -f $OBJ/$t-agent.pub $OBJ/$t-agent-private.pub
61 cp -f $OBJ/$t-agent-cert.pub $OBJ/$t-agent-private-cert.pub
93 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \
143 (printf 'cert-authority,principals="estragon" '; cat $OBJ/user_ca_key.pub) \
[all...]
H A Dssh-com.sh45 PublicHostKeyFile ${SRC}/dsa_ssh2.pub
59 rm -f ${OBJ}/dsa ${OBJ}/dsa.pub
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
74 ${SSHKEYGEN} -if ${SRC}/dsa_ssh2.pub
117 sshd2_config dsa.pub dsa ssh_config_com; do
H A Dhostkey-agent.sh24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \
42 cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts
62 echo "Hostkey $OBJ/agent-key.${k}.pub" >> $OBJ/sshd_proxy
63 echo "HostCertificate $OBJ/agent-key.${k}-cert.pub" >> $OBJ/sshd_proxy
64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key"
65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert"
71 cat $OBJ/agent-ca.pub) > $OBJ/known_hosts
H A DMakefile121 ed25519-agent.pub empty.in expect failed-regress.log \
126 key.dsa-* key.ecdsa-* key.ed25519-512 key.ed25519-512.pub \
130 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \
139 t10.out t10.out.pub t12.out t12.out.pub t2.out t3.out \
140 t6.out1 t6.out2 t7.out t7.out.pub t8.out t8.out.pub \
141 t9.out t9.out.pub \
157 ssh-keygen -yf t2.out | diff - ${.CURDIR}/rsa_openssh.pub
[all...]
H A Dprincipals-command.sh29 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'`
30 CA_BODY=`cat $OBJ/user_ca_key.pub | awk '{ print $2 }'`
31 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'`
32 CA_FP=`${SSHKEYGEN} -lf $OBJ/user_ca_key.pub | awk '{ print $2 }'`
64 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
138 cat $OBJ/user_ca_key.pub
150 cat $OBJ/user_ca_key.pub
H A Dssh-com-keygen.sh31 COMPUB=${COMPRV}.pub
33 OPENSSHPUB=${OPENSSHPRV}.pub
H A Dhostkey-rotate.sh54 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub"
94 mv $OBJ/hkr.${secondary}.pub $OBJ/hkr.${secondary}.pub.old
101 check_key_present ${secondary} $OBJ/hkr.${secondary}.pub.old && \
115 check_key_present ${primary} $OBJ/hkr.${primary}-new.pub || fail "new key missing"
120 mv $OBJ/hkr.${primary}.pub $OBJ/hkr.${primary}.pub.old
121 mv $OBJ/hkr.${primary}-new.pub $OBJ/hkr.${primary}.pub
126 check_key_present ${primary} $OBJ/hkr.${primary}.pub
[all...]
H A Dkeygen-change.sh21 rm -f $OBJ/$t-key $OBJ/$t-key.pub
/openbsd-current/gnu/usr.bin/gcc/gcc/testsuite/g++.dg/other/
H A Daccess1.C19 void pub();
26 void Outer::pub() { i = new Inner(Foo::m); } function in class:Outer
/openbsd-current/gnu/usr.bin/gcc/gcc/testsuite/g++.old-deja/g++.pt/
H A Dcrash18.C11 template<class U> int pub (U u) { function in class:foo
22 return fff.pub (3);
/openbsd-current/regress/usr.bin/ssh/unittests/hostkeys/
H A Dmktestdata.sh43 hentries "sisyphus.example.com" "*_5.pub"
44 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_6.pub"
52 hentries "sisyphus.example.com" "*_1.pub"
55 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_2.pub"
58 hentries "*.example.com,192.0.2.*,2001:*" "*_3.pub"
66 printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub
67 printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub
68 printf "@cert-authority *.example.com " ; cat dsa_4.pub
73 printf "@what sisyphus.example.com " ; cat dsa_1.pub
/openbsd-current/regress/usr.bin/ssh/unittests/authopt/testdata/
H A Dmktestdata.sh5 rm -f ca_key ca_key.pub
6 rm -f user_key user_key.pub
17 -V 19990101:19991231 -z 1 "$@" user_key.pub
18 mv user_key-cert.pub "$output"
48 rm -f user_key ca_key user_key.pub ca_key.pub
/openbsd-current/sys/crypto/
H A Dcurve25519.h27 int curve25519_generate_public(uint8_t pub[CURVE25519_KEY_SIZE],
/openbsd-current/regress/usr.bin/ssh/unittests/sshkey/
H A Dmktestdata.sh32 awk '/^priv:$/,/^pub:/' | \
35 awk '/^pub:/,/^P:/' | #\
36 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub
40 for x in priv pub g ; do
53 awk '/^priv:$/,/^pub:/' | \
56 awk '/^pub:/,/^ASN1 OID:/' | #\
57 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub
61 for x in priv pub curve ; do
87 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb
146 -V 19990101:20110101 -z 1 rsa_1.pub
[all...]
/openbsd-current/usr.bin/ssh/
H A Dkexc25519.c48 kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) argument
53 crypto_scalarmult_curve25519(pub, key, basepoint);
58 const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int raw)
64 crypto_scalarmult_curve25519(shared_key, key, pub);
84 const u_char pub[CURVE25519_SIZE], struct sshbuf *out)
86 return kexc25519_shared_key_ext(key, pub, out, 0);
133 /* allocate space for encrypted KEM key and ECDH pub key */
57 kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE], const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int raw) argument
83 kexc25519_shared_key(const u_char key[CURVE25519_SIZE], const u_char pub[CURVE25519_SIZE], struct sshbuf *out) argument
/openbsd-current/regress/usr.sbin/arp/
H A DMakefile33 # Two entries to the same destination are ok if one is "pub"
38 ${ARP} -s 192.0.2.42 ${PUB_MAC} pub
42 # Insert the "pub" entry first, it should not matter
46 ${ARP} -s 192.0.2.42 ${PUB_MAC} pub
51 # Not specifying "pub" should generate an error
60 # Not specifying "pub" works only if "-F" is specified
77 # Tryin to add two "pub" entries should generate and error
82 ${ARP} -s 192.0.2.42 ${PUB_MAC} pub
83 ${ARP} -s 192.0.2.42 ${OTHER_MAC} pub && exit 1 || exit 0

Completed in 272 milliseconds

1234