| /freebsd/tests/sys/geom/class/eli/ |
| H A D | attach_test.sh | 17 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 19 atf_check geli init -B none -P -K keyfile ${md} 20 atf_check geli attach -d -p -k keyfile ${md} 54 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 56 atf_check geli init -B none -P -K keyfile ${md} 57 atf_check geli attach -d -p -k keyfile ${md} 60 atf_check -s not-exit:0 -e ignore -- geli attach -d -p -k keyfile ${md} 82 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 84 atf_check geli init -B none -P -K keyfile ${md} 85 atf_check geli attach -r -p -k keyfile ${md} [all …]
|
| H A D | init_test.sh | 13 geli init -B none -e $ealgo -l $keylen -P -K keyfile \ 15 atf_check geli attach -p -k keyfile ${md} 47 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 69 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 75 atf_check -s exit:0 -o ignore geli init -B none -P -K keyfile ${md} 82 atf_check -s exit:0 -o ignore geli init -P -K keyfile ${md} 87 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md} 89 atf_check -s exit:0 -o ignore geli attach -p -k keyfile ${md} 96 geli init -B backupfile -P -K keyfile ${md} 101 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md} [all …]
|
| H A D | integrity_test.sh | 13 -K keyfile -s $secsize ${md} 14 atf_check geli attach -p -k keyfile ${md} 59 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 78 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \ 85 atf_check geli attach -p -k keyfile ${md} 105 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 122 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \ 129 atf_check geli attach -p -k keyfile ${md} 149 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
|
| H A D | reentrancy_test.sh | 16 atf_check dd if=/dev/random of=keyfile bs=$secsize count=16 status=none 20 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \ 22 atf_check geli attach -p -k keyfile ${md} 25 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \ 27 atf_check geli attach -p -k keyfile ${md}.eli
|
| H A D | kill_test.sh | 80 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 82 atf_check geli init -B none -P -K keyfile ${md} 84 atf_check geli attach -r -p -k keyfile ${md} 90 atf_check geli attach -p -k keyfile ${md}
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | kstash.c | 38 static char *keyfile; variable 51 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" }, 87 if (keyfile == NULL) in main() 88 asprintf(&keyfile, "%s/m-key", hdb_db_dir(context)); in main() 94 ret = hdb_read_master_key(context, keyfile, &mkey); in main() 96 krb5_err(context, 1, ret, "reading master key from %s", keyfile); in main() 100 krb5_err(context, 1, ret, "reading master key from %s", keyfile); in main() 138 asprintf(&old, "%s.old", keyfile); in main() 139 asprintf(&new, "%s.new", keyfile); in main() 144 krb5_warnx(context, "writing key to `%s'", keyfile); in main() [all …]
|
| /freebsd/crypto/krb5/src/lib/kdb/ |
| H A D | kdb_default.c | 112 char *keyfile, in krb5_def_store_mkey_list() argument 126 if (!keyfile) { in krb5_def_store_mkey_list() 129 keyfile = defkeyfile; in krb5_def_store_mkey_list() 132 if ((statrc = stat(keyfile, &stb)) >= 0) { in krb5_def_store_mkey_list() 138 keyfile, error_message(retval)); in krb5_def_store_mkey_list() 147 retval = asprintf(&tmp_ktname, "FILE:%s_tmp", keyfile); in krb5_def_store_mkey_list() 200 if (rename(tmp_ktpath, keyfile) < 0) { in krb5_def_store_mkey_list() 204 tmp_ktpath, keyfile, error_message(errno)); in krb5_def_store_mkey_list() 217 const char *keyfile, in krb5_db_def_fetch_mkey_stash() argument 226 if (!(kf = fopen(keyfile, "rb"))) in krb5_db_def_fetch_mkey_stash() [all …]
|
| /freebsd/contrib/unbound/contrib/ |
| H A D | update-anchor.sh | 56 keyfile="$2" 65 $ubhost -v $rh $filearg "$keyfile" -t DNSKEY "$zonename" >$tmpfile 68 echo "Error: Could not update zone $zonename anchor file $keyfile" 79 echo "Error: Could not update zone $zonename anchor file $keyfile" 122 diff $tmp2 $keyfile >/dev/null 2>&1 124 cat $tmp2 > $keyfile 126 echo "$zonename key file $keyfile updated." 128 echo "$zonename key file $keyfile unchanged."
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
| H A D | send_encrypted_props.ksh | 54 [[ -f $keyfile ]] && log_must rm $keyfile 60 typeset keyfile=/$TESTPOOL/pkey 67 log_must eval "echo 'password' > $keyfile" 73 -o keylocation=file://$keyfile $TESTPOOL/crypt 75 log_must zfs create -o keyformat=passphrase -o keylocation=file://$keyfile \ 113 "-o keyformat=passphrase -o keylocation=file://$keyfile $TESTPOOL/recv" 127 "-o keylocation=file://$keyfile $ds < $sendfile" 131 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile" 151 "-o keylocation=file://$keyfile $ds < $sendfile" 155 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile" [all …]
|
| H A D | send-wR_encrypted_zvol.ksh | 44 [[ -d $recvmnt ]] && log_must rm -rf $keyfile 45 [[ -d $mntpnt ]] && log_must rm -rf $keyfile 48 [[ -f $keyfile ]] && log_must rm $keyfile 55 typeset keyfile=/$TESTPOOL/pkey 64 log_must eval "echo 'password' > $keyfile" 67 -o keylocation=file://$keyfile -V 128M $TESTPOOL/$TESTVOL
|
| H A D | send_leak_keymaps.ksh | 47 [[ -f $keyfile ]] && log_must rm $keyfile 53 typeset keyfile=/$TESTPOOL/pkey 56 log_must eval "echo 'password' > $keyfile" 58 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
|
| H A D | send_encrypted_truncated_files.ksh | 49 [[ -f $keyfile ]] && log_must rm $keyfile 62 typeset keyfile=/$TESTPOOL/pkey 67 log_must eval "echo 'password' > $keyfile" 69 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
|
| H A D | send_encrypted_files.ksh | 53 [[ -f $keyfile ]] && log_must rm $keyfile 60 typeset keyfile=/$TESTPOOL/pkey 65 log_must eval "echo 'password' > $keyfile" 67 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
|
| H A D | send_realloc_encrypted_files.ksh | 48 rm -f $keyfile 55 typeset keyfile=/$TESTPOOL/pkey 58 log_must eval "echo 'password' > $keyfile" 60 -o keylocation=file://$keyfile $POOL/fs
|
| H A D | recv_dedup_encrypted_zvol.ksh | 37 rm $keyfile 43 typeset keyfile=/$TESTPOOL/pkey 50 log_must eval "echo 'password' > $keyfile"
|
| /freebsd/share/examples/uefisign/ |
| H A D | uefikeys | 19 keyfile="${1}.key" 28 [ ! -e "${keyfile}" ] || die "${keyfile} already exists" 32 openssl genrsa -out "${keyfile}" 2048 2> /dev/null || die "openssl genrsa failed" 33 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"… 36 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
|
| /freebsd/sbin/decryptcore/ |
| H A D | decryptcore.c | 116 decrypt(int ofd, const char *privkeyfile, const char *keyfile, in decrypt() argument 132 PJDLOG_ASSERT(keyfile != NULL); in decrypt() 154 kfd = open(keyfile, O_RDONLY); in decrypt() 156 pjdlog_errno(LOG_ERR, "Unable to open %s", keyfile); in decrypt() 309 char core[PATH_MAX], encryptedcore[PATH_MAX], keyfile[PATH_MAX]; in main() local 326 *keyfile = '\0'; in main() 351 if (strlcpy(keyfile, optarg, sizeof(keyfile)) >= in main() 352 sizeof(keyfile)) { in main() 377 (*keyfile != '\0' || *encryptedcore != '\0' || *core != '\0')) { in main() 392 PJDLOG_VERIFY(snprintf(keyfile, sizeof(keyfile), in main() [all …]
|
| /freebsd/crypto/openssl/apps/ |
| H A D | smime.c | 209 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 353 if (keyfile == NULL) in smime_main() 354 keyfile = signerfile; in smime_main() 358 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in smime_main() 360 keyfile = NULL; in smime_main() 375 if (keyfile != NULL) { in smime_main() 390 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in smime_main() 393 keyfile = opt_arg(); in smime_main() 456 if (keyfile && !signerfile) { in smime_main() 468 if (!keyfile) in smime_main() [all …]
|
| H A D | spkac.c | 76 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 117 keyfile = opt_arg(); in spkac_main() 154 if (keyfile != NULL) { in spkac_main() 158 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
| H A D | cms.c | 359 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 661 if (keyfile == NULL) in cms_main() 662 keyfile = signerfile; in cms_main() 666 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in cms_main() 668 keyfile = NULL; in cms_main() 677 if (keyfile != NULL) { in cms_main() 691 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in cms_main() 694 keyfile = opt_arg(); in cms_main() 722 if (keyfile != NULL || signerfile != NULL) in cms_main() 824 if (keyfile != NULL && signerfile == NULL) { in cms_main() [all …]
|
| /freebsd/libexec/rc/rc.d/ |
| H A D | sshd | 37 local keyfile 45 keyfile="/etc/ssh/ssh_host_${alg}_key" 52 if [ -f "${keyfile}" ] ; then 63 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N "" 64 /usr/bin/ssh-keygen -l -f "$keyfile.pub"
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zdb/ |
| H A D | zdb_encrypted_raw.ksh | 40 keyfile="$TEST_BASE_DIR/keyfile" 45 rm -f "$keyfile" 56 echo -n "$RAWKEY" > "$keyfile" 59 -o encryption=on -o keyformat=raw -o keylocation="file://$keyfile" \ 73 log_must eval "zdb -K $keyfile -dddd $dataset $obj | grep -q 'size\s$size$'"
|
| /freebsd/usr.bin/ssh-copy-id/ |
| H A D | ssh-copy-id.sh | 41 keyfile=$HOME/.ssh/authorized_keys ; \ 45 if ! grep -sqwF "$key" "$keyfile"; then \ 46 printf "$alg $key $comment\n" >> "$keyfile" ; \ 50 /sbin/restorecon -F "$HOME/.ssh/" "$keyfile" >/dev/null 2>&1 || true ; \
|
| /freebsd/crypto/krb5/src/kadmin/dbutil/ |
| H A D | kdb5_stash.c | 72 char *keyfile = 0; in kdb5_stash() local 75 keyfile = global_params.stash_file; in kdb5_stash() 81 keyfile = optarg; in kdb5_stash() 128 retval = krb5_db_store_master_key_list(util_context, keyfile, master_princ, in kdb5_stash()
|
| /freebsd/contrib/libpcap/ |
| H A D | sslutils.c | 55 void ssl_set_keyfile(const char *keyfile) in ssl_set_keyfile() argument 57 ssl_keyfile = keyfile; in ssl_set_keyfile() 91 char const *keyfile = ssl_keyfile[0] ? ssl_keyfile : "key.pem"; in ssl_init_once() local 92 if (1 != SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM)) in ssl_init_once() 94 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once()
|