Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 25 of 73) sorted by relevance

123

/freebsd/tests/sys/geom/class/eli/
H A Dattach_test.sh17 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
19 atf_check geli init -B none -P -K keyfile ${md}
20 atf_check geli attach -d -p -k keyfile ${md}
54 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
56 atf_check geli init -B none -P -K keyfile ${md}
57 atf_check geli attach -d -p -k keyfile ${md}
60 atf_check -s not-exit:0 -e ignore -- geli attach -d -p -k keyfile ${md}
82 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
84 atf_check geli init -B none -P -K keyfile ${md}
85 atf_check geli attach -r -p -k keyfile ${md}
[all …]
H A Dinit_test.sh13 geli init -B none -e $ealgo -l $keylen -P -K keyfile \
15 atf_check geli attach -p -k keyfile ${md}
47 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
69 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
75 atf_check -s exit:0 -o ignore geli init -B none -P -K keyfile ${md}
82 atf_check -s exit:0 -o ignore geli init -P -K keyfile ${md}
87 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md}
89 atf_check -s exit:0 -o ignore geli attach -p -k keyfile ${md}
96 geli init -B backupfile -P -K keyfile ${md}
101 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md}
[all …]
H A Dintegrity_test.sh13 -K keyfile -s $secsize ${md}
14 atf_check geli attach -p -k keyfile ${md}
59 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
78 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
85 atf_check geli attach -p -k keyfile ${md}
105 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
122 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
129 atf_check geli attach -p -k keyfile ${md}
149 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
H A Dreentrancy_test.sh16 atf_check dd if=/dev/random of=keyfile bs=$secsize count=16 status=none
20 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
22 atf_check geli attach -p -k keyfile ${md}
25 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
27 atf_check geli attach -p -k keyfile ${md}.eli
H A Dkill_test.sh80 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
82 atf_check geli init -B none -P -K keyfile ${md}
84 atf_check geli attach -r -p -k keyfile ${md}
90 atf_check geli attach -p -k keyfile ${md}
H A Ddetach_test.sh17 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
19 atf_check geli init -B none -P -K keyfile ${md}
20 atf_check geli attach -p -k keyfile ${md}
/freebsd/crypto/heimdal/kdc/
H A Dkstash.c38 static char *keyfile; variable
51 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" },
87 if (keyfile == NULL) in main()
88 asprintf(&keyfile, "%s/m-key", hdb_db_dir(context)); in main()
94 ret = hdb_read_master_key(context, keyfile, &mkey); in main()
96 krb5_err(context, 1, ret, "reading master key from %s", keyfile); in main()
100 krb5_err(context, 1, ret, "reading master key from %s", keyfile); in main()
138 asprintf(&old, "%s.old", keyfile); in main()
139 asprintf(&new, "%s.new", keyfile); in main()
144 krb5_warnx(context, "writing key to `%s'", keyfile); in main()
[all …]
/freebsd/contrib/unbound/contrib/
H A Dupdate-anchor.sh56 keyfile="$2"
65 $ubhost -v $rh $filearg "$keyfile" -t DNSKEY "$zonename" >$tmpfile
68 echo "Error: Could not update zone $zonename anchor file $keyfile"
79 echo "Error: Could not update zone $zonename anchor file $keyfile"
122 diff $tmp2 $keyfile >/dev/null 2>&1
124 cat $tmp2 > $keyfile
126 echo "$zonename key file $keyfile updated."
128 echo "$zonename key file $keyfile unchanged."
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_props.ksh53 [[ -f $keyfile ]] && log_must rm $keyfile
59 typeset keyfile=/$TESTPOOL/pkey
66 log_must eval "echo 'password' > $keyfile"
72 -o keylocation=file://$keyfile $TESTPOOL/crypt
74 log_must zfs create -o keyformat=passphrase -o keylocation=file://$keyfile \
112 "-o keyformat=passphrase -o keylocation=file://$keyfile $TESTPOOL/recv"
126 "-o keylocation=file://$keyfile $ds < $sendfile"
130 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile"
150 "-o keylocation=file://$keyfile $ds < $sendfile"
154 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile"
[all …]
H A Dsend-wR_encrypted_zvol.ksh43 [[ -d $recvmnt ]] && log_must rm -rf $keyfile
44 [[ -d $mntpnt ]] && log_must rm -rf $keyfile
47 [[ -f $keyfile ]] && log_must rm $keyfile
54 typeset keyfile=/$TESTPOOL/pkey
63 log_must eval "echo 'password' > $keyfile"
66 -o keylocation=file://$keyfile -V 128M $TESTPOOL/$TESTVOL
H A Dsend_encrypted_truncated_files.ksh48 [[ -f $keyfile ]] && log_must rm $keyfile
61 typeset keyfile=/$TESTPOOL/pkey
66 log_must eval "echo 'password' > $keyfile"
68 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_encrypted_files.ksh52 [[ -f $keyfile ]] && log_must rm $keyfile
59 typeset keyfile=/$TESTPOOL/pkey
64 log_must eval "echo 'password' > $keyfile"
66 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_realloc_encrypted_files.ksh47 rm -f $keyfile
54 typeset keyfile=/$TESTPOOL/pkey
57 log_must eval "echo 'password' > $keyfile"
59 -o keylocation=file://$keyfile $POOL/fs
H A Drecv_dedup_encrypted_zvol.ksh36 rm $keyfile
42 typeset keyfile=/$TESTPOOL/pkey
49 log_must eval "echo 'password' > $keyfile"
H A Dsend_encrypted_freeobjects.ksh64 keyfile=/$POOL/keyencfods
68 log_must eval "echo 'password' > $keyfile"
75 -o keyformat=passphrase -o keylocation=file://$keyfile $POOL/$sendds
/freebsd/share/examples/uefisign/
H A Duefikeys19 keyfile="${1}.key"
28 [ ! -e "${keyfile}" ] || die "${keyfile} already exists"
32 openssl genrsa -out "${keyfile}" 2048 2> /dev/null || die "openssl genrsa failed"
33 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"…
36 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
/freebsd/sbin/decryptcore/
H A Ddecryptcore.c116 decrypt(int ofd, const char *privkeyfile, const char *keyfile, in decrypt() argument
132 PJDLOG_ASSERT(keyfile != NULL); in decrypt()
154 kfd = open(keyfile, O_RDONLY); in decrypt()
156 pjdlog_errno(LOG_ERR, "Unable to open %s", keyfile); in decrypt()
309 char core[PATH_MAX], encryptedcore[PATH_MAX], keyfile[PATH_MAX]; in main() local
326 *keyfile = '\0'; in main()
351 if (strlcpy(keyfile, optarg, sizeof(keyfile)) >= in main()
352 sizeof(keyfile)) { in main()
377 (*keyfile != '\0' || *encryptedcore != '\0' || *core != '\0')) { in main()
392 PJDLOG_VERIFY(snprintf(keyfile, sizeof(keyfile), in main()
[all …]
/freebsd/crypto/openssl/apps/
H A Dsmime.c146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
283 if (keyfile == NULL) in smime_main()
284 keyfile = signerfile; in smime_main()
288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
289 keyfile = NULL; in smime_main()
304 if (keyfile != NULL) { in smime_main()
318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
320 keyfile = opt_arg(); in smime_main()
385 if (keyfile && !signerfile) { in smime_main()
396 if (!keyfile) in smime_main()
[all …]
H A Dcms.c292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
581 if (keyfile == NULL) in cms_main()
582 keyfile = signerfile; in cms_main()
586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
587 keyfile = NULL; in cms_main()
596 if (keyfile != NULL) { in cms_main()
609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
611 keyfile = opt_arg(); in cms_main()
639 if (keyfile != NULL || signerfile != NULL) in cms_main()
743 if (keyfile != NULL && signerfile == NULL) { in cms_main()
[all …]
H A Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
107 keyfile = opt_arg(); in spkac_main()
145 if (keyfile != NULL) { in spkac_main()
149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
H A Ddgst.c104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
155 keyfile = opt_arg(); in dgst_main()
161 keyfile = opt_arg(); in dgst_main()
165 keyfile = opt_arg(); in dgst_main()
227 if (keyfile != NULL && argc > 1) { in dgst_main()
264 if (keyfile != NULL) in dgst_main()
274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
279 if (keyfile != NULL) { in dgst_main()
283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main()
285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
/freebsd/libexec/rc/rc.d/
H A Dsshd38 local keyfile
46 keyfile="/etc/ssh/ssh_host_${alg}_key"
53 if [ -f "${keyfile}" ] ; then
64 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N ""
65 /usr/bin/ssh-keygen -l -f "$keyfile.pub"
/freebsd/usr.bin/ssh-copy-id/
H A Dssh-copy-id.sh41 keyfile=$HOME/.ssh/authorized_keys ; \
45 if ! grep -sqwF "$key" "$keyfile"; then \
46 printf "$alg $key $comment\n" >> "$keyfile" ; \
50 /sbin/restorecon -F "$HOME/.ssh/" "$keyfile" >/dev/null 2>&1 || true ; \
/freebsd/contrib/libpcap/
H A Dsslutils.c55 void ssl_set_keyfile(const char *keyfile) in ssl_set_keyfile() argument
57 ssl_keyfile = keyfile; in ssl_set_keyfile()
91 char const *keyfile = ssl_keyfile[0] ? ssl_keyfile : "key.pem"; in ssl_init_once() local
92 if (1 != SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM)) in ssl_init_once()
94 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once()
/freebsd/crypto/openssl/demos/certs/
H A Dmkcerts.sh81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \
83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \
85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \
88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1
94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \

123