Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 25 of 93) sorted by relevance

1234

/freebsd/tests/sys/geom/class/eli/
H A Dattach_test.sh17 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
19 atf_check geli init -B none -P -K keyfile ${md}
20 atf_check geli attach -d -p -k keyfile ${md}
54 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
56 atf_check geli init -B none -P -K keyfile ${md}
57 atf_check geli attach -d -p -k keyfile ${md}
60 atf_check -s not-exit:0 -e ignore -- geli attach -d -p -k keyfile ${md}
82 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
84 atf_check geli init -B none -P -K keyfile ${md}
85 atf_check geli attach -r -p -k keyfile ${md}
[all …]
H A Dinit_test.sh13 geli init -B none -e $ealgo -l $keylen -P -K keyfile \
15 atf_check geli attach -p -k keyfile ${md}
47 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
69 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
75 atf_check -s exit:0 -o ignore geli init -B none -P -K keyfile ${md}
82 atf_check -s exit:0 -o ignore geli init -P -K keyfile ${md}
87 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md}
89 atf_check -s exit:0 -o ignore geli attach -p -k keyfile ${md}
96 geli init -B backupfile -P -K keyfile ${md}
101 atf_check -s not-exit:0 -e ignore geli attach -p -k keyfile ${md}
[all …]
H A Dintegrity_test.sh13 -K keyfile -s $secsize ${md}
14 atf_check geli attach -p -k keyfile ${md}
59 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
78 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
85 atf_check geli attach -p -k keyfile ${md}
105 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
122 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
129 atf_check geli attach -p -k keyfile ${md}
149 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
H A Dreentrancy_test.sh16 atf_check dd if=/dev/random of=keyfile bs=$secsize count=16 status=none
20 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
22 atf_check geli attach -p -k keyfile ${md}
25 geli init -B none -a $aalgo -e $ealgo -l $keylen -P -K keyfile \
27 atf_check geli attach -p -k keyfile ${md}.eli
H A Dkill_test.sh80 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
82 atf_check geli init -B none -P -K keyfile ${md}
84 atf_check geli attach -r -p -k keyfile ${md}
90 atf_check geli attach -p -k keyfile ${md}
/freebsd/crypto/heimdal/kdc/
H A Dkstash.c38 static char *keyfile; variable
51 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" },
87 if (keyfile == NULL) in main()
88 asprintf(&keyfile, "%s/m-key", hdb_db_dir(context)); in main()
94 ret = hdb_read_master_key(context, keyfile, &mkey); in main()
96 krb5_err(context, 1, ret, "reading master key from %s", keyfile); in main()
100 krb5_err(context, 1, ret, "reading master key from %s", keyfile); in main()
138 asprintf(&old, "%s.old", keyfile); in main()
139 asprintf(&new, "%s.new", keyfile); in main()
144 krb5_warnx(context, "writing key to `%s'", keyfile); in main()
[all …]
/freebsd/crypto/krb5/src/lib/kdb/
H A Dkdb_default.c112 char *keyfile, in krb5_def_store_mkey_list() argument
126 if (!keyfile) { in krb5_def_store_mkey_list()
129 keyfile = defkeyfile; in krb5_def_store_mkey_list()
132 if ((statrc = stat(keyfile, &stb)) >= 0) { in krb5_def_store_mkey_list()
138 keyfile, error_message(retval)); in krb5_def_store_mkey_list()
147 retval = asprintf(&tmp_ktname, "FILE:%s_tmp", keyfile); in krb5_def_store_mkey_list()
200 if (rename(tmp_ktpath, keyfile) < 0) { in krb5_def_store_mkey_list()
204 tmp_ktpath, keyfile, error_message(errno)); in krb5_def_store_mkey_list()
217 const char *keyfile, in krb5_db_def_fetch_mkey_stash() argument
226 if (!(kf = fopen(keyfile, "rb"))) in krb5_db_def_fetch_mkey_stash()
[all …]
/freebsd/contrib/unbound/contrib/
H A Dupdate-anchor.sh56 keyfile="$2"
65 $ubhost -v $rh $filearg "$keyfile" -t DNSKEY "$zonename" >$tmpfile
68 echo "Error: Could not update zone $zonename anchor file $keyfile"
79 echo "Error: Could not update zone $zonename anchor file $keyfile"
122 diff $tmp2 $keyfile >/dev/null 2>&1
124 cat $tmp2 > $keyfile
126 echo "$zonename key file $keyfile updated."
128 echo "$zonename key file $keyfile unchanged."
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_props.ksh54 [[ -f $keyfile ]] && log_must rm $keyfile
60 typeset keyfile=/$TESTPOOL/pkey
67 log_must eval "echo 'password' > $keyfile"
73 -o keylocation=file://$keyfile $TESTPOOL/crypt
75 log_must zfs create -o keyformat=passphrase -o keylocation=file://$keyfile \
113 "-o keyformat=passphrase -o keylocation=file://$keyfile $TESTPOOL/recv"
127 "-o keylocation=file://$keyfile $ds < $sendfile"
131 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile"
151 "-o keylocation=file://$keyfile $ds < $sendfile"
155 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile"
[all …]
H A Dsend-wR_encrypted_zvol.ksh44 [[ -d $recvmnt ]] && log_must rm -rf $keyfile
45 [[ -d $mntpnt ]] && log_must rm -rf $keyfile
48 [[ -f $keyfile ]] && log_must rm $keyfile
55 typeset keyfile=/$TESTPOOL/pkey
64 log_must eval "echo 'password' > $keyfile"
67 -o keylocation=file://$keyfile -V 128M $TESTPOOL/$TESTVOL
H A Dsend_leak_keymaps.ksh47 [[ -f $keyfile ]] && log_must rm $keyfile
53 typeset keyfile=/$TESTPOOL/pkey
56 log_must eval "echo 'password' > $keyfile"
58 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_encrypted_truncated_files.ksh49 [[ -f $keyfile ]] && log_must rm $keyfile
62 typeset keyfile=/$TESTPOOL/pkey
67 log_must eval "echo 'password' > $keyfile"
69 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_encrypted_files.ksh53 [[ -f $keyfile ]] && log_must rm $keyfile
60 typeset keyfile=/$TESTPOOL/pkey
65 log_must eval "echo 'password' > $keyfile"
67 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_realloc_encrypted_files.ksh48 rm -f $keyfile
55 typeset keyfile=/$TESTPOOL/pkey
58 log_must eval "echo 'password' > $keyfile"
60 -o keylocation=file://$keyfile $POOL/fs
H A Drecv_dedup_encrypted_zvol.ksh37 rm $keyfile
43 typeset keyfile=/$TESTPOOL/pkey
50 log_must eval "echo 'password' > $keyfile"
/freebsd/share/examples/uefisign/
H A Duefikeys19 keyfile="${1}.key"
28 [ ! -e "${keyfile}" ] || die "${keyfile} already exists"
32 openssl genrsa -out "${keyfile}" 2048 2> /dev/null || die "openssl genrsa failed"
33 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"…
36 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
/freebsd/sbin/decryptcore/
H A Ddecryptcore.c116 decrypt(int ofd, const char *privkeyfile, const char *keyfile, in decrypt() argument
132 PJDLOG_ASSERT(keyfile != NULL); in decrypt()
154 kfd = open(keyfile, O_RDONLY); in decrypt()
156 pjdlog_errno(LOG_ERR, "Unable to open %s", keyfile); in decrypt()
309 char core[PATH_MAX], encryptedcore[PATH_MAX], keyfile[PATH_MAX]; in main() local
326 *keyfile = '\0'; in main()
351 if (strlcpy(keyfile, optarg, sizeof(keyfile)) >= in main()
352 sizeof(keyfile)) { in main()
377 (*keyfile != '\0' || *encryptedcore != '\0' || *core != '\0')) { in main()
392 PJDLOG_VERIFY(snprintf(keyfile, sizeof(keyfile), in main()
[all …]
/freebsd/crypto/openssl/apps/
H A Dsmime.c209 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
353 if (keyfile == NULL) in smime_main()
354 keyfile = signerfile; in smime_main()
358 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in smime_main()
360 keyfile = NULL; in smime_main()
375 if (keyfile != NULL) { in smime_main()
390 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in smime_main()
393 keyfile = opt_arg(); in smime_main()
456 if (keyfile && !signerfile) { in smime_main()
468 if (!keyfile) in smime_main()
[all …]
H A Dspkac.c76 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
117 keyfile = opt_arg(); in spkac_main()
154 if (keyfile != NULL) { in spkac_main()
158 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
H A Dcms.c359 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
661 if (keyfile == NULL) in cms_main()
662 keyfile = signerfile; in cms_main()
666 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in cms_main()
668 keyfile = NULL; in cms_main()
677 if (keyfile != NULL) { in cms_main()
691 if (sk_OPENSSL_STRING_push(skkeys, keyfile) <= 0) in cms_main()
694 keyfile = opt_arg(); in cms_main()
722 if (keyfile != NULL || signerfile != NULL) in cms_main()
824 if (keyfile != NULL && signerfile == NULL) { in cms_main()
[all …]
/freebsd/libexec/rc/rc.d/
H A Dsshd37 local keyfile
45 keyfile="/etc/ssh/ssh_host_${alg}_key"
52 if [ -f "${keyfile}" ] ; then
63 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N ""
64 /usr/bin/ssh-keygen -l -f "$keyfile.pub"
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zdb/
H A Dzdb_encrypted_raw.ksh40 keyfile="$TEST_BASE_DIR/keyfile"
45 rm -f "$keyfile"
56 echo -n "$RAWKEY" > "$keyfile"
59 -o encryption=on -o keyformat=raw -o keylocation="file://$keyfile" \
73 log_must eval "zdb -K $keyfile -dddd $dataset $obj | grep -q 'size\s$size$'"
/freebsd/usr.bin/ssh-copy-id/
H A Dssh-copy-id.sh41 keyfile=$HOME/.ssh/authorized_keys ; \
45 if ! grep -sqwF "$key" "$keyfile"; then \
46 printf "$alg $key $comment\n" >> "$keyfile" ; \
50 /sbin/restorecon -F "$HOME/.ssh/" "$keyfile" >/dev/null 2>&1 || true ; \
/freebsd/crypto/krb5/src/kadmin/dbutil/
H A Dkdb5_stash.c72 char *keyfile = 0; in kdb5_stash() local
75 keyfile = global_params.stash_file; in kdb5_stash()
81 keyfile = optarg; in kdb5_stash()
128 retval = krb5_db_store_master_key_list(util_context, keyfile, master_princ, in kdb5_stash()
/freebsd/contrib/libpcap/
H A Dsslutils.c55 void ssl_set_keyfile(const char *keyfile) in ssl_set_keyfile() argument
57 ssl_keyfile = keyfile; in ssl_set_keyfile()
91 char const *keyfile = ssl_keyfile[0] ? ssl_keyfile : "key.pem"; in ssl_init_once() local
92 if (1 != SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM)) in ssl_init_once()
94 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once()

1234