Home
last modified time | relevance | path

Searched refs:pub (Results 1 – 25 of 303) sorted by relevance

12345678910>>...13

/freebsd/crypto/openssh/regress/
H A Dagent-pkcs11-cert.sh18 $SSHKEYGEN -qs $OBJ/ca -I "ecdsa_key" -n $USER -z 1 ${SSH_SOFTHSM_DIR}/EC.pub ||
20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub ||
22 $SSHKEYGEN -qs $OBJ/ca -I "ca_ca" -n $USER -z 3 $OBJ/ca.pub ||
44 $OBJ/ca.pub \
45 ${SSH_SOFTHSM_DIR}/EC.pub \
46 ${SSH_SOFTHSM_DIR}/EC-cert.pub \
47 ${SSH_SOFTHSM_DIR}/RSA.pub \
48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub ||
52 ${SSH_SOFTHSM_DIR}/EC.pub \
53 ${SSH_SOFTHSM_DIR}/RSA.pub \
[all …]
H A Dcert-hostkey.sh64 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
71 cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca
83 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub \
95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
106 $OBJ/cert_host_key_${ktype}-cert.pub || \
108 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert
139 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub
163 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
166 kh_revoke cert_host_key_${ktype}.pub >> $OBJ/known_hosts-cert.orig
[all …]
H A Dkeygen-convert.sh28 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \
31 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \
38 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub
39 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \
49 ${SSHKEYGEN} -y -f $OBJ/$t-key >$OBJ/$t-key-nocomment.pub
50 cmp $OBJ/$t-key.pub $OBJ/$t-key-nocomment.pub || \
53 rm -f $OBJ/$t-key $OBJ/$t-key.pub $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub \
54 $OBJ/$t-rfc-imported $OBJ/$t-key-nocomment.pub
H A Dkeygen-sshfp.sh7 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \
12 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \
20 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | wc -l`
27 fp=`${SSHKEYGEN} -Ohashalg=sha1 -r test -f ${SRC}/ed25519_openssh.pub`
33 fp=`${SSHKEYGEN} -Ohashalg=sha256 -r test -f ${SRC}/ed25519_openssh.pub`
39 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="1"{print $6}'`
43 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="2"{print $6}'`
H A Dagent.sh29 rm -f $OBJ/user_ca_key $OBJ/user_ca_key.pub
38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub*
43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed"
46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER
60 cp -f $OBJ/$t-agent.pub $OBJ/$t-agent-private.pub
61 cp -f $OBJ/$t-agent-cert.pub $OBJ/$t-agent-private-cert.pub
93 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \
143 (printf 'cert-authority,principals="estragon" '; cat $OBJ/user_ca_key.pub) \
148 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
149 -oCertificateFile=$OBJ/$t-agent-cert.pub \
[all …]
H A Dssh-com-client.sh36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub
41 rm -f ${OBJ}/$t ${OBJ}/$t.pub
49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub
50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub
87 cp ${HK}.$key.pub ${HK}.pub
H A Dmultipubkey.sh26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub
52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
64 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \
72 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
H A DMakefile129 ed25519-agent.pub ed25519 ed25519.pub empty.in \
135 key.ed25519-512.pub key.rsa-* keys-command-args kh.* askpass \
139 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \
148 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \
149 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \
150 t8.out t8.out.pub t9.out t9.out.pub \
173 ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub ; \
178 ${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out ; \
179 ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub ; \
184 ${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\
[all …]
H A Dhostkey-rotate.sh113 mv $OBJ/hkr.${secondary}.pub $OBJ/hkr.${secondary}.pub.old
120 check_key_present ${secondary} $OBJ/hkr.${secondary}.pub.old && \
134 check_key_present ${primary} $OBJ/hkr.${primary}-new.pub || fail "new key missing"
139 mv $OBJ/hkr.${primary}.pub $OBJ/hkr.${primary}.pub.old
140 mv $OBJ/hkr.${primary}-new.pub $OBJ/hkr.${primary}.pub
145 check_key_present ${primary} $OBJ/hkr.${primary}.pub.old && fail "old key present"
H A Dagent-pkcs11.sh30 pub=$(cat $k.pub)
31 ${SSHADD} -L | grep -q "$pub" || \
33 ${SSHADD} -T $k.pub || fail "ssh-add -T with $k failed"
36 cat $k.pub > $OBJ/authorized_keys_$USER
H A Dcert-file.sh32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub
36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub
40 rm $OBJ/user_key3.pub # to test use of private key w/o public half.
44 rm $OBJ/user_key4 $OBJ/user_key4.pub # to test no matching pub/private key case.
66 -oCertificateFile=$OBJ/user_key3-cert.pub \
/freebsd/usr.sbin/lpr/common_source/
H A Dctlinfo.c69 struct cjobinfo pub; member
238 if ((cpriv == NULL) || (cpriv != cpriv->pub.cji_priv)) { in ctl_freeinf()
244 FREESTR(cpriv->pub.cji_accthost); in ctl_freeinf()
245 FREESTR(cpriv->pub.cji_acctuser); in ctl_freeinf()
246 FREESTR(cpriv->pub.cji_class); in ctl_freeinf()
247 FREESTR(cpriv->pub.cji_curqueue); in ctl_freeinf()
249 FREESTR(cpriv->pub.cji_jobname); in ctl_freeinf()
250 FREESTR(cpriv->pub.cji_mailto); in ctl_freeinf()
251 FREESTR(cpriv->pub.cji_headruser); in ctl_freeinf()
299 cpriv->pub.cji_priv = cpriv; in ctl_readcf()
[all …]
/freebsd/usr.bin/jot/tests/
H A Dregress.wp5.out1 ftp://www.example.com/pub/uploaded%20files/disk001.iso
2 ftp://www.example.com/pub/uploaded%20files/disk002.iso
3 ftp://www.example.com/pub/uploaded%20files/disk003.iso
4 ftp://www.example.com/pub/uploaded%20files/disk004.iso
5 ftp://www.example.com/pub/uploaded%20files/disk005.iso
6 ftp://www.example.com/pub/uploaded%20files/disk006.iso
7 ftp://www.example.com/pub/uploaded%20files/disk007.iso
8 ftp://www.example.com/pub/uploaded%20files/disk008.iso
9 ftp://www.example.com/pub/uploaded%20files/disk009.iso
10 ftp://www.example.com/pub/uploaded%20files/disk010.iso
/freebsd/crypto/openssh/regress/unittests/sshkey/
H A Dmktestdata.sh36 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub
40 for x in priv pub g ; do
57 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub
61 for x in priv pub curve ; do
87 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb
146 -V 19990101:20110101 -z 1 rsa_1.pub
149 -V 19990101:20110101 -z 2 dsa_1.pub
152 -V 19990101:20110101 -z 3 ecdsa_1.pub
155 -V 19990101:20110101 -z 4 ed25519_1.pub
158 -V 19990101:20110101 -z 4 ecdsa_sk1.pub
[all …]
/freebsd/crypto/libecc/src/examples/sig/dsa/
H A Ddsa.c89 int dsa_import_pub_key(dsa_pub_key *pub, const u8 *p, u16 plen, in dsa_import_pub_key() argument
97 MUST_HAVE((pub != NULL), ret, err); in dsa_import_pub_key()
101 ret = _os2ip(&(pub->p), p, plen); EG(ret, err); in dsa_import_pub_key()
102 ret = _os2ip(&(pub->q), q, qlen); EG(ret, err); in dsa_import_pub_key()
103 ret = _os2ip(&(pub->g), g, glen); EG(ret, err); in dsa_import_pub_key()
104 ret = _os2ip(&(pub->y), y, ylen); EG(ret, err); in dsa_import_pub_key()
107 ret = nn_cmp(&(pub->q), &(pub->p), &cmp); EG(ret, err); in dsa_import_pub_key()
110 ret = nn_cmp(&(pub->g), &(pub->p), &cmp); EG(ret, err); in dsa_import_pub_key()
113 ret = nn_cmp(&(pub->y), &(pub->p), &cmp); EG(ret, err); in dsa_import_pub_key()
117 if(ret && (pub != NULL)){ in dsa_import_pub_key()
[all …]
/freebsd/tests/sys/netinet/libalias/
H A D3_natin.c65 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd);
86 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd);
107 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234);
128 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, cgn, 0x1234);
201 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234);
218 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234);
243 UDP_UNNAT_FAIL(p, u, pub, 0x5678, pub, 0xabcd);
245 LibAliasSetAddress(la, pub);
246 UDP_UNNAT_CHECK(p, u, pub, 0x5679, pub, 0xabcd, prv1, 0x1234);
262 pf1 = LibAliasRedirectAddr(la, prv1, pub);
[all …]
/freebsd/crypto/libecc/src/examples/sig/rsa/
H A Drsa.h107 ATTRIBUTE_WARN_UNUSED_RET int rsa_import_pub_key(rsa_pub_key *pub, const u8 *n,
120 ATTRIBUTE_WARN_UNUSED_RET int rsaep(const rsa_pub_key *pub, nn_src_t m, nn_t c);
122 ATTRIBUTE_WARN_UNUSED_RET int rsadp_hardened(const rsa_priv_key *priv, const rsa_pub_key *pub, nn_s…
125 ATTRIBUTE_WARN_UNUSED_RET int rsasp1_hardened(const rsa_priv_key *priv, const rsa_pub_key *pub, nn_…
126 ATTRIBUTE_WARN_UNUSED_RET int rsavp1(const rsa_pub_key *pub, nn_src_t s, nn_t m);
139 ATTRIBUTE_WARN_UNUSED_RET int rsaes_pkcs1_v1_5_encrypt(const rsa_pub_key *pub, const u8 *m, u32 mle…
144 …s_pkcs1_v1_5_decrypt_hardened(const rsa_priv_key *priv, const rsa_pub_key *pub, const u8 *c, u32 c…
147 ATTRIBUTE_WARN_UNUSED_RET int rsaes_oaep_encrypt(const rsa_pub_key *pub, const u8 *m, u32 mlen,
154 …t rsaes_oaep_decrypt_hardened(const rsa_priv_key *priv, const rsa_pub_key *pub, const u8 *c, u32 c…
160 …assa_pkcs1_v1_5_sign_hardened(const rsa_priv_key *priv, const rsa_pub_key *pub, const u8 *m, u32 m…
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ffdhe.txt47 PublicKey=ffdhe2048-1-pub
63 PublicKey=ffdhe2048-2-pub
79 PrivPubKeyPair=ffdhe2048-1:ffdhe2048-1-pub
81 PrivPubKeyPair=ffdhe2048-2:ffdhe2048-2-pub
84 PeerKey=ffdhe2048-2-pub
88 PeerKey=ffdhe2048-1-pub
92 PeerKey=ffdhe2048-2-pub
100 PeerKey=ffdhe2048-2-pub
111 PeerKey=ffdhe2048-1-pub
147 PublicKey=ffdhe3072-1-pub
[all …]
/freebsd/crypto/openssl/test/
H A Dffc_internal_test.c445 BIGNUM *pub = NULL; in ffc_public_validate_test() local
448 if (!TEST_ptr(pub = BN_new())) in ffc_public_validate_test()
455 if (!TEST_true(BN_set_word(pub, 1))) in ffc_public_validate_test()
457 BN_set_negative(pub, 1); in ffc_public_validate_test()
459 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res))) in ffc_public_validate_test()
463 if (!TEST_true(BN_set_word(pub, 0))) in ffc_public_validate_test()
466 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res))) in ffc_public_validate_test()
475 if (!TEST_true(BN_add_word(pub, 2))) in ffc_public_validate_test()
478 if (!TEST_true(ossl_ffc_validate_public_key(params, pub, &res))) in ffc_public_validate_test()
481 if (!TEST_ptr(BN_copy(pub, params->p))) in ffc_public_validate_test()
[all …]
/freebsd/sys/geom/uzip/
H A Dg_uzip_zlib.c42 struct g_uzip_dapi pub; member
106 zp->pub.max_blen = compressBound(blksz); in g_uzip_zlib_ctor()
107 zp->pub.decompress = &g_uzip_zlib_decompress; in g_uzip_zlib_ctor()
108 zp->pub.free = &g_uzip_zlib_free; in g_uzip_zlib_ctor()
109 zp->pub.rewind = &g_uzip_zlib_rewind; in g_uzip_zlib_ctor()
110 zp->pub.pvt = (void *)zp; in g_uzip_zlib_ctor()
111 return (&zp->pub); in g_uzip_zlib_ctor()
H A Dg_uzip_lzma.c41 struct g_uzip_dapi pub; member
108 lzp->pub.max_blen = LZ4_compressBound(blksz); in g_uzip_lzma_ctor()
109 lzp->pub.decompress = &g_uzip_lzma_decompress; in g_uzip_lzma_ctor()
110 lzp->pub.free = &g_uzip_lzma_free; in g_uzip_lzma_ctor()
111 lzp->pub.rewind = &g_uzip_lzma_nop; in g_uzip_lzma_ctor()
112 lzp->pub.pvt = lzp; in g_uzip_lzma_ctor()
113 return (&lzp->pub); in g_uzip_lzma_ctor()
/freebsd/contrib/file/magic/Magdir/
H A Dssh17 # qemu-9.0.0/roms/skiboot/libstb/crypto/mbedtls/tests/data_files/format_gen.pub
21 !:ext pub
23 # Reference: http://mark0.net/download/triddefs_xml.7z/defs/p/pub-ssh-dss.trid.xml
28 !:ext pub
29 # Reference: http://mark0.net/download/triddefs_xml.7z/defs/p/pub-ssh-rsa.trid.xml
34 !:ext pub
38 !:ext pub
43 !:ext pub
47 !:ext pub
51 !:ext pub
[all …]
/freebsd/crypto/openssh/regress/unittests/authopt/testdata/
H A Dmktestdata.sh5 rm -f ca_key ca_key.pub
6 rm -f user_key user_key.pub
17 -V 19990101:19991231 -z 1 "$@" user_key.pub
18 mv user_key-cert.pub "$output"
48 rm -f user_key ca_key user_key.pub ca_key.pub
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto_internal-modexp.c48 struct bignum *pub; in crypto_dh_derive_secret() local
56 pub = bignum_init(); in crypto_dh_derive_secret()
57 if (!pub || bignum_set_unsigned_bin(pub, pubkey, pubkey_len) < 0 || in crypto_dh_derive_secret()
58 bignum_cmp_d(pub, 1) <= 0) in crypto_dh_derive_secret()
72 bignum_exptmod(pub, q, p, tmp) < 0 || in crypto_dh_derive_secret()
84 bignum_deinit(pub); in crypto_dh_derive_secret()
/freebsd/crypto/libecc/src/examples/sig/gostr34_10_94/
H A Dgostr34_10_94.c65 int gostr34_10_94_import_pub_key(gostr34_10_94_pub_key *pub, const u8 *p, u16 plen, in gostr34_10_94_import_pub_key() argument
70 return dsa_import_pub_key(pub, p, plen, q, qlen, g, glen, y, ylen); in gostr34_10_94_import_pub_key()
79 int gostr34_10_94_compute_pub_from_priv(gostr34_10_94_pub_key *pub, const gostr34_10_94_priv_key *p… in gostr34_10_94_compute_pub_from_priv() argument
81 return dsa_compute_pub_from_priv(pub, priv); in gostr34_10_94_compute_pub_from_priv()
250 int gostr34_10_94_verify(const gostr34_10_94_pub_key *pub, const u8 *msg, u32 msglen, in gostr34_10_94_verify() argument
268 MUST_HAVE((pub != NULL) && (msg != NULL) && (sig != NULL), ret, err); in gostr34_10_94_verify()
273 p = &(pub->p); in gostr34_10_94_verify()
274 q = &(pub->q); in gostr34_10_94_verify()
275 g = &(pub->g); in gostr34_10_94_verify()
276 y = &(pub->y); in gostr34_10_94_verify()
[all …]

12345678910>>...13