/freebsd/crypto/openssh/regress/ |
H A D | agent-pkcs11-cert.sh | 18 $SSHKEYGEN -qs $OBJ/ca -I "ecdsa_key" -n $USER -z 1 ${SSH_SOFTHSM_DIR}/EC.pub || 20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub || 22 $SSHKEYGEN -qs $OBJ/ca -I "ca_ca" -n $USER -z 3 $OBJ/ca.pub || 44 $OBJ/ca.pub \ 45 ${SSH_SOFTHSM_DIR}/EC.pub \ 46 ${SSH_SOFTHSM_DIR}/EC-cert.pub \ 47 ${SSH_SOFTHSM_DIR}/RSA.pub \ 48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub || 52 ${SSH_SOFTHSM_DIR}/EC.pub \ 53 ${SSH_SOFTHSM_DIR}/RSA.pub \ [all …]
|
H A D | cert-file.sh | 32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub 36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub 40 rm $OBJ/user_key3.pub # to test use of private key w/o public half. 44 rm $OBJ/user_key4 $OBJ/user_key4.pub # to test no matching pub/private key case. 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER 57 # Key with no .pub should work - finding the equivalent *-cert.pub. 63 # CertificateFile matching private key with no .pub file should work. 66 -oCertificateFile=$OBJ/user_key3-cert.pub \ 80 opts3="$opts2 -oCertificateFile=$OBJ/cert_user_key1_2.pub" 90 opts3="$opts3 -oCertificateFile=$OBJ/cert_user_key1_1.pub" [all …]
|
H A D | cert-hostkey.sh | 64 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 71 cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca 83 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub \ 95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 106 $OBJ/cert_host_key_${ktype}-cert.pub || \ 108 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert 139 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub 163 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 165 test -f "$OBJ/cert_host_key_${ktype}.pub" || fatal "no pubkey" [all …]
|
H A D | keygen-convert.sh | 28 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \ 31 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \ 38 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub 39 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \ 49 ${SSHKEYGEN} -y -f $OBJ/$t-key >$OBJ/$t-key-nocomment.pub 50 cmp $OBJ/$t-key.pub $OBJ/$t-key-nocomment.pub || \ 53 rm -f $OBJ/$t-key $OBJ/$t-key.pub $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub \ 54 $OBJ/$t-rfc-imported $OBJ/$t-key-nocomment.pub
|
H A D | ssh-com-client.sh | 36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub 41 rm -f ${OBJ}/$t ${OBJ}/$t.pub 49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub 50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub 87 cp ${HK}.$key.pub ${HK}.pub 127 for i in ssh2_config random_seed dsa.pub dsa host.dsa \ 128 id.list id.com id.com.pub id.openssh; do
|
H A D | Makefile | 127 ed25519-agent.pub ed25519 ed25519.pub empty.in \ 133 key.ed25519-512.pub key.rsa-* keys-command-args kh.* askpass \ 137 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \ 146 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \ 147 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \ 148 t8.out t8.out.pub t9.out t9.out.pub \ 171 ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub ; \ 176 ${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out ; \ 177 ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub ; \ 182 ${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\ [all …]
|
H A D | multipubkey.sh | 26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub 38 echo "TrustedUserCAKeys $OBJ/user_ca_key.pub" 52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 64 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \ 72 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
|
H A D | keygen-sshfp.sh | 7 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \ 12 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \ 20 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | wc -l` 27 fp=`${SSHKEYGEN} -Ohashalg=sha1 -r test -f ${SRC}/ed25519_openssh.pub` 33 fp=`${SSHKEYGEN} -Ohashalg=sha256 -r test -f ${SRC}/ed25519_openssh.pub` 39 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="1"{print $6}'` 43 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="2"{print $6}'`
|
H A D | agent.sh | 29 rm -f $OBJ/user_ca_key $OBJ/user_ca_key.pub 38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub* 43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed" 46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER 60 cp -f $OBJ/$t-agent.pub $OBJ/$t-agent-private.pub 61 cp -f $OBJ/$t-agent-cert.pub $OBJ/$t-agent-private-cert.pub 93 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \ 143 (printf 'cert-authority,principals="estragon" '; cat $OBJ/user_ca_key.pub) \ 148 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \ 149 -oCertificateFile=$OBJ/$t-agent-cert.pub \ [all …]
|
H A D | hostkey-rotate.sh | 73 test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub" 113 mv $OBJ/hkr.${secondary}.pub $OBJ/hkr.${secondary}.pub.old 120 check_key_present ${secondary} $OBJ/hkr.${secondary}.pub.old && \ 134 check_key_present ${primary} $OBJ/hkr.${primary}-new.pub || fail "new key missing" 139 mv $OBJ/hkr.${primary}.pub $OBJ/hkr.${primary}.pub.old 140 mv $OBJ/hkr.${primary}-new.pub $OBJ/hkr.${primary}.pub 145 check_key_present ${primary} $OBJ/hkr.${primary}.pub.old && fail "old key present"
|
H A D | hostkey-agent.sh | 24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \ 42 cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts 62 echo "Hostkey $OBJ/agent-key.${k}.pub" >> $OBJ/sshd_proxy 63 echo "HostCertificate $OBJ/agent-key.${k}-cert.pub" >> $OBJ/sshd_proxy 64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key" 65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert" 71 cat $OBJ/agent-ca.pub) > $OBJ/known_hosts
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | mktestdata.sh | 32 awk '/^priv:$/,/^pub:/' | \ 35 awk '/^pub:/,/^P:/' | #\ 36 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 40 for x in priv pub g ; do 53 awk '/^priv:$/,/^pub:/' | \ 56 awk '/^pub:/,/^ASN1 OID:/' | #\ 57 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 61 for x in priv pub curve ; do 87 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb 146 -V 19990101:20110101 -z 1 rsa_1.pub [all …]
|
/freebsd/usr.bin/jot/tests/ |
H A D | regress.wp5.out | 1 ftp://www.example.com/pub/uploaded%20files/disk001.iso 2 ftp://www.example.com/pub/uploaded%20files/disk002.iso 3 ftp://www.example.com/pub/uploaded%20files/disk003.iso 4 ftp://www.example.com/pub/uploaded%20files/disk004.iso 5 ftp://www.example.com/pub/uploaded%20files/disk005.iso 6 ftp://www.example.com/pub/uploaded%20files/disk006.iso 7 ftp://www.example.com/pub/uploaded%20files/disk007.iso 8 ftp://www.example.com/pub/uploaded%20files/disk008.iso 9 ftp://www.example.com/pub/uploaded%20files/disk009.iso 10 ftp://www.example.com/pub/uploaded%20files/disk010.iso
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ffdhe.txt | 47 PublicKey=ffdhe2048-1-pub 63 PublicKey=ffdhe2048-2-pub 79 PrivPubKeyPair=ffdhe2048-1:ffdhe2048-1-pub 81 PrivPubKeyPair=ffdhe2048-2:ffdhe2048-2-pub 84 PeerKey=ffdhe2048-2-pub 88 PeerKey=ffdhe2048-1-pub 92 PeerKey=ffdhe2048-2-pub 100 PeerKey=ffdhe2048-2-pub 111 PeerKey=ffdhe2048-1-pub 147 PublicKey=ffdhe3072-1-pub [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | ssh | 17 # qemu-9.0.0/roms/skiboot/libstb/crypto/mbedtls/tests/data_files/format_gen.pub 21 !:ext pub 23 # Reference: http://mark0.net/download/triddefs_xml.7z/defs/p/pub-ssh-dss.trid.xml 28 !:ext pub 29 # Reference: http://mark0.net/download/triddefs_xml.7z/defs/p/pub-ssh-rsa.trid.xml 34 !:ext pub 38 !:ext pub 43 !:ext pub 47 !:ext pub 51 !:ext pub [all …]
|
/freebsd/crypto/openssh/regress/unittests/hostkeys/ |
H A D | mktestdata.sh | 43 hentries "sisyphus.example.com" "*_5.pub" 44 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_6.pub" 52 hentries "sisyphus.example.com" "*_1.pub" 55 hentries "prometheus.example.com,192.0.2.1,2001:db8::1" "*_2.pub" 58 hentries "*.example.com,192.0.2.*,2001:*" "*_3.pub" 66 printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub 67 printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub 68 printf "@cert-authority *.example.com " ; cat dsa_4.pub 73 printf "@what sisyphus.example.com " ; cat dsa_1.pub
|
H A D | test_iterate.c | 207 { "dsa_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, { 221 { "ecdsa_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, { 235 { "ed25519_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, { 249 { "rsa_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, { 291 { "dsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 305 { "ecdsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 319 { "ed25519_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 333 { "rsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 375 { "dsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 389 { "ecdsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, { [all …]
|
/freebsd/usr.sbin/lpr/common_source/ |
H A D | ctlinfo.c | 69 struct cjobinfo pub; member 238 if ((cpriv == NULL) || (cpriv != cpriv->pub.cji_priv)) { in ctl_freeinf() 244 FREESTR(cpriv->pub.cji_accthost); in ctl_freeinf() 245 FREESTR(cpriv->pub.cji_acctuser); in ctl_freeinf() 246 FREESTR(cpriv->pub.cji_class); in ctl_freeinf() 247 FREESTR(cpriv->pub.cji_curqueue); in ctl_freeinf() 248 /* [cpriv->pub.cji_fname is part of cpriv-malloced area] */ in ctl_freeinf() 249 FREESTR(cpriv->pub.cji_jobname); in ctl_freeinf() 250 FREESTR(cpriv->pub.cji_mailto); in ctl_freeinf() 251 FREESTR(cpriv->pub.cji_headruser); in ctl_freeinf() [all …]
|
/freebsd/tests/sys/netinet/libalias/ |
H A D | 3_natin.c | 65 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd); 86 UDP_UNNAT_FAIL(p, u, pub, 0x5678, masq, 0xabcd); 107 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234); 128 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, cgn, 0x1234); 201 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234); 218 UDP_UNNAT_CHECK(p, u, pub, 0x5678, masq, 0xabcd, prv3, 0x1234); 243 UDP_UNNAT_FAIL(p, u, pub, 0x5678, pub, 0xabcd); 245 LibAliasSetAddress(la, pub); 246 UDP_UNNAT_CHECK(p, u, pub, 0x5679, pub, 0xabcd, prv1, 0x1234); 262 pf1 = LibAliasRedirectAddr(la, prv1, pub); [all …]
|
H A D | 2_natout.c | 56 NAT_CHECK(pip, pub, ext, masq); 77 NAT_CHECK(pip, pub, ext, pub); 89 NAT_CHECK(pip, pub, ext, pub); 110 NAT_CHECK(pip, pub, ext, pub); 122 NAT_CHECK(pip, pub, ext, pub); 273 case 1: s = prv2; d = pub; break; 275 case 3: s = cgn; d = pub; break; 391 UDP_NAT_CHECK(po3, uo3, prv1, sport, pub, dport, masq); 417 UDP_NAT_CHECK(po, uo, prv1, sport, pub, dport, masq); 422 UDP_UNNAT_CHECK(po2, uo2, pub, dport2, masq, aport, prv1, sport); [all …]
|
/freebsd/crypto/openssh/regress/unittests/authopt/testdata/ |
H A D | mktestdata.sh | 5 rm -f ca_key ca_key.pub 6 rm -f user_key user_key.pub 17 -V 19990101:19991231 -z 1 "$@" user_key.pub 18 mv user_key-cert.pub "$output" 48 rm -f user_key ca_key user_key.pub ca_key.pub
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 48 struct bignum *pub; in crypto_dh_derive_secret() local 56 pub = bignum_init(); in crypto_dh_derive_secret() 57 if (!pub || bignum_set_unsigned_bin(pub, pubkey, pubkey_len) < 0 || in crypto_dh_derive_secret() 58 bignum_cmp_d(pub, 1) <= 0) in crypto_dh_derive_secret() 72 bignum_exptmod(pub, q, p, tmp) < 0 || in crypto_dh_derive_secret() 84 bignum_deinit(pub); in crypto_dh_derive_secret()
|
/freebsd/crypto/openssh/regress/unittests/sshsig/ |
H A D | tests.c | 103 check_sig("rsa.pub", "rsa.sig", msg, namespace); in tests() 108 check_sig("dsa.pub", "dsa.sig", msg, namespace); in tests() 114 check_sig("ecdsa.pub", "ecdsa.sig", msg, namespace); in tests() 120 check_sig("ed25519.pub", "ed25519.sig", msg, namespace); in tests() 126 check_sig("ecdsa_sk.pub", "ecdsa_sk.sig", msg, namespace); in tests() 131 check_sig("ed25519_sk.pub", "ed25519_sk.sig", msg, namespace); in tests() 136 check_sig("ecdsa_sk_webauthn.pub", "ecdsa_sk_webauthn.sig", in tests()
|
/freebsd/sys/geom/uzip/ |
H A D | g_uzip_zlib.c | 42 struct g_uzip_dapi pub; member 106 zp->pub.max_blen = compressBound(blksz); in g_uzip_zlib_ctor() 107 zp->pub.decompress = &g_uzip_zlib_decompress; in g_uzip_zlib_ctor() 108 zp->pub.free = &g_uzip_zlib_free; in g_uzip_zlib_ctor() 109 zp->pub.rewind = &g_uzip_zlib_rewind; in g_uzip_zlib_ctor() 110 zp->pub.pvt = (void *)zp; in g_uzip_zlib_ctor() 111 return (&zp->pub); in g_uzip_zlib_ctor()
|
H A D | g_uzip_lzma.c | 41 struct g_uzip_dapi pub; member 108 lzp->pub.max_blen = LZ4_compressBound(blksz); in g_uzip_lzma_ctor() 109 lzp->pub.decompress = &g_uzip_lzma_decompress; in g_uzip_lzma_ctor() 110 lzp->pub.free = &g_uzip_lzma_free; in g_uzip_lzma_ctor() 111 lzp->pub.rewind = &g_uzip_lzma_nop; in g_uzip_lzma_ctor() 112 lzp->pub.pvt = lzp; in g_uzip_lzma_ctor() 113 return (&lzp->pub); in g_uzip_lzma_ctor()
|