| /openbsd-src/distrib/notes/ |
| H A D | mirrors | 9 http://openbsd.org.ar/pub/OpenBSD (Buenos Aires) 10 ftp://ftp.openbsd.org.ar/pub/OpenBSD (Buenos Aires) 13 http://mirror.internode.on.net/pub/OpenBSD (Adelaide) 14 ftp://mirror.internode.on.net/pub/OpenBSD (Adelaide) 15 http://mirror.aarnet.edu.au/pub/OpenBSD (Brisbane) 16 ftp://mirror.aarnet.edu.au/pub/OpenBSD (Brisbane) 17 http://ftp.iinet.net.au/pub/OpenBSD (Perth) 18 ftp://ftp.iinet.net.au/pub/OpenBSD (Perth) 21 http://ftp5.eu.openbsd.org/ftp/pub/OpenBSD (Vienna) 22 ftp://ftp5.eu.openbsd.org/pub/OpenBSD (Vienna) [all …]
|
| /openbsd-src/regress/usr.bin/ssh/ |
| H A D | agent-pkcs11-cert.sh | 18 $SSHKEYGEN -qs $OBJ/ca -I "ecdsa_key" -n $USER -z 1 ${SSH_SOFTHSM_DIR}/EC.pub || 20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub || 22 $SSHKEYGEN -qs $OBJ/ca -I "ca_ca" -n $USER -z 3 $OBJ/ca.pub || 44 $OBJ/ca.pub \ 45 ${SSH_SOFTHSM_DIR}/EC.pub \ 46 ${SSH_SOFTHSM_DIR}/EC-cert.pub \ 47 ${SSH_SOFTHSM_DIR}/RSA.pub \ 48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub || 52 ${SSH_SOFTHSM_DIR}/EC.pub \ 53 ${SSH_SOFTHSM_DIR}/RSA.pub \ [all …]
|
| H A D | keygen-convert.sh | 28 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \ 31 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \ 38 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub 39 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \ 49 ${SSHKEYGEN} -y -f $OBJ/$t-key >$OBJ/$t-key-nocomment.pub 50 cmp $OBJ/$t-key.pub $OBJ/$t-key-nocomment.pub || \ 53 rm -f $OBJ/$t-key $OBJ/$t-key.pub $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub \ 54 $OBJ/$t-rfc-imported $OBJ/$t-key-nocomment.pub
|
| H A D | cert-hostkey.sh | 64 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 71 cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca 83 ${SSHKEYGEN} -kf $OBJ/host_krl_ca $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub \ 95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 106 $OBJ/cert_host_key_${ktype}-cert.pub || \ 108 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert 139 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub 163 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 166 kh_revoke cert_host_key_${ktype}.pub >> $OBJ/known_hosts-cert.orig [all …]
|
| H A D | keygen-sshfp.sh | 7 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \ 12 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | \ 20 fp=`${SSHKEYGEN} -r test -f ${SRC}/ed25519_openssh.pub | wc -l` 27 fp=`${SSHKEYGEN} -Ohashalg=sha1 -r test -f ${SRC}/ed25519_openssh.pub` 33 fp=`${SSHKEYGEN} -Ohashalg=sha256 -r test -f ${SRC}/ed25519_openssh.pub` 39 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="1"{print $6}'` 43 fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="2"{print $6}'`
|
| H A D | agent.sh | 29 rm -f $OBJ/user_ca_key $OBJ/user_ca_key.pub 38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub* 43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed" 46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER 60 cp -f $OBJ/$t-agent.pub $OBJ/$t-agent-private.pub 61 cp -f $OBJ/$t-agent-cert.pub $OBJ/$t-agent-private-cert.pub 93 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \ 143 (printf 'cert-authority,principals="estragon" '; cat $OBJ/user_ca_key.pub) \ [all...] |
| H A D | ssh-com-client.sh | 36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub 41 rm -f ${OBJ}/$t ${OBJ}/$t.pub 49 ${SSHKEYGEN} -e -f ${OBJ}/rsa.pub > ${HK}.ssh-rsa.pub 50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub 87 cp ${HK}.$key.pub ${HK}.pub
|
| H A D | Makefile | 121 ed25519-agent.pub empty.in expect failed-regress.log \ 126 key.dsa-* key.ecdsa-* key.ed25519-512 key.ed25519-512.pub \ 130 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \ 139 t10.out t10.out.pub t12.out t12.out.pub t2.out t3.out \ 140 t6.out1 t6.out2 t7.out t7.out.pub t8.out t8.out.pub \ 141 t9.out t9.out.pub \ 157 ssh-keygen -yf t2.out | diff - ${.CURDIR}/rsa_openssh.pub 160 ssh-keygen -ef ${.CURDIR}/rsa_openssh.pub |\ 162 diff - ${.CURDIR}/rsa_openssh.pub 165 ssh-keygen -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\ [all …]
|
| H A D | multipubkey.sh | 26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub 52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 64 cat $OBJ/user_key1.pub $OBJ/user_key2.pub > \ 72 cat $OBJ/user_key2.pub > $OBJ/authorized_keys_$USER
|
| H A D | hostkey-rotate.sh | 94 mv $OBJ/hkr.${secondary}.pub $OBJ/hkr.${secondary}.pub.old 101 check_key_present ${secondary} $OBJ/hkr.${secondary}.pub.old && \ 115 check_key_present ${primary} $OBJ/hkr.${primary}-new.pub || fail "new key missing" 120 mv $OBJ/hkr.${primary}.pub $OBJ/hkr.${primary}.pub.old 121 mv $OBJ/hkr.${primary}-new.pub $OBJ/hkr.${primary}.pub 126 check_key_present ${primary} $OBJ/hkr.${primary}.pub.old && fail "old key present"
|
| H A D | agent-pkcs11.sh | 30 pub=$(cat $k.pub) 31 ${SSHADD} -L | grep -q "$pub" || \ 33 ${SSHADD} -T $k.pub || fail "ssh-add -T with $k failed" 36 cat $k.pub > $OBJ/authorized_keys_$USER
|
| H A D | cert-file.sh | 32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub 36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub 40 rm $OBJ/user_key3.pub # to test use of private key w/o public half. 44 rm $OBJ/user_key4 $OBJ/user_key4.pub # to test no matching pub/private key case. 66 -oCertificateFile=$OBJ/user_key3-cert.pub \
|
| H A D | principals-command.sh | 29 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 30 CA_BODY=`cat $OBJ/user_ca_key.pub | awk '{ print $2 }'` 31 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 32 CA_FP=`${SSHKEYGEN} -lf $OBJ/user_ca_key.pub | awk '{ print $2 }'` 138 cat $OBJ/user_ca_key.pub 150 cat $OBJ/user_ca_key.pub
|
| H A D | ssh-com.sh | 45 PublicHostKeyFile ${SRC}/dsa_ssh2.pub 59 rm -f ${OBJ}/dsa ${OBJ}/dsa.pub 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 74 ${SSHKEYGEN} -if ${SRC}/dsa_ssh2.pub 117 sshd2_config dsa.pub dsa ssh_config_com; do
|
| H A D | hostkey-agent.sh | 24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \ 42 cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts 62 echo "Hostkey $OBJ/agent-key.${k}.pub" >> $OBJ/sshd_proxy 63 echo "HostCertificate $OBJ/agent-key.${k}-cert.pub" >> $OBJ/sshd_proxy 64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key" 65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert" 71 cat $OBJ/agent-ca.pub) > $OBJ/known_hosts 97 cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts
|
| H A D | cfgmatchlisten.sh | 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 198 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
| H A D | limit-keytype.sh | 48 mv $OBJ/user_key3-cert.pub $OBJ/cert_user_key3.pub 56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
|
| /openbsd-src/regress/usr.bin/jot/ |
| H A D | regress.wp5.out | 1 ftp://www.example.com/pub/uploaded%20files/disk001.iso 2 ftp://www.example.com/pub/uploaded%20files/disk002.iso 3 ftp://www.example.com/pub/uploaded%20files/disk003.iso 4 ftp://www.example.com/pub/uploaded%20files/disk004.iso 5 ftp://www.example.com/pub/uploaded%20files/disk005.iso 6 ftp://www.example.com/pub/uploaded%20files/disk006.iso 7 ftp://www.example.com/pub/uploaded%20files/disk007.iso 8 ftp://www.example.com/pub/uploaded%20files/disk008.iso 9 ftp://www.example.com/pub/uploaded%20files/disk009.iso 10 ftp://www.example.com/pub/uploaded%20files/disk010.iso
|
| /openbsd-src/regress/usr.bin/ssh/unittests/sshkey/ |
| H A D | mktestdata.sh | 36 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 40 for x in priv pub g ; do 57 grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.pub 61 for x in priv pub curve ; do 87 rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb 146 -V 19990101:20110101 -z 1 rsa_1.pub 149 -V 19990101:20110101 -z 2 dsa_1.pub 152 -V 19990101:20110101 -z 3 ecdsa_1.pub 155 -V 19990101:20110101 -z 4 ed25519_1.pub 158 -V 19990101:20110101 -z 4 ecdsa_sk1.pub [all …]
|
| /openbsd-src/regress/usr.bin/ssh/unittests/authopt/testdata/ |
| H A D | mktestdata.sh | 5 rm -f ca_key ca_key.pub 6 rm -f user_key user_key.pub 17 -V 19990101:19991231 -z 1 "$@" user_key.pub 18 mv user_key-cert.pub "$output" 48 rm -f user_key ca_key user_key.pub ca_key.pub
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | authfile.c | 271 /* try .pub suffix */ in sshkey_load_public() 272 if (asprintf(&pubfile, "%s.pub", filename) == -1) in sshkey_load_public() 296 struct sshkey *pub = NULL; in sshkey_load_cert() 303 if (asprintf(&file, "%s-cert.pub", filename) == -1) in sshkey_load_cert() 308 sshkey_free(pub); in sshkey_load_cert() 378 struct sshkey *pub = NULL; in sshkey_in_file() 387 sshkey_free(pub); in sshkey_in_file() 388 pub = NULL; in sshkey_in_file() 403 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_in_file() 407 switch (r = sshkey_read(pub, in sshkey_in_file() 298 struct sshkey *pub = NULL; sshkey_load_cert() local 380 struct sshkey *pub = NULL; sshkey_in_file() local [all...] |
| H A D | kexc25519.c | 48 kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) in kexc25519_keygen() 53 crypto_scalarmult_curve25519(pub, key, basepoint); in kexc25519_keygen() 58 const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int raw) in kexc25519_shared_key_ext() 64 crypto_scalarmult_curve25519(shared_key, key, pub); in kexc25519_shared_key_ext() 84 const u_char pub[CURVE25519_SIZE], struct sshbuf *out) in kexc25519_shared_key() 86 return kexc25519_shared_key_ext(key, pub, out, 0); in kexc25519_shared_key() 133 /* allocate space for encrypted KEM key and ECDH pub key */ in kex_c25519_enc()
|
| /openbsd-src/regress/usr.bin/ssh/unittests/hostkeys/ |
| H A D | mktestdata.sh | 66 printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub 67 printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub 68 printf "@cert-authority *.example.com " ; cat dsa_4.pub 73 printf "@what sisyphus.example.com " ; cat dsa_1.pub
|
| /openbsd-src/regress/usr.sbin/arp/ |
| H A D | Makefile | 38 ${ARP} -s 192.0.2.42 ${PUB_MAC} pub 46 ${ARP} -s 192.0.2.42 ${PUB_MAC} pub 82 ${ARP} -s 192.0.2.42 ${PUB_MAC} pub 83 ${ARP} -s 192.0.2.42 ${OTHER_MAC} pub && exit 1 || exit 0
|
| /openbsd-src/gnu/usr.bin/gcc/gcc/testsuite/g++.dg/other/ |
| H A D | access1.C | 19 void pub(); 26 void Outer::pub() { i = new Inner(Foo::m); } in pub() function
|