Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 21 of 21) sorted by relevance

/openssh-portable/regress/
H A Dkeys-command.sh12 rm -f $OBJ/keys-command-args
14 touch $OBJ/keys-command-args
15 chmod a+rw $OBJ/keys-command-args
26 echo args: "\$@" >> $OBJ/keys-command-args
40 if ! $OBJ/check-perm -m keys-command $KEY_COMMAND ; then
H A Dkrl.sh108 $SSHKEYGEN $OPTS -kf $OBJ/krl-keys $RKEYS \
177 check_krl $f $OBJ/krl-keys $KEYS_RESULT "$TAG"
204 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
H A DMakefile77 keys-command \
114 key.ed25519-512.pub key.rsa-* keys-command-args kh.* \
H A Dprincipals-command.sh57 if ! $OBJ/check-perm -m keys-command $PRINCIPALS_COMMAND ; then
/openssh-portable/
H A Dssh-keysign.c171 struct sshkey *keys[NUM_KEYTYPES], *key = NULL; in main() local
226 keys[i] = NULL; in main()
235 keys[i] = key; in main()
268 if (keys[i] != NULL && in main()
269 sshkey_equal_public(key, keys[i])) { in main()
282 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, NULL, 0)) in main()
H A Dauthfd.c274 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || in ssh_fetch_identitylist()
280 if ((r = deserialise_identity2(msg, &(idl->keys[i]), in ssh_fetch_identitylist()
310 if (idl->keys != NULL) in ssh_free_identitylist()
311 sshkey_free(idl->keys[i]); in ssh_free_identitylist()
315 free(idl->keys); in ssh_free_identitylist()
336 if (sshkey_equal_public(idlist->keys[i], key)) { in ssh_agent_has_key()
H A Dssh-add.c290 if (!sshkey_equal_public(idlist->keys[i], private)) in add_file()
292 left = sshkey_signatures_left(idlist->keys[i]); in add_file()
475 fp = sshkey_fingerprint(idlist->keys[i], in list_identities()
477 printf("%u %s %s (%s)\n", sshkey_size(idlist->keys[i]), in list_identities()
479 sshkey_type(idlist->keys[i])); in list_identities()
482 if ((r = sshkey_write(idlist->keys[i], stdout)) != 0) { in list_identities()
488 left = sshkey_signatures_left(idlist->keys[i]); in list_identities()
H A Dssh-pkcs11-helper.c117 struct sshkey **keys = NULL; in process_add() local
128 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) { in process_add()
134 if ((r = sshkey_to_blob(keys[i], &blob, &blen)) != 0) { in process_add()
144 add_key(keys[i], name); in process_add() local
152 free(keys); in process_add()
H A Dhostfile.c468 struct sshkey * const *keys; member
493 if (sshkey_equal(ctx->keys[i], l->key)) { in host_delete()
524 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument
540 ctx.keys = keys; in hostfile_replace_entries()
578 if ((fp = sshkey_fingerprint(keys[i], hash_alg, in hostfile_replace_entries()
585 sshkey_ssh_name(keys[i]), fp); in hostfile_replace_entries()
587 if (!write_host_entry(ctx.out, host, ip, keys[i], store_hash)) { in hostfile_replace_entries()
H A Dclientloop.c1814 struct sshkey **keys; member
1835 sshkey_free(ctx->keys[i]); in hostkeys_update_ctx_free()
1836 free(ctx->keys); in hostkeys_update_ctx_free()
1858 if (sshkey_equal(l->key, ctx->keys[i])) { in hostkeys_find()
1891 if ((fp = sshkey_fingerprint(ctx->keys[i], in update_known_hosts()
1895 sshkey_type(ctx->keys[i]), fp); in update_known_hosts()
2008 __func__, sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_private_confirm()
2107 if (sshkey_equal(key, ctx->keys[i])) { in client_input_hostkeys()
2115 sizeof(*ctx->keys))) == NULL) in client_input_hostkeys()
2118 ctx->keys = tmp; in client_input_hostkeys()
[all …]
H A Dsshconnect2.c274 struct idlist keys; member
1517 preferred = &authctxt->keys; in pubkey_prepare()
1575 id->key = idlist->keys[j]; in pubkey_prepare()
1577 idlist->keys[j] = NULL; in pubkey_prepare()
1650 for (id = TAILQ_FIRST(&authctxt->keys); id; in pubkey_cleanup()
1651 id = TAILQ_FIRST(&authctxt->keys)) { in pubkey_cleanup()
1652 TAILQ_REMOVE(&authctxt->keys, id, next); in pubkey_cleanup()
1664 TAILQ_FOREACH(id, &authctxt->keys, next) in pubkey_reset()
1694 TAILQ_REMOVE(&authctxt->keys, id, next); in userauth_pubkey()
1985 private = authctxt->sensitive->keys[i]; in userauth_hostbased()
[all …]
H A Dsshconnect.h29 struct sshkey **keys; member
H A Dssh.c1392 sensitive_data.keys = NULL; in main()
1395 sensitive_data.keys = xcalloc(sensitive_data.nkeys, in main()
1506 if (sensitive_data.keys[i] != NULL) { in main()
1509 sshkey_free(sensitive_data.keys[i]); in main()
1510 sensitive_data.keys[i] = NULL; in main()
1513 free(sensitive_data.keys); in main()
2015 struct sshkey **keys; in load_public_identity_files() local
2034 &keys)) > 0) { in load_public_identity_files()
2037 sshkey_free(keys[i]); in load_public_identity_files() local
2040 identity_keys[n_ids] = keys[i]; in load_public_identity_files()
[all …]
H A Dhostfile.h48 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
H A Dauthfd.h22 struct sshkey **keys; member
H A Dssh-keygen.c804 struct sshkey **keys = NULL; in do_download() local
819 fp = sshkey_fingerprint(keys[i], fptype, rep); in do_download()
820 ra = sshkey_fingerprint(keys[i], fingerprint_hash, in do_download()
825 fp, sshkey_type(keys[i])); in do_download()
834 sshkey_free(keys[i]); in do_download() local
836 free(keys); in do_download()
1682 if (sshkey_equal_public(public, keys[i])) { in load_pkcs11_key()
1683 private = keys[i]; in load_pkcs11_key()
1686 sshkey_free(keys[i]); in load_pkcs11_key() local
1688 free(keys); in load_pkcs11_key()
[all …]
H A Dmisc.c1056 } keys[EXPAND_MAX_KEYS]; in percent_expand() local
1068 keys[num_keys].key = va_arg(ap, char *); in percent_expand()
1069 if (keys[num_keys].key == NULL) in percent_expand()
1071 keys[num_keys].repl = va_arg(ap, char *); in percent_expand()
1072 if (keys[num_keys].repl == NULL) in percent_expand()
1096 if (strchr(keys[i].key, *string) != NULL) { in percent_expand() local
1097 if ((r = sshbuf_put(buf, keys[i].repl, in percent_expand()
1098 strlen(keys[i].repl))) != 0) { in percent_expand()
H A Dkex.c1060 u_char *keys[NKEYS]; in kex_derive_keys() local
1074 shared_secret, &keys[i])) != 0) { in kex_derive_keys()
1076 free(keys[j]); in kex_derive_keys() local
1083 kex->newkeys[mode]->enc.iv = keys[ctos ? 0 : 1]; in kex_derive_keys()
1084 kex->newkeys[mode]->enc.key = keys[ctos ? 2 : 3]; in kex_derive_keys()
1085 kex->newkeys[mode]->mac.key = keys[ctos ? 4 : 5]; in kex_derive_keys()
H A Dssh-agent.c567 struct sshkey **keys = NULL, *k; in process_add_smartcard_key() local
612 count = pkcs11_add_provider(canonical_provider, pin, &keys); in process_add_smartcard_key()
614 k = keys[i]; in process_add_smartcard_key()
628 keys[i] = NULL; in process_add_smartcard_key()
633 free(keys); in process_add_smartcard_key()
/openssh-portable/contrib/aix/
H A Dbuildbff.sh242 echo Creating host keys if required.
/openssh-portable/contrib/redhat/
H A Dopenssh.spec646 - Add a trigger to add host keys for protocol 2 to the config file, now that
666 - Only require openssl (don't prereq) because we generate keys in the init

Completed in 83 milliseconds