Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 24 of 24) sorted by relevance

/openssh-portable/regress/
H A Dkeys-command.sh12 rm -f $OBJ/keys-command-args
14 touch $OBJ/keys-command-args
15 chmod a+rw $OBJ/keys-command-args
26 echo args: "\$@" >> $OBJ/keys-command-args
40 if ! $OBJ/check-perm -m keys-command $KEY_COMMAND ; then
H A Dkrl.sh114 $SSHKEYGEN $OPTS -kf $OBJ/krl-keys $RKEYS \
183 check_krl $f $OBJ/krl-keys $KEYS_RESULT "$TAG"
210 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
H A Dprincipals-command.sh57 if ! $OBJ/check-perm -m keys-command $PRINCIPALS_COMMAND ; then
H A DMakefile78 keys-command \
115 key.ed25519-512.pub key.rsa-* keys-command-args kh.* \
/openssh-portable/
H A Dssh-add.c294 left = sshkey_signatures_left(idlist->keys[i]); in add_file()
485 fp = sshkey_fingerprint(idlist->keys[i], in list_identities()
489 sshkey_type(idlist->keys[i])); in list_identities()
498 left = sshkey_signatures_left(idlist->keys[i]); in list_identities()
544 struct sshkey **keys; in load_resident_keys() local
551 &keys, &nkeys)) != 0) { in load_resident_keys()
556 if ((fp = sshkey_fingerprint(keys[i], in load_resident_keys()
562 sshkey_type(keys[i]), fp); in load_resident_keys()
571 sshkey_type(keys[i]), fp); in load_resident_keys()
582 sshkey_free(keys[i]); in load_resident_keys() local
[all …]
H A Dssh-sk-client.c385 struct sshkey *key = NULL, **keys = NULL, **tmp; in sshsk_load_resident()
420 if ((tmp = recallocarray(keys, nkeys, nkeys + 1, in sshsk_load_resident()
421 sizeof(*keys))) == NULL) { in sshsk_load_resident()
427 keys = tmp; in sshsk_load_resident()
428 keys[nkeys++] = key; in sshsk_load_resident()
434 *keysp = keys; in sshsk_load_resident()
436 keys = NULL; in sshsk_load_resident()
441 sshkey_free(keys[i]); in sshsk_load_resident() local
442 free(keys); in sshsk_load_resident()
H A Dssh-keysign.c169 struct sshkey *keys[NUM_KEYTYPES], *key = NULL; in main() local
224 keys[i] = NULL; in main()
233 keys[i] = key; in main()
266 if (keys[i] != NULL && in main()
267 sshkey_equal_public(key, keys[i])) { in main()
280 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, in main()
H A Dssh-sk-helper.c214 struct sshkey **keys = NULL; in process_load_resident() local
231 &keys, &nkeys)) != 0) { in process_load_resident()
245 sshkey_type(keys[i]), keys[i]->sk_application); in process_load_resident()
247 if ((r = sshkey_private_serialize(keys[i], kbuf)) != 0) in process_load_resident()
257 sshkey_free(keys[i]); in process_load_resident() local
258 free(keys); in process_load_resident()
H A Dauthfd.c288 (idl->keys = calloc(num, sizeof(*idl->keys))) == NULL || in ssh_fetch_identitylist()
294 if ((r = deserialise_identity2(msg, &(idl->keys[i]), in ssh_fetch_identitylist()
324 if (idl->keys != NULL) in ssh_free_identitylist()
325 sshkey_free(idl->keys[i]); in ssh_free_identitylist()
329 free(idl->keys); in ssh_free_identitylist()
350 if (sshkey_equal_public(idlist->keys[i], key)) { in ssh_agent_has_key()
H A Dssh-keygen.c862 sshkey_free(keys[i]); in do_download() local
865 free(keys); in do_download()
1712 &keys, NULL); in load_pkcs11_key()
1718 private = keys[i]; in load_pkcs11_key()
1721 sshkey_free(keys[i]); in load_pkcs11_key() local
1723 free(keys); in load_pkcs11_key()
2965 struct sshkey **keys; in do_download_sk() local
2989 sshkey_type(keys[i]), keys[i]->type); in do_download_sk()
2996 sshkey_type(keys[i]), fp, keys[i]->sk_application, in do_download_sk()
3046 sshkey_free(keys[i]); in do_download_sk() local
[all …]
H A Dssh-pkcs11-helper.c121 struct sshkey **keys = NULL; in process_add() local
133 if ((nkeys = pkcs11_add_provider(name, pin, &keys, &labels)) > 0) { in process_add()
139 if ((r = sshkey_to_blob(keys[i], &blob, &blen)) != 0) { in process_add()
149 add_key(keys[i], name, labels[i]); in process_add() local
159 free(keys); /* keys themselves are transferred to pkcs11_keylist */ in process_add()
H A Dhostfile.c467 struct sshkey * const *keys; member
492 if (sshkey_equal(ctx->keys[i], l->key)) { in host_delete()
523 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument
539 ctx.keys = keys; in hostfile_replace_entries()
578 if ((fp = sshkey_fingerprint(keys[i], hash_alg, in hostfile_replace_entries()
585 sshkey_ssh_name(keys[i]), fp); in hostfile_replace_entries()
587 if (!write_host_entry(ctx.out, host, ip, keys[i], store_hash)) { in hostfile_replace_entries()
H A Dclientloop.c1829 struct sshkey **keys; member
1850 sshkey_free(ctx->keys[i]); in hostkeys_update_ctx_free()
1851 free(ctx->keys); in hostkeys_update_ctx_free()
1873 if (sshkey_equal(l->key, ctx->keys[i])) { in hostkeys_find()
1915 if ((fp = sshkey_fingerprint(ctx->keys[i], in update_known_hosts()
1921 sshkey_type(ctx->keys[i]), fp); in update_known_hosts()
2057 __func__, sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_private_confirm()
2157 if (sshkey_equal(key, ctx->keys[i])) { in client_input_hostkeys()
2165 sizeof(*ctx->keys))) == NULL) in client_input_hostkeys()
2168 ctx->keys = tmp; in client_input_hostkeys()
[all …]
H A Dssh-sk.c741 struct sshkey *key = NULL, **keys = NULL, **tmp; in sshsk_load_resident()
783 if ((tmp = recallocarray(keys, nkeys, nkeys + 1, in sshsk_load_resident()
789 keys = tmp; in sshsk_load_resident()
790 keys[nkeys++] = key; in sshsk_load_resident()
795 *keysp = keys; in sshsk_load_resident()
797 keys = NULL; in sshsk_load_resident()
807 sshkey_free(keys[i]); in sshsk_load_resident() local
808 free(keys); in sshsk_load_resident()
H A Dsshconnect2.c287 struct idlist keys; member
1571 preferred = &authctxt->keys; in pubkey_prepare()
1651 id->key = idlist->keys[j]; in pubkey_prepare()
1653 idlist->keys[j] = NULL; in pubkey_prepare()
1726 for (id = TAILQ_FIRST(&authctxt->keys); id; in pubkey_cleanup()
1727 id = TAILQ_FIRST(&authctxt->keys)) { in pubkey_cleanup()
1728 TAILQ_REMOVE(&authctxt->keys, id, next); in pubkey_cleanup()
1740 TAILQ_FOREACH(id, &authctxt->keys, next) in pubkey_reset()
1770 TAILQ_REMOVE(&authctxt->keys, id, next); in userauth_pubkey()
2061 private = authctxt->sensitive->keys[i]; in userauth_hostbased()
[all …]
H A Dsshconnect.h29 struct sshkey **keys; member
H A Dssh.c1453 sensitive_data.keys = NULL; in main()
1456 sensitive_data.keys = xcalloc(sensitive_data.nkeys, in main()
1593 if (sensitive_data.keys[i] != NULL) { in main()
1596 sshkey_free(sensitive_data.keys[i]); in main()
1597 sensitive_data.keys[i] = NULL; in main()
1600 free(sensitive_data.keys); in main()
2102 struct sshkey **keys = NULL; in load_public_identity_files() local
2122 &keys, &comments)) > 0) { in load_public_identity_files()
2125 sshkey_free(keys[i]); in load_public_identity_files() local
2129 identity_keys[n_ids] = keys[i]; in load_public_identity_files()
[all …]
H A Dhostfile.h48 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
H A Dauthfd.h22 struct sshkey **keys; member
H A Dssh-agent.c653 struct sshkey **keys = NULL, *k; in process_add_smartcard_key() local
698 count = pkcs11_add_provider(canonical_provider, pin, &keys, &comments); in process_add_smartcard_key()
700 k = keys[i]; in process_add_smartcard_key()
704 keys[i] = NULL; /* transferred */ in process_add_smartcard_key()
718 sshkey_free(keys[i]); in process_add_smartcard_key() local
724 free(keys); in process_add_smartcard_key()
H A Dmisc.c1068 } keys[EXPAND_MAX_KEYS]; in percent_expand() local
1080 keys[num_keys].key = va_arg(ap, char *); in percent_expand()
1081 if (keys[num_keys].key == NULL) in percent_expand()
1083 keys[num_keys].repl = va_arg(ap, char *); in percent_expand()
1084 if (keys[num_keys].repl == NULL) in percent_expand()
1108 if (strchr(keys[i].key, *string) != NULL) { in percent_expand() local
1109 if ((r = sshbuf_put(buf, keys[i].repl, in percent_expand()
1110 strlen(keys[i].repl))) != 0) { in percent_expand()
H A Dkex.c1065 u_char *keys[NKEYS]; in kex_derive_keys() local
1079 shared_secret, &keys[i])) != 0) { in kex_derive_keys()
1081 free(keys[j]); in kex_derive_keys() local
1088 kex->newkeys[mode]->enc.iv = keys[ctos ? 0 : 1]; in kex_derive_keys()
1089 kex->newkeys[mode]->enc.key = keys[ctos ? 2 : 3]; in kex_derive_keys()
1090 kex->newkeys[mode]->mac.key = keys[ctos ? 4 : 5]; in kex_derive_keys()
/openssh-portable/contrib/aix/
H A Dbuildbff.sh242 echo Creating host keys if required.
/openssh-portable/contrib/redhat/
H A Dopenssh.spec646 - Add a trigger to add host keys for protocol 2 to the config file, now that
666 - Only require openssl (don't prereq) because we generate keys in the init

Completed in 37 milliseconds