Home
last modified time | relevance | path

Searched refs:hostkey (Results 1 – 14 of 14) sorted by relevance

/freebsd/crypto/openssh/
H A Ddns.c197 struct sshkey *hostkey, int *flags) in verify_host_key_dns() argument
215 if (hostkey == NULL) in verify_host_key_dns()
259 &hostkey_digest, &hostkey_digest_len, hostkey)) { in verify_host_key_dns()
H A DPROTOCOL.agent18 string hostkey
23 Where 'hostkey' is the encoded server host public key, 'session
26 identifier using the private hostkey, as sent in the final
H A Dssh-agent.c718 struct sshkey *mkey = NULL, *hostkey = NULL; in parse_userauth_request() local
753 if ((r = sshkey_froms(b, &hostkey)) != 0) in parse_userauth_request()
775 *hostkeyp = hostkey; in parse_userauth_request()
776 hostkey = NULL; in parse_userauth_request()
786 sshkey_free(hostkey); in parse_userauth_request()
870 struct sshkey *key = NULL, *hostkey = NULL; in process_sign_request2() local
900 &hostkey) != 0) { in process_sign_request2()
928 if (e->nsession_ids > 1 && hostkey == NULL) { in process_sign_request2()
934 if (hostkey != NULL && !sshkey_equal(hostkey, in process_sign_request2()
1005 sshkey_free(hostkey); in process_sign_request2()
H A Dssh_api.c514 _ssh_verify_host_key(struct sshkey *hostkey, struct ssh *ssh) in _ssh_verify_host_key() argument
518 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key()
521 if (sshkey_equal_public(hostkey, k->key)) in _ssh_verify_host_key()
H A Dauth2-pubkey.c99 struct sshkey *key = NULL, *hostkey = NULL; in userauth_pubkey() local
118 (r = sshkey_fromb(b, &hostkey)) != 0) in userauth_pubkey()
122 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey()
311 sshkey_free(hostkey); in userauth_pubkey()
H A Dssh-keyscan.c210 key_print_wrapper(struct sshkey *hostkey, struct ssh *ssh) in key_print_wrapper() argument
215 keyprint(c, hostkey); in key_print_wrapper()
H A Dmonitor.c1369 struct sshkey *hostkey = NULL; in monitor_valid_userblob() local
1428 (hostbound && (r = sshkey_froms(b, &hostkey)) != 0)) in monitor_valid_userblob()
1433 if (hostkey != NULL) { in monitor_valid_userblob()
1439 if (get_hostkey_index(hostkey, 1, ssh) == -1) in monitor_valid_userblob()
1441 sshkey_free(hostkey); in monitor_valid_userblob()
H A Dsshconnect2.c94 verify_host_key_callback(struct sshkey *hostkey, struct ssh *ssh) in verify_host_key_callback() argument
98 if ((r = sshkey_check_rsa_length(hostkey, in verify_host_key_callback()
101 if (verify_host_key(xxx_host, xxx_hostaddr, hostkey, in verify_host_key_callback()
H A DPROTOCOL367 2.5. connection: hostkey update and rotation "hostkeys-00@openssh.com"
399 string hostkey
H A DChangeLog1665 arranging the hostkey algorithms. AFAIK this code is unused in OpenSSH, but I
4206 upstream: add explict check for server hostkey type against
5268 Prevents a future situation where we add a new hostkey type that is not
6941 to fall back to text revocation lists in some cases; fixes t-cert-hostkey.
/freebsd/crypto/openssh/regress/
H A DREADME.regress123 cert-hostkey.sh certified host keys
132 hostkey-agent.sh: hostkey agent
134 hostkey-rotate.sh: hostkey rotate
H A DMakefile87 cert-hostkey \
96 hostkey-agent \
97 hostkey-rotate \
/freebsd/contrib/ntp/util/
H A Dntp-keygen.c316 int hostkey = 0; /* generate RSA keys */ in main() local
400 hostkey++; in main()
588 if (hostkey) in main()
/freebsd/contrib/ntp/
H A DCommitLog[all...]