Home
last modified time | relevance | path

Searched refs:hostkey (Results 1 – 14 of 14) sorted by relevance

/freebsd/crypto/openssh/
H A Ddns.c197 struct sshkey *hostkey, int *flags) in verify_host_key_dns() argument
215 if (hostkey == NULL) in verify_host_key_dns()
259 &hostkey_digest, &hostkey_digest_len, hostkey)) { in verify_host_key_dns()
H A DPROTOCOL.agent18 string hostkey
23 Where 'hostkey' is the encoded server host public key, 'session
26 identifier using the private hostkey, as sent in the final
H A Dssh-agent.c713 struct sshkey *mkey = NULL, *hostkey = NULL; in parse_userauth_request() local
748 if ((r = sshkey_froms(b, &hostkey)) != 0) in parse_userauth_request()
770 *hostkeyp = hostkey; in parse_userauth_request()
771 hostkey = NULL; in parse_userauth_request()
781 sshkey_free(hostkey); in parse_userauth_request()
865 struct sshkey *key = NULL, *hostkey = NULL; in process_sign_request2() local
895 &hostkey) != 0) { in process_sign_request2()
923 if (e->nsession_ids > 1 && hostkey == NULL) { in process_sign_request2()
929 if (hostkey != NULL && !sshkey_equal(hostkey, in process_sign_request2()
999 sshkey_free(hostkey); in process_sign_request2()
H A Dauth2-pubkey.c94 struct sshkey *key = NULL, *hostkey = NULL; in userauth_pubkey() local
113 (r = sshkey_fromb(b, &hostkey)) != 0) in userauth_pubkey()
117 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey()
306 sshkey_free(hostkey); in userauth_pubkey()
H A Dssh_api.c514 _ssh_verify_host_key(struct sshkey *hostkey, struct ssh *ssh) in _ssh_verify_host_key() argument
518 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key()
521 if (sshkey_equal_public(hostkey, k->key)) in _ssh_verify_host_key()
H A Dssh-keyscan.c210 key_print_wrapper(struct sshkey *hostkey, struct ssh *ssh) in key_print_wrapper() argument
215 keyprint(c, hostkey); in key_print_wrapper()
H A Dmonitor.c1272 struct sshkey *hostkey = NULL; in monitor_valid_userblob() local
1331 (hostbound && (r = sshkey_froms(b, &hostkey)) != 0)) in monitor_valid_userblob()
1336 if (hostkey != NULL) { in monitor_valid_userblob()
1342 if (get_hostkey_index(hostkey, 1, ssh) == -1) in monitor_valid_userblob()
1344 sshkey_free(hostkey); in monitor_valid_userblob()
H A Dsshconnect2.c94 verify_host_key_callback(struct sshkey *hostkey, struct ssh *ssh) in verify_host_key_callback() argument
98 if ((r = sshkey_check_rsa_length(hostkey, in verify_host_key_callback()
101 if (verify_host_key(xxx_host, xxx_hostaddr, hostkey, in verify_host_key_callback()
H A DPROTOCOL367 2.5. connection: hostkey update and rotation "hostkeys-00@openssh.com"
399 string hostkey
H A DChangeLog2366 upstream: add explict check for server hostkey type against
3428 Prevents a future situation where we add a new hostkey type that is not
5101 to fall back to text revocation lists in some cases; fixes t-cert-hostkey.
/freebsd/crypto/openssh/regress/
H A DREADME.regress123 cert-hostkey.sh certified host keys
132 hostkey-agent.sh: hostkey agent
134 hostkey-rotate.sh: hostkey rotate
H A DMakefile86 cert-hostkey \
95 hostkey-agent \
96 hostkey-rotate \
/freebsd/contrib/ntp/util/
H A Dntp-keygen.c316 int hostkey = 0; /* generate RSA keys */ in main() local
400 hostkey++; in main()
588 if (hostkey) in main()
/freebsd/contrib/ntp/
H A DCommitLog[all...]