Searched refs:hostkey (Results 1 – 14 of 14) sorted by relevance
/freebsd/crypto/openssh/ |
H A D | dns.c | 197 struct sshkey *hostkey, int *flags) in verify_host_key_dns() argument 215 if (hostkey == NULL) in verify_host_key_dns() 259 &hostkey_digest, &hostkey_digest_len, hostkey)) { in verify_host_key_dns()
|
H A D | PROTOCOL.agent | 18 string hostkey 23 Where 'hostkey' is the encoded server host public key, 'session 26 identifier using the private hostkey, as sent in the final
|
H A D | ssh-agent.c | 713 struct sshkey *mkey = NULL, *hostkey = NULL; in parse_userauth_request() local 748 if ((r = sshkey_froms(b, &hostkey)) != 0) in parse_userauth_request() 770 *hostkeyp = hostkey; in parse_userauth_request() 771 hostkey = NULL; in parse_userauth_request() 781 sshkey_free(hostkey); in parse_userauth_request() 865 struct sshkey *key = NULL, *hostkey = NULL; in process_sign_request2() local 895 &hostkey) != 0) { in process_sign_request2() 923 if (e->nsession_ids > 1 && hostkey == NULL) { in process_sign_request2() 929 if (hostkey != NULL && !sshkey_equal(hostkey, in process_sign_request2() 999 sshkey_free(hostkey); in process_sign_request2()
|
H A D | auth2-pubkey.c | 94 struct sshkey *key = NULL, *hostkey = NULL; in userauth_pubkey() local 113 (r = sshkey_fromb(b, &hostkey)) != 0) in userauth_pubkey() 117 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey() 306 sshkey_free(hostkey); in userauth_pubkey()
|
H A D | ssh_api.c | 514 _ssh_verify_host_key(struct sshkey *hostkey, struct ssh *ssh) in _ssh_verify_host_key() argument 518 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key() 521 if (sshkey_equal_public(hostkey, k->key)) in _ssh_verify_host_key()
|
H A D | ssh-keyscan.c | 210 key_print_wrapper(struct sshkey *hostkey, struct ssh *ssh) in key_print_wrapper() argument 215 keyprint(c, hostkey); in key_print_wrapper()
|
H A D | monitor.c | 1272 struct sshkey *hostkey = NULL; in monitor_valid_userblob() local 1331 (hostbound && (r = sshkey_froms(b, &hostkey)) != 0)) in monitor_valid_userblob() 1336 if (hostkey != NULL) { in monitor_valid_userblob() 1342 if (get_hostkey_index(hostkey, 1, ssh) == -1) in monitor_valid_userblob() 1344 sshkey_free(hostkey); in monitor_valid_userblob()
|
H A D | sshconnect2.c | 94 verify_host_key_callback(struct sshkey *hostkey, struct ssh *ssh) in verify_host_key_callback() argument 98 if ((r = sshkey_check_rsa_length(hostkey, in verify_host_key_callback() 101 if (verify_host_key(xxx_host, xxx_hostaddr, hostkey, in verify_host_key_callback()
|
H A D | PROTOCOL | 367 2.5. connection: hostkey update and rotation "hostkeys-00@openssh.com" 399 string hostkey
|
H A D | ChangeLog | 2366 upstream: add explict check for server hostkey type against 3428 Prevents a future situation where we add a new hostkey type that is not 5101 to fall back to text revocation lists in some cases; fixes t-cert-hostkey.
|
/freebsd/crypto/openssh/regress/ |
H A D | README.regress | 123 cert-hostkey.sh certified host keys 132 hostkey-agent.sh: hostkey agent 134 hostkey-rotate.sh: hostkey rotate
|
H A D | Makefile | 86 cert-hostkey \ 95 hostkey-agent \ 96 hostkey-rotate \
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.c | 316 int hostkey = 0; /* generate RSA keys */ in main() local 400 hostkey++; in main() 588 if (hostkey) in main()
|
/freebsd/contrib/ntp/ |
H A D | CommitLog | [all...] |