/freebsd/crypto/openssh/regress/unittests/sshsig/ |
H A D | tests.c | 58 struct sshkey *k, *sign_key; in check_sig() local 64 sign_key = NULL; in check_sig() 69 &sign_key, &sig_details), 0); in check_sig() 70 ASSERT_INT_EQ(sshkey_equal(k, sign_key), 1); in check_sig() 72 sshkey_free(sign_key); in check_sig()
|
/freebsd/crypto/openssh/ |
H A D | sshsig.h | 88 int sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key, 104 int sshsig_find_principals(const char *path, const struct sshkey *sign_key,
|
H A D | sshsig.c | 891 const struct sshkey *sign_key, const char *principal, in check_allowed_keys_line() argument 911 if (!sigopts->ca && sshkey_equal(found_key, sign_key)) { in check_allowed_keys_line() 914 } else if (sigopts->ca && sshkey_is_cert(sign_key) && in check_allowed_keys_line() 915 sshkey_equal_public(sign_key->cert->signature_key, found_key)) { in check_allowed_keys_line() 918 if ((r = sshkey_cert_check_authority(sign_key, 0, 1, 0, in check_allowed_keys_line() 929 &principals, sign_key, verify_time)) != 0) { in check_allowed_keys_line() 985 sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key, in sshsig_check_allowed_keys() argument 1005 r = check_allowed_keys_line(path, linenum, line, sign_key, in sshsig_check_allowed_keys() 1026 sshsig_find_principals(const char *path, const struct sshkey *sign_key, in sshsig_find_principals() argument 1046 sign_key, NULL, NULL, verify_time, principals); in sshsig_find_principals()
|
H A D | ssh-keygen.c | 2835 struct sshkey *sign_key = NULL; in sig_verify() local 2855 &sign_key, &sig_details)) != 0) in sig_verify() 2858 if ((fp = sshkey_fingerprint(sign_key, fingerprint_hash, in sig_verify() 2870 if ((r = sshkey_check_revoked(sign_key, revoked_keys)) != 0) { in sig_verify() 2877 sign_key, principal, sig_namespace, verify_time)) != 0) { in sig_verify() 2886 if ((fp = sshkey_fingerprint(sign_key, fingerprint_hash, in sig_verify() 2891 sig_namespace, sshkey_type(sign_key), fp); in sig_verify() 2896 sshkey_type(sign_key), fp); in sig_verify() 2903 if (ret == 0 && print_pubkey && sign_key != NULL) { in sig_verify() 2904 if ((r = sshkey_write(sign_key, stdout)) == 0) in sig_verify() [all …]
|
H A D | sshconnect2.c | 1208 struct sshkey *sign_key = NULL, *prv = NULL; in identity_sign() local 1228 sign_key = id->key; in identity_sign() 1240 sign_key = prv; in identity_sign() 1244 if (!is_agent && sshkey_is_sk(sign_key) && in identity_sign() 1245 (sign_key->sk_flags & SSH_SK_USER_PRESENCE_REQD)) { in identity_sign() 1247 if ((fp = sshkey_fingerprint(sign_key, in identity_sign() 1252 sshkey_type(sign_key), fp); in identity_sign() 1255 if ((r = sshkey_sign(sign_key, sigp, lenp, data, datalen, in identity_sign() 1259 sshkey_is_sk(sign_key) && in identity_sign() 1264 sshkey_type(sign_key), id->filename); in identity_sign()
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 58 struct sshkey *sign_key, struct sshkey *ca_key, in build_cert() argument 105 ASSERT_INT_EQ(sshkey_sign(sign_key, &sigblob, &siglen, in build_cert()
|
/freebsd/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 689 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member 753 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey() 777 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey()
|