Home
last modified time | relevance | path

Searched refs:sign_key (Results 1 – 7 of 7) sorted by relevance

/freebsd/crypto/openssh/regress/unittests/sshsig/
H A Dtests.c58 struct sshkey *k, *sign_key; in check_sig() local
64 sign_key = NULL; in check_sig()
69 &sign_key, &sig_details), 0); in check_sig()
70 ASSERT_INT_EQ(sshkey_equal(k, sign_key), 1); in check_sig()
72 sshkey_free(sign_key); in check_sig()
/freebsd/crypto/openssh/
H A Dsshsig.h88 int sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key,
104 int sshsig_find_principals(const char *path, const struct sshkey *sign_key,
H A Dsshsig.c891 const struct sshkey *sign_key, const char *principal, in check_allowed_keys_line() argument
911 if (!sigopts->ca && sshkey_equal(found_key, sign_key)) { in check_allowed_keys_line()
914 } else if (sigopts->ca && sshkey_is_cert(sign_key) && in check_allowed_keys_line()
915 sshkey_equal_public(sign_key->cert->signature_key, found_key)) { in check_allowed_keys_line()
918 if ((r = sshkey_cert_check_authority(sign_key, 0, 1, 0, in check_allowed_keys_line()
929 &principals, sign_key, verify_time)) != 0) { in check_allowed_keys_line()
985 sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key, in sshsig_check_allowed_keys() argument
1005 r = check_allowed_keys_line(path, linenum, line, sign_key, in sshsig_check_allowed_keys()
1026 sshsig_find_principals(const char *path, const struct sshkey *sign_key, in sshsig_find_principals() argument
1046 sign_key, NULL, NULL, verify_time, principals); in sshsig_find_principals()
H A Dssh-keygen.c2835 struct sshkey *sign_key = NULL; in sig_verify() local
2855 &sign_key, &sig_details)) != 0) in sig_verify()
2858 if ((fp = sshkey_fingerprint(sign_key, fingerprint_hash, in sig_verify()
2870 if ((r = sshkey_check_revoked(sign_key, revoked_keys)) != 0) { in sig_verify()
2877 sign_key, principal, sig_namespace, verify_time)) != 0) { in sig_verify()
2886 if ((fp = sshkey_fingerprint(sign_key, fingerprint_hash, in sig_verify()
2891 sig_namespace, sshkey_type(sign_key), fp); in sig_verify()
2896 sshkey_type(sign_key), fp); in sig_verify()
2903 if (ret == 0 && print_pubkey && sign_key != NULL) { in sig_verify()
2904 if ((r = sshkey_write(sign_key, stdout)) == 0) in sig_verify()
[all …]
H A Dsshconnect2.c1208 struct sshkey *sign_key = NULL, *prv = NULL; in identity_sign() local
1228 sign_key = id->key; in identity_sign()
1240 sign_key = prv; in identity_sign()
1244 if (!is_agent && sshkey_is_sk(sign_key) && in identity_sign()
1245 (sign_key->sk_flags & SSH_SK_USER_PRESENCE_REQD)) { in identity_sign()
1247 if ((fp = sshkey_fingerprint(sign_key, in identity_sign()
1252 sshkey_type(sign_key), fp); in identity_sign()
1255 if ((r = sshkey_sign(sign_key, sigp, lenp, data, datalen, in identity_sign()
1259 sshkey_is_sk(sign_key) && in identity_sign()
1264 sshkey_type(sign_key), id->filename); in identity_sign()
/freebsd/crypto/openssh/regress/unittests/sshkey/
H A Dtest_sshkey.c58 struct sshkey *sign_key, struct sshkey *ca_key, in build_cert() argument
105 ASSERT_INT_EQ(sshkey_sign(sign_key, &sigblob, &siglen, in build_cert()
/freebsd/contrib/wpa/src/eapol_supp/
H A Deapol_supp_sm.c689 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member
753 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey()
777 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey()