Searched refs:signature_key (Results 1 – 15 of 15) sorted by relevance
/freebsd/crypto/openssh/ |
H A D | auth2-pubkey.c | 180 ca_s = format_key(key->cert->signature_key); in userauth_pubkey() 396 if ((ca_fp = sshkey_fingerprint(cert->signature_key, in match_principals_command() 406 if ((r = sshkey_to_base64(cert->signature_key, &catext)) != 0) { in match_principals_command() 426 "T", sshkey_ssh_name(cert->signature_key), in match_principals_command() 497 if ((ca_fp = sshkey_fingerprint(key->cert->signature_key, in user_cert_trusted_ca() 501 if ((r = sshkey_in_file(key->cert->signature_key, in user_cert_trusted_ca() 504 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca() 567 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca() 767 auth_key_is_revoked(key->cert->signature_key)) in user_key_allowed()
|
H A D | auth2-hostbased.c | 235 if ((fp = sshkey_fingerprint(key->cert->signature_key, in hostbased_key_allowed() 240 sshkey_type(key->cert->signature_key), fp, in hostbased_key_allowed()
|
H A D | PROTOCOL.krl | 208 string signature_key 212 to this subsection's "signature_key", including both and using the 213 signature generation rules appropriate for the type of "signature_key".
|
H A D | krl.c | 460 key->cert->signature_key, in ssh_krl_revoke_key() 464 key->cert->signature_key, in ssh_krl_revoke_key() 1235 if ((r = revoked_certs_for_ca_key(krl, key->cert->signature_key, in is_key_revoked() 1264 if ((r = is_key_revoked(krl, key->cert->signature_key)) != 0) in ssh_krl_check_key()
|
H A D | auth.c | 242 cafp = sshkey_fingerprint(key->cert->signature_key, in format_method_key() 248 sshkey_type(key->cert->signature_key), in format_method_key()
|
H A D | sshkey.c | 690 sshkey_free(cert->signature_key); in cert_free() 710 cert->signature_key = NULL; in cert_new() 1562 if (from->signature_key == NULL) in sshkey_cert_copy() 1563 to->signature_key = NULL; in sshkey_cert_copy() 1564 else if ((r = sshkey_from_private(from->signature_key, in sshkey_cert_copy() 1565 &to->signature_key)) != 0) in sshkey_cert_copy() 1969 if (sshkey_from_blob_internal(ca, &key->cert->signature_key, 0) != 0) { in cert_parse() 1973 if (!sshkey_type_is_valid_ca(key->cert->signature_key->type)) { in cert_parse() 1977 if ((ret = sshkey_verify(key->cert->signature_key, sig, slen, in cert_parse()
|
H A D | sshkey.h | 122 struct sshkey *signature_key; member
|
H A D | hostfile.c | 327 sshkey_equal_public(k->cert->signature_key, in check_key_not_revoked() 378 if (sshkey_equal_public(k->cert->signature_key, in check_hostkeys_by_key_or_type()
|
H A D | auth2-pubkeyfile.c | 309 if (!sshkey_equal(found, key->cert->signature_key) || in auth_check_authkey_line()
|
H A D | authfile.c | 424 sshkey_compare(key->cert->signature_key, pub))) { in sshkey_in_file()
|
H A D | sshconnect.c | 1487 if ((cafp = sshkey_fingerprint(host_key->cert->signature_key, in verify_host_key() 1500 sshkey_ssh_name(host_key->cert->signature_key), cafp, in verify_host_key()
|
H A D | ssh-agent.c | 414 if (key->cert == NULL || key->cert->signature_key == NULL) in match_key_hop() 416 if (!sshkey_equal(key->cert->signature_key, dch->keys[i])) in match_key_hop()
|
H A D | sshsig.c | 915 sshkey_equal_public(sign_key->cert->signature_key, found_key)) { in check_allowed_keys_line()
|
H A D | ssh-keygen.c | 1900 &public->cert->signature_key)) != 0) in do_ca_sign() 2161 ca_fp = sshkey_fingerprint(key->cert->signature_key, in print_cert() 2171 sshkey_type(key->cert->signature_key), ca_fp, in print_cert()
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 451 ASSERT_INT_EQ(sshkey_from_private(k2, &k1->cert->signature_key), 0); in sshkey_tests()
|