| /freebsd/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_file.c | 78 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 87 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 97 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 105 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 131 ASSERT_INT_EQ(sshkey_equal(k1, k2), 0); in sshkey_file_tests() 197 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 206 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 216 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 224 ASSERT_INT_EQ(sshkey_equal(k1, k2), 1); in sshkey_file_tests() 232 ASSERT_INT_EQ(sshkey_equal(k1, k2), 0); in sshkey_file_tests() [all …]
|
| H A D | test_sshkey.c | 365 ASSERT_INT_EQ(sshkey_equal(kr, k1), 1); in sshkey_tests() 386 ASSERT_INT_EQ(sshkey_equal(ke, k1), 1); in sshkey_tests() 403 ASSERT_INT_EQ(sshkey_equal(kf, k1), 1); in sshkey_tests() 410 ASSERT_INT_EQ(sshkey_equal(kd, kr), 0); in sshkey_tests() 412 ASSERT_INT_EQ(sshkey_equal(kd, ke), 0); in sshkey_tests() 413 ASSERT_INT_EQ(sshkey_equal(kr, ke), 0); in sshkey_tests() 414 ASSERT_INT_EQ(sshkey_equal(ke, kf), 0); in sshkey_tests() 416 ASSERT_INT_EQ(sshkey_equal(kd, kf), 0); in sshkey_tests() 423 ASSERT_INT_EQ(sshkey_equal(kr, k1), 0); in sshkey_tests() 428 ASSERT_INT_EQ(sshkey_equal(ke, k1), 0); in sshkey_tests() [all …]
|
| /freebsd/crypto/openssh/regress/unittests/sshsig/ |
| H A D | tests.c | 68 ASSERT_INT_EQ(sshkey_equal(k, sign_key), 1); in check_sig()
|
| /freebsd/crypto/openssh/ |
| H A D | auth2-pubkeyfile.c | 313 if (!sshkey_equal(found, key->cert->signature_key) || in auth_check_authkey_line() 318 if (!sshkey_equal(found, key) || keyopts->cert_authority) in auth_check_authkey_line()
|
| H A D | sshd-auth.c | 352 sshkey_equal(key, host_certificates[i]))) in get_hostkey_index() 357 sshkey_equal(key, host_pubkeys[i]))) in get_hostkey_index()
|
| H A D | sshd-session.c | 506 sshkey_equal(key, in get_hostkey_index() 512 sshkey_equal(key, sensitive_data.host_keys[i]))) in get_hostkey_index() 516 sshkey_equal(key, sensitive_data.host_pubkeys[i]))) in get_hostkey_index()
|
| H A D | sshkey.h | 189 int sshkey_equal(const struct sshkey *, const struct sshkey *);
|
| H A D | ssh-agent.c | 402 !sshkey_equal(key, dch->keys[i])) in match_key_hop() 411 if (!sshkey_equal(key->cert->signature_key, dch->keys[i])) in match_key_hop() 594 if (sshkey_equal(key, id->key)) in lookup_identity() 742 !sshkey_equal(expected_key, mkey) || in parse_userauth_request() 929 if (hostkey != NULL && !sshkey_equal(hostkey, in process_sign_request2() 1737 key_match = sshkey_equal(key, e->session_ids[i].key); in process_ext_session_bind()
|
| H A D | authfile.c | 374 strict_type ? sshkey_equal : sshkey_equal_public; in sshkey_in_file()
|
| H A D | sshconnect.c | 752 if (l->key == NULL || !sshkey_equal(ctx->key, l->key)) in hostkeys_find_by_key_cb() 1075 !sshkey_equal(ip_found->key, host_found->key)))) in check_host_key() 1506 if (sshkey_equal(previous_host_key, host_key)) { in verify_host_key()
|
| H A D | hostfile.c | 387 if (sshkey_equal(k, hostkeys->entries[i].key)) { in check_hostkeys_by_key_or_type() 593 if (!sshkey_equal(ctx->keys[i], l->key)) in host_delete()
|
| H A D | clientloop.c | 2127 if (sshkey_equal(l->key, ctx->keys[i])) { in hostkeys_find() 2176 if (!sshkey_equal(l->key, ctx->keys[i])) in hostkeys_find() 2210 if (!sshkey_equal(l->key, ctx->old_keys[i])) in hostkeys_check_old() 2513 if (sshkey_equal(key, ctx->keys[i])) { in client_input_hostkeys()
|
| H A D | sshconnect2.c | 724 if (sshkey_equal(key, id->key)) { in input_userauth_pk_ok() 1753 if (sshkey_equal(idlist->keys[j], id->key)) { in pubkey_prepare() 1786 if (sshkey_equal(id->key, id2->key)) { in pubkey_prepare()
|
| H A D | auth2-pubkey.c | 116 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey()
|
| H A D | sshsig.c | 916 if (!sigopts->ca && sshkey_equal(found_key, sign_key)) { in check_allowed_keys_line()
|
| H A D | ssh_namespace.h | 876 #define sshkey_equal Fssh_sshkey_equal macro
|
| H A D | krl.c | 225 sshkey_equal(rc->ca_key, ca_key)) { in revoked_certs_for_ca_key()
|
| H A D | sshd.c | 1678 if (!sshkey_equal(pubkey, key)) { in main()
|
| H A D | sshkey.c | 837 sshkey_equal(const struct sshkey *a, const struct sshkey *b) in sshkey_equal() function 3198 if (!sshkey_equal(pubkey, k)) { in sshkey_parse_private2()
|
| H A D | ssh-pkcs11.c | 846 if (sshkey_equal(key, (*keysp)[i])) in pkcs11_key_included()
|
| H A D | ssh-keygen.c | 1746 if (sshkey_equal(ca, agent_ids->keys[j])) { in do_ca_sign()
|
| /freebsd/crypto/openssh/regress/unittests/hostkeys/ |
| H A D | test_iterate.c | 133 ASSERT_INT_EQ(sshkey_equal(l->key, expected->l.key), 1); in check()
|