/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 415 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_1.pub"), in sshkey_tests() 463 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 472 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 481 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 491 ASSERT_INT_EQ(sshkey_load_public(test_data_file("dsa_2.pub"), &k2, in sshkey_tests() 502 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2, in sshkey_tests() 513 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_2.pub"), &k2, in sshkey_tests() 523 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_1.pub"), &k2, in sshkey_tests()
|
H A D | test_file.c | 105 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_1.pub"), &k2, in sshkey_file_tests() 215 ASSERT_INT_EQ(sshkey_load_public(test_data_file("dsa_1.pub"), &k2, in sshkey_file_tests() 316 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_1.pub"), &k2, in sshkey_file_tests() 383 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_1.pub"), &k2, in sshkey_file_tests() 449 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_sk1.pub"), &k2, in sshkey_file_tests() 515 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_sk1.pub"), in sshkey_file_tests()
|
/freebsd/crypto/openssh/ |
H A D | authfile.h | 39 int sshkey_load_public(const char *, struct sshkey **, char **);
|
H A D | ssh-add.c | 181 if ((r = sshkey_load_public(filename, &public, &comment)) != 0) { in delete_file() 199 if ((r = sshkey_load_public(certpath, &cert, &comment)) != 0) { in delete_file() 405 if ((r = sshkey_load_public(certpath, &cert, NULL)) != 0) { in add_file() 506 if ((r = sshkey_load_public(filename, &key, NULL)) != 0) { in test_key() 993 if ((r = sshkey_load_public(argv[i], &k, NULL)) != 0) in main()
|
H A D | ssh-keygen.c | 436 if ((r = sshkey_load_public(identity_file, &k, NULL)) != 0) in do_convert_to() 942 if ((r = sshkey_load_public(path, &pubkey, &comment)) != 0) in fingerprint_private() 1521 if ((r = sshkey_load_public(fname, &public, &comment)) != 0) in do_print_resource_record() 1730 if ((r = sshkey_load_public(path, &public, NULL)) != 0) in load_pkcs11_key() 1794 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0) in do_ca_sign() 1852 if ((r = sshkey_load_public(tmp, &public, &comment)) != 0) in do_ca_sign() 2460 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0) in do_gen_krl() 2504 if ((r = sshkey_load_public(argv[i], &k, &comment)) != 0) in do_check_krl() 2738 if ((r = sshkey_load_public(keypath, &pubkey, NULL)) != 0) { in sig_sign()
|
H A D | authfile.c | 265 sshkey_load_public(const char *filename, struct sshkey **keyp, char **commentp) in sshkey_load_public() function
|
H A D | ssh.c | 1686 check_load(sshkey_load_public(p, &(sensitive_data.keys[o]), NULL), \ in main() 2392 check_load(sshkey_load_public(filename, &public, NULL), in load_public_identity_files() 2411 check_load(sshkey_load_public(cp, &public, NULL), in load_public_identity_files() 2442 check_load(sshkey_load_public(filename, &public, NULL), in load_public_identity_files()
|
H A D | sshd.c | 1935 if ((r = sshkey_load_public(options.host_key_files[i], 2014 if ((r = sshkey_load_public(options.host_cert_files[i],
|
H A D | ssh_namespace.h | 880 #define sshkey_load_public Fssh_sshkey_load_public macro
|
/freebsd/crypto/openssh/regress/unittests/sshsig/ |
H A D | tests.c | 49 ASSERT_INT_EQ(sshkey_load_public(test_data_file(name), &ret, NULL), 0); in load_key()
|
/freebsd/crypto/openssh/regress/unittests/authopt/ |
H A D | tests.c | 33 r = sshkey_load_public(test_data_file(name), &ret, NULL); in load_key()
|
/freebsd/crypto/openssh/regress/unittests/hostkeys/ |
H A D | test_iterate.c | 175 ASSERT_INT_EQ(sshkey_load_public( in prepare_expected()
|