/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/identity/ipa/ |
H A D | ipa_user.py | 254 key_fp = ':'.join(a + b for a, b in zip(fp_plain[::2], fp_plain[1::2])).upper() 257 key_fp = 'SHA256:{fp}'.format(fp=fp_plain) 259 return "%s (%s)" % (key_fp, key_type) 262 return "%s %s (%s)" % (key_fp, user_host, key_type)
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/identity/ipa/ |
H A D | ipa_user.py | 294 key_fp = ':'.join(a + b for a, b in zip(fp_plain[::2], fp_plain[1::2])).upper() 297 key_fp = 'SHA256:{fp}'.format(fp=fp_plain) 299 return "%s (%s)" % (key_fp, key_type) 302 return "%s %s (%s)" % (key_fp, comment, key_type)
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/ |
H A D | ipa_user.py | 294 key_fp = ':'.join(a + b for a, b in zip(fp_plain[::2], fp_plain[1::2])).upper() 297 key_fp = 'SHA256:{fp}'.format(fp=fp_plain) 299 return "%s (%s)" % (key_fp, key_type) 302 return "%s %s (%s)" % (key_fp, comment, key_type)
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | auth2-pubkey.c | 420 char *ca_fp = NULL, *key_fp = NULL, *catext = NULL, *keytext = NULL; in match_principals_command() local 466 if ((key_fp = sshkey_fingerprint(key, in match_principals_command() 490 "f", key_fp, in match_principals_command() 535 free(key_fp); in match_principals_command() 891 char *username = NULL, *key_fp = NULL, *keytext = NULL; in user_key_command_allowed2() local 921 if ((key_fp = sshkey_fingerprint(key, options.fingerprint_hash, in user_key_command_allowed2() 950 "f", key_fp, in user_key_command_allowed2() 1005 free(key_fp); in user_key_command_allowed2()
|
H A D | ssh-keygen.c | 1979 char valid[64], *key_fp, *ca_fp; 1982 key_fp = sshkey_fingerprint(key, fingerprint_hash, SSH_FP_DEFAULT); 1985 if (key_fp == NULL || ca_fp == NULL) 1991 printf(" Public key: %s %s\n", sshkey_type(key), key_fp);
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | auth2-pubkey.c | 447 char *ca_fp = NULL, *key_fp = NULL, *catext = NULL, *keytext = NULL; in match_principals_command() local 494 if ((key_fp = sshkey_fingerprint(key, in match_principals_command() 518 "f", key_fp, in match_principals_command() 564 free(key_fp); in match_principals_command() 889 char *username = NULL, *key_fp = NULL, *keytext = NULL; in user_key_command_allowed2() local 919 if ((key_fp = sshkey_fingerprint(key, options.fingerprint_hash, in user_key_command_allowed2() 948 "f", key_fp, in user_key_command_allowed2() 1004 free(key_fp); in user_key_command_allowed2()
|
H A D | sshconnect.c | 846 char *key_fp = NULL, *keytext = NULL, *tmp; in load_hostkeys_command() local 855 if ((key_fp = sshkey_fingerprint(host_key, in load_hostkeys_command() 884 "f", key_fp == NULL ? "NONE" : key_fp, in load_hostkeys_command() 914 free(key_fp); in load_hostkeys_command()
|
H A D | ssh-keygen.c | 2072 char valid[64], *key_fp, *ca_fp; in print_cert() local 2075 key_fp = sshkey_fingerprint(key, fingerprint_hash, SSH_FP_DEFAULT); in print_cert() 2078 if (key_fp == NULL || ca_fp == NULL) in print_cert() 2084 printf(" Public key: %s %s\n", sshkey_type(key), key_fp); in print_cert()
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | auth.c | 662 char *key_fp; in auth_key_is_revoked() local 688 key_fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); in auth_key_is_revoked() 690 "%s key %s ", key_type(key), key_fp); in auth_key_is_revoked() 691 free(key_fp); in auth_key_is_revoked()
|
H A D | ssh-keygen.c | 1868 char *key_fp, *ca_fp; in do_show_cert() local 1881 key_fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); in do_show_cert() 1888 printf(" Public key: %s %s\n", key_type(key), key_fp); in do_show_cert()
|
/dports/databases/proftpd-mod_sql_postgres/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/databases/proftpd-mod_sql_sqlite/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/databases/proftpd-mod_sql_mysql/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/databases/proftpd-mod_sql_tds/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/databases/proftpd-mod_sql_odbc/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/net/proftpd-mod_ldap/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/security/proftpd-mod_clamav/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/ftp/proftpd/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|
/dports/ftp/proftpd-mod_vroot/proftpd-1.3.7c/tests/t/lib/ProFTPD/Tests/Modules/ |
H A D | mod_sftp_sql.pm | 2215 my ($login, $key_fp, $key_fp_algo) = get_sessions($db_file, 2227 $self->assert($expected_md5 eq $key_fp || $expected_sha256 eq $key_fp, 2228 test_msg("Expected key fingerprint '$expected_md5' or '$expected_sha256', got '$key_fp'"));
|