Searched refs:sign_key (Results 1 – 5 of 5) sorted by relevance
/dragonfly/crypto/openssh/ |
H A D | sshsig.h | 88 int sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key, 104 int sshsig_find_principals(const char *path, const struct sshkey *sign_key,
|
H A D | sshsig.c | 879 const struct sshkey *sign_key, const char *principal, in check_allowed_keys_line() argument 899 if (!sigopts->ca && sshkey_equal(found_key, sign_key)) { in check_allowed_keys_line() 902 } else if (sigopts->ca && sshkey_is_cert(sign_key) && in check_allowed_keys_line() 903 sshkey_equal_public(sign_key->cert->signature_key, found_key)) { in check_allowed_keys_line() 906 if ((r = sshkey_cert_check_authority(sign_key, 0, 1, 0, in check_allowed_keys_line() 917 &principals, sign_key, verify_time)) != 0) { in check_allowed_keys_line() 973 sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key, in sshsig_check_allowed_keys() argument 993 r = check_allowed_keys_line(path, linenum, line, sign_key, in sshsig_check_allowed_keys() 1014 sshsig_find_principals(const char *path, const struct sshkey *sign_key, in sshsig_find_principals() argument 1035 sign_key, NULL, NULL, verify_time, principals); in sshsig_find_principals()
|
H A D | ssh-keygen.c | 2777 struct sshkey *sign_key = NULL; in sig_verify() local 2797 &sign_key, &sig_details)) != 0) in sig_verify() 2833 sig_namespace, sshkey_type(sign_key), fp); in sig_verify() 2838 sshkey_type(sign_key), fp); in sig_verify() 2845 if (ret == 0 && print_pubkey && sign_key != NULL) { in sig_verify() 2846 if ((r = sshkey_write(sign_key, stdout)) == 0) in sig_verify() 2855 sshkey_free(sign_key); in sig_verify() 2867 struct sshkey *sign_key = NULL; in sig_find_principals() local 2882 if ((r = sshsig_get_pubkey(sigbuf, &sign_key)) != 0) { in sig_find_principals() 2886 if ((r = sshsig_find_principals(allowed_keys, sign_key, in sig_find_principals() [all …]
|
H A D | sshconnect2.c | 1242 struct sshkey *sign_key = NULL, *prv = NULL; in identity_sign() local 1262 sign_key = id->key; in identity_sign() 1274 sign_key = prv; in identity_sign() 1278 if (!is_agent && sshkey_is_sk(sign_key) && in identity_sign() 1279 (sign_key->sk_flags & SSH_SK_USER_PRESENCE_REQD)) { in identity_sign() 1281 if ((fp = sshkey_fingerprint(sign_key, in identity_sign() 1286 sshkey_type(sign_key), fp); in identity_sign() 1289 if ((r = sshkey_sign(sign_key, sigp, lenp, data, datalen, in identity_sign() 1293 sshkey_is_sk(sign_key) && in identity_sign() 1298 sshkey_type(sign_key), id->filename); in identity_sign()
|
/dragonfly/contrib/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 675 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member 738 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey() 762 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey()
|