Home
last modified time | relevance | path

Searched refs:sign_key (Results 1 – 5 of 5) sorted by relevance

/dragonfly/crypto/openssh/
H A Dsshsig.h88 int sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key,
104 int sshsig_find_principals(const char *path, const struct sshkey *sign_key,
H A Dsshsig.c879 const struct sshkey *sign_key, const char *principal, in check_allowed_keys_line() argument
899 if (!sigopts->ca && sshkey_equal(found_key, sign_key)) { in check_allowed_keys_line()
902 } else if (sigopts->ca && sshkey_is_cert(sign_key) && in check_allowed_keys_line()
903 sshkey_equal_public(sign_key->cert->signature_key, found_key)) { in check_allowed_keys_line()
906 if ((r = sshkey_cert_check_authority(sign_key, 0, 1, 0, in check_allowed_keys_line()
917 &principals, sign_key, verify_time)) != 0) { in check_allowed_keys_line()
973 sshsig_check_allowed_keys(const char *path, const struct sshkey *sign_key, in sshsig_check_allowed_keys() argument
993 r = check_allowed_keys_line(path, linenum, line, sign_key, in sshsig_check_allowed_keys()
1014 sshsig_find_principals(const char *path, const struct sshkey *sign_key, in sshsig_find_principals() argument
1035 sign_key, NULL, NULL, verify_time, principals); in sshsig_find_principals()
H A Dssh-keygen.c2777 struct sshkey *sign_key = NULL; in sig_verify() local
2797 &sign_key, &sig_details)) != 0) in sig_verify()
2833 sig_namespace, sshkey_type(sign_key), fp); in sig_verify()
2838 sshkey_type(sign_key), fp); in sig_verify()
2845 if (ret == 0 && print_pubkey && sign_key != NULL) { in sig_verify()
2846 if ((r = sshkey_write(sign_key, stdout)) == 0) in sig_verify()
2855 sshkey_free(sign_key); in sig_verify()
2867 struct sshkey *sign_key = NULL; in sig_find_principals() local
2882 if ((r = sshsig_get_pubkey(sigbuf, &sign_key)) != 0) { in sig_find_principals()
2886 if ((r = sshsig_find_principals(allowed_keys, sign_key, in sig_find_principals()
[all …]
H A Dsshconnect2.c1242 struct sshkey *sign_key = NULL, *prv = NULL; in identity_sign() local
1262 sign_key = id->key; in identity_sign()
1274 sign_key = prv; in identity_sign()
1278 if (!is_agent && sshkey_is_sk(sign_key) && in identity_sign()
1279 (sign_key->sk_flags & SSH_SK_USER_PRESENCE_REQD)) { in identity_sign()
1281 if ((fp = sshkey_fingerprint(sign_key, in identity_sign()
1286 sshkey_type(sign_key), fp); in identity_sign()
1289 if ((r = sshkey_sign(sign_key, sigp, lenp, data, datalen, in identity_sign()
1293 sshkey_is_sk(sign_key) && in identity_sign()
1298 sshkey_type(sign_key), id->filename); in identity_sign()
/dragonfly/contrib/wpa_supplicant/src/eapol_supp/
H A Deapol_supp_sm.c675 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member
738 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey()
762 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey()