/openbsd/regress/usr.bin/ssh/unittests/sshkey/ |
H A D | test_sshkey.c | 379 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_1.pub"), in sshkey_tests() 426 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 435 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 444 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 454 ASSERT_INT_EQ(sshkey_load_public(test_data_file("dsa_2.pub"), &k2, in sshkey_tests() 464 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2, in sshkey_tests() 473 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_2.pub"), &k2, in sshkey_tests() 482 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_1.pub"), &k2, in sshkey_tests()
|
H A D | test_file.c | 94 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_1.pub"), &k2, in sshkey_file_tests() 204 ASSERT_INT_EQ(sshkey_load_public(test_data_file("dsa_1.pub"), &k2, in sshkey_file_tests() 303 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_1.pub"), &k2, in sshkey_file_tests() 368 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_1.pub"), &k2, in sshkey_file_tests() 432 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_sk1.pub"), &k2, in sshkey_file_tests() 497 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_sk1.pub"), in sshkey_file_tests()
|
/openbsd/usr.bin/ssh/ |
H A D | authfile.h | 39 int sshkey_load_public(const char *, struct sshkey **, char **);
|
H A D | ssh-add.c | 174 if ((r = sshkey_load_public(filename, &public, &comment)) != 0) { in delete_file() 192 if ((r = sshkey_load_public(certpath, &cert, &comment)) != 0) { in delete_file() 398 if ((r = sshkey_load_public(certpath, &cert, NULL)) != 0) { in add_file() 499 if ((r = sshkey_load_public(filename, &key, NULL)) != 0) { in test_key() 983 if ((r = sshkey_load_public(argv[i], &k, NULL)) != 0) in main()
|
H A D | ssh-keygen.c | 426 if ((r = sshkey_load_public(identity_file, &k, NULL)) != 0) in do_convert_to() 949 if ((r = sshkey_load_public(path, &pubkey, &comment)) != 0) in fingerprint_private() 1526 if ((r = sshkey_load_public(fname, &public, &comment)) != 0) in do_print_resource_record() 1735 if ((r = sshkey_load_public(path, &public, NULL)) != 0) in load_pkcs11_key() 1799 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0) in do_ca_sign() 1857 if ((r = sshkey_load_public(tmp, &public, &comment)) != 0) in do_ca_sign() 2465 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0) in do_gen_krl() 2509 if ((r = sshkey_load_public(argv[i], &k, &comment)) != 0) in do_check_krl() 2743 if ((r = sshkey_load_public(keypath, &pubkey, NULL)) != 0) { in sig_sign()
|
H A D | authfile.c | 258 sshkey_load_public(const char *filename, struct sshkey **keyp, char **commentp) in sshkey_load_public() function
|
H A D | ssh.c | 1652 check_load(sshkey_load_public(p, &(sensitive_data.keys[o]), NULL), \ in main() 2358 check_load(sshkey_load_public(filename, &public, NULL), in load_public_identity_files() 2377 check_load(sshkey_load_public(cp, &public, NULL), in load_public_identity_files() 2408 check_load(sshkey_load_public(filename, &public, NULL), in load_public_identity_files()
|
H A D | sshd.c | 1422 if ((r = sshkey_load_public(options.host_key_files[i], in main() 1501 if ((r = sshkey_load_public(options.host_cert_files[i], in main()
|
/openbsd/regress/usr.bin/ssh/unittests/sshsig/ |
H A D | tests.c | 43 ASSERT_INT_EQ(sshkey_load_public(test_data_file(name), &ret, NULL), 0); in load_key()
|
/openbsd/regress/usr.bin/ssh/misc/ssh-verify-attestation/ |
H A D | ssh-verify-attestation.c | 372 if ((r = sshkey_load_public(argv[0], &k, NULL)) != 0) in main()
|
/openbsd/regress/usr.bin/ssh/unittests/authopt/ |
H A D | tests.c | 29 r = sshkey_load_public(test_data_file(name), &ret, NULL); in load_key()
|
/openbsd/regress/usr.bin/ssh/unittests/hostkeys/ |
H A D | test_iterate.c | 146 ASSERT_INT_EQ(sshkey_load_public( in prepare_expected()
|