Searched refs:KEY_UNSPEC (Results 1 – 19 of 19) sorted by relevance
/external/openssh/regress/unittests/hostkeys/ |
D | test_iterate.c | 97 expected_keytype = KEY_UNSPEC; in check() 105 expected_keytype = KEY_UNSPEC; in check() 177 KEY_UNSPEC, /* key type */ 255 KEY_UNSPEC, 268 KEY_UNSPEC, 346 KEY_UNSPEC, 359 KEY_UNSPEC, 437 KEY_UNSPEC, 450 KEY_UNSPEC, 528 KEY_UNSPEC, [all …]
|
/external/openssh/ |
D | authfile.c | 382 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) in sshkey_load_public() 405 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) in sshkey_load_public() 434 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_load_cert() 469 case KEY_UNSPEC: in sshkey_load_private_cert() 540 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_in_file()
|
D | hostfile.c | 705 lineinfo.keytype = KEY_UNSPEC; in hostkeys_foreach() 786 if ((lineinfo.key = sshkey_new(KEY_UNSPEC)) == NULL) { in hostkeys_foreach() 823 if (lineinfo.keytype == KEY_UNSPEC && l < 8 && in hostkeys_foreach() 838 lineinfo.keytype = KEY_UNSPEC; in hostkeys_foreach() 840 if (lineinfo.keytype == KEY_UNSPEC) { in hostkeys_foreach()
|
D | ssh-keysign.c | 124 if (pktype == KEY_UNSPEC) in valid_request() 242 r = sshkey_load_private_type_fd(key_fd[i], KEY_UNSPEC, in main()
|
D | sshkey.c | 182 return KEY_UNSPEC; in sshkey_type_from_name() 245 if (type == KEY_UNSPEC) { in sshkey_names_valid2() 514 case KEY_UNSPEC: in sshkey_new() 563 case KEY_UNSPEC: in sshkey_add_private() 627 case KEY_UNSPEC: in sshkey_free() 1269 case KEY_UNSPEC: in sshkey_read() 1287 if (type == KEY_UNSPEC) in sshkey_read() 1292 if (ret->type != KEY_UNSPEC && ret->type != type) in sshkey_read() 1668 if ((k = sshkey_new(KEY_UNSPEC)) == NULL) in sshkey_generate() 2113 case KEY_UNSPEC: in sshkey_from_blob_internal() [all …]
|
D | ssh-keygen.c | 199 if (type == KEY_UNSPEC) in type_bits_valid() 628 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 634 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 641 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 668 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pem() 678 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pem() 826 if ((ret = sshkey_new(KEY_UNSPEC)) == NULL) in try_read_key() 1957 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in do_show_cert() 2103 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in update_krl_from_file()
|
D | auth2-hostbased.c | 89 if (pktype == KEY_UNSPEC) { in userauth_hostbased()
|
D | sshkey.h | 65 KEY_UNSPEC enumerator
|
D | sshconnect2.c | 134 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs() 603 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok() 1254 switch ((r = sshkey_load_private_type(KEY_UNSPEC, id->filename, in load_identity_file() 1759 authctxt->sensitive->keys[i]->type == KEY_UNSPEC) in userauth_hostbased()
|
D | auth2-pubkey.c | 107 if (pktype == KEY_UNSPEC) { in userauth_pubkey() 783 found = key_new(key_is_cert(key) ? KEY_UNSPEC : key->type); in check_authkeys_file()
|
D | ssh_api.c | 507 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs()
|
D | authfd.c | 633 if (key->type != KEY_UNSPEC) { in ssh_remove_identity()
|
D | ssh-pkcs11.c | 540 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_keys_filter()
|
D | ssh-keyscan.c | 776 case KEY_UNSPEC: in main()
|
D | kex.c | 740 if (k->hostkey_type == KEY_UNSPEC) in choose_hostkeyalg()
|
D | sshd.c | 861 if (key == NULL || key->type == KEY_UNSPEC ||
|
D | clientloop.c | 2404 if (key == NULL || key->type == KEY_UNSPEC) in key_accepted_by_hostkeyalgs()
|
/external/openssh/regress/misc/kexfuzz/ |
D | kexfuzz.c | 415 if ((r = sshkey_load_private_type_fd(fd, KEY_UNSPEC, NULL, in main() 421 if (key == NULL || key->type == KEY_UNSPEC || key->type == KEY_RSA1) in main()
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 191 k1 = sshkey_new(KEY_UNSPEC); in sshkey_tests()
|