/external/dropbear/ |
cli-kex.c | 63 sign_key *hostkey = NULL; local 77 hostkey = new_sign_key(); 86 if (buf_get_pub_key(ses.payload, hostkey, &type) != DROPBEAR_SUCCESS) { 96 kexdh_comb_key(cli_ses.dh_e, cli_ses.dh_x, &dh_f, hostkey); 102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE) 104 dropbear_exit("Bad hostkey signature"); 107 sign_key_free(hostkey); 108 hostkey = NULL; 271 /* Now we're at the interesting hostkey */
|
common-runopts.c | 36 int readhostkey(const char * filename, sign_key * hostkey, int *type) { 47 if (buf_get_priv_key(buf, hostkey, type) == DROPBEAR_FAILURE) {
|
svr-kex.c | 84 kexdh_comb_key(&dh_f, &dh_y, dh_e, svr_opts.hostkey); 90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey, 98 buf_put_sign(ses.writepayload, svr_opts.hostkey,
|
svr-runopts.c | 113 svr_opts.hostkey = NULL; 327 svr_opts.hostkey = new_sign_key(); 331 ret = readhostkey(svr_opts.rsakeyfile, svr_opts.hostkey, &type); 338 ret = readhostkey(svr_opts.dsskeyfile, svr_opts.hostkey, &type); 346 && svr_opts.hostkey->dsskey == NULL 349 && svr_opts.hostkey->rsakey == NULL
|
runopts.h | 44 int readhostkey(const char * filename, sign_key * hostkey, int *type); 85 sign_key *hostkey; member in struct:svr_runopts
|
dbclient.1 | 75 Always accept hostkeys if they are unknown. If a hostkey mismatch occurs the
|
kex.h | 38 sign_key *hostkey);
|
options.h | 22 /* Default hostkey paths - these can be specified on the command line */ 96 /* Hostkey/public key algorithms - at least one required, these are used 97 * for hostkey as well as for verifying signatures with pubkey auth. 110 * ~4k in binary size with static uclibc, but your DSS hostkey could be exposed
|
cli-runopts.c | 117 /* Load a hostkey since the previous argument was "-i" */ 153 case 'y': /* always accept the remote hostkey */
|
CHANGES | 4 mismatching hostkey but wouldn't warn loudly. It will now 256 - Fixed stupid DSS hostkey typo (server couldn't load host keys) 431 - Default hostkey path changed to /etc/dropbear/dropbear_{rsa,dss}_host_key 579 - Fixed bug in specifying the rsa hostkey
|
common-algo.c | 169 /* we need sha1 for hostkey stuff regardless */
|
common-kex.c | 515 sign_key *hostkey) { 553 buf_put_pub_key(ses.kexhashbuf, hostkey, ses.newkeys->algo_hostkey); 619 erralgo = "hostkey"; 622 TRACE(("hostkey algo %s", algo->name))
|
svr-chansession.c | 878 * hostkey. can't think of a workaround to clear it */ 880 /* wipe the hostkey */ 881 sign_key_free(svr_opts.hostkey); 882 svr_opts.hostkey = NULL;
|
/external/dropbear/debian/ |
dropbear.postinst | 52 # RSA hostkey file (default: /etc/dropbear/dropbear_rsa_host_key) 55 # DSS hostkey file (default: /etc/dropbear/dropbear_dss_host_key)
|
/libcore/luni/src/main/java/java/net/ |
ProxySelectorImpl.java | 91 * Returns the proxy identified by the {@code hostKey} system property, or 94 private Proxy lookupProxy(String hostKey, String portKey, Proxy.Type type, int defaultPort) { 95 String host = System.getProperty(hostKey);
|
/external/chromium/chrome/browser/safe_browsing/ |
protocol_parser.cc | 341 // kBinHashList only contains prefixes, no HOSTKEY and COUNT. 382 // kBinHashList only contains (add_chunk_number, prefix) pairs, no HOSTKEY
|
safe_browsing_util.h | 135 // Holds information about the prefixes for a hostkey. prefixes can either be
|
protocol_parser_unittest.cc | 152 // Test parsing one add chunk where a hostkey spans several entries. 872 // Test parsing one add chunk where a hostkey spans several entries. [all...] |
safe_browsing_database_unittest.cc | 460 // Add a simple chunk with one hostkey. 816 // Add a simple chunk with one hostkey and cache it. [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
proxydetect.cc | 966 const CFStringRef hostKey, 991 hostCFStr = (CFStringRef)CFDictionaryGetValue(proxyDict, hostKey); [all...] |