Home | History | Annotate | Download | only in openssh

Lines Matching refs:FILE

6  * This file contains functions for reading and writing identity files, and
12 * incompatible with the protocol description in the RFC file, it must be
76 "SSH PRIVATE KEY FILE FORMAT 1.1\n";
129 /* This buffer will be used to contain the data in the file. */
217 /* Save a key blob to a file */
229 error("write to key file %s failed: %s", filename,
329 error("%s: fstat of key file %.200s%sfailed: %.100s", __func__,
338 error("%s: key file %.200s%stoo large", __func__,
348 debug("%s: read from key file %.200s%sfailed: %.100s",
365 debug("%s: key file %.200s%schanged size while reading",
376 * Loads the public part of the ssh v1 key file. Returns NULL if an error was
377 * encountered (the file does not exist or is not readable), and the key
399 /* load public key from private-key file, works only for SSH v1 */
621 * permissions of the file. if the key owned by a different user,
629 error("@ WARNING: UNPROTECTED PRIVATE KEY FILE! @");
669 debug("could not open key file '%s': %s", filename,
730 debug("could not open key file '%s': %s", filename,
756 FILE *f;
795 /* load public key from ssh v1 private or any pubkey file */
800 char file[MAXPATHLEN];
817 if ((strlcpy(file, filename, sizeof file) < sizeof(file)) &&
818 (strlcat(file, ".pub", sizeof file) < sizeof(file)) &&
819 (key_try_load_public(pub, file, commentp) == 1))
830 char *file;
833 xasprintf(&file, "%s-cert.pub", filename);
834 if (key_try_load_public(pub, file, NULL) == 1) {
835 xfree(file);
838 xfree(file);
887 * Returns 1 if the specified "key" is listed in the file "filename",
895 FILE *f;