/external/dropbear/ |
common-runopts.c | 36 int readhostkey(const char * filename, sign_key * hostkey, int *type) { 47 if (buf_get_priv_key(buf, hostkey, type) == DROPBEAR_FAILURE) {
|
runopts.h | 44 int readhostkey(const char * filename, sign_key * hostkey, int *type); 85 sign_key *hostkey; member in struct:svr_runopts
|
kex.h | 38 sign_key *hostkey);
|
svr-kex.c | 84 kexdh_comb_key(&dh_f, &dh_y, dh_e, svr_opts.hostkey); 90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey, 98 buf_put_sign(ses.writepayload, svr_opts.hostkey,
|
cli-kex.c | 63 sign_key *hostkey = NULL; local 77 hostkey = new_sign_key(); 86 if (buf_get_pub_key(ses.payload, hostkey, &type) != DROPBEAR_SUCCESS) { 96 kexdh_comb_key(cli_ses.dh_e, cli_ses.dh_x, &dh_f, hostkey); 102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE) 104 dropbear_exit("Bad hostkey signature"); 107 sign_key_free(hostkey); 108 hostkey = NULL; 271 /* Now we're at the interesting hostkey */
|
svr-runopts.c | 113 svr_opts.hostkey = NULL; 327 svr_opts.hostkey = new_sign_key(); 331 ret = readhostkey(svr_opts.rsakeyfile, svr_opts.hostkey, &type); 338 ret = readhostkey(svr_opts.dsskeyfile, svr_opts.hostkey, &type); 346 && svr_opts.hostkey->dsskey == NULL 349 && svr_opts.hostkey->rsakey == NULL
|
common-kex.c | 515 sign_key *hostkey) { 553 buf_put_pub_key(ses.kexhashbuf, hostkey, ses.newkeys->algo_hostkey); 619 erralgo = "hostkey"; 622 TRACE(("hostkey algo %s", algo->name))
|
svr-chansession.c | 878 * hostkey. can't think of a workaround to clear it */ 880 /* wipe the hostkey */ 881 sign_key_free(svr_opts.hostkey); 882 svr_opts.hostkey = NULL;
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
KexState.java | 29 public byte[] hostkey; field in class:KexState
|
KexManager.java | 354 private boolean verifySignature(byte[] sig, byte[] hostkey) throws IOException 359 RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(hostkey); 369 DSAPublicKey dpk = DSASHA1Verify.decodeSSHDSAPublicKey(hostkey); 507 sci.serverHostKey = kxs.hostkey; 539 kxs.hostkey = dhgexrpl.getHostKey(); 547 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); 552 "The server hostkey was not accepted by the verifier callback.").initCause(e); 556 throw new IOException("The server hostkey was not accepted by the verifier callback"); 572 boolean res = verifySignature(dhgexrpl.getSignature(), kxs.hostkey); 575 throw new IOException("Hostkey signature sent by remote is wrong!") [all...] |
/external/openssh/ |
dns.c | 176 Key *hostkey, int *flags) 195 if (hostkey == NULL) 226 &hostkey_digest, &hostkey_digest_len, hostkey)) {
|
ssh-keyscan.c | 219 hostjump(Key *hostkey) 221 kexjmp_key = hostkey;
|
sshconnect2.c | 98 verify_host_key_callback(Key *hostkey) 100 if (verify_host_key(xxx_host, xxx_hostaddr, hostkey) == -1) [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
KnownHosts.java | 292 * Try to find the preferred order of hostkey algorithms for the given hostname. 293 * Based on the type of hostkey that is present in the internal database 295 * an ordered list of hostkey algorithms is returned which can be passed 301 * an array with hostkey algorithms is returned (i.e., an array of length 2). 652 * that type of hostkey anymore (e.g., "ssh-rsa" was disabled and 668 * Checks the internal hostkey database for the given hostkey. 673 * @param serverHostKeyAlgorithm type of hostkey, either <code>ssh-rsa</code> or <code>ssh-dss</code> 676 * <li><code>HOSTKEY_IS_OK</code>: the given hostkey matches an entry for the given hostname</li> 677 * <li><code>HOSTKEY_IS_NEW</code>: no entries found for this hostname and this type of hostkey</li [all...] |
/external/openssh/regress/ |
Makefile | 58 cert-hostkey \
|