Home | History | Annotate | Download | only in openssh

Lines Matching defs:file

272 match_principals_file(char *file, struct passwd *pw, struct sshkey_cert *cert)
274 FILE *f;
280 debug("trying authorized principals file %s", file);
281 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) {
285 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
313 "from file \"%s\" on line %lu",
314 cert->principals[i], file, linenum);
316 file, linenum) != 1)
330 * Checks whether key is allowed in authorized_keys-format file,
334 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw)
346 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
382 if (auth_parse_options(pw, key_options, file,
390 debug("matching CA found: file %s, line %lu, %s %s",
391 file, linenum, key_type(found), fp);
418 key_type(found), fp, file);
423 if (auth_parse_options(pw, key_options, file,
431 debug("matching key found: file %s, line %lu %s %s",
432 file, linenum, key_type(found), fp);
469 * principals against the names in that file rather than matching
500 * Checks whether key is allowed in file.
504 user_key_allowed2(struct passwd *pw, Key *key, char *file)
506 FILE *f;
512 debug("trying public key file %s", file);
513 if ((f = auth_openkeyfile(file, pw, options.strict_modes)) != NULL) {
514 found_key = check_authkeys_file(f, file, key, pw);
529 FILE *f;
677 char *file;
696 file = expand_authorized_keys(
699 success = user_key_allowed2(pw, key, file);
700 free(file);