Lines Matching defs:keys
2097 * Keys received from the server and a flag for each indicating
2100 * keys) by client_global_hostkeys_private_confirm().
2102 struct sshkey **keys;
2109 * Keys that are in known_hosts, but were not present in the update
2125 sshkey_free(ctx->keys[i]);
2126 free(ctx->keys);
2147 /* Mark off keys we've already seen for this host */
2149 if (sshkey_equal(l->key, ctx->keys[i])) {
2151 sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum);
2182 if ((fp = sshkey_fingerprint(ctx->keys[i],
2186 sshkey_type(ctx->keys[i]), fp);
2226 * Now that all the keys are verified, we can go ahead and replace
2232 ctx->host_str, ctx->ip_str, ctx->keys, ctx->nkeys,
2254 "private host keys");
2264 * Expect a signature for each of the ctx->nnew private keys we
2266 * ctx->keys where the corresponding ctx->keys_seen[i] == 0.
2277 (r = sshkey_puts(ctx->keys[i], signdata)) != 0)
2286 if ((r = sshkey_verify(ctx->keys[i], sig, siglen,
2289 __func__, sshkey_type(ctx->keys[i]), i);
2309 * the server's hostkeys. The keys are checked against the user's
2367 /* Ensure keys are unique */
2369 if (sshkey_equal(key, ctx->keys[i])) {
2376 if ((tmp = reallocarray(ctx->keys, ctx->nkeys + 1,
2377 sizeof(*ctx->keys))) == NULL)
2380 ctx->keys = tmp;
2381 ctx->keys[ctx->nkeys++] = key;
2399 /* Find which keys we already know about. */
2407 /* Figure out if we have any new keys to add */
2414 debug3("%s: %zu keys from server: %zu new, %zu retained. %zu to remove",
2418 /* We have some keys to remove. Just do it. */
2422 * We have received hitherto-unseen keys from the server.
2425 debug3("%s: asking server to prove ownership for %zu keys",
2439 if ((r = sshkey_putb(ctx->keys[i], buf)) != 0)