Home | History | Annotate | Download | only in openssh

Lines Matching defs:public

297 #define SSH_COM_PUBLIC_BEGIN		"---- BEGIN SSH2 PUBLIC KEY ----"
298 #define SSH_COM_PUBLIC_END "---- END SSH2 PUBLIC KEY ----"
631 fatal("%s: %s is not a recognised public key format", __func__,
798 fatal("cannot read public key from pkcs11");
830 struct sshkey *public;
845 if ((r = sshkey_load_public(identity_file, &public, &comment)) != 0)
846 debug2("Error loading public key \"%s\": %s",
849 fp = sshkey_fingerprint(public, fptype, rep);
850 ra = sshkey_fingerprint(public, fingerprint_hash,
854 printf("%u %s %s (%s)\n", sshkey_size(public), fp, comment,
855 sshkey_type(public));
858 sshkey_free(public);
907 if ((public = sshkey_new(KEY_RSA1)) == NULL)
909 if ((r = sshkey_read(public, &cp)) != 0) {
911 sshkey_free(public);
912 if ((public = sshkey_new(KEY_UNSPEC)) == NULL)
914 if ((r = sshkey_read(public, &cp)) != 0) {
915 sshkey_free(public);
920 fp = sshkey_fingerprint(public, fptype, rep);
921 ra = sshkey_fingerprint(public, fingerprint_hash,
925 printf("%u %s %s (%s)\n", sshkey_size(public), fp,
926 comment ? comment : "no comment", sshkey_type(public));
931 sshkey_free(public);
937 printf("%s is not a public key file.\n", identity_file);
963 struct sshkey *private, *public;
994 if ((r = sshkey_from_private(private, &public)) != 0)
1003 sshkey_free(public);
1011 printf("Could not save your public key in %s\n",
1013 sshkey_free(public);
1021 sshkey_free(public);
1025 if ((r = sshkey_write(public, f)) != 0) {
1028 sshkey_free(public);
1034 sshkey_free(public);
1334 struct sshkey *public;
1347 if ((r = sshkey_load_public(fname, &public, &comment)) != 0) {
1348 printf("Failed to read v2 public key from \"%s\": %s.\n",
1352 export_dns_rr(hname, public, stdout, print_generic);
1353 sshkey_free(public);
1366 struct sshkey *public;
1435 if ((r = sshkey_from_private(private, &public)) != 0)
1442 printf("Could not save your public key in %s\n", identity_file);
1450 if ((r = sshkey_write(public, f)) != 0)
1452 sshkey_free(public);
1561 struct sshkey **keys = NULL, *public, *private = NULL;
1564 if ((r = sshkey_load_public(path, &public, NULL)) != 0)
1565 fatal("Couldn't load CA public key \"%s\": %s",
1571 fatal("cannot read public key from pkcs11");
1573 if (sshkey_equal_public(public, keys[i])) {
1580 sshkey_free(public);
1592 struct sshkey *ca, *public;
1642 if ((r = sshkey_load_public(tmp, &public, &comment)) != 0)
1645 if (public->type != KEY_RSA && public->type != KEY_DSA &&
1646 public->type != KEY_ECDSA && public->type != KEY_ED25519)
1648 __func__, tmp, sshkey_type(public));
1651 if ((r = sshkey_to_certified(public, v00)) != 0)
1654 public->cert->type = cert_key_type;
1655 public->cert->serial = (u_int64_t)cert_serial;
1656 public->cert->key_id = xstrdup(cert_key_id);
1657 public->cert->nprincipals = n;
1658 public->cert->principals = plist;
1659 public->cert->valid_after = cert_valid_from;
1660 public->cert->valid_before = cert_valid_to;
1662 prepare_options_buf(public->cert->critical,
1665 prepare_options_buf(public->cert->critical,
1667 prepare_options_buf(public->cert->extensions,
1671 &public->cert->signature_key)) != 0)
1674 if (sshkey_certify(public, ca) != 0)
1687 if ((r = sshkey_write(public, f)) != 0)
1695 "valid %s", sshkey_cert_type(public),
1696 out, public->cert->key_id,
1697 (unsigned long long)public->cert->serial,
1703 sshkey_free(public);
1911 fatal("Cannot load public key \"%s\": %s",
1926 printf(" Public key: %s %s\n", sshkey_type(key), key_fp);
2134 fatal("Cannot load CA public key %s: %s",
2182 fatal("Cannot load public key %s: %s",
2241 struct sshkey *private, *public;
2621 printf("Generating public/private %s key pair.\n",
2627 if ((r = sshkey_from_private(private, &public)) != 0) {
2719 printf("Could not save your public key in %s\n", identity_file);
2727 if ((r = sshkey_write(public, f)) != 0)
2733 fp = sshkey_fingerprint(public, fingerprint_hash,
2735 ra = sshkey_fingerprint(public, fingerprint_hash,
2739 printf("Your public key has been saved in %s.\n",
2749 sshkey_free(public);