Lines Matching defs:host_key

836     const struct sshkey *host_key, const char *hostfile_hostname)
847 if (host_key != NULL) {
848 if ((key_fp = sshkey_fingerprint(host_key,
851 if ((r = sshkey_to_base64(host_key, &keytext)) != 0)
876 "t", host_key == NULL ? "NONE" : sshkey_ssh_name(host_key),
921 struct sshkey *host_key, int readonly, int clobber_port,
935 int r, want_cert = sshkey_is_cert(host_key), host_ip_differ = 0;
989 "HOSTNAME", cinfo, host_key, host);
1001 "ADDRESS", cinfo, host_key, ip);
1006 if (!hostkey_accepted_by_hostkeyalgs(host_key)) {
1008 sshkey_ssh_name(host_key));
1013 want_cert = sshkey_is_cert(host_key);
1014 type = sshkey_type(host_key);
1020 host_status = check_key_in_hostkeys(host_hostkeys, host_key,
1037 ip_status = check_key_in_hostkeys(ip_hostkeys, host_key,
1055 if (sshkey_cert_check_host(host_key,
1094 host_key, options.hash_known_hosts))
1104 fp = sshkey_fingerprint(host_key,
1106 ra = sshkey_fingerprint(host_key,
1121 host_key, ROQUIET, 1,
1149 if (show_other_keys(host_hostkeys, host_key)) {
1155 fp = sshkey_fingerprint(host_key,
1157 ra = sshkey_fingerprint(host_key,
1172 if ((msg2 = other_hostkeys_message(host, ip, host_key,
1200 host, host_key, options.hash_known_hosts) &&
1202 host_key, options.hash_known_hosts);
1206 hostline, host_key,
1211 host_key, options.hash_known_hosts);
1277 warn_changed_key(host_key);
1414 if ((r = sshkey_from_private(host_key, &raw_key)) != 0)
1418 host_key = raw_key;
1433 verify_host_key(char *host, struct sockaddr *hostaddr, struct sshkey *host_key,
1441 if ((fp = sshkey_fingerprint(host_key,
1448 if (sshkey_is_cert(host_key)) {
1449 if ((cafp = sshkey_fingerprint(host_key->cert->signature_key,
1455 sshkey_format_cert_validity(host_key->cert,
1459 sshkey_ssh_name(host_key), fp,
1460 (unsigned long long)host_key->cert->serial,
1461 host_key->cert->key_id,
1462 sshkey_ssh_name(host_key->cert->signature_key), cafp,
1464 for (i = 0; i < host_key->cert->nprincipals; i++) {
1466 host_key->cert->principals[i]);
1469 debug("Server host key: %s %s", sshkey_ssh_name(host_key), fp);
1472 if (sshkey_equal(previous_host_key, host_key)) {
1474 sshkey_type(host_key), fp);
1481 r = sshkey_check_revoked(host_key, options.revoked_host_keys);
1487 sshkey_type(host_key), fp,
1493 "revoked keys file %s", sshkey_type(host_key),
1505 if ((r = sshkey_from_private(host_key, &plain)) != 0)
1528 r = check_host_key(host, cinfo, hostaddr, options.port, host_key,
1537 if (r == 0 && host_key != NULL) {
1539 r = sshkey_from_private(host_key, &previous_host_key);
1631 warn_changed_key(struct sshkey *host_key)
1635 fp = sshkey_fingerprint(host_key, options.fingerprint_hash,
1647 sshkey_type(host_key), fp);