Searched refs:sshkey_equal (Results 1 – 17 of 17) sorted by relevance
| /dflybsd-src/crypto/openssh/ |
| H A D | auth2-pubkeyfile.c | 309 if (!sshkey_equal(found, key->cert->signature_key) || in auth_check_authkey_line() 314 if (!sshkey_equal(found, key) || keyopts->cert_authority) in auth_check_authkey_line()
|
| H A D | ssh-agent.c | 389 !sshkey_equal(key, dch->keys[i])) in match_key_hop() 398 if (!sshkey_equal(key->cert->signature_key, dch->keys[i])) in match_key_hop() 581 if (sshkey_equal(key, id->key)) in lookup_identity() 724 !sshkey_equal(expected_key, mkey) || in parse_userauth_request() 911 if (hostkey != NULL && !sshkey_equal(hostkey, in process_sign_request2() 1724 key_match = sshkey_equal(key, e->session_ids[i].key); in process_ext_session_bind()
|
| H A D | sshd-session.c | 597 sshkey_equal(key, in get_hostkey_index() 603 sshkey_equal(key, sensitive_data.host_keys[i]))) in get_hostkey_index() 607 sshkey_equal(key, sensitive_data.host_pubkeys[i]))) in get_hostkey_index()
|
| H A D | sshkey.h | 206 int sshkey_equal(const struct sshkey *, const struct sshkey *);
|
| H A D | hostfile.c | 387 if (sshkey_equal(k, hostkeys->entries[i].key)) { in check_hostkeys_by_key_or_type() 565 if (!sshkey_equal(ctx->keys[i], l->key)) in host_delete()
|
| H A D | sshconnect.c | 757 if (l->key == NULL || !sshkey_equal(ctx->key, l->key)) in hostkeys_find_by_key_cb() 1080 !sshkey_equal(ip_found->key, host_found->key)))) in check_host_key() 1510 if (sshkey_equal(previous_host_key, host_key)) { in verify_host_key()
|
| H A D | ssh-pkcs11-helper.c | 103 if (sshkey_equal(k, ki->key)) in lookup_key()
|
| H A D | authfile.c | 388 strict_type ? sshkey_equal : sshkey_equal_public; in sshkey_in_file()
|
| H A D | clientloop.c | 2099 if (sshkey_equal(l->key, ctx->keys[i])) { in hostkeys_find() 2148 if (!sshkey_equal(l->key, ctx->keys[i])) in hostkeys_find() 2182 if (!sshkey_equal(l->key, ctx->old_keys[i])) in hostkeys_check_old() 2484 if (sshkey_equal(key, ctx->keys[i])) { in client_input_hostkeys()
|
| H A D | sshconnect2.c | 720 if (sshkey_equal(key, id->key)) { in input_userauth_pk_ok() 1741 if (sshkey_equal(idlist->keys[j], id->key)) { in pubkey_prepare() 1774 if (sshkey_equal(id->key, id2->key)) { in pubkey_prepare()
|
| H A D | auth2-pubkey.c | 117 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey()
|
| H A D | sshsig.c | 910 if (!sigopts->ca && sshkey_equal(found_key, sign_key)) { in check_allowed_keys_line()
|
| H A D | krl.c | 225 sshkey_equal(rc->ca_key, ca_key)) { in revoked_certs_for_ca_key()
|
| H A D | sshd.c | 1497 if (!sshkey_equal(pubkey, key)) { in main()
|
| H A D | sshkey.c | 717 sshkey_equal(const struct sshkey *a, const struct sshkey *b) in sshkey_equal() function 3131 if (!sshkey_equal(pubkey, k)) { in sshkey_parse_private2()
|
| H A D | ssh-pkcs11.c | 696 if (sshkey_equal(key, (*keysp)[i])) in pkcs11_key_included()
|
| H A D | ssh-keygen.c | 1802 if (sshkey_equal(ca, agent_ids->keys[j])) { in do_ca_sign()
|