/external/dropbear/ |
D | cli-kex.c | 63 sign_key *hostkey = NULL; in recv_msg_kexdh_reply() local 77 hostkey = new_sign_key(); in recv_msg_kexdh_reply() 86 if (buf_get_pub_key(ses.payload, hostkey, &type) != DROPBEAR_SUCCESS) { in recv_msg_kexdh_reply() 96 kexdh_comb_key(cli_ses.dh_e, cli_ses.dh_x, &dh_f, hostkey); in recv_msg_kexdh_reply() 102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE) in recv_msg_kexdh_reply() 107 sign_key_free(hostkey); in recv_msg_kexdh_reply() 108 hostkey = NULL; in recv_msg_kexdh_reply()
|
D | svr-runopts.c | 113 svr_opts.hostkey = NULL; in svr_getopts() 327 svr_opts.hostkey = new_sign_key(); in loadhostkeys() 331 ret = readhostkey(svr_opts.rsakeyfile, svr_opts.hostkey, &type); in loadhostkeys() 338 ret = readhostkey(svr_opts.dsskeyfile, svr_opts.hostkey, &type); in loadhostkeys() 346 && svr_opts.hostkey->dsskey == NULL in loadhostkeys() 349 && svr_opts.hostkey->rsakey == NULL in loadhostkeys()
|
D | svr-kex.c | 84 kexdh_comb_key(&dh_f, &dh_y, dh_e, svr_opts.hostkey); in send_msg_kexdh_reply() 90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey, in send_msg_kexdh_reply() 98 buf_put_sign(ses.writepayload, svr_opts.hostkey, in send_msg_kexdh_reply()
|
D | common-runopts.c | 36 int readhostkey(const char * filename, sign_key * hostkey, int *type) { in readhostkey() argument 47 if (buf_get_priv_key(buf, hostkey, type) == DROPBEAR_FAILURE) { in readhostkey()
|
D | runopts.h | 44 int readhostkey(const char * filename, sign_key * hostkey, int *type); 85 sign_key *hostkey; member
|
D | kex.h | 38 sign_key *hostkey);
|
D | common-kex.c | 515 sign_key *hostkey) { in kexdh_comb_key() argument 553 buf_put_pub_key(ses.kexhashbuf, hostkey, ses.newkeys->algo_hostkey); in kexdh_comb_key()
|
D | svr-chansession.c | 881 sign_key_free(svr_opts.hostkey); in execchild() 882 svr_opts.hostkey = NULL; in execchild()
|
D | CHANGES | 4 mismatching hostkey but wouldn't warn loudly. It will now 256 - Fixed stupid DSS hostkey typo (server couldn't load host keys) 431 - Default hostkey path changed to /etc/dropbear/dropbear_{rsa,dss}_host_key 579 - Fixed bug in specifying the rsa hostkey
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
D | KexManager.java | 354 private boolean verifySignature(byte[] sig, byte[] hostkey) throws IOException in verifySignature() argument 359 RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(hostkey); in verifySignature() 369 DSAPublicKey dpk = DSASHA1Verify.decodeSSHDSAPublicKey(hostkey); in verifySignature() 507 sci.serverHostKey = kxs.hostkey; in handleMessage() 539 kxs.hostkey = dhgexrpl.getHostKey(); in handleMessage() 547 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); in handleMessage() 572 boolean res = verifySignature(dhgexrpl.getSignature(), kxs.hostkey); in handleMessage() 595 kxs.hostkey = dhr.getHostKey(); in handleMessage() 603 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); in handleMessage() 627 boolean res = verifySignature(dhr.getSignature(), kxs.hostkey); in handleMessage()
|
D | KexState.java | 29 public byte[] hostkey; field in KexState
|
/external/openssh/ |
D | dns.c | 176 Key *hostkey, int *flags) in verify_host_key_dns() argument 195 if (hostkey == NULL) in verify_host_key_dns() 226 &hostkey_digest, &hostkey_digest_len, hostkey)) { in verify_host_key_dns()
|
D | ssh-keyscan.c | 219 hostjump(Key *hostkey) in hostjump() argument 221 kexjmp_key = hostkey; in hostjump()
|
D | ChangeLog | 290 [cert-hostkey.sh] 602 - (tim) [regress/cert-hostkey.sh] Typo. Missing $ on variable name. 603 - (tim) [regress/cert-hostkey.sh] Add missing TEST_SSH_ECC guard around some 670 - (djm) [regress/cert-hostkey.sh regress/cert-userkey.sh] fix shell test 819 hostkey warnings when connecting to servers with new ECDSA keys 940 - (dtucker) [regress/cert-hostkey.sh] Disable ECC-based tests on platforms 959 [regress/cert-hostkey.sh regress/cert-userkey.sh] 1654 [regress/cert-hostkey.sh regress/cert-userkey.sh]
|
D | sshconnect2.c | 98 verify_host_key_callback(Key *hostkey) in verify_host_key_callback() argument 100 if (verify_host_key(xxx_host, xxx_hostaddr, hostkey) == -1) in verify_host_key_callback()
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
D | KnownHosts.java | 805 static private byte[] rawFingerPrint(String type, String keyType, byte[] hostkey) in rawFingerPrint() argument 833 if (hostkey == null) in rawFingerPrint() 838 dig.update(hostkey); in rawFingerPrint()
|
/external/ganymed-ssh2/ |
D | HISTORY.txt | 260 The class includes support for hostkey comparison as well as functionality to add accepted keys 267 - It is now possible to override the default server hostkey algorithm order (for the key exchange) 271 The used server hostkey algorithm is now also reflected in ConnectionInfo. 273 - The default server hostkey algorithm order is now "ssh-rsa", "ssh-dss".
|
/external/openssh/regress/ |
D | Makefile | 58 cert-hostkey \
|