Home
last modified time | relevance | path

Searched refs:KEY_RSA1 (Results 1 – 19 of 19) sorted by relevance

/external/openssh/
Dsshconnect1.c271 private = key_load_private_type(KEY_RSA1, authfile, "", NULL, in try_rsa_authentication()
279 private = key_load_private_type(KEY_RSA1, in try_rsa_authentication()
517 server_key = key_new(KEY_RSA1); in ssh_kex()
529 host_key = key_new(KEY_RSA1); in ssh_kex()
723 sensitive->keys[i]->type == KEY_RSA1 && in ssh_userauth1()
743 options.identity_keys[i]->type == KEY_RSA1 && in ssh_userauth1()
Dhostfile.c350 int proto = (k ? k->type : keytype) == KEY_RSA1 ? 1 : 2; in check_hostkeys_by_key_or_type()
356 if (proto == 1 && hostkeys->entries[i].key->type != KEY_RSA1) in check_hostkeys_by_key_or_type()
358 if (proto == 2 && hostkeys->entries[i].key->type == KEY_RSA1) in check_hostkeys_by_key_or_type()
491 if (l->key->type == KEY_RSA1) { in host_delete()
790 lineinfo.key = sshkey_new(KEY_RSA1); in hostkeys_foreach()
821 lineinfo.keytype = KEY_RSA1; in hostkeys_foreach()
Dauthfd.c211 if ((key = sshkey_new(KEY_RSA1)) == NULL) in deserialise_identity1()
397 if (key->type != KEY_RSA1) in ssh_decrypt_challenge()
551 case KEY_RSA1: in ssh_add_identity_constrained()
610 if (key->type == KEY_RSA1) { in ssh_remove_identity()
Dsshkey.c92 { NULL, "RSA1", KEY_RSA1, 0, 0 },
235 if (type == KEY_RSA1) { in sshkey_names_valid2()
247 if (kt->type == KEY_RSA1) in sshkey_names_valid2()
269 case KEY_RSA1: in sshkey_size()
478 case KEY_RSA1: in sshkey_new()
537 case KEY_RSA1: in sshkey_add_private()
593 case KEY_RSA1: in sshkey_free()
671 case KEY_RSA1: in sshkey_equal_public()
889 if (k->type == KEY_RSA1) { in sshkey_fingerprint_raw()
1246 case KEY_RSA1: in sshkey_read()
[all …]
Dsshd.c392 sensitive_data.server_key = key_generate(KEY_RSA1, in generate_ephemeral_server_key()
599 if (tmp->type == KEY_RSA1) in demote_sensitive_data()
805 if (key == NULL || key->type == KEY_RSA1)
948 key->type == KEY_RSA1 || sshkey_is_cert(key))
1047 sensitive_data.server_key->type == KEY_RSA1) {
1096 sensitive_data.server_key = key_new_private(KEY_RSA1);
1802 if (key == NULL && pubkey != NULL && pubkey->type != KEY_RSA1 &&
1818 case KEY_RSA1:
1834 key ? "private" : "agent", i, keytype == KEY_RSA1 ?
Dssh-agent.c256 if (id->key->type == KEY_RSA1) { in process_request_identities()
305 if ((key = sshkey_new(KEY_RSA1)) == NULL) in process_authentication_challenge1()
443 if ((key = sshkey_new(KEY_RSA1)) == NULL) { in process_remove_identity()
555 if ((k = sshkey_new_private(KEY_RSA1)) == NULL) in agent_decode_rsa1()
770 version = k->type == KEY_RSA1 ? 1 : 2; in process_add_smartcard_key()
Dauth-rsa.c189 key = key_new(KEY_RSA1); in rsa_key_allowed_in_file()
Dsshkey.h56 KEY_RSA1, enumerator
Dmonitor_wrap.c395 key->type = KEY_RSA1; in mm_auth_rhosts_rsa_key_allowed()
929 key->type = KEY_RSA1; in mm_auth_rsa_generate_challenge()
957 key->type = KEY_RSA1; in mm_auth_rsa_verify_response()
Dauth1.c176 client_host_key = key_new(KEY_RSA1); in auth1_process_rhosts_rsa()
Dssh-keyscan.c199 if ((rsa = sshkey_new(KEY_RSA1)) == NULL) { in keygrab_ssh1()
710 case KEY_RSA1: in main()
Dssh-keygen.c238 case KEY_RSA1: in ask_filename()
312 if (k->type == KEY_RSA1) in do_convert_to_ssh2()
335 case KEY_RSA1: in do_convert_to_pkcs8()
360 case KEY_RSA1: in do_convert_to_pem()
890 if ((public = sshkey_new(KEY_RSA1)) == NULL) in do_fingerprint()
1387 if (private->type != KEY_RSA1) { in do_change_comment()
Dauthfile.c378 if ((pub = sshkey_new(KEY_RSA1)) == NULL) in sshkey_load_public()
Dsshconnect2.c1205 if (key && key->type == KEY_RSA1) in pubkey_prepare()
1328 return (id->key->type != KEY_RSA1); in try_identity()
1612 authctxt->sensitive->keys[i]->type == KEY_RSA1 || in userauth_hostbased()
Dmonitor.c1246 key->type = KEY_RSA1; /* XXX */ in mm_answer_keyallowed()
1715 key->type = KEY_RSA1; in mm_answer_rsa_challenge()
Dsshconnect.c1391 KEY_RSA1, in show_other_keys()
Dssh.c1230 sensitive_data.keys[0] = key_load_private_type(KEY_RSA1, in main()
Dclientloop.c2158 l->key->type == KEY_RSA1) in hostkeys_find()
DChangeLog2073 now correctly identify KEY_RSA1 keys; ok markus@ miod@