Searched refs:hostkey (Results 1 - 15 of 15) sorted by relevance

/external/dropbear/
H A Dcommon-runopts.c36 int readhostkey(const char * filename, sign_key * hostkey, int *type) { argument
47 if (buf_get_priv_key(buf, hostkey, type) == DROPBEAR_FAILURE) {
H A Drunopts.h44 int readhostkey(const char * filename, sign_key * hostkey, int *type);
85 sign_key *hostkey; member in struct:svr_runopts
H A Dkex.h38 sign_key *hostkey);
H A Dsvr-kex.c84 kexdh_comb_key(&dh_f, &dh_y, dh_e, svr_opts.hostkey);
90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey,
98 buf_put_sign(ses.writepayload, svr_opts.hostkey,
H A Dcli-kex.c63 sign_key *hostkey = NULL; local
77 hostkey = new_sign_key();
86 if (buf_get_pub_key(ses.payload, hostkey, &type) != DROPBEAR_SUCCESS) {
96 kexdh_comb_key(cli_ses.dh_e, cli_ses.dh_x, &dh_f, hostkey);
102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE)
104 dropbear_exit("Bad hostkey signature");
107 sign_key_free(hostkey);
108 hostkey = NULL;
271 /* Now we're at the interesting hostkey */
H A Dsvr-runopts.c113 svr_opts.hostkey = NULL;
327 svr_opts.hostkey = new_sign_key();
331 ret = readhostkey(svr_opts.rsakeyfile, svr_opts.hostkey, &type);
338 ret = readhostkey(svr_opts.dsskeyfile, svr_opts.hostkey, &type);
346 && svr_opts.hostkey->dsskey == NULL
349 && svr_opts.hostkey->rsakey == NULL
H A Dcommon-kex.c515 sign_key *hostkey) {
553 buf_put_pub_key(ses.kexhashbuf, hostkey, ses.newkeys->algo_hostkey);
619 erralgo = "hostkey";
622 TRACE(("hostkey algo %s", algo->name))
514 kexdh_comb_key(mp_int *dh_pub_us, mp_int *dh_priv, mp_int *dh_pub_them, sign_key *hostkey) argument
H A Dsvr-chansession.c878 * hostkey. can't think of a workaround to clear it */
880 /* wipe the hostkey */
881 sign_key_free(svr_opts.hostkey);
882 svr_opts.hostkey = NULL;
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
H A DKexState.java29 public byte[] hostkey; field in class:KexState
H A DKexManager.java354 private boolean verifySignature(byte[] sig, byte[] hostkey) throws IOException argument
359 RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(hostkey);
369 DSAPublicKey dpk = DSASHA1Verify.decodeSSHDSAPublicKey(hostkey);
507 sci.serverHostKey = kxs.hostkey;
539 kxs.hostkey = dhgexrpl.getHostKey();
547 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey);
552 "The server hostkey was not accepted by the verifier callback.").initCause(e);
556 throw new IOException("The server hostkey was not accepted by the verifier callback");
572 boolean res = verifySignature(dhgexrpl.getSignature(), kxs.hostkey);
595 kxs.hostkey
[all...]
/external/openssh/
H A Ddns.c176 Key *hostkey, int *flags)
195 if (hostkey == NULL)
226 &hostkey_digest, &hostkey_digest_len, hostkey)) {
175 verify_host_key_dns(const char *hostname, struct sockaddr *address, Key *hostkey, int *flags) argument
H A Dssh-keyscan.c219 hostjump(Key *hostkey) argument
221 kexjmp_key = hostkey;
H A Dsshconnect2.c98 verify_host_key_callback(Key *hostkey) argument
100 if (verify_host_key(xxx_host, xxx_hostaddr, hostkey) == -1)
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
H A DKnownHosts.java292 * Try to find the preferred order of hostkey algorithms for the given hostname.
293 * Based on the type of hostkey that is present in the internal database
295 * an ordered list of hostkey algorithms is returned which can be passed
301 * an array with hostkey algorithms is returned (i.e., an array of length 2).
652 * that type of hostkey anymore (e.g., "ssh-rsa" was disabled and
668 * Checks the internal hostkey database for the given hostkey.
673 * @param serverHostKeyAlgorithm type of hostkey, either <code>ssh-rsa</code> or <code>ssh-dss</code>
676 * <li><code>HOSTKEY_IS_OK</code>: the given hostkey matches an entry for the given hostname</li>
677 * <li><code>HOSTKEY_IS_NEW</code>: no entries found for this hostname and this type of hostkey</l
805 rawFingerPrint(String type, String keyType, byte[] hostkey) argument
[all...]
/external/openssh/regress/
H A DMakefile58 cert-hostkey \

Completed in 297 milliseconds