| /src/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 419 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_1.pub"), in sshkey_tests() 467 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 476 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 485 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_2.pub"), &k2, in sshkey_tests() 495 ASSERT_INT_EQ(sshkey_load_public(test_data_file("dsa_2.pub"), &k2, in sshkey_tests() 506 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2, in sshkey_tests() 517 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_2.pub"), &k2, in sshkey_tests() 527 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_1.pub"), &k2, in sshkey_tests()
|
| H A D | test_file.c | 105 ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa_1.pub"), &k2, in sshkey_file_tests() 215 ASSERT_INT_EQ(sshkey_load_public(test_data_file("dsa_1.pub"), &k2, in sshkey_file_tests() 317 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_1.pub"), &k2, in sshkey_file_tests() 384 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_1.pub"), &k2, in sshkey_file_tests() 450 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_sk1.pub"), &k2, in sshkey_file_tests() 516 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ed25519_sk1.pub"), in sshkey_file_tests()
|
| /src/crypto/openssh/ |
| H A D | authfile.h | 39 int sshkey_load_public(const char *, struct sshkey **, char **);
|
| H A D | ssh-add.c | 181 if ((r = sshkey_load_public(filename, &public, &comment)) != 0) { in delete_file() 199 if ((r = sshkey_load_public(certpath, &cert, &comment)) != 0) { in delete_file() 405 if ((r = sshkey_load_public(certpath, &cert, NULL)) != 0) { in add_file() 506 if ((r = sshkey_load_public(filename, &key, NULL)) != 0) { in test_key() 993 if ((r = sshkey_load_public(argv[i], &k, NULL)) != 0) in main()
|
| H A D | ssh-keygen.c | 443 if ((r = sshkey_load_public(identity_file, &k, NULL)) != 0) in do_convert_to() 970 if ((r = sshkey_load_public(path, &pubkey, &comment)) != 0) in fingerprint_private() 1549 if ((r = sshkey_load_public(fname, &public, &comment)) != 0) in do_print_resource_record() 1758 if ((r = sshkey_load_public(path, &public, NULL)) != 0) in load_pkcs11_key() 1822 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0) in do_ca_sign() 1880 if ((r = sshkey_load_public(tmp, &public, &comment)) != 0) in do_ca_sign() 2488 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0) in do_gen_krl() 2532 if ((r = sshkey_load_public(argv[i], &k, &comment)) != 0) in do_check_krl() 2766 if ((r = sshkey_load_public(keypath, &pubkey, NULL)) != 0) { in sig_sign()
|
| H A D | authfile.c | 263 sshkey_load_public(const char *filename, struct sshkey **keyp, char **commentp) in sshkey_load_public() function
|
| H A D | ssh.c | 1745 check_load(sshkey_load_public(p, &(sensitive_data.keys[o]), NULL), \ in main() 2451 check_load(sshkey_load_public(filename, &public, NULL), in load_public_identity_files() 2470 check_load(sshkey_load_public(cp, &public, NULL), in load_public_identity_files() 2501 check_load(sshkey_load_public(filename, &public, NULL), in load_public_identity_files()
|
| H A D | sshd.c | 1680 if ((r = sshkey_load_public(options.host_key_files[i], in main() 1759 if ((r = sshkey_load_public(options.host_cert_files[i], in main()
|
| H A D | ssh_namespace.h | 888 #define sshkey_load_public Fssh_sshkey_load_public macro
|
| /src/crypto/openssh/regress/unittests/sshsig/ |
| H A D | tests.c | 49 ASSERT_INT_EQ(sshkey_load_public(test_data_file(name), &ret, NULL), 0); in load_key()
|
| /src/crypto/openssh/regress/misc/ssh-verify-attestation/ |
| H A D | ssh-verify-attestation.c | 374 if ((r = sshkey_load_public(argv[0], &k, NULL)) != 0) in main()
|
| /src/crypto/openssh/regress/unittests/authopt/ |
| H A D | tests.c | 33 r = sshkey_load_public(test_data_file(name), &ret, NULL); in load_key()
|
| /src/crypto/openssh/regress/unittests/hostkeys/ |
| H A D | test_iterate.c | 175 ASSERT_INT_EQ(sshkey_load_public( in prepare_expected()
|