Lines Matching defs:public

592 		fatal("%s: %s is not a recognised public key format", __func__,
755 fatal("cannot read public key from pkcs11");
785 Key *public;
801 public = key_load_public(identity_file, &comment);
802 if (public != NULL) {
803 fp = key_fingerprint(public, fptype, rep);
804 ra = key_fingerprint(public, SSH_FP_MD5, SSH_FP_RANDOMART);
805 printf("%u %s %s (%s)\n", key_size(public), fp, comment,
806 key_type(public));
809 key_free(public);
858 public = key_new(KEY_RSA1);
859 if (key_read(public, &cp) != 1) {
861 key_free(public);
862 public = key_new(KEY_UNSPEC);
863 if (key_read(public, &cp) != 1) {
864 key_free(public);
869 fp = key_fingerprint(public, fptype, rep);
870 ra = key_fingerprint(public, SSH_FP_MD5, SSH_FP_RANDOMART);
871 printf("%u %s %s (%s)\n", key_size(public), fp,
872 comment ? comment : "no comment", key_type(public));
877 key_free(public);
883 printf("%s is not a public key file.\n", identity_file);
909 Key *private, *public;
940 public = key_from_private(private);
947 key_free(public);
955 printf("Could not save your public key in %s\n",
957 key_free(public);
964 key_free(public);
968 if (!key_write(public, f)) {
970 key_free(public);
976 key_free(public);
984 printhost(FILE *f, const char *name, Key *public, int ca, int hash)
993 fp = key_fingerprint(public, fptype, rep);
994 ra = key_fingerprint(public, SSH_FP_MD5, SSH_FP_RANDOMART);
995 printf("%u %s %s (%s)\n", key_size(public), fp, name,
996 key_type(public));
1005 if (!key_write(public, f))
1321 Key *public;
1333 public = key_load_public(fname, &comment);
1334 if (public != NULL) {
1335 export_dns_rr(hname, public, stdout, print_generic);
1336 key_free(public);
1343 printf("failed to read v2 public key from %s.\n", fname);
1355 Key *public;
1418 public = key_from_private(private);
1424 printf("Could not save your public key in %s\n", identity_file);
1432 if (!key_write(public, f))
1434 key_free(public);
1538 Key **keys = NULL, *public, *private = NULL;
1541 if ((public = key_load_public(path, NULL)) == NULL)
1542 fatal("Couldn't load CA public key \"%s\"", path);
1547 fatal("cannot read public key from pkcs11");
1549 if (key_equal_public(public, keys[i])) {
1556 key_free(public);
1568 Key *ca, *public;
1616 if ((public = key_load_public(tmp, &comment)) == NULL)
1618 if (public->type != KEY_RSA && public->type != KEY_DSA &&
1619 public->type != KEY_ECDSA && public->type != KEY_ED25519)
1621 __func__, tmp, key_type(public));
1624 if (key_to_certified(public, v00) != 0)
1626 public->cert->type = cert_key_type;
1627 public->cert->serial = (u_int64_t)cert_serial;
1628 public->cert->key_id = xstrdup(cert_key_id);
1629 public->cert->nprincipals = n;
1630 public->cert->principals = plist;
1631 public->cert->valid_after = cert_valid_from;
1632 public->cert->valid_before = cert_valid_to;
1634 prepare_options_buf(&public->cert->critical,
1637 prepare_options_buf(&public->cert->critical,
1639 prepare_options_buf(&public->cert->extensions,
1642 public->cert->signature_key = key_from_private(ca);
1644 if (key_certify(public, ca) != 0)
1657 if (!key_write(public, f))
1664 "valid %s", key_cert_type(public),
1665 out, public->cert->key_id,
1666 (unsigned long long)public->cert->serial,
1672 key_free(public);
1876 fatal("%s is not a public key", identity_file);
2090 fatal("Cannot load CA public key %s", tmp);
2135 fatal("Cannot load public key %s", argv[i]);
2159 fprintf(stderr, " -c Change comment in private and public key files.\n");
2161 fprintf(stderr, " -D pkcs11 Download public key from pkcs11 token.\n");
2198 fprintf(stderr, " -y Read private key file and print public key.\n");
2214 Key *private, *public;
2581 printf("Generating public/private %s key pair.\n", key_type_name);
2587 public = key_from_private(private);
2675 printf("Could not save your public key in %s\n", identity_file);
2683 if (!key_write(public, f))
2689 char *fp = key_fingerprint(public, SSH_FP_MD5, SSH_FP_HEX);
2690 char *ra = key_fingerprint(public, SSH_FP_MD5,
2692 printf("Your public key has been saved in %s.\n",
2702 key_free(public);