Lines Matching defs:file
247 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert)
255 debug("trying authorized principals file %s", file);
256 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) {
260 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
288 "from file \"%s\" on line %lu",
289 cert->principals[i], file, linenum);
291 file, linenum) != 1)
305 * Checks whether key is allowed in authorized_keys-format file,
309 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw)
321 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
357 if (auth_parse_options(pw, key_options, file,
364 debug("matching CA found: file %s, line %lu, %s %s",
365 file, linenum, key_type(found), fp);
392 key_type(found), fp, file);
397 if (auth_parse_options(pw, key_options, file,
404 debug("matching key found: file %s, line %lu %s %s",
405 file, linenum, key_type(found), fp);
440 * principals against the names in that file rather than matching
471 * Checks whether key is allowed in file.
475 user_key_allowed2(struct passwd *pw, Key *key, char *file)
483 debug("trying public key file %s", file);
484 if ((f = auth_openkeyfile(file, pw, options.strict_modes)) != NULL) {
485 found_key = check_authkeys_file(f, file, key, pw);
648 char *file;
667 file = expand_authorized_keys(
670 success = user_key_allowed2(pw, key, file);
671 free(file);