| Package | Description |
|---|---|
| org.apache.sshd.server.config.keys |
| Modifier and Type | Method and Description |
|---|---|
static AuthorizedKeyEntry |
AuthorizedKeyEntry.parseAuthorizedKeyEntry(String line) |
| Modifier and Type | Method and Description |
|---|---|
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(BufferedReader rdr) |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(File file)
Reads read the contents of an
authorized_keys file |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(InputStream in,
boolean okToClose)
Reads read the contents of an
authorized_keys file |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(Path path,
OpenOption... options)
Reads read the contents of an
authorized_keys file |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(Reader rdr,
boolean okToClose)
Reads read the contents of an
authorized_keys file |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(String filePath)
Reads read the contents of an
authorized_keys file |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readAuthorizedKeys(URL url)
Reads read the contents of an
authorized_keys file |
static List<AuthorizedKeyEntry> |
AuthorizedKeyEntry.readDefaultAuthorizedKeys()
Reads read the contents of the default OpenSSH
authorized_keys file |
protected Collection<AuthorizedKeyEntry> |
DefaultAuthorizedKeysAuthenticator.reloadAuthorizedKeys(Path path,
String username,
ServerSession session) |
protected Collection<AuthorizedKeyEntry> |
AuthorizedKeysAuthenticator.reloadAuthorizedKeys(Path path,
String username,
ServerSession session) |
| Modifier and Type | Method and Description |
|---|---|
static PublickeyAuthenticator |
AuthorizedKeyEntry.fromAuthorizedEntries(Collection<? extends AuthorizedKeyEntry> entries) |
static List<PublicKey> |
AuthorizedKeyEntry.resolveAuthorizedKeys(Collection<? extends AuthorizedKeyEntry> entries) |
Copyright © 2008–2015 The Apache Software Foundation. All rights reserved.