• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/openssh/

Lines Matching refs:keys

191 		/* Prefer algorithms that we already have keys for */
256 char *filename; /* comment for agent-only keys */
273 struct idlist keys;
645 * search keys in the reverse order, because last candidate has been
647 * duplicate keys
649 TAILQ_FOREACH_REVERSE(id, &authctxt->keys, idlist, next) {
1087 * for RSA keys/certs and when the server advertises support for
1099 * For RSA keys/certs, since these might have a different sig type:
1208 TAILQ_FOREACH(private_id, &authctxt->keys, next) {
1217 * filename matches for non-PKCS#11/agent keys that
1218 * didn't load public keys. This supports the case
1225 TAILQ_FOREACH(private_id, &authctxt->keys, next) {
1451 /* RSA keys/certs might be allowed by alternate signature types */
1475 * try keys in the following order:
1478 * 3. agent keys that are found in the config file
1479 * 4. other agent keys
1480 * 5. keys that are only listed in the config file
1493 TAILQ_INIT(&agent); /* keys from the agent */
1494 TAILQ_INIT(&files); /* keys from the config file */
1495 preferred = &authctxt->keys;
1496 TAILQ_INIT(preferred); /* preferred order of keys */
1498 /* list of keys stored in the filesystem and PKCS#11 */
1524 /* list of keys supported by the agent */
1539 * agent keys from the config file are
1542 if (sshkey_equal(idlist->keys[j], id->key)) {
1553 id->key = idlist->keys[j];
1555 idlist->keys[j] = NULL;
1562 /* append remaining agent keys */
1569 /* Prefer PKCS11 keys that are explicitly listed */
1591 /* append remaining keys from the config file */
1609 /* List the keys we plan on using */
1625 for (id = TAILQ_FIRST(&authctxt->keys); id;
1626 id = TAILQ_FIRST(&authctxt->keys)) {
1627 TAILQ_REMOVE(&authctxt->keys, id, next);
1639 TAILQ_FOREACH(id, &authctxt->keys, next)
1665 while ((id = TAILQ_FIRST(&authctxt->keys))) {
1669 TAILQ_REMOVE(&authctxt->keys, id, next);
1670 TAILQ_INSERT_TAIL(&authctxt->keys, id, next);
1673 * encrypted keys we cannot do this and have to load the
1951 if (authctxt->sensitive->keys[i] == NULL ||
1952 authctxt->sensitive->keys[i]->type == KEY_UNSPEC)
1955 sshkey_ssh_name(authctxt->sensitive->keys[i]),
1959 private = authctxt->sensitive->keys[i];
1960 authctxt->sensitive->keys[i] = NULL;
1966 /* No more keys of this type; advance */