/freebsd-current/crypto/openssh/ |
H A D | auth2-hostbased.c | 117 logit_r(r, "refusing %s key", sshkey_type(key)); 239 sshkey_type(key->cert->signature_key), fp, 246 sshkey_type(key), fp, cuser, lookup);
|
H A D | ssh-pkcs11-client.c | 411 debug3_f("wrap %s for provider %s", sshkey_type(k), helper->path); 441 debug3_f("private key type %s cert type %s", sshkey_type(priv), 442 sshkey_type(certpub)); 447 sshkey_type(priv), sshkey_type(certpub)); 472 fatal_f("unknown key type %s", sshkey_type(priv));
|
H A D | auth2-pubkeyfile.c | 324 sshkey_is_cert(key) ? "CA" : "key", sshkey_type(found), fp); 334 sshkey_type(found), fp, loc); 376 sshkey_type(found), fp, loc);
|
H A D | auth.c | 246 sshkey_type(key), fp == NULL ? "(null)" : fp, 249 sshkey_type(key->cert->signature_key), 258 xasprintf(&ret, "%s %s%s%s", sshkey_type(key), 572 sshkey_type(key), fp, options.revoked_keys_file); 576 "revoked keys file %s", sshkey_type(key), fp,
|
H A D | ssh-agent.c | 391 tag, hostname, sshkey_type(key), fp, dch->nkeys); 402 sshkey_type(dch->keys[i]), fp); 477 sshkey_type(id->key), id->comment); 499 "%zu constraints", sshkey_type(id->key), id->comment, 529 fromkey ? sshkey_type(fromkey) : "(ORIGIN)", 531 sshkey_type(hks->key), fp2); 881 verbose_f("%s key not found", sshkey_type(key)); 915 sshkey_type(id->key), fp); 953 sshkey_type(id->key), fp, 971 sshkey_type(i [all...] |
H A D | ssh_api.c | 483 debug3_f("check %s", sshkey_type(k->key)); 498 debug3_f("check %s", sshkey_type(k->key)); 511 debug3_f("need %s", sshkey_type(hostkey)); 513 debug3_f("check %s", sshkey_type(k->key));
|
H A D | ssh-sk-helper.c | 120 "msg len %zu, compat 0x%lx", sshkey_type(key), 251 sshkey_type(srks[i]->key), srks[i]->key->sk_application,
|
H A D | sshconnect.c | 1022 type = sshkey_type(host_key); 1292 sshkey_type(host_found->key), 1482 sshkey_type(host_key), fp); 1495 sshkey_type(host_key), fp, 1501 "revoked keys file %s", sshkey_type(host_key), 1625 sshkey_type(found->key), 1627 sshkey_type(found->key), fp); 1654 sshkey_type(host_key), fp);
|
H A D | auth2-pubkey.c | 82 xasprintf(&ret, "%s %s", sshkey_type(key), fp); 157 logit("refusing previously-used %s key", sshkey_type(key)); 174 logit_r(r, "refusing %s key", sshkey_type(key)); 503 sshkey_type(key->cert->signature_key), ca_fp, 566 sshkey_type(key->cert->signature_key), ca_fp,
|
H A D | ssh-add.c | 130 sshkey_type(key), comment ? comment : "no comment"); 554 sshkey_type(idlist->keys[i])); 629 sshkey_type(key), fp); 638 sshkey_type(key), fp); 738 host, sshkey_type(hke->key), want_ca ? "CA " : "",
|
H A D | ssh-keygen.c | 360 sshkey_size(k), sshkey_type(k), 394 fatal_f("unsupported key type %s", sshkey_type(k)); 420 fatal_f("unsupported key type %s", sshkey_type(k)); 811 fatal_f("unsupported key type %s", sshkey_type(k)); 874 fp, sshkey_type(keys[i])); 925 comment ? comment : "no comment", sshkey_type(public)); 1287 sshkey_type(l->key), fp, 1856 tmp, sshkey_type(public)); 1885 sshkey_type(ca), ca_fp); 2141 printf(" Public key: %s %s\n", sshkey_type(ke [all...] |
H A D | sshkey.h | 211 const char *sshkey_type(const struct sshkey *);
|
H A D | ssh-keysign.c | 295 sshkey_type(key), fp ? fp : "");
|
H A D | hostfile.c | 247 sshkey_type(l->key), l->path, l->linenum); 570 sshkey_type(l->key), l->path, l->linenum); 580 l->path, l->linenum, sshkey_type(l->key), ctx->host);
|
H A D | sshconnect2.c | 673 id->key ? sshkey_type(id->key) : "", id->key ? " " : "", 731 sshkey_type(key), fp == NULL ? "<ERROR>" : fp); 1250 sshkey_type(sign_key), fp); 1262 sshkey_type(sign_key), id->filename); 1332 debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp); 1440 loc, sshkey_type(id->key), fp); 1444 sshkey_type(sign_id->key), sign_id->filename,
|
H A D | clientloop.c | 2269 sshkey_type(ctx->keys[i]), fp); 2280 sshkey_type(ctx->old_keys[i]), fp); 2395 "for %s key %zu", sshkey_type(ctx->keys[i]), i); 2415 sshkey_type(ctx->keys[i]), i, alg); 2421 sshkey_type(ctx->keys[i]), i); 2504 debug3_f("received %s key %s", sshkey_type(key), fp);
|
H A D | ssh-pkcs11-helper.c | 101 debug("check %s %s %s", sshkey_type(ki->key),
|
H A D | ssh-sk-client.c | 456 sshkey_type(srk->key), srk->key->sk_application,
|
H A D | monitor.c | 1206 (key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key), 1450 sshkey_type(key), sigalg == NULL ? "default" : sigalg, 1463 sshkey_type(key), fp, 1475 "not met ", sshkey_type(key), fp,
|
H A D | serverloop.c | 707 error_f("unknown host %s key", sshkey_type(key)); 736 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg);
|
H A D | auth2.c | 809 sshkey_type(authctxt->prev_keys[i]),
|
H A D | krl.c | 244 KRL_DBG(("new CA %s", ca_key == NULL ? "*" : sshkey_type(ca_key))); 410 debug3_f("revoke type %s", sshkey_type(key));
|
H A D | sshd.c | 419 sshkey_type(sensitive_data.host_keys[i])); 2044 sshkey_type(key));
|
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 355 kextypes[j], sshkey_type(st->pubkeys[keytypes[i]])); 366 kextypes[j], sshkey_type(st->pubkeys[keytypes[i]])); 383 sshkey_type(st->privkeys[keytypes[i]])); 390 sshkey_type(st->pubkeys[keytypes[i]]));
|
/freebsd-current/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 163 sshkey_type(k), lens[i]);
|