Lines Matching +defs:ca +defs:path

940 fingerprint_private(const char *path)
948 fatal("%s: %s", path, strerror(errno));
949 if ((r = sshkey_load_public(path, &pubkey, &comment)) != 0)
950 debug_r(r, "load public \"%s\"", path);
953 if ((r = sshkey_load_private(path, NULL,
955 debug_r(r, "load private \"%s\"", path);
958 fatal("%s is not a key file.", path);
974 const char *path;
979 path = identity_file;
983 path = "(stdin)";
984 } else if ((f = fopen(path, "r")) == NULL)
985 fatal("%s: %s: %s", __progname, path, strerror(errno));
1010 fingerprint_private(path);
1041 debug("%s:%lu: not a public key", path, lnum);
1059 fatal("%s is not a public key file.", path);
1069 char *path;
1094 identity_file, key_types[i].path);
1101 error("Could not stat %s: %s", key_types[i].path,
1111 identity_file, key_types[i].path);
1113 identity_file, key_types[i].path);
1115 identity_file, key_types[i].path);
1167 key_types[i].path, strerror(errno));
1214 "with wildcard: %.64s", l->path,
1237 logit("%s:%lu: invalid line", l->path, l->linenum);
1307 logit("%s:%lu: invalid line", l->path, l->linenum);
1328 fatal("Specified known hosts path too long");
1351 fatal("known_hosts path too long");
1729 load_pkcs11_key(char *path)
1735 if ((r = sshkey_load_public(path, &public, NULL)) != 0)
1736 fatal_r(r, "Couldn't load CA public key \"%s\"", path);
1778 struct sshkey *ca, *public;
1791 if ((ca = load_pkcs11_key(tmp)) == NULL)
1799 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0)
1807 if (sshkey_equal(ca, agent_ids->keys[j])) {
1815 ca->flags |= SSHKEY_FLAG_EXT;
1818 ca = load_identity(tmp, NULL);
1819 if (sshkey_is_sk(ca) &&
1820 (ca->sk_flags & SSH_SK_USER_VERIFICATION_REQD)) {
1829 if (sshkey_type_from_shortname(key_type_name) != ca->type) {
1831 sshkey_ssh_name(ca), key_type_name);
1833 } else if (ca->type == KEY_RSA) {
1837 ca_fp = sshkey_fingerprint(ca, fingerprint_hash, SSH_FP_DEFAULT);
1876 if ((r = sshkey_from_private(ca,
1878 fatal_r(r, "sshkey_from_private (ca key)");
1880 if (agent_fd != -1 && (ca->flags & SSHKEY_FLAG_EXT) != 0) {
1881 if ((r = sshkey_certify_custom(public, ca,
1886 if (sshkey_is_sk(ca) &&
1887 (ca->sk_flags & SSH_SK_USER_PRESENCE_REQD)) {
1890 sshkey_type(ca), ca_fp);
1892 r = sshkey_certify(public, ca, key_type_name,
2186 const char *path;
2195 path = identity_file;
2196 if (strcmp(path, "-") == 0) {
2198 path = "(stdin)";
2214 error_r(r, "%s:%lu: invalid key", path, lnum);
2218 error("%s:%lu is not a certificate", path, lnum);
2223 printf("%s:\n", path);
2225 printf("%s:%lu:\n", path, lnum);
2235 load_krl(const char *path, struct ssh_krl **krlp)
2240 if ((r = sshbuf_load_file(path, &krlbuf)) != 0)
2241 fatal_r(r, "Unable to load KRL %s", path);
2245 fatal_r(r, "Invalid KRL file %s", path);
2287 const struct sshkey *ca, struct ssh_krl *krl)
2291 char *path, *cp, *ep, *line = NULL;
2298 path = tilde_expand_filename(file, pw->pw_uid);
2299 if (strcmp(path, "-") == 0) {
2301 free(path);
2302 path = xstrdup("(standard input)");
2303 } else if ((krl_spec = fopen(path, "r")) == NULL)
2304 fatal("fopen %s: %s", path, strerror(errno));
2307 printf("Revoking from %s\n", path);
2311 path, linesize);
2334 if (ca == NULL && !wild_ca) {
2344 path, lnum, cp);
2347 path, lnum);
2355 path, lnum, cp);
2358 path, lnum);
2361 "%llu:%llu", path, lnum,
2366 ca, serial, serial2) != 0) {
2370 if (ca == NULL && !wild_ca) {
2376 if (ssh_krl_revoke_cert_by_key_id(krl, ca, cp) != 0)
2406 fatal_r(r, "%s:%lu: invalid key", path, lnum);
2433 if (strcmp(path, "-") != 0)
2436 free(path);
2446 struct sshkey *ca = NULL;
2465 if ((r = sshkey_load_public(tmp, &ca, NULL)) != 0)
2482 update_krl_from_file(pw, argv[i], wild_ca, ca, krl);
2492 sshkey_free(ca);
2546 "path %s instead", keypath, privpath);
3120 private_key_passphrase(const char *path)
3130 "(empty for no passphrase): ", path);
3164 /* Don't emit a user-id that contains path or control characters */
3181 char *fp, *pin = NULL, *pass = NULL, *path, *pubpath;
3219 xasprintf(&path, "id_%s_rk%s%s",
3224 if (!confirm_overwrite(path)) {
3225 free(path);
3231 pass = private_key_passphrase(path);
3232 if ((r = sshkey_save_private(key, path, pass,
3235 error_r(r, "Saving key \"%s\" failed", path);
3236 free(path);
3243 path);
3247 xasprintf(&pubpath, "%s.pub", path);
3248 free(path);
3267 save_attestation(struct sshbuf *attest, const char *path)
3272 if (path == NULL)
3277 r = sshbuf_write_file(path, attest);
3280 fatal_r(r, "Unable to write attestation data \"%s\"", path);
3283 "%s\n", path);