Lines Matching refs:linenum

638 sshsigopt_parse(const char *opts, const char *path, u_long linenum,
734 parse_principals_key_and_options(const char *path, u_long linenum, char *line,
758 error("%s:%lu: invalid line", path, linenum);
779 path, linenum, required_principal);
791 error("%s:%lu: invalid options", path, linenum);
796 error("%s:%lu: missing key", path, linenum);
803 error("%s:%lu: invalid key", path, linenum);
808 debug3("%s:%lu: options %s", path, linenum, opts == NULL ? "" : opts);
809 if ((sigopts = sshsigopt_parse(opts, path, linenum, &reason)) == NULL) {
810 error("%s:%lu: bad options: %s", path, linenum, reason);
836 cert_filter_principals(const char *path, u_long linenum,
858 path, linenum, cp, reason);
874 error("%s:%lu: no valid principals found", path, linenum);
892 check_allowed_keys_line(const char *path, u_long linenum, char *line,
907 if ((r = parse_principals_key_and_options(path, linenum, line,
915 debug("%s:%lu: matched key", path, linenum);
923 path, linenum, reason);
927 path, linenum);
930 if ((r = cert_filter_principals(path, linenum,
934 path, linenum);
938 path, linenum);
949 "namespace \"%s\"", path, linenum, sig_namespace);
960 "verify time %s < valid-after %s", path, linenum,
969 "verify time %s > valid-before %s", path, linenum,
993 u_long linenum = 0;
1006 linenum++;
1007 r = check_allowed_keys_line(path, linenum, line, sign_key,
1034 u_long linenum = 0;
1046 linenum++;
1047 r = check_allowed_keys_line(path, linenum, line,
1082 u_long linenum = 0;
1100 linenum++;
1102 if ((r = parse_principals_key_and_options(path, linenum, line,