| /dflybsd-src/crypto/openssh/ |
| H A D | ssh-pkcs11-client.c | 411 debug3_f("wrap %s for provider %s", sshkey_type(k), helper->path); in wrap_key() 441 debug3_f("private key type %s cert type %s", sshkey_type(priv), in pkcs11_make_cert() 442 sshkey_type(certpub)); in pkcs11_make_cert() 447 sshkey_type(priv), sshkey_type(certpub)); in pkcs11_make_cert() 472 fatal_f("unknown key type %s", sshkey_type(priv)); in pkcs11_make_cert()
|
| H A D | auth2-hostbased.c | 118 logit_r(r, "refusing %s key", sshkey_type(key)); in userauth_hostbased() 240 sshkey_type(key->cert->signature_key), fp, in hostbased_key_allowed() 247 sshkey_type(key), fp, cuser, lookup); in hostbased_key_allowed()
|
| H A D | auth.c | 244 sshkey_type(key), fp == NULL ? "(null)" : fp, in format_method_key() 247 sshkey_type(key->cert->signature_key), in format_method_key() 256 xasprintf(&ret, "%s %s%s%s", sshkey_type(key), in format_method_key() 548 sshkey_type(key), fp, options.revoked_keys_file); in auth_key_is_revoked() 552 "revoked keys file %s", sshkey_type(key), fp, in auth_key_is_revoked()
|
| H A D | ssh-agent.c | 373 tag, hostname, sshkey_type(key), fp, dch->nkeys); in match_key_hop() 384 sshkey_type(dch->keys[i]), fp); in match_key_hop() 459 sshkey_type(id->key), id->comment); in permitted_by_dest_constraints() 481 "%zu constraints", sshkey_type(id->key), id->comment, in identity_permitted() 511 fromkey ? sshkey_type(fromkey) : "(ORIGIN)", in identity_permitted() 513 sshkey_type(hks->key), fp2); in identity_permitted() 863 verbose_f("%s key not found", sshkey_type(key)); in process_sign_request2() 897 sshkey_type(id->key), fp); in process_sign_request2() 935 sshkey_type(id->key), fp, in process_sign_request2() 953 sshkey_type(id->key), fp); in process_sign_request2() [all …]
|
| H A D | auth2-pubkeyfile.c | 324 sshkey_is_cert(key) ? "CA" : "key", sshkey_type(found), fp); in auth_check_authkey_line() 334 sshkey_type(found), fp, loc); in auth_check_authkey_line() 376 sshkey_type(found), fp, loc); in auth_check_authkey_line()
|
| H A D | auth2-pubkey.c | 83 xasprintf(&ret, "%s %s", sshkey_type(key), fp); in format_key() 158 logit("refusing previously-used %s key", sshkey_type(key)); in userauth_pubkey() 175 logit_r(r, "refusing %s key", sshkey_type(key)); in userauth_pubkey() 504 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca() 567 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
|
| H A D | ssh_api.c | 488 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_public_key() 503 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_private_key() 516 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key() 518 debug3_f("check %s", sshkey_type(k->key)); in _ssh_verify_host_key()
|
| H A D | sshconnect.c | 1052 type = sshkey_type(host_key); in check_host_key() 1322 sshkey_type(host_found->key), in check_host_key() 1512 sshkey_type(host_key), fp); in verify_host_key() 1525 sshkey_type(host_key), fp, in verify_host_key() 1531 "revoked keys file %s", sshkey_type(host_key), in verify_host_key() 1655 sshkey_type(found->key), in show_other_keys() 1657 sshkey_type(found->key), fp); in show_other_keys() 1684 sshkey_type(host_key), fp); in warn_changed_key()
|
| H A D | ssh-add.c | 130 sshkey_type(key), comment ? comment : "no comment"); in delete_one() 554 sshkey_type(idlist->keys[i])); in list_identities() 629 sshkey_type(key), fp); in load_resident_keys() 638 sshkey_type(key), fp); in load_resident_keys() 738 host, sshkey_type(hke->key), want_ca ? "CA " : "", in parse_dest_constraint_hop()
|
| H A D | ssh-keygen.c | 360 sshkey_size(k), sshkey_type(k), in do_convert_to_ssh2() 394 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pkcs8() 420 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pem() 811 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_from() 874 fp, sshkey_type(keys[i])); in do_download() 925 comment ? comment : "no comment", sshkey_type(public)); in fingerprint_one_key() 1287 sshkey_type(l->key), fp, in known_hosts_find_delete() 1856 tmp, sshkey_type(public)); in do_ca_sign() 1885 sshkey_type(ca), ca_fp); in do_ca_sign() 2141 printf(" Public key: %s %s\n", sshkey_type(key), key_fp); in print_cert() [all …]
|
| H A D | hostfile.c | 247 sshkey_type(l->key), l->path, l->linenum); in record_hostkey() 570 sshkey_type(l->key), l->path, l->linenum); in host_delete() 580 l->path, l->linenum, sshkey_type(l->key), ctx->host); in host_delete()
|
| H A D | sshconnect2.c | 671 id->key ? sshkey_type(id->key) : "", id->key ? " " : "", in format_identity() 729 sshkey_type(key), fp == NULL ? "<ERROR>" : fp); in input_userauth_pk_ok() 1248 sshkey_type(sign_key), fp); in identity_sign() 1260 sshkey_type(sign_key), id->filename); in identity_sign() 1330 debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp); in sign_and_send_pubkey() 1438 loc, sshkey_type(id->key), fp); in sign_and_send_pubkey() 1442 sshkey_type(sign_id->key), sign_id->filename, in sign_and_send_pubkey()
|
| H A D | clientloop.c | 2252 sshkey_type(ctx->keys[i]), fp); in update_known_hosts() 2263 sshkey_type(ctx->old_keys[i]), fp); in update_known_hosts() 2378 "for %s key %zu", sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_prove_confirm() 2398 sshkey_type(ctx->keys[i]), i, alg); in client_global_hostkeys_prove_confirm() 2404 sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_prove_confirm() 2468 debug3_f("received %s key %s", sshkey_type(key), fp); in client_input_hostkeys()
|
| H A D | ssh-keysign.c | 295 sshkey_type(key), fp ? fp : ""); in main()
|
| H A D | sshkey.h | 211 const char *sshkey_type(const struct sshkey *);
|
| H A D | serverloop.c | 674 error_f("unknown host %s key", sshkey_type(key)); in server_input_hostkeys_prove() 703 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); in server_input_hostkeys_prove()
|
| H A D | monitor.c | 1221 (key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key), in mm_answer_keyallowed() 1465 sshkey_type(key), sigalg == NULL ? "default" : sigalg, in mm_answer_keyverify() 1478 sshkey_type(key), fp, in mm_answer_keyverify() 1490 "not met ", sshkey_type(key), fp, in mm_answer_keyverify()
|
| H A D | ssh-pkcs11-helper.c | 101 debug("check %s %s %s", sshkey_type(ki->key), in lookup_key()
|
| H A D | ssh-sk-client.c | 456 sshkey_type(srk->key), srk->key->sk_application, in sshsk_load_resident()
|
| H A D | krl.c | 244 KRL_DBG(("new CA %s", ca_key == NULL ? "*" : sshkey_type(ca_key))); in revoked_certs_for_ca_key() 410 debug3_f("revoke type %s", sshkey_type(key)); in ssh_krl_revoke_key_explicit()
|
| H A D | auth2.c | 757 sshkey_type(authctxt->prev_keys[i]), in auth2_key_already_used()
|
| H A D | ssh.c | 2401 cp, sshkey_type(public)); in load_public_identity_files() 2434 filename, sshkey_type(public)); in load_public_identity_files()
|
| H A D | sshkey.c | 209 sshkey_type(const struct sshkey *k) in sshkey_type() function 1066 sshkey_type(k), sshkey_size(k)); in fingerprint_randomart() 1069 r = snprintf(title, sizeof(title), "[%s]", sshkey_type(k)); in fingerprint_randomart()
|
| H A D | sshd-session.c | 255 sshkey_type(sensitive_data.host_keys[i])); in demote_sensitive_data()
|
| H A D | sshd.c | 1599 sshkey_type(key)); in main()
|