/freebsd/crypto/openssh/regress/unittests/hostkeys/ |
H A D | test_iterate.c | 113 expected_keytype = KEY_UNSPEC; in check() 202 KEY_UNSPEC, /* key type */ 272 KEY_UNSPEC, 286 KEY_UNSPEC, 356 KEY_UNSPEC, 370 KEY_UNSPEC, 440 KEY_UNSPEC, 454 KEY_UNSPEC, 524 KEY_UNSPEC, 711 KEY_UNSPEC, [all …]
|
/freebsd/crypto/openssh/ |
H A D | authfile.c | 147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private() 187 KEY_UNSPEC, &pubkey)) != 0) in sshkey_load_pubkey_from_private() 221 if ((k = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_try_load_public() 338 case KEY_UNSPEC: in sshkey_load_private_cert() 410 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_in_file()
|
H A D | sshkey.c | 267 return KEY_UNSPEC; in type_from_name() 316 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) in sshkey_match_keyname_to_sigalgs() 376 if (type == KEY_UNSPEC) { in sshkey_names_valid2() 721 if (type != KEY_UNSPEC && in sshkey_new() 1309 return KEY_UNSPEC; in peek_type_nid() 1324 if (ret->type != KEY_UNSPEC && sshkey_impl_from_type(ret->type) == NULL) in sshkey_read() 1332 if ((type = peek_type_nid(cp, space, &curve_nid)) == KEY_UNSPEC) in sshkey_read() 1340 if (ret->type != KEY_UNSPEC && ret->type != type) in sshkey_read() 1521 if ((k = sshkey_new(KEY_UNSPEC)) == NULL) in sshkey_generate() 3223 if (type != KEY_UNSPEC && in sshkey_parse_private2() [all …]
|
H A D | hostfile.c | 788 lineinfo.keytype = KEY_UNSPEC; in hostkeys_foreach_file() 869 if ((lineinfo.key = sshkey_new(KEY_UNSPEC)) == NULL) { in hostkeys_foreach_file() 893 if (lineinfo.keytype == KEY_UNSPEC && l < 8 && in hostkeys_foreach_file() 908 lineinfo.keytype = KEY_UNSPEC; in hostkeys_foreach_file() 910 if (lineinfo.keytype == KEY_UNSPEC) { in hostkeys_foreach_file()
|
H A D | ssh-keysign.c | 123 if (pktype == KEY_UNSPEC) in valid_request() 247 r = sshkey_load_private_type_fd(key_fd[i], KEY_UNSPEC, in main()
|
H A D | auth2-hostbased.c | 85 if (pktype == KEY_UNSPEC) { in userauth_hostbased()
|
H A D | ssh-pkcs11-client.c | 267 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) { in rsa_encrypt() 346 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) { in ecdsa_do_sign()
|
H A D | sshkey.h | 76 KEY_UNSPEC enumerator
|
H A D | ssh-keygen.c | 181 if (type == KEY_UNSPEC) in type_bits_valid() 731 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 739 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 747 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 773 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pem() 930 if ((ret = sshkey_new(KEY_UNSPEC)) == NULL) in try_read_key() 2234 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in do_show_cert() 2426 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in update_krl_from_file()
|
H A D | ssh-pkcs11.c | 804 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_ecdsa_pubkey() 903 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_rsa_pubkey() 1021 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_x509_pubkey() 1054 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_x509_pubkey()
|
H A D | auth2-pubkeyfile.c | 268 int want_keytype = sshkey_is_cert(key) ? KEY_UNSPEC : key->type; in auth_check_authkey_line()
|
H A D | sshconnect2.c | 178 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs() 700 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok() 1548 switch ((r = sshkey_load_private_type(KEY_UNSPEC, id->filename, in load_identity_file() 2161 authctxt->sensitive->keys[i]->type == KEY_UNSPEC) in userauth_hostbased()
|
H A D | ssh_api.c | 552 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs()
|
H A D | authfd.c | 658 if (key->type != KEY_UNSPEC) { in ssh_remove_identity()
|
H A D | ssh-keyscan.c | 781 case KEY_UNSPEC: in main()
|
H A D | auth2-pubkey.c | 139 if (pktype == KEY_UNSPEC) { in userauth_pubkey()
|
H A D | ssh-add.c | 151 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in delete_stdin()
|
H A D | sshsig.c | 779 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) { in parse_principals_key_and_options()
|
H A D | sshd-session.c | 635 if (key == NULL || key->type == KEY_UNSPEC || in notify_hostkeys()
|
H A D | kex.c | 887 if (k->hostkey_type == KEY_UNSPEC) { in choose_hostkeyalg()
|
H A D | sshconnect.c | 731 if (key->type == KEY_UNSPEC) in hostkey_accepted_by_hostkeyalgs()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | authkeys_fuzz.cc | 38 if ((key = sshkey_new(KEY_UNSPEC)) == NULL || in LLVMFuzzerTestOneInput() 39 (cert = sshkey_new(KEY_UNSPEC)) == NULL) in LLVMFuzzerTestOneInput()
|
H A D | agent_fuzz_helper.c | 29 if ((pubkey = sshkey_new(KEY_UNSPEC)) == NULL) in pubkey_or_die()
|
H A D | kex_fuzz.cc | 285 if ((pubkey = sshkey_new(KEY_UNSPEC)) == NULL) in prepare_key()
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 199 k1 = sshkey_new(KEY_UNSPEC); in sshkey_tests()
|