| /freebsd/crypto/openssh/regress/unittests/hostkeys/ |
| H A D | test_iterate.c | 104 expected_keytype = KEY_UNSPEC; in check() 188 KEY_UNSPEC, /* key type */ 244 KEY_UNSPEC, 258 KEY_UNSPEC, 314 KEY_UNSPEC, 328 KEY_UNSPEC, 384 KEY_UNSPEC, 398 KEY_UNSPEC, 454 KEY_UNSPEC, 599 KEY_UNSPEC, [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | authfile.c | 137 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private() 177 KEY_UNSPEC, &pubkey)) != 0) in sshkey_load_pubkey_from_private() 209 if ((k = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_try_load_public() 324 case KEY_UNSPEC: in sshkey_load_private_cert() 396 if ((pub = sshkey_new(KEY_UNSPEC)) == NULL) { in sshkey_in_file()
|
| H A D | sshkey.c | 243 return KEY_UNSPEC; in type_from_name() 292 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) in sshkey_match_keyname_to_sigalgs() 355 if (type == KEY_UNSPEC) { in sshkey_names_valid2() 692 if (type != KEY_UNSPEC && in sshkey_new() 1296 return KEY_UNSPEC; in peek_type_nid() 1311 if (ret->type != KEY_UNSPEC && sshkey_impl_from_type(ret->type) == NULL) in sshkey_read() 1319 if ((type = peek_type_nid(cp, space, &curve_nid)) == KEY_UNSPEC) in sshkey_read() 1327 if (ret->type != KEY_UNSPEC && ret->type != type) in sshkey_read() 1508 if ((k = sshkey_new(KEY_UNSPEC)) == NULL) in sshkey_generate() 3182 if (type != KEY_UNSPEC && in sshkey_parse_private2() [all …]
|
| H A D | ssh-keysign.c | 121 if (pktype == KEY_UNSPEC) in valid_request() 243 r = sshkey_load_private_type_fd(key_fd[i], KEY_UNSPEC, in main()
|
| H A D | hostfile.c | 818 lineinfo.keytype = KEY_UNSPEC; in hostkeys_foreach_file() 905 if ((lineinfo.key = sshkey_new(KEY_UNSPEC)) == NULL) { in hostkeys_foreach_file() 929 if (lineinfo.keytype == KEY_UNSPEC && l < 8 && in hostkeys_foreach_file() 944 lineinfo.keytype = KEY_UNSPEC; in hostkeys_foreach_file() 946 if (lineinfo.keytype == KEY_UNSPEC) { in hostkeys_foreach_file()
|
| H A D | auth2-hostbased.c | 85 if (pktype == KEY_UNSPEC) { in userauth_hostbased()
|
| H A D | ssh-pkcs11.c | 952 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_ecdsa_pubkey() 1055 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_rsa_pubkey() 1177 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in pkcs11_fetch_ed25519_pubkey() 1294 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_x509_pubkey() 1338 key = sshkey_new(KEY_UNSPEC); in pkcs11_fetch_x509_pubkey() 1359 if ((key = sshkey_new(KEY_UNSPEC)) == NULL || in pkcs11_fetch_x509_pubkey()
|
| H A D | sshkey.h | 70 KEY_UNSPEC enumerator
|
| H A D | auth2-pubkeyfile.c | 272 int want_keytype = sshkey_is_cert(key) ? KEY_UNSPEC : key->type; in auth_check_authkey_line()
|
| H A D | ssh-keygen.c | 177 if (type == KEY_UNSPEC) in type_bits_valid() 666 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 674 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pkcs8() 699 if ((*k = sshkey_new(KEY_UNSPEC)) == NULL) in do_convert_from_pem() 849 if ((ret = sshkey_new(KEY_UNSPEC)) == NULL) in try_read_key() 2153 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in do_show_cert() 2347 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in update_krl_from_file()
|
| H A D | sshconnect2.c | 179 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs() 701 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok() 1553 switch ((r = sshkey_load_private_type(KEY_UNSPEC, id->filename, in load_identity_file() 2172 authctxt->sensitive->keys[i]->type == KEY_UNSPEC) in userauth_hostbased()
|
| H A D | ssh_api.c | 552 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs()
|
| H A D | ssh-keyscan.c | 748 case KEY_UNSPEC: in main()
|
| H A D | authfd.c | 653 if (key->type != KEY_UNSPEC) { in ssh_remove_identity()
|
| H A D | auth2-pubkey.c | 138 if (pktype == KEY_UNSPEC) { in userauth_pubkey()
|
| H A D | ssh-add.c | 146 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) in delete_stdin()
|
| H A D | sshd-session.c | 541 if (key == NULL || key->type == KEY_UNSPEC || in notify_hostkeys()
|
| H A D | sshsig.c | 784 if ((key = sshkey_new(KEY_UNSPEC)) == NULL) { in parse_principals_key_and_options()
|
| H A D | kex.c | 892 if (k->hostkey_type == KEY_UNSPEC) { in choose_hostkeyalg()
|
| H A D | sshconnect.c | 726 if (key->type == KEY_UNSPEC) in hostkey_accepted_by_hostkeyalgs()
|
| /freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
| H A D | authkeys_fuzz.cc | 38 if ((key = sshkey_new(KEY_UNSPEC)) == NULL || in LLVMFuzzerTestOneInput() 39 (cert = sshkey_new(KEY_UNSPEC)) == NULL) in LLVMFuzzerTestOneInput()
|
| H A D | agent_fuzz_helper.c | 29 if ((pubkey = sshkey_new(KEY_UNSPEC)) == NULL) in pubkey_or_die()
|
| H A D | kex_fuzz.cc | 285 if ((pubkey = sshkey_new(KEY_UNSPEC)) == NULL) in prepare_key()
|
| /freebsd/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 259 k1 = sshkey_new(KEY_UNSPEC); in sshkey_tests()
|