/freebsd/crypto/openssh/ |
H A D | sshsig.h | 38 const char *sk_provider, const char *sk_pin, const struct sshbuf *message, 59 const char *sk_provider, const char *sk_pin,
|
H A D | ssh-agent.c | 146 char *sk_provider; member 366 free(id->sk_provider); in free_identity() 961 id->sk_provider, pin, compat)) != 0) { in process_sign_request2() 1373 char *fp, *comment = NULL, *sk_provider = NULL; in process_add_identity() local 1390 &sk_provider, &dest_constraints, &ndest_constraints, in process_add_identity() 1398 if (sk_provider != NULL) { in process_add_identity() 1404 if (strcasecmp(sk_provider, "internal") == 0) { in process_add_identity() 1410 sk_provider); in process_add_identity() 1413 if (realpath(sk_provider, canonical_provider) == NULL) { in process_add_identity() 1415 "realpath: %s", sk_provider, in process_add_identity() [all …]
|
H A D | sshsig.c | 165 const char *sk_provider, const char *sk_pin, const struct sshbuf *h_message, in sshsig_wrap_sign() argument 199 sign_alg, sk_provider, sk_pin, 0, signer_ctx)) != 0) { in sshsig_wrap_sign() 206 sign_alg, sk_provider, sk_pin, 0)) != 0) { in sshsig_wrap_sign() 444 const char *sk_provider, const char *sk_pin, in sshsig_signb() argument 459 if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b, in sshsig_signb() 572 const char *sk_provider, const char *sk_pin, in sshsig_sign_fd() argument 587 if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b, in sshsig_sign_fd()
|
H A D | ssh.c | 1597 if (options.sk_provider != NULL && *options.sk_provider == '$' && in main() 1598 strlen(options.sk_provider) > 1) { in main() 1599 if ((cp = getenv(options.sk_provider + 1)) == NULL) { in main() 1601 "disabling", options.sk_provider); in main() 1602 free(options.sk_provider); in main() 1603 options.sk_provider = NULL; in main() 1606 options.sk_provider, cp); in main() 1607 free(options.sk_provider); in main() 1608 options.sk_provider = xstrdup(cp); in main()
|
H A D | readconf.h | 87 char *sk_provider; /* Security key provider */ member
|
H A D | servconf.h | 243 char *sk_provider; member
|
H A D | ssh_api.c | 65 const char *sk_provider, const char *sk_pin, u_int compat) in mm_sshkey_sign() argument 71 sk_provider, sk_pin, compat); in mm_sshkey_sign()
|
H A D | ssh-keygen.c | 155 static char *sk_provider = NULL; variable 1905 key_type_name, sk_provider, NULL, agent_signer, in do_ca_sign() 1916 sk_provider, pin); in do_ca_sign() 2642 if ((r = sshsig_sign_fd(signkey, hashalg, sk_provider, pin, in sign_one() 3422 sk_provider = getenv("SSH_SK_PROVIDER"); in main() 3593 sk_provider = optarg; in main() 3620 if (sk_provider == NULL) in main() 3621 sk_provider = "internal"; in main() 3771 return do_download_sk(sk_provider, sk_device); in main() 3900 r = sshsk_enroll(type, sk_provider, sk_device, in main()
|
H A D | readconf.c | 1477 charptr = &options->sk_provider; in process_config_line_depth() 2646 options->sk_provider = NULL; in initialize_options() 2891 if (options->sk_provider == NULL) in fill_default_options() 2892 options->sk_provider = xstrdup("internal"); in fill_default_options() 2894 if (options->sk_provider == NULL) in fill_default_options() 2895 options->sk_provider = xstrdup("$SSH_SK_PROVIDER"); in fill_default_options() 2957 CLEAR_ON_NONE(options->sk_provider); in fill_default_options() 3033 free(o->sk_provider); in free_options() 3643 dump_cfg_string(oSecurityKeyProvider, o->sk_provider); in dump_client_config()
|
H A D | sshkey.c | 2199 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in sshkey_sign() argument 2216 r = sshsk_sign(sk_provider, key, sigp, lenp, data, in sshkey_sign() 2223 alg, sk_provider, sk_pin, compat); in sshkey_sign() 2282 const char *sk_provider, const char *sk_pin, in sshkey_certify_custom() argument 2364 sshbuf_len(cert), alg, sk_provider, sk_pin, 0, signer_ctx)) != 0) in sshkey_certify_custom() 2394 const char *alg, const char *sk_provider, const char *sk_pin, in default_key_sign() argument 2400 sk_provider, sk_pin, compat); in default_key_sign() 2405 const char *sk_provider, const char *sk_pin) in sshkey_certify() argument 2407 return sshkey_certify_custom(k, ca, alg, sk_provider, sk_pin, in sshkey_certify()
|
H A D | ssh-ed25519.c | 149 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_ed25519_sign() argument
|
H A D | ssh-xmss.c | 204 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_xmss_sign() argument
|
H A D | servconf.c | 202 options->sk_provider = NULL; in initialize_server_options() 496 if (options->sk_provider == NULL) in fill_default_server_options() 497 options->sk_provider = xstrdup("internal"); in fill_default_server_options() 533 CLEAR_ON_NONE(options->sk_provider); in fill_default_server_options() 2498 charptr = &options->sk_provider; in process_server_config_line_depth() 3293 dump_cfg_string(sSecurityKeyProvider, o->sk_provider); in dump_config()
|
H A D | ssh-dss.c | 262 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_dss_sign() argument
|
H A D | ssh-ecdsa.c | 323 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_ecdsa_sign() argument
|
H A D | sshconnect2.c | 1256 alg, options.sk_provider, pin, compat)) != 0) { in identity_sign() 1573 options.sk_provider == NULL) { in load_identity_file() 1693 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) { in pubkey_prepare() 1716 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) { in pubkey_prepare()
|
H A D | sshd-session.c | 1422 data, dlen, alg, options.sk_provider, NULL, in sshd_hostkey_sign() 1427 data, dlen, alg, options.sk_provider, NULL, in sshd_hostkey_sign()
|
H A D | ssh-rsa.c | 407 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_rsa_sign() argument
|
H A D | monitor_wrap.c | 265 const char *sk_provider, const char *sk_pin, u_int compat) in mm_sshkey_sign() argument
|
H A D | sshconnect.c | 1752 skprovider = options.sk_provider; in maybe_add_key_to_agent()
|
H A D | monitor.c | 679 options.sk_provider, NULL, compat)) != 0) in mm_answer_sign()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | agent_fuzz_helper.c | 71 id->sk_provider = xstrdup("internal"); in add_key() 90 id->sk_provider = xstrdup("internal"); in add_key()
|