| /freebsd/crypto/openssh/ |
| H A D | sshd-auth.c | 255 append_hostkey_type(b, sshkey_ssh_name(key)); in list_hostkey_types() 274 append_hostkey_type(b, sshkey_ssh_name(key)); in list_hostkey_types() 400 debug2_f("key %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 409 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
| H A D | auth2-pubkey.c | 154 "(received %s, expected %s)", sshkey_ssh_name(key), pkalg); in userauth_pubkey() 456 "t", sshkey_ssh_name(key), in match_principals_command() 457 "T", sshkey_ssh_name(cert->signature_key), in match_principals_command() 723 "t", sshkey_ssh_name(key), in user_key_command_allowed2()
|
| H A D | sshconnect.c | 723 const char *ktype = sshkey_ssh_name(key); in hostkey_accepted_by_hostkeyalgs() 909 "t", host_key == NULL ? "NONE" : sshkey_ssh_name(host_key), in load_hostkeys_command() 1041 sshkey_ssh_name(host_key)); in check_host_key() 1493 sshkey_ssh_name(host_key), fp, in verify_host_key() 1496 sshkey_ssh_name(host_key->cert->signature_key), cafp, in verify_host_key() 1503 debug("Server host key: %s %s", sshkey_ssh_name(host_key), fp); in verify_host_key()
|
| H A D | sshd-session.c | 546 debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp); in notify_hostkeys() 618 debug2_f("privkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 627 debug2_f("pubkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 636 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
| H A D | sshconnect2.c | 100 sshkey_ssh_name(hostkey)); in verify_host_key_callback() 1174 return match_list(sshkey_ssh_name(key), in key_sig_algorithm() 1608 if (match_pattern_list(sshkey_ssh_name(key), allowlist, 0) == 1) in key_type_allowed() 1744 sshkey_ssh_name(idlist->keys[j])); in pubkey_prepare() 1810 sshkey_ssh_name(id->key), id->filename); in pubkey_prepare() 1816 sshkey_ssh_name(id->key), id->filename); in pubkey_prepare() 2175 sshkey_ssh_name(authctxt->sensitive->keys[i]), in userauth_hostbased() 2203 sshkey_ssh_name(private), fp, authctxt->active_ktype); in userauth_hostbased() 2244 sshkey_ssh_name(private), fp); in userauth_hostbased()
|
| H A D | clientloop.c | 2131 sshkey_ssh_name(ctx->keys[i]), in hostkeys_find() 2179 sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum); in hostkeys_find() 2184 debug3_f("deprecated %s key at %s:%ld", sshkey_ssh_name(l->key), in hostkeys_find() 2213 sshkey_ssh_name(ctx->old_keys[i]), l->path, l->linenum, in hostkeys_check_old() 2502 "HostkeyAlgorithms", sshkey_ssh_name(key)); in client_input_hostkeys() 2508 sshkey_ssh_name(key)); in client_input_hostkeys() 2515 sshkey_ssh_name(key)); in client_input_hostkeys()
|
| H A D | auth2-hostbased.c | 102 "(received %s, expected %s)", sshkey_ssh_name(key), pkalg); in userauth_hostbased()
|
| H A D | sshkey.h | 250 const char *sshkey_ssh_name(const struct sshkey *);
|
| H A D | ssh-sk-helper.c | 133 __progname, sshkey_ssh_name(key)); in process_sign()
|
| H A D | sshkey.c | 216 sshkey_ssh_name(const struct sshkey *k) in sshkey_ssh_name() function 1412 sshkey_ssh_name(key), uu)) != 0) in sshkey_format_text() 1644 fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k)); in sshkey_shield_private() 1777 fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k)); in sshkey_unshield_private() 2314 if ((ret = sshbuf_put_cstring(cert, sshkey_ssh_name(k))) != 0) in sshkey_certify_custom() 2550 if ((r = sshbuf_put_cstring(b, sshkey_ssh_name(key))) != 0) in sshkey_private_serialize_opt()
|
| H A D | krl.c | 1332 fprintf(f, "hash: %s # %s\n", fp, sshkey_ssh_name(key)); in krl_dump() 1363 sshkey_ssh_name(rc->ca_key), fp); in krl_dump()
|
| H A D | sshd.c | 1319 fatal_fr(r, "encode %s key", sshkey_ssh_name(key)); in accumulate_host_timing_secret() 1729 key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp); in main()
|
| H A D | ssh-agent.c | 328 dch->keys[i] == NULL ? "" : sshkey_ssh_name(dch->keys[i]), in dump_dest_constraint_hop() 654 sshkey_ssh_name(id->key), fp); in process_request_identities() 1452 sshkey_ssh_name(k), fp, comment, seconds, confirm, in process_add_identity()
|
| H A D | serverloop.c | 718 sigalg = sshkey_ssh_name(key); in server_input_hostkeys_prove()
|
| H A D | monitor.c | 758 debug_f("hostkey %s index %d", sshkey_ssh_name(pubkey), keyid); in mm_answer_sign() 1026 sshkey_ssh_name(key), list); in key_base_type_match()
|
| H A D | ssh-add.c | 999 debug2("%s: %s", argv[i], sshkey_ssh_name(k)); in main()
|
| H A D | hostfile.c | 716 sshkey_ssh_name(keys[i]), fp); in hostfile_replace_entries()
|
| H A D | ssh_namespace.h | 934 #define sshkey_ssh_name Fssh_sshkey_ssh_name macro
|
| H A D | ssh-keygen.c | 1773 sshkey_ssh_name(ca), key_type_name); in do_ca_sign() 2086 printf(" Type: %s %s certificate\n", sshkey_ssh_name(key), in print_cert()
|
| /freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
| H A D | kex_fuzz.cc | 138 debug_f("store %s at %d", sshkey_ssh_name(pubkey), pubkey->type); in store_key() 195 keyname = xstrdup(sshkey_ssh_name(privkey)); in do_kex_with_key()
|
| /freebsd/crypto/openssh/regress/unittests/kex/ |
| H A D | test_kex.c | 113 keyname = strdup(sshkey_ssh_name(private)); in do_kex_with_key()
|