Home
last modified time | relevance | path

Searched refs:sshkey_type (Results 1 – 25 of 32) sorted by relevance

12

/freebsd/crypto/openssh/
H A Dssh-pkcs11-client.c115 sshkey_type(key), helper->path, helper->nkeyblobs); in helper_add_key()
246 fatal_f("no helper for %s key", sshkey_type(key)); in pkcs11_sign()
297 fatal_f("no helper for %s key", sshkey_type(priv)); in pkcs11_make_cert()
300 sshkey_type(priv), sshkey_type(certpub), helper->path); in pkcs11_make_cert()
306 sshkey_type(priv), sshkey_type(certpub)); in pkcs11_make_cert()
467 debug3_f("free %s key", sshkey_type(key)); in pkcs11_key_free()
470 fatal_f("no helper for %s key", sshkey_type(key)); in pkcs11_key_free()
H A Dauth2-hostbased.c119 logit_r(r, "refusing %s key", sshkey_type(key)); in userauth_hostbased()
223 sshkey_type(key->cert->signature_key), fp, reason); in hostbased_key_allowed()
250 sshkey_type(key->cert->signature_key), fp, in hostbased_key_allowed()
257 sshkey_type(key), fp, cuser, lookup); in hostbased_key_allowed()
H A Dauth2-pubkeyfile.c328 sshkey_is_cert(key) ? "CA" : "key", sshkey_type(found), fp); in auth_check_authkey_line()
338 sshkey_type(found), fp, loc); in auth_check_authkey_line()
380 sshkey_type(found), fp, loc); in auth_check_authkey_line()
397 sshkey_type(key->cert->signature_key), fp, loc, reason); in auth_check_authkey_line()
H A Dauth.c243 sshkey_type(key), fp == NULL ? "(null)" : fp, in format_method_key()
246 sshkey_type(key->cert->signature_key), in format_method_key()
255 xasprintf(&ret, "%s %s%s%s", sshkey_type(key), in format_method_key()
574 sshkey_type(key), fp, in auth_key_is_revoked()
579 "revoked keys file %s", sshkey_type(key), fp, in auth_key_is_revoked()
H A Dssh-agent.c386 tag, hostname, sshkey_type(key), fp, dch->nkeys); in match_key_hop()
397 sshkey_type(dch->keys[i]), fp); in match_key_hop()
472 sshkey_type(id->key), id->comment); in permitted_by_dest_constraints()
494 "%zu constraints", sshkey_type(id->key), id->comment, in identity_permitted()
524 fromkey ? sshkey_type(fromkey) : "(ORIGIN)", in identity_permitted()
526 sshkey_type(hks->key), fp2); in identity_permitted()
881 verbose_f("%s key not found", sshkey_type(key)); in process_sign_request2()
915 sshkey_type(id->key), fp); in process_sign_request2()
954 sshkey_type(id->key), fp, in process_sign_request2()
972 sshkey_type(id->key), fp); in process_sign_request2()
[all …]
H A Dauth2-pubkey.c82 xasprintf(&ret, "%s %s", sshkey_type(key), fp); in format_key()
158 logit("refusing previously-used %s key", sshkey_type(key)); in userauth_pubkey()
175 logit_r(r, "refusing %s key", sshkey_type(key)); in userauth_pubkey()
535 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
591 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
604 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
H A Dssh_api.c490 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_public_key()
505 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_private_key()
518 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key()
520 debug3_f("check %s", sshkey_type(k->key)); in _ssh_verify_host_key()
H A Dsshconnect.c1047 type = sshkey_type(host_key); in check_host_key()
1317 sshkey_type(host_found->key), in check_host_key()
1508 sshkey_type(host_key), fp); in verify_host_key()
1522 sshkey_type(host_key), fp, in verify_host_key()
1528 "revoked keys file %s", sshkey_type(host_key), in verify_host_key()
1666 sshkey_type(found->key), in show_other_keys()
1668 sshkey_type(found->key), fp); in show_other_keys()
1695 sshkey_type(host_key), fp); in warn_changed_key()
H A Dssh-pkcs11-helper.c88 sshkey_type(keys[i]), labels[i]); in process_add()
126 error_fr(r, "sign %s", sshkey_type(key)); in process_sign()
H A Dssh-keygen.c342 sshkey_size(k), sshkey_type(k), in do_convert_to_ssh2()
371 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pkcs8()
392 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pem()
759 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_from()
821 fp, sshkey_type(keys[i])); in do_download()
872 comment ? comment : "no comment", sshkey_type(public)); in fingerprint_one_key()
1231 sshkey_type(l->key), fp, in known_hosts_find_delete()
1803 tmp, sshkey_type(public)); in do_ca_sign()
1832 sshkey_type(ca), ca_fp); in do_ca_sign()
2088 printf(" Public key: %s %s\n", sshkey_type(key), key_fp); in print_cert()
[all …]
H A Dssh-add.c125 sshkey_type(key), comment ? comment : "no comment"); in delete_one()
553 sshkey_type(idlist->keys[i])); in list_identities()
623 sshkey_type(key), fp); in load_resident_keys()
632 sshkey_type(key), fp); in load_resident_keys()
745 host, sshkey_type(hke->key), want_ca ? "CA " : "", in parse_dest_constraint_hop()
H A Dssh-sk-helper.c137 "msg len %zu, compat 0x%lx", sshkey_type(key), in process_sign()
268 sshkey_type(srks[i]->key), srks[i]->key->sk_application, in process_load_resident()
H A Dhostfile.c247 sshkey_type(l->key), l->path, l->linenum); in record_hostkey()
598 sshkey_type(l->key), l->path, l->linenum); in host_delete()
608 l->path, l->linenum, sshkey_type(l->key), ctx->host); in host_delete()
H A Dsshconnect2.c673 id->key ? sshkey_type(id->key) : "", id->key ? " " : "", in format_identity()
733 sshkey_type(key), fp == NULL ? "<ERROR>" : fp); in input_userauth_pk_ok()
1256 sshkey_type(sign_key), fp); in identity_sign()
1268 sshkey_type(sign_key), id->filename); in identity_sign()
1339 debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp); in sign_and_send_pubkey()
1447 loc, sshkey_type(id->key), fp); in sign_and_send_pubkey()
1451 sshkey_type(sign_id->key), sign_id->filename, in sign_and_send_pubkey()
H A Dclientloop.c2280 sshkey_type(ctx->keys[i]), fp); in update_known_hosts()
2291 sshkey_type(ctx->old_keys[i]), fp); in update_known_hosts()
2406 "for %s key %zu", sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_prove_confirm()
2426 sshkey_type(ctx->keys[i]), i, alg); in client_global_hostkeys_prove_confirm()
2432 sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_prove_confirm()
2497 debug3_f("received %s key %s", sshkey_type(key), fp); in client_input_hostkeys()
H A Dssh-keysign.c291 sshkey_type(key), fp ? fp : ""); in main()
H A Dsshkey.h194 const char *sshkey_type(const struct sshkey *);
H A Dserverloop.c699 error_f("unknown host %s key", sshkey_type(key)); in server_input_hostkeys_prove()
729 sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg); in server_input_hostkeys_prove()
H A Dmonitor.c1362 (key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key), in mm_answer_keyallowed()
1606 sshkey_type(key), sigalg == NULL ? "default" : sigalg, in mm_answer_keyverify()
1619 sshkey_type(key), fp, in mm_answer_keyverify()
1631 "not met ", sshkey_type(key), fp, in mm_answer_keyverify()
H A Dssh.c536 sshkey_type(*k), message, path); in check_load()
539 sshkey_type(*k), fp); in check_load()
2450 cp, sshkey_type(public)); in load_public_identity_files()
2482 filename, sshkey_type(public)); in load_public_identity_files()
H A Dssh-sk-client.c476 sshkey_type(srk->key), srk->key->sk_application, in sshsk_load_resident()
H A Dkrl.c244 KRL_DBG(("new CA %s", ca_key == NULL ? "*" : sshkey_type(ca_key))); in revoked_certs_for_ca_key()
410 debug3_f("revoke type %s", sshkey_type(key)); in ssh_krl_revoke_key_explicit()
H A Dauth2.c757 sshkey_type(authctxt->prev_keys[i]), in auth2_key_already_used()
/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc350 kextypes[j], sshkey_type(st->pubkeys[keytypes[i]])); in main()
361 kextypes[j], sshkey_type(st->pubkeys[keytypes[i]])); in main()
378 sshkey_type(st->privkeys[keytypes[i]])); in main()
385 sshkey_type(st->pubkeys[keytypes[i]])); in main()
/freebsd/crypto/openssh/regress/misc/ssh-verify-attestation/
H A Dssh-verify-attestation.c322 error_f("key type %s not supported", sshkey_type(k)); in cred_matches_key()
380 debug2("key %s: %s %s", argv[2], sshkey_type(k), fp); in main()
403 fatal("unsupported key type %s", sshkey_type(k)); in main()

12