| /freebsd/crypto/openssh/ |
| H A D | sshd-auth.c | 259 append_hostkey_type(b, sshkey_ssh_name(key)); in list_hostkey_types() 280 append_hostkey_type(b, sshkey_ssh_name(key)); in list_hostkey_types() 408 debug2_f("key %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 417 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
| H A D | sshconnect.c | 737 const char *ktype = sshkey_ssh_name(key); in hostkey_accepted_by_hostkeyalgs() 923 "t", host_key == NULL ? "NONE" : sshkey_ssh_name(host_key), in load_hostkeys_command() 1055 sshkey_ssh_name(host_key)); in check_host_key() 1506 sshkey_ssh_name(host_key), fp, in verify_host_key() 1509 sshkey_ssh_name(host_key->cert->signature_key), cafp, in verify_host_key() 1516 debug("Server host key: %s %s", sshkey_ssh_name(host_key), fp); in verify_host_key()
|
| H A D | sshd-session.c | 598 debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp); in notify_hostkeys() 670 debug2_f("privkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 679 debug2_f("pubkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 688 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
| H A D | sshconnect2.c | 1170 return match_list(sshkey_ssh_name(key), in key_sig_algorithm() 1603 if (match_pattern_list(sshkey_ssh_name(key), in key_type_allowed_by_config() 1736 sshkey_ssh_name(idlist->keys[j])); in pubkey_prepare() 1802 sshkey_ssh_name(id->key), id->filename); in pubkey_prepare() 1808 sshkey_ssh_name(id->key), id->filename); in pubkey_prepare() 2162 sshkey_ssh_name(authctxt->sensitive->keys[i]), in userauth_hostbased() 2190 sshkey_ssh_name(private), fp, authctxt->active_ktype); in userauth_hostbased() 2231 sshkey_ssh_name(private), fp); in userauth_hostbased()
|
| H A D | auth2-pubkey.c | 461 "t", sshkey_ssh_name(key), in match_principals_command() 462 "T", sshkey_ssh_name(cert->signature_key), in match_principals_command() 722 "t", sshkey_ssh_name(key), in user_key_command_allowed2()
|
| H A D | clientloop.c | 2104 sshkey_ssh_name(ctx->keys[i]), in hostkeys_find() 2152 sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum); in hostkeys_find() 2157 debug3_f("deprecated %s key at %s:%ld", sshkey_ssh_name(l->key), in hostkeys_find() 2186 sshkey_ssh_name(ctx->old_keys[i]), l->path, l->linenum, in hostkeys_check_old() 2474 "HostkeyAlgorithms", sshkey_ssh_name(key)); in client_input_hostkeys() 2480 sshkey_ssh_name(key)); in client_input_hostkeys() 2487 sshkey_ssh_name(key)); in client_input_hostkeys()
|
| H A D | sshkey.h | 270 const char *sshkey_ssh_name(const struct sshkey *);
|
| H A D | ssh-sk-helper.c | 116 __progname, sshkey_ssh_name(key)); in process_sign()
|
| H A D | sshkey.c | 237 sshkey_ssh_name(const struct sshkey *k) in sshkey_ssh_name() function 1422 sshkey_ssh_name(key), uu)) != 0) in sshkey_format_text() 1654 fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k)); in sshkey_shield_private() 1788 fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k)); in sshkey_unshield_private() 2322 if ((ret = sshbuf_put_cstring(cert, sshkey_ssh_name(k))) != 0) in sshkey_certify_custom() 2561 if ((r = sshbuf_put_cstring(b, sshkey_ssh_name(key))) != 0) in sshkey_private_serialize_opt()
|
| H A D | krl.c | 1332 fprintf(f, "hash: %s # %s\n", fp, sshkey_ssh_name(key)); in krl_dump() 1363 sshkey_ssh_name(rc->ca_key), fp); in krl_dump()
|
| H A D | sshd.c | 1326 fatal_fr(r, "encode %s key", sshkey_ssh_name(key)); in accumulate_host_timing_secret() 1738 key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp); in main()
|
| H A D | ssh-agent.c | 338 dch->keys[i] == NULL ? "" : sshkey_ssh_name(dch->keys[i]), in dump_dest_constraint_hop() 658 sshkey_ssh_name(id->key), fp); in process_request_identities() 1477 sshkey_ssh_name(k), fp, comment, seconds, confirm, in process_add_identity()
|
| H A D | serverloop.c | 693 sigalg = sshkey_ssh_name(key); in server_input_hostkeys_prove()
|
| H A D | hostfile.c | 688 sshkey_ssh_name(keys[i]), fp); in hostfile_replace_entries()
|
| H A D | ssh-add.c | 997 debug2("%s: %s", argv[i], sshkey_ssh_name(k)); in main()
|
| H A D | monitor.c | 729 debug_f("hostkey %s index %d", sshkey_ssh_name(pubkey), keyid); in mm_answer_sign() 992 sshkey_ssh_name(key), list); in key_base_type_match()
|
| H A D | ssh.c | 1749 sshkey_ssh_name(sensitive_data.keys[o]), p); \ in main() 1760 sshkey_ssh_name(sensitive_data.keys[o]), p); \ in main()
|
| H A D | ssh_namespace.h | 925 #define sshkey_ssh_name Fssh_sshkey_ssh_name macro
|
| H A D | ssh-keygen.c | 1854 sshkey_ssh_name(ca), key_type_name); in do_ca_sign() 2167 printf(" Type: %s %s certificate\n", sshkey_ssh_name(key), in print_cert()
|
| /freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
| H A D | kex_fuzz.cc | 138 debug_f("store %s at %d", sshkey_ssh_name(pubkey), pubkey->type); in store_key() 195 keyname = xstrdup(sshkey_ssh_name(privkey)); in do_kex_with_key()
|
| /freebsd/crypto/openssh/regress/unittests/kex/ |
| H A D | test_kex.c | 100 keyname = strdup(sshkey_ssh_name(private)); in do_kex_with_key()
|