/external/openssh/ |
D | ssh_api.c | 445 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_public_key() 460 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_private_key() 473 debug3("%s: need %s", __func__, sshkey_type(hostkey)); in _ssh_verify_host_key() 475 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_verify_host_key()
|
D | key.h | 42 #define key_type sshkey_type
|
D | ssh-keygen.c | 321 sshkey_size(k), sshkey_type(k), in do_convert_to_ssh2() 353 fatal("%s: unsupported key type %s", __func__, sshkey_type(k)); in do_convert_to_pkcs8() 375 fatal("%s: unsupported key type %s", __func__, sshkey_type(k)); in do_convert_to_pem() 739 sshkey_type(k)); in do_convert_from() 794 fp, sshkey_type(keys[i])); in do_download() 849 comment ? comment : "no comment", sshkey_type(public)); in fingerprint_one_key() 1173 sshkey_type(l->key), fp, l->comment); in known_hosts_find_delete() 1635 __func__, tmp, sshkey_type(public)); in do_ca_sign() 1895 printf(" Public key: %s %s\n", sshkey_type(key), key_fp); in print_cert() 1897 sshkey_type(key->cert->signature_key), ca_fp); in print_cert()
|
D | hostfile.c | 253 sshkey_type(l->key), l->path, l->linenum); in record_hostkey() 510 sshkey_type(l->key), l->path, l->linenum); in host_delete() 521 l->path, l->linenum, sshkey_type(l->key), ctx->host); in host_delete()
|
D | sshconnect.c | 1276 sshkey_ssh_name(host_key) : sshkey_type(host_key), fp); in verify_host_key() 1281 __func__, sshkey_type(host_key), fp); in verify_host_key() 1294 sshkey_type(host_key), fp, in verify_host_key() 1300 "revoked keys file %s: %s", sshkey_type(host_key), in verify_host_key()
|
D | auth2-hostbased.c | 114 __func__, sshkey_type(key)); in userauth_hostbased()
|
D | sshkey.h | 126 const char *sshkey_type(const struct sshkey *);
|
D | auth.c | 734 sshkey_type(key), fp, options.revoked_keys_file); in auth_key_is_revoked() 738 "revoked keys file %s: %s", sshkey_type(key), fp, in auth_key_is_revoked()
|
D | ssh-keysign.c | 292 sshkey_type(key), fp ? fp : ""); in main()
|
D | krl.c | 236 ca_key == NULL ? "*" : sshkey_type(ca_key))); in revoked_certs_for_ca_key() 405 debug3("%s: revoke type %s", __func__, sshkey_type(key)); in ssh_krl_revoke_key_explicit() 418 debug3("%s: revoke type %s by sha1", __func__, sshkey_type(key)); in ssh_krl_revoke_key_sha1()
|
D | clientloop.c | 2272 sshkey_type(ctx->keys[i]), fp); in update_known_hosts() 2280 sshkey_type(ctx->old_keys[i]), fp); in update_known_hosts() 2375 __func__, sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_private_confirm() 2456 sshkey_type(key), fp); in client_input_hostkeys()
|
D | auth2-pubkey.c | 143 __func__, sshkey_type(key), fp); in userauth_pubkey() 190 __func__, sshkey_type(key), fp); in userauth_pubkey()
|
D | ssh-add.c | 389 sshkey_type(idlist->keys[i])); in list_identities()
|
D | serverloop.c | 665 __func__, sshkey_type(key)); in server_input_hostkeys_prove()
|
D | sshkey.c | 123 sshkey_type(const struct sshkey *k) in sshkey_type() function 1108 sshkey_type(k), sshkey_size(k)); in fingerprint_randomart() 1111 r = snprintf(title, sizeof(title), "[%s]", sshkey_type(k)); in fingerprint_randomart()
|
D | ssh-agent.c | 411 verbose("%s: %s key not found", __func__, sshkey_type(key)); in process_sign_request2()
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 158 sshkey_type(k), lens[i]); in signature_tests()
|