/external/openssh/ |
D | auth2-hostbased.c | 113 __func__, sshkey_type(key)); in userauth_hostbased() 243 sshkey_type(key->cert->signature_key), fp, in hostbased_key_allowed() 250 sshkey_type(key), fp, cuser, lookup); in hostbased_key_allowed()
|
D | sshconnect.c | 779 type = sshkey_type(host_key); in check_host_key() 1003 sshkey_type(host_found->key), in check_host_key() 1196 __func__, sshkey_type(host_key), fp); in verify_host_key() 1209 sshkey_type(host_key), fp, in verify_host_key() 1215 "revoked keys file %s: %s", sshkey_type(host_key), in verify_host_key() 1334 sshkey_type(found->key), in show_other_keys() 1336 sshkey_type(found->key), fp); in show_other_keys() 1363 sshkey_type(host_key), fp); in warn_changed_key()
|
D | auth2-pubkey.c | 84 xasprintf(&ret, "%s %s", sshkey_type(key), fp); in format_key() 151 logit("refusing previously-used %s key", sshkey_type(key)); in userauth_pubkey() 632 sshkey_is_cert(key) ? "CA" : "key", sshkey_type(found), fp); in check_authkey_line() 642 sshkey_type(found), fp, loc); in check_authkey_line() 682 sshkey_type(found), fp, loc); in check_authkey_line() 766 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca() 828 sshkey_type(key->cert->signature_key), ca_fp, in user_cert_trusted_ca()
|
D | ssh_api.c | 476 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_public_key() 491 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_private_key() 504 debug3("%s: need %s", __func__, sshkey_type(hostkey)); in _ssh_verify_host_key() 506 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_verify_host_key()
|
D | ssh-keygen.c | 359 sshkey_size(k), sshkey_type(k), in do_convert_to_ssh2() 391 fatal("%s: unsupported key type %s", __func__, sshkey_type(k)); in do_convert_to_pkcs8() 415 fatal("%s: unsupported key type %s", __func__, sshkey_type(k)); in do_convert_to_pem() 792 sshkey_type(k)); in do_convert_from() 851 fp, sshkey_type(keys[i])); in do_download() 902 comment ? comment : "no comment", sshkey_type(public)); in fingerprint_one_key() 1265 sshkey_type(l->key), fp, in known_hosts_find_delete() 1801 __func__, tmp, sshkey_type(public)); in do_ca_sign() 1832 sshkey_type(ca), ca_fp); in do_ca_sign() 2064 printf(" Public key: %s %s\n", sshkey_type(key), key_fp); in print_cert() [all …]
|
D | auth.c | 290 sshkey_type(key), fp == NULL ? "(null)" : fp, in format_method_key() 293 sshkey_type(key->cert->signature_key), in format_method_key() 302 xasprintf(&ret, "%s %s%s%s", sshkey_type(key), in format_method_key() 652 sshkey_type(key), fp, options.revoked_keys_file); in auth_key_is_revoked() 656 "revoked keys file %s: %s", sshkey_type(key), fp, in auth_key_is_revoked()
|
D | ssh-sk-helper.c | 119 "msg len %zu, compat 0x%lx", __progname, sshkey_type(key), in process_sign() 245 sshkey_type(keys[i]), keys[i]->sk_application); in process_load_resident()
|
D | ssh-add.c | 488 sshkey_type(idlist->keys[i])); in list_identities() 559 sshkey_type(keys[i]), fp); in load_resident_keys() 568 sshkey_type(keys[i]), fp); in load_resident_keys()
|
D | hostfile.c | 251 sshkey_type(l->key), l->path, l->linenum); in record_hostkey() 495 sshkey_type(l->key), l->path, l->linenum); in host_delete() 506 l->path, l->linenum, sshkey_type(l->key), ctx->host); in host_delete()
|
D | sshconnect2.c | 631 id->key ? sshkey_type(id->key) : "", id->key ? " " : "", in format_identity() 690 sshkey_type(key), fp == NULL ? "<ERROR>" : fp); in input_userauth_pk_ok() 1202 sshkey_type(sign_key), fp); in identity_sign() 1262 debug3("%s: %s %s", __func__, sshkey_type(id->key), fp); in sign_and_send_pubkey() 1369 loc, sshkey_type(id->key), fp); in sign_and_send_pubkey() 1373 sshkey_type(sign_id->key), sign_id->filename, in sign_and_send_pubkey() 1752 sshkey_type(id->key), id->filename); in try_identity()
|
D | ssh-keysign.c | 277 sshkey_type(key), fp ? fp : ""); in main()
|
D | sshkey.h | 174 const char *sshkey_type(const struct sshkey *);
|
D | ssh-agent.c | 310 verbose("%s: %s key not found", __func__, sshkey_type(key)); in process_sign_request2() 324 sshkey_type(id->key), fp); in process_sign_request2() 514 "authenticator-hosted key", sshkey_type(k)); in process_add_identity()
|
D | clientloop.c | 1906 sshkey_type(ctx->keys[i]), fp); in update_known_hosts() 1917 sshkey_type(ctx->old_keys[i]), fp); in update_known_hosts() 2042 __func__, sshkey_type(ctx->keys[i]), i); in client_global_hostkeys_private_confirm() 2126 sshkey_type(key), fp); in client_input_hostkeys()
|
D | ssh-sk-client.c | 426 nkeys, sshkey_type(key), key->sk_application); in sshsk_load_resident()
|
D | krl.c | 245 ca_key == NULL ? "*" : sshkey_type(ca_key))); in revoked_certs_for_ca_key() 414 debug3("%s: revoke type %s", __func__, sshkey_type(key)); in ssh_krl_revoke_key_explicit()
|
D | auth2.c | 767 sshkey_type(authctxt->prev_keys[i]), in auth2_key_already_used()
|
D | ssh-sk.c | 621 provider_path, sshkey_type(key), key->sk_flags, in sshsk_sign()
|
D | serverloop.c | 763 __func__, sshkey_type(key)); in server_input_hostkeys_prove()
|
D | monitor.c | 1219 (key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key), in mm_answer_keyallowed() 1456 sshkey_type(key), fp, in mm_answer_keyverify()
|
D | sshd.c | 414 sshkey_type(sensitive_data.host_keys[i]), in demote_sensitive_data() 1901 sshkey_type(key));
|
D | ssh.c | 2236 __func__, cp, sshkey_type(public)); in load_public_identity_files() 2270 __func__, filename, sshkey_type(public)); in load_public_identity_files()
|
D | sshkey.c | 161 sshkey_type(const struct sshkey *k) in sshkey_type() function 1201 sshkey_type(k), sshkey_size(k)); in fingerprint_randomart() 1204 r = snprintf(title, sizeof(title), "[%s]", sshkey_type(k)); in fingerprint_randomart()
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 160 sshkey_type(k), lens[i]); in signature_tests()
|