/dragonfly/crypto/openssh/ |
H A D | ssh-agent.c | 145 char *sk_provider; member 252 free(id->sk_provider); in free_identity() 1224 if (sk_provider != NULL) { in process_add_identity() 1235 "realpath: %s", sk_provider, in process_add_identity() 1239 free(sk_provider); in process_add_identity() 1241 if (match_pattern_list(sk_provider, in process_add_identity() 1267 free(id->sk_provider); in process_add_identity() 1276 id->sk_provider = sk_provider; in process_add_identity() 1286 sk_provider == NULL ? "none" : sk_provider, ndest_constraints); in process_add_identity() 1291 sk_provider = NULL; in process_add_identity() [all …]
|
H A D | sshsig.h | 38 const char *sk_provider, const char *sk_pin, const struct sshbuf *message, 59 const char *sk_provider, const char *sk_pin,
|
H A D | sshsig.c | 154 const char *sk_provider, const char *sk_pin, const struct sshbuf *h_message, in sshsig_wrap_sign() argument 188 sign_alg, sk_provider, sk_pin, 0, signer_ctx)) != 0) { in sshsig_wrap_sign() 195 sign_alg, sk_provider, sk_pin, 0)) != 0) { in sshsig_wrap_sign() 433 const char *sk_provider, const char *sk_pin, in sshsig_signb() argument 448 if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b, in sshsig_signb() 561 const char *sk_provider, const char *sk_pin, in sshsig_sign_fd() argument 576 if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b, in sshsig_sign_fd()
|
H A D | ssh.c | 1515 if (options.sk_provider != NULL && *options.sk_provider == '$' && in main() 1516 strlen(options.sk_provider) > 1) { in main() 1517 if ((cp = getenv(options.sk_provider + 1)) == NULL) { in main() 1519 "disabling", options.sk_provider); in main() 1520 free(options.sk_provider); in main() 1521 options.sk_provider = NULL; in main() 1524 options.sk_provider, cp); in main() 1525 free(options.sk_provider); in main() 1526 options.sk_provider = xstrdup(cp); in main()
|
H A D | readconf.h | 85 char *sk_provider; /* Security key provider */ member
|
H A D | servconf.h | 231 char *sk_provider; member
|
H A D | readconf.c | 1319 charptr = &options->sk_provider; in process_config_line_depth() 2384 options->sk_provider = NULL; in initialize_options() 2622 if (options->sk_provider == NULL) in fill_default_options() 2623 options->sk_provider = xstrdup("internal"); in fill_default_options() 2625 if (options->sk_provider == NULL) in fill_default_options() 2626 options->sk_provider = xstrdup("$SSH_SK_PROVIDER"); in fill_default_options() 2672 CLEAR_ON_NONE(options->sk_provider); in fill_default_options() 2745 free(o->sk_provider); in free_options() 3341 dump_cfg_string(oSecurityKeyProvider, o->sk_provider); in dump_client_config()
|
H A D | ssh-keygen.c | 159 static char *sk_provider = NULL; variable 1852 key_type_name, sk_provider, NULL, agent_signer, in do_ca_sign() 1863 sk_provider, pin); in do_ca_sign() 2584 if ((r = sshsig_sign_fd(signkey, hashalg, sk_provider, pin, in sign_one() 3355 sk_provider = getenv("SSH_SK_PROVIDER"); in main() 3526 sk_provider = optarg; in main() 3554 if (sk_provider == NULL) in main() 3555 sk_provider = "internal"; in main() 3705 return do_download_sk(sk_provider, sk_device); in main() 3832 r = sshsk_enroll(type, sk_provider, sk_device, in main()
|
H A D | servconf.c | 187 options->sk_provider = NULL; in initialize_server_options() 454 if (options->sk_provider == NULL) in fill_default_server_options() 455 options->sk_provider = xstrdup("internal"); in fill_default_server_options() 477 CLEAR_ON_NONE(options->sk_provider); in fill_default_server_options() 2284 charptr = &options->sk_provider; in process_server_config_line_depth() 2957 dump_cfg_string(sSecurityKeyProvider, o->sk_provider); in dump_config()
|
H A D | sshkey.c | 2782 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in sshkey_sign() argument 2820 r = sshsk_sign(sk_provider, key, sigp, lenp, data, in sshkey_sign() 2943 const char *sk_provider, const char *sk_pin, in sshkey_certify_custom() argument 3082 sshbuf_len(cert), alg, sk_provider, sk_pin, 0, signer_ctx)) != 0) in sshkey_certify_custom() 3112 const char *alg, const char *sk_provider, const char *sk_pin, in default_key_sign() argument 3118 sk_provider, sk_pin, compat); in default_key_sign() 3123 const char *sk_provider, const char *sk_pin) in sshkey_certify() argument 3125 return sshkey_certify_custom(k, ca, alg, sk_provider, sk_pin, in sshkey_certify()
|
H A D | sshconnect2.c | 1290 alg, options.sk_provider, pin, compat)) != 0) { in identity_sign() 1607 options.sk_provider == NULL) { in load_identity_file() 1727 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) { in pubkey_prepare() 1750 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) { in pubkey_prepare()
|
H A D | sshd.c | 2347 data, dlen, alg, options.sk_provider, NULL, 2352 data, dlen, alg, options.sk_provider, NULL, 2359 alg, options.sk_provider, NULL, ssh->compat) < 0)
|
H A D | ssh_api.c | 66 const char *sk_provider, const char *sk_pin, u_int compat) in mm_sshkey_sign() argument
|
H A D | monitor_wrap.c | 219 const char *sk_provider, const char *sk_pin, u_int compat) in mm_sshkey_sign() argument
|
H A D | sshconnect.c | 1699 skprovider = options.sk_provider; in maybe_add_key_to_agent()
|
H A D | monitor.c | 672 options.sk_provider, NULL, compat)) != 0) in mm_answer_sign()
|