Home
last modified time | relevance | path

Searched refs:sk_provider (Results 1 – 16 of 16) sorted by relevance

/dragonfly/crypto/openssh/
H A Dssh-agent.c145 char *sk_provider; member
252 free(id->sk_provider); in free_identity()
1224 if (sk_provider != NULL) { in process_add_identity()
1235 "realpath: %s", sk_provider, in process_add_identity()
1239 free(sk_provider); in process_add_identity()
1241 if (match_pattern_list(sk_provider, in process_add_identity()
1267 free(id->sk_provider); in process_add_identity()
1276 id->sk_provider = sk_provider; in process_add_identity()
1286 sk_provider == NULL ? "none" : sk_provider, ndest_constraints); in process_add_identity()
1291 sk_provider = NULL; in process_add_identity()
[all …]
H A Dsshsig.h38 const char *sk_provider, const char *sk_pin, const struct sshbuf *message,
59 const char *sk_provider, const char *sk_pin,
H A Dsshsig.c154 const char *sk_provider, const char *sk_pin, const struct sshbuf *h_message, in sshsig_wrap_sign() argument
188 sign_alg, sk_provider, sk_pin, 0, signer_ctx)) != 0) { in sshsig_wrap_sign()
195 sign_alg, sk_provider, sk_pin, 0)) != 0) { in sshsig_wrap_sign()
433 const char *sk_provider, const char *sk_pin, in sshsig_signb() argument
448 if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b, in sshsig_signb()
561 const char *sk_provider, const char *sk_pin, in sshsig_sign_fd() argument
576 if ((r = sshsig_wrap_sign(key, hashalg, sk_provider, sk_pin, b, in sshsig_sign_fd()
H A Dssh.c1515 if (options.sk_provider != NULL && *options.sk_provider == '$' && in main()
1516 strlen(options.sk_provider) > 1) { in main()
1517 if ((cp = getenv(options.sk_provider + 1)) == NULL) { in main()
1519 "disabling", options.sk_provider); in main()
1520 free(options.sk_provider); in main()
1521 options.sk_provider = NULL; in main()
1524 options.sk_provider, cp); in main()
1525 free(options.sk_provider); in main()
1526 options.sk_provider = xstrdup(cp); in main()
H A Dreadconf.h85 char *sk_provider; /* Security key provider */ member
H A Dservconf.h231 char *sk_provider; member
H A Dreadconf.c1319 charptr = &options->sk_provider; in process_config_line_depth()
2384 options->sk_provider = NULL; in initialize_options()
2622 if (options->sk_provider == NULL) in fill_default_options()
2623 options->sk_provider = xstrdup("internal"); in fill_default_options()
2625 if (options->sk_provider == NULL) in fill_default_options()
2626 options->sk_provider = xstrdup("$SSH_SK_PROVIDER"); in fill_default_options()
2672 CLEAR_ON_NONE(options->sk_provider); in fill_default_options()
2745 free(o->sk_provider); in free_options()
3341 dump_cfg_string(oSecurityKeyProvider, o->sk_provider); in dump_client_config()
H A Dssh-keygen.c159 static char *sk_provider = NULL; variable
1852 key_type_name, sk_provider, NULL, agent_signer, in do_ca_sign()
1863 sk_provider, pin); in do_ca_sign()
2584 if ((r = sshsig_sign_fd(signkey, hashalg, sk_provider, pin, in sign_one()
3355 sk_provider = getenv("SSH_SK_PROVIDER"); in main()
3526 sk_provider = optarg; in main()
3554 if (sk_provider == NULL) in main()
3555 sk_provider = "internal"; in main()
3705 return do_download_sk(sk_provider, sk_device); in main()
3832 r = sshsk_enroll(type, sk_provider, sk_device, in main()
H A Dservconf.c187 options->sk_provider = NULL; in initialize_server_options()
454 if (options->sk_provider == NULL) in fill_default_server_options()
455 options->sk_provider = xstrdup("internal"); in fill_default_server_options()
477 CLEAR_ON_NONE(options->sk_provider); in fill_default_server_options()
2284 charptr = &options->sk_provider; in process_server_config_line_depth()
2957 dump_cfg_string(sSecurityKeyProvider, o->sk_provider); in dump_config()
H A Dsshkey.c2782 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in sshkey_sign() argument
2820 r = sshsk_sign(sk_provider, key, sigp, lenp, data, in sshkey_sign()
2943 const char *sk_provider, const char *sk_pin, in sshkey_certify_custom() argument
3082 sshbuf_len(cert), alg, sk_provider, sk_pin, 0, signer_ctx)) != 0) in sshkey_certify_custom()
3112 const char *alg, const char *sk_provider, const char *sk_pin, in default_key_sign() argument
3118 sk_provider, sk_pin, compat); in default_key_sign()
3123 const char *sk_provider, const char *sk_pin) in sshkey_certify() argument
3125 return sshkey_certify_custom(k, ca, alg, sk_provider, sk_pin, in sshkey_certify()
H A Dsshconnect2.c1290 alg, options.sk_provider, pin, compat)) != 0) { in identity_sign()
1607 options.sk_provider == NULL) { in load_identity_file()
1727 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) { in pubkey_prepare()
1750 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) { in pubkey_prepare()
H A Dsshd.c2347 data, dlen, alg, options.sk_provider, NULL,
2352 data, dlen, alg, options.sk_provider, NULL,
2359 alg, options.sk_provider, NULL, ssh->compat) < 0)
H A Dssh_api.c66 const char *sk_provider, const char *sk_pin, u_int compat) in mm_sshkey_sign() argument
H A Dmonitor_wrap.c219 const char *sk_provider, const char *sk_pin, u_int compat) in mm_sshkey_sign() argument
H A Dsshconnect.c1699 skprovider = options.sk_provider; in maybe_add_key_to_agent()
H A Dmonitor.c672 options.sk_provider, NULL, compat)) != 0) in mm_answer_sign()