/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | clientloop.c | 1949 sshkey_ssh_name(ctx->keys[i]), in hostkeys_find() 1997 sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum); in hostkeys_find() 2002 debug3_f("deprecated %s key at %s:%ld", sshkey_ssh_name(l->key), in hostkeys_find() 2031 sshkey_ssh_name(ctx->old_keys[i]), l->path, l->linenum, in hostkeys_check_old() 2280 const char *ktype = sshkey_ssh_name(key); in key_accepted_by_hostkeyalgs() 2338 "HostkeyAlgorithms", sshkey_ssh_name(key)); in client_input_hostkeys() 2344 sshkey_ssh_name(key)); in client_input_hostkeys() 2351 sshkey_ssh_name(key)); in client_input_hostkeys()
|
H A D | auth2-pubkey.c | 427 "t", sshkey_ssh_name(key), in match_principals_command() 428 "T", sshkey_ssh_name(cert->signature_key), in match_principals_command() 686 "t", sshkey_ssh_name(key), in user_key_command_allowed2()
|
H A D | sshconnect2.c | 1210 return match_list(sshkey_ssh_name(key), in key_sig_algorithm() 1643 if (match_pattern_list(sshkey_ssh_name(key), in key_type_allowed_by_config() 1776 sshkey_ssh_name(idlist->keys[j])); in pubkey_prepare() 1838 sshkey_ssh_name(id->key), id->filename); in pubkey_prepare() 2185 sshkey_ssh_name(authctxt->sensitive->keys[i]), in userauth_hostbased() 2213 sshkey_ssh_name(private), fp, authctxt->active_ktype); in userauth_hostbased() 2254 sshkey_ssh_name(private), fp); in userauth_hostbased()
|
H A D | sshconnect.c | 882 "t", host_key == NULL ? "NONE" : sshkey_ssh_name(host_key), in load_hostkeys_command() 1459 sshkey_ssh_name(host_key), fp, in verify_host_key() 1462 sshkey_ssh_name(host_key->cert->signature_key), cafp, in verify_host_key() 1469 debug("Server host key: %s %s", sshkey_ssh_name(host_key), fp); in verify_host_key()
|
H A D | sshd.c | 611 append_hostkey_type(b, sshkey_ssh_name(key)); in list_hostkey_types() 632 append_hostkey_type(b, sshkey_ssh_name(key)); in list_hostkey_types() 761 debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp); in notify_hostkeys() 1469 fatal_fr(r, "encode %s key", sshkey_ssh_name(key)); in accumulate_host_timing_secret() 1870 key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp); in main()
|
H A D | sshkey.h | 261 const char *sshkey_ssh_name(const struct sshkey *);
|
H A D | krl.c | 813 KRL_DBG(("sig key %s", sshkey_ssh_name(sign_keys[i]))); in ssh_krl_to_blob() 1399 fprintf(f, "hash: %s # %s\n", fp, sshkey_ssh_name(key)); in krl_dump() 1430 sshkey_ssh_name(rc->ca_key), fp); in krl_dump()
|
H A D | ssh-sk-helper.c | 116 __progname, sshkey_ssh_name(key)); in process_sign()
|
H A D | sshkey.c | 216 sshkey_ssh_name(const struct sshkey *k) in sshkey_ssh_name() function 1252 sshkey_ssh_name(key), uu)) != 0) in sshkey_format_text() 1509 fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k)); in sshkey_shield_private() 1645 fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k)); in sshkey_unshield_private() 2179 if ((ret = sshbuf_put_cstring(cert, sshkey_ssh_name(k))) != 0) in sshkey_certify_custom() 2418 if ((r = sshbuf_put_cstring(b, sshkey_ssh_name(key))) != 0) in sshkey_private_serialize_opt()
|
H A D | hostfile.c | 684 sshkey_ssh_name(keys[i]), fp); in hostfile_replace_entries()
|
H A D | ssh.c | 1588 sshkey_ssh_name(sensitive_data.keys[o]), p); \ in main() 1599 sshkey_ssh_name(sensitive_data.keys[o]), p); \ in main()
|
H A D | ssh-keygen.c | 1794 sshkey_ssh_name(ca), key_type_name); in do_ca_sign() 2107 printf(" Type: %s %s certificate\n", sshkey_ssh_name(key), in print_cert()
|
H A D | monitor.c | 1131 sshkey_ssh_name(key), list); in key_base_type_match()
|
H A D | ssh-agent.c | 1288 sshkey_ssh_name(k), fp, comment, seconds, confirm, in process_add_identity()
|