Home
last modified time | relevance | path

Searched refs:format (Results 1 – 24 of 24) sorted by relevance

/openssh-portable/
H A Dutf8.h20 __attribute__((format(printf, 1, 2)));
22 __attribute__((format(printf, 2, 3)));
25 __attribute__((format(printf, 4, 5)));
27 __attribute__((format(printf, 4, 5)));
H A Dmisc.h120 __attribute__((format(printf, 2, 3)));
122 __attribute__((format(printf, 3, 4)));
211 int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2)));
213 __attribute__((format(printf, 2, 3)));
215 __attribute__((format(printf, 2, 3)));
H A Dpacket.h118 __attribute__((format(printf, 2, 3)));
135 __attribute__((format(printf, 2, 3)))
137 void ssh_packet_send_debug(struct ssh *, const char *fmt, ...) __attribute__((format(printf, 2,…
177 __attribute__((format(printf, 2, 3)));
180 __attribute__((format(printf, 3, 4)))
H A Dlog.h72 __attribute__((format(printf, 7, 8)));
77 __attribute__((format(printf, 7, 8)));
80 __attribute__((format(printf, 7, 8)));
83 __attribute__((format(printf, 7, 8)));
85 __attribute__((format(printf, 3, 4)));
H A DPROTOCOL.u2f21 given key is backed by hardware. Finally the signature format includes
64 The format of a sk-ecdsa-sha2-nistp256@openssh.com public key is:
81 The format of a sk-ssh-ed25519@openssh.com public key is:
155 at the time of key generation. It will take the following format:
164 A previous version of this format, emitted prior to OpenSSH 8.4 omitted
193 The signature returned from U2F hardware takes the following format:
197 byte[] ecdsa_signature (in X9.62 format).
200 format data in the pre-authentication attack surface. Therefore, the
201 signature format used on the wire in SSH2_USERAUTH_REQUEST packets will
232 signature is similar to the sk-ecdsa-sha2-nistp256@openssh.com format:
[all …]
H A DPROTOCOL.key1 This document describes the private key format for OpenSSH.
3 1. Overall format
H A DPROTOCOL.krl1 This describes the key/certificate revocation list format for OpenSSH.
3 1. Overall format
31 format (see below).
152 Its format is slightly different to the previously-described sections:
H A DPROTOCOL.sshsig1 This document describes a lightweight SSH Signature format
6 1. Armored format
32 2. Blob format
H A DPROTOCOL386 SSH_FXP_EXTENDED request with the following format:
443 following format:
473 following format:
530 4.1 Public key format
541 4.2 Private key format
543 OpenSSH private keys, as generated by ssh-keygen(1) use the format
544 described in PROTOCOL.key by default. As a legacy option, PEM format
546 and were the default format before OpenSSH 7.8.
548 4.3 KRL format
550 OpenSSH supports a compact format for Key Revocation Lists (KRLs). This
[all …]
H A Dssh-agent.c1376 char *shell, *format, *pidstr, *agentsocket = NULL; in main() local
1497 format = c_flag ? "unsetenv %s;\n" : "unset %s;\n"; in main()
1498 printf(format, SSH_AUTHSOCKET_ENV_NAME); in main()
1499 printf(format, SSH_AGENTPID_ENV_NAME); in main()
1553 format = c_flag ? "setenv %s %s;\n" : "%s=%s; export %s;\n"; in main()
1554 printf(format, SSH_AUTHSOCKET_ENV_NAME, socket_name, in main()
1569 format = c_flag ? "setenv %s %s;\n" : "%s=%s; export %s;\n"; in main()
1570 printf(format, SSH_AUTHSOCKET_ENV_NAME, socket_name, in main()
1572 printf(format, SSH_AGENTPID_ENV_NAME, pidstrbuf, in main()
H A Dauthfile.c70 int format, const char *openssh_format_cipher, int openssh_format_rounds) in sshkey_save_private() argument
78 format, openssh_format_cipher, openssh_format_rounds)) != 0) in sshkey_save_private()
H A Dauth.h222 __attribute__((format(printf, 1, 2)));
H A DREADME.dns22 generic DNS RR format parsable by most modern name server
H A DPROTOCOL.certkeys69 The certificate key types take a similar high-level format (note: data
226 options on the certificates validity. The format of this field
257 specified in CIDR format (nn.nn.nn.nn/nn
H A Dsshkey.h262 int format, const char *openssh_format_cipher, int openssh_format_rounds);
H A Dsshbuf.h166 __attribute__((format(printf, 2, 3)));
H A Dsshkey.c4372 int format, const char *_passphrase, const char *comment) in sshkey_private_to_blob_pem_pkcs8() argument
4392 if (format == SSHKEY_PRIVATE_PKCS8 && (pkey = EVP_PKEY_new()) == NULL) { in sshkey_private_to_blob_pem_pkcs8()
4401 if (format == SSHKEY_PRIVATE_PEM) { in sshkey_private_to_blob_pem_pkcs8()
4410 if (format == SSHKEY_PRIVATE_PEM) { in sshkey_private_to_blob_pem_pkcs8()
4419 if (format == SSHKEY_PRIVATE_PEM) { in sshkey_private_to_blob_pem_pkcs8()
4434 if (format == SSHKEY_PRIVATE_PKCS8) { in sshkey_private_to_blob_pem_pkcs8()
4465 int format, const char *openssh_format_cipher, int openssh_format_rounds) in sshkey_private_to_fileblob() argument
4489 switch (format) { in sshkey_private_to_fileblob()
4496 format, passphrase, comment); in sshkey_private_to_fileblob()
H A DOVERVIEW54 - RSA keys are stored in files with a special format. The code to
H A DPROTOCOL.mux8 a length and message type in SSH uint32 wire format:
H A Dsftp-client.c105 const char *errfmt, ...) __attribute__((format(printf, 4, 5)));
H A Dconfigure.ac57 dnl select manpage formatter to be used to build "cat" format pages.
166 OSSH_CHECK_CFLAG_COMPILE([-Wno-error=format-truncation])
292 typedef void foo(const char *, ...) __attribute__((format(printf, 1, 2)));]],
5498 echo " Manpage format: $MANTYPE"
/openssh-portable/openbsd-compat/
H A Dbsd-snprintf.c199 ch = *format++; in dopr()
211 ch = *format++; in dopr()
217 ch = *format++; in dopr()
221 ch = *format++; in dopr()
225 ch = *format++; in dopr()
229 ch = *format++; in dopr()
233 ch = *format++; in dopr()
243 ch = *format++; in dopr()
246 ch = *format++; in dopr()
255 ch = *format++; in dopr()
[all …]
H A Dbsd-misc.h146 void err(int, const char *, ...) __attribute__((format(printf, 2, 3)));
149 void errx(int, const char *, ...) __attribute__((format(printf, 2, 3)));
152 void warn(const char *, ...) __attribute__((format(printf, 1, 2)));
/openssh-portable/regress/unittests/test_helper/
H A Dtest_helper.h53 __attribute__((format(printf, 1, 2)));