Home
last modified time | relevance | path

Searched refs:nkeys (Results 1 – 16 of 16) sorted by relevance

/openssh-portable/regress/
H A Dhostkey-rotate.sh21 nkeys=0
26 nkeys=`expr $nkeys + 1`
69 expect_nkeys $nkeys "learn hostkeys"
78 expect_nkeys $nkeys "learn hostkeys $k"
91 expect_nkeys $nkeys "learn hostkeys"
104 expect_nkeys `expr $nkeys + 1` "learn hostkeys"
116 expect_nkeys $nkeys "learn hostkeys"
/openssh-portable/
H A Dssh-pkcs11-client.c321 u_int nkeys, i; in pkcs11_add_provider() local
338 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) in pkcs11_add_provider()
340 *keysp = xcalloc(nkeys, sizeof(struct sshkey *)); in pkcs11_add_provider()
341 for (i = 0; i < nkeys; i++) { in pkcs11_add_provider()
354 if ((r = sshbuf_get_u32(msg, &nkeys)) != 0) in pkcs11_add_provider()
355 nkeys = -1; in pkcs11_add_provider()
357 nkeys = -1; in pkcs11_add_provider()
360 return (nkeys); in pkcs11_add_provider()
H A Dssh-pkcs11.c697 for (i = 0; i < *nkeys; i++) in pkcs11_key_included()
1155 (*keysp)[*nkeys] = key; in pkcs11_fetch_certs()
1156 *nkeys = *nkeys + 1; in pkcs11_fetch_certs()
1257 (*keysp)[*nkeys] = key; in pkcs11_fetch_keys()
1258 *nkeys = *nkeys + 1; in pkcs11_fetch_keys()
1467 int nkeys, need_finalize = 0; in pkcs11_register_provider() local
1549 nkeys = 0; in pkcs11_register_provider()
1604 return (nkeys); in pkcs11_register_provider()
1628 int nkeys; in pkcs11_add_provider() local
1638 if (nkeys == 0) in pkcs11_add_provider()
[all …]
H A Dssh-pkcs11-helper.c118 int r, i, nkeys; in process_add() local
128 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) { in process_add()
131 (r = sshbuf_put_u32(msg, nkeys)) != 0) in process_add()
133 for (i = 0; i < nkeys; i++) { in process_add()
149 if ((r = sshbuf_put_u32(msg, -nkeys)) != 0) in process_add()
H A Dclientloop.c1816 size_t nkeys, nnew; member
1834 for (i = 0; i < ctx->nkeys; i++) in hostkeys_update_ctx_free()
1857 for (i = 0; i < ctx->nkeys; i++) { in hostkeys_find()
1888 for (i = 0; i < ctx->nkeys; i++) { in update_known_hosts()
2106 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys()
2114 if ((tmp = recallocarray(ctx->keys, ctx->nkeys, ctx->nkeys + 1, in client_input_hostkeys()
2117 __func__, ctx->nkeys); in client_input_hostkeys()
2119 ctx->keys[ctx->nkeys++] = key; in client_input_hostkeys()
2123 if (ctx->nkeys == 0) { in client_input_hostkeys()
2147 for (i = 0; i < ctx->nkeys; i++) { in client_input_hostkeys()
[all …]
H A Dhostfile.c469 size_t nkeys; member
492 for (i = 0; i < ctx->nkeys; i++) { in host_delete()
524 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument
538 if ((ctx.skip_keys = calloc(nkeys, sizeof(*ctx.skip_keys))) == NULL) in hostfile_replace_entries()
541 ctx.nkeys = nkeys; in hostfile_replace_entries()
575 for (i = 0; i < nkeys; i++) { in hostfile_replace_entries()
H A Dsshconnect.h30 int nkeys; member
H A Dhostfile.h48 const char *host, const char *ip, struct sshkey **keys, size_t nkeys,
H A Dauthfd.h21 size_t nkeys; member
H A Dssh.c1391 sensitive_data.nkeys = 0; in main()
1394 sensitive_data.nkeys = 10; in main()
1395 sensitive_data.keys = xcalloc(sensitive_data.nkeys, in main()
1400 if ((o) >= sensitive_data.nkeys) \ in main()
1406 if ((o) >= sensitive_data.nkeys) \ in main()
1504 if (sensitive_data.nkeys != 0) { in main()
1505 for (i = 0; i < sensitive_data.nkeys; i++) { in main()
2016 int nkeys; in load_public_identity_files() local
2033 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, in load_public_identity_files()
2035 for (i = 0; i < nkeys; i++) { in load_public_identity_files()
H A Dauthfd.c291 idl->nkeys = num; in ssh_fetch_identitylist()
309 for (i = 0; i < idl->nkeys; i++) { in ssh_free_identitylist()
335 for (i = 0; i < idlist->nkeys; i++) { in ssh_agent_has_key()
H A Dsshd.c758 u_int i, nkeys; local
768 for (i = nkeys = 0; i < options.num_host_key_files; i++) {
778 if (nkeys == 0) {
795 nkeys++;
797 debug3("%s: sent %u hostkeys", __func__, nkeys);
798 if (nkeys == 0)
H A Dssh-keygen.c805 int i, nkeys; in do_download() local
814 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys); in do_download()
815 if (nkeys <= 0) in do_download()
817 for (i = 0; i < nkeys; i++) { in do_download()
1671 int r, i, nkeys; in load_pkcs11_key() local
1677 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, &keys); in load_pkcs11_key()
1678 debug3("%s: %d keys", __func__, nkeys); in load_pkcs11_key()
1679 if (nkeys <= 0) in load_pkcs11_key()
1681 for (i = 0; i < nkeys; i++) { in load_pkcs11_key()
1744 for (j = 0; j < agent_ids->nkeys; j++) { in do_ca_sign()
H A Dssh-add.c289 for (i = 0; i < idlist->nkeys; i++) { in add_file()
473 for (i = 0; i < idlist->nkeys; i++) { in list_identities()
H A Dsshconnect2.c1557 for (j = 0; j < idlist->nkeys; j++) { in pubkey_prepare()
1976 for (i = 0; i < authctxt->sensitive->nkeys; i++) { in userauth_hostbased()
H A Dsshkey.c3760 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; in sshkey_parse_private2() local
3824 (r = sshbuf_get_u32(decoded, &nkeys)) != 0 || in sshkey_parse_private2()
3847 if (nkeys != 1) { in sshkey_parse_private2()

Completed in 49 milliseconds