sshkey_ssh_name
keyname = strdup(sshkey_ssh_name(private));
"(received %s, expected %s)", sshkey_ssh_name(key), pkalg);
"(received %s, expected %s)", sshkey_ssh_name(key), pkalg);
"t", sshkey_ssh_name(key),
"T", sshkey_ssh_name(cert->signature_key),
"t", sshkey_ssh_name(key),
sshkey_ssh_name(ctx->keys[i]),
sshkey_ssh_name(ctx->keys[i]), l->path, l->linenum);
debug3_f("deprecated %s key at %s:%ld", sshkey_ssh_name(l->key),
sshkey_ssh_name(ctx->old_keys[i]), l->path, l->linenum,
"HostkeyAlgorithms", sshkey_ssh_name(key));
sshkey_ssh_name(key));
sshkey_ssh_name(key));
sshkey_ssh_name(keys[i]), fp);
fprintf(f, "hash: %s # %s\n", fp, sshkey_ssh_name(key));
sshkey_ssh_name(rc->ca_key), fp);
sshkey_ssh_name(key), list);
debug_f("hostkey %s index %d", sshkey_ssh_name(pubkey), keyid);
sigalg = sshkey_ssh_name(key);
debug2("%s: %s", argv[i], sshkey_ssh_name(k));
sshkey_ssh_name(k), fp, comment, seconds, confirm,
dch->keys[i] == NULL ? "" : sshkey_ssh_name(dch->keys[i]),
sshkey_ssh_name(id->key), fp);
sshkey_ssh_name(ca), key_type_name);
printf(" Type: %s %s certificate\n", sshkey_ssh_name(key),
__progname, sshkey_ssh_name(key));
sshkey_ssh_name(host_key));
sshkey_ssh_name(host_key), fp,
sshkey_ssh_name(host_key->cert->signature_key), cafp,
debug("Server host key: %s %s", sshkey_ssh_name(host_key), fp);
const char *ktype = sshkey_ssh_name(key);
"t", host_key == NULL ? "NONE" : sshkey_ssh_name(host_key),
return match_list(sshkey_ssh_name(key),
if (match_pattern_list(sshkey_ssh_name(key), allowlist, 0) == 1)
sshkey_ssh_name(idlist->keys[j]));
sshkey_ssh_name(id->key), id->filename);
sshkey_ssh_name(id->key), id->filename);
sshkey_ssh_name(authctxt->sensitive->keys[i]),
sshkey_ssh_name(private), fp, authctxt->active_ktype);
sshkey_ssh_name(private), fp);
sshkey_ssh_name(hostkey));
append_hostkey_type(b, sshkey_ssh_name(key));
append_hostkey_type(b, sshkey_ssh_name(key));
debug2_f("key %u: %s", num_keys, sshkey_ssh_name(k));
debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k));
debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp);
debug2_f("privkey %u: %s", num_keys, sshkey_ssh_name(k));
debug2_f("pubkey %u: %s", num_keys, sshkey_ssh_name(k));
debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k));
fatal_fr(r, "encode %s key", sshkey_ssh_name(key));
key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp);
sshkey_ssh_name(key), uu)) != 0)
fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k));
fprintf(stderr, "%s: entering for %s\n", __func__, sshkey_ssh_name(k));
if ((ret = sshbuf_put_cstring(cert, sshkey_ssh_name(k))) != 0)
if ((r = sshbuf_put_cstring(b, sshkey_ssh_name(key))) != 0)
const char *sshkey_ssh_name(const struct sshkey *);