sshkey_type
error_f("key type %s not supported", sshkey_type(k));
debug2("key %s: %s %s", argv[2], sshkey_type(k), fp);
fatal("unsupported key type %s", sshkey_type(k));
sshkey_type(k), lens[i]);
sshkey_type(key), fp == NULL ? "(null)" : fp,
sshkey_type(key->cert->signature_key),
xasprintf(&ret, "%s %s%s%s", sshkey_type(key),
sshkey_type(key), fp,
"revoked keys file %s", sshkey_type(key), fp,
logit_r(r, "refusing %s key", sshkey_type(key));
sshkey_type(key->cert->signature_key), fp, reason);
sshkey_type(key->cert->signature_key), fp,
sshkey_type(key), fp, cuser, lookup);
logit("refusing previously-used %s key", sshkey_type(key));
logit_r(r, "refusing %s key", sshkey_type(key));
sshkey_type(key->cert->signature_key), ca_fp,
sshkey_type(key->cert->signature_key), ca_fp,
sshkey_type(key->cert->signature_key), ca_fp,
xasprintf(&ret, "%s %s", sshkey_type(key), fp);
sshkey_is_cert(key) ? "CA" : "key", sshkey_type(found), fp);
sshkey_type(found), fp, loc);
sshkey_type(found), fp, loc);
sshkey_type(key->cert->signature_key), fp, loc, reason);
sshkey_type(authctxt->prev_keys[i]),
sshkey_type(ctx->keys[i]), fp);
sshkey_type(ctx->old_keys[i]), fp);
"for %s key %zu", sshkey_type(ctx->keys[i]), i);
sshkey_type(ctx->keys[i]), i, alg);
sshkey_type(ctx->keys[i]), i);
debug3_f("received %s key %s", sshkey_type(key), fp);
sshkey_type(l->key), l->path, l->linenum);
sshkey_type(l->key), l->path, l->linenum);
l->path, l->linenum, sshkey_type(l->key), ctx->host);
KRL_DBG(("new CA %s", ca_key == NULL ? "*" : sshkey_type(ca_key)));
debug3_f("revoke type %s", sshkey_type(key));
(key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key),
sshkey_type(key), sigalg == NULL ? "default" : sigalg,
sshkey_type(key), fp,
"not met ", sshkey_type(key), fp,
error_f("unknown host %s key", sshkey_type(key));
sshkey_type(key), ndx, sigalg == NULL ? "default" : sigalg);
sshkey_type(key), comment ? comment : "no comment");
sshkey_type(idlist->keys[i]));
sshkey_type(key), fp);
sshkey_type(key), fp);
host, sshkey_type(hke->key), want_ca ? "CA " : "",
dch->hostname, key_is_ca ? "CA " : "", sshkey_type(k), fp);
"authenticator-hosted key", sshkey_type(k));
error_fr(r, "sshkey_verify for %s %s", sshkey_type(key), fp);
sshkey_type(key), fp);
"for %s %s", sshkey_type(key), fp);
debug_f("recorded %s %s (slot %zu of %d)", sshkey_type(key), fp, i,
tag, hostname, sshkey_type(key), fp, dch->nkeys);
sshkey_type(dch->keys[i]), fp);
sshkey_type(id->key), id->comment);
"%zu constraints", sshkey_type(id->key), id->comment,
fromkey ? sshkey_type(fromkey) : "(ORIGIN)",
sshkey_type(hks->key), fp2);
verbose_f("%s key not found", sshkey_type(key));
sshkey_type(id->key), fp);
sshkey_type(id->key), fp,
sshkey_type(id->key), fp);
sshkey_type(l->key), fp,
tmp, sshkey_type(public));
sshkey_type(ca), ca_fp);
printf(" Public key: %s %s\n", sshkey_type(key), key_fp);
sshkey_type(key->cert->signature_key), ca_fp,
sshkey_type(signkey));
sshkey_type(signkey), fp);
sig_namespace, sshkey_type(sign_key), fp);
sshkey_type(sign_key), fp);
sshkey_type(key), key->type);
sshkey_type(key), fp, key->sk_application, key->sk_flags);
printf("Saved %s key%s%s to %s\n", sshkey_type(key),
sshkey_size(k), sshkey_type(k),
fatal_f("unsupported key type %s", sshkey_type(k));
fatal_f("unsupported key type %s", sshkey_type(k));
fatal_f("unsupported key type %s", sshkey_type(k));
fp, sshkey_type(keys[i]));
comment ? comment : "no comment", sshkey_type(public));
sshkey_type(key), fp ? fp : "");
sshkey_type(key), helper->path, helper->nkeyblobs);
fatal_f("no helper for %s key", sshkey_type(key));
fatal_f("no helper for %s key", sshkey_type(priv));
sshkey_type(priv), sshkey_type(certpub), helper->path);
sshkey_type(priv), sshkey_type(certpub));
debug3_f("free %s key", sshkey_type(key));
fatal_f("no helper for %s key", sshkey_type(key));
error_fr(r, "sign %s", sshkey_type(key));
sshkey_type(keys[i]), labels[i]);
(u_long)slotidx, sshkey_type(key), fp);
sshkey_type(key), provider->name, (u_long)slotidx, hex);
sshkey_type(srk->key), srk->key->sk_application,
"msg len %zu, compat 0x%lx", sshkey_type(key),
sshkey_type(srks[i]->key), srks[i]->key->sk_application,
provider_path, sshkey_type(key), key->sk_flags,
cp, sshkey_type(public));
filename, sshkey_type(public));
sshkey_type(*k), message, path);
sshkey_type(*k), fp);
debug3_f("check %s", sshkey_type(k->key));
debug3_f("check %s", sshkey_type(k->key));
debug3_f("need %s", sshkey_type(hostkey));
debug3_f("check %s", sshkey_type(k->key));
type = sshkey_type(host_key);
sshkey_type(host_found->key),
sshkey_type(host_key), fp);
sshkey_type(host_key), fp,
"revoked keys file %s", sshkey_type(host_key),
sshkey_type(found->key),
sshkey_type(found->key), fp);
sshkey_type(host_key), fp);
sshkey_type(sign_key), fp);
sshkey_type(sign_key), id->filename);
debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp);
loc, sshkey_type(id->key), fp);
sshkey_type(sign_id->key), sign_id->filename,
id->key ? sshkey_type(id->key) : "", id->key ? " " : "",
sshkey_type(key), fp == NULL ? "<ERROR>" : fp);
sshkey_type(sensitive_data.host_keys[i]));
sshkey_type(key));
sshkey_type(k), sshkey_size(k));
r = snprintf(title, sizeof(title), "[%s]", sshkey_type(k));
const char *sshkey_type(const struct sshkey *);