Lines Matching defs:keys
113 /* Path to CA key when certifying keys. */
125 /* Comma-separated list of principal names for certifying keys */
160 /* Use new OpenSSH private key format when writing SSH2 keys instead of PEM */
163 /* Cipher for new-format private keys */
167 * Number of KDF rounds to derive new format keys /
216 fatal("DSA keys must be 1024 bits");
312 fprintf(stderr, "version 1 keys are not supported\n");
786 struct sshkey **keys = NULL;
796 nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys);
801 fp = sshkey_fingerprint(keys[i], fptype, rep);
802 ra = sshkey_fingerprint(keys[i], fingerprint_hash,
806 printf("%u %s %s (PKCS11 key)\n", sshkey_size(keys[i]),
807 fp, sshkey_type(keys[i]));
813 (void) sshkey_write(keys[i], stdout); /* XXX check */
816 sshkey_free(keys[i]);
818 free(keys);
980 printf("%s: generating new host keys: ", __progname);
1403 fprintf(stderr, "Comments are only supported for RSA1 keys.\n");
1561 struct sshkey **keys = NULL, *public, *private = NULL;
1568 nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, &keys);
1569 debug3("%s: %d keys", __func__, nkeys);
1573 if (sshkey_equal_public(public, keys[i])) {
1574 private = keys[i];
1577 sshkey_free(keys[i]);
1579 free(keys);
1595 int v00 = 0; /* legacy keys */
2564 fatal("no keys found.");