/freebsd/crypto/openssh/regress/unittests/match/ |
H A D | tests.c | 50 ASSERT_INT_EQ(match_pattern_list("", "", 0), 0); /* no patterns */ in tests() 51 ASSERT_INT_EQ(match_pattern_list("", "*", 0), 1); in tests() 52 ASSERT_INT_EQ(match_pattern_list("", "!*", 0), -1); in tests() 53 ASSERT_INT_EQ(match_pattern_list("", "!a,*", 0), 1); in tests() 54 ASSERT_INT_EQ(match_pattern_list("", "*,!a", 0), 1); in tests() 55 ASSERT_INT_EQ(match_pattern_list("", "a,!*", 0), -1); in tests() 56 ASSERT_INT_EQ(match_pattern_list("", "!*,a", 0), -1); in tests() 57 ASSERT_INT_EQ(match_pattern_list("a", "", 0), 0); in tests() 58 ASSERT_INT_EQ(match_pattern_list("a", "*", 0), 1); in tests() 59 ASSERT_INT_EQ(match_pattern_list("a", "!*", 0), -1); in tests() [all …]
|
/freebsd/crypto/openssh/ |
H A D | match.c | 122 match_pattern_list(const char *string, const char *pattern, int dolower) in match_pattern_list() function 183 return match_pattern_list(string, pattern, 0); in match_usergroup_pattern_list() 200 r = match_pattern_list(hostcopy, pattern, 1); in match_hostname() 338 r = match_pattern_list(cp, filter, 0); in filter_list()
|
H A D | match.h | 18 int match_pattern_list(const char *, const char *, int);
|
H A D | compat.c | 130 if (match_pattern_list(version, check[i].pat, 0) == 1) { in compat_banner()
|
H A D | sshsig.c | 261 match_pattern_list(hashalg, HASHALG_ALLOWED, 0) == 1) in sshsig_check_hashalg() 371 if (match_pattern_list(sigtype, RSA_SIGN_ALLOWED, 0) != 1) { in sshsig_wrap_verify() 769 if (match_pattern_list(required_principal, in parse_principals_key_and_options() 944 match_pattern_list(sig_namespace, sigopts->namespaces, 0) != 1) { in check_allowed_keys_line()
|
H A D | auth2-hostbased.c | 103 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { in userauth_hostbased()
|
H A D | sshkey.c | 304 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 305 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || in sshkey_match_keyname_to_sigalgs() 306 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() 308 return match_pattern_list("ssh-rsa-cert-v01@openssh.com", in sshkey_match_keyname_to_sigalgs() 310 match_pattern_list("rsa-sha2-256-cert-v01@openssh.com", in sshkey_match_keyname_to_sigalgs() 312 match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", in sshkey_match_keyname_to_sigalgs() 315 return match_pattern_list(keyname, sigalgs, 0) == 1; in sshkey_match_keyname_to_sigalgs() 370 if (match_pattern_list( in sshkey_names_valid2() 2036 if (match_pattern_list(key->cert->signature_type, allowed, 0) != 1) in sshkey_check_cert_sigtype()
|
H A D | sshconnect2.c | 1601 if (match_pattern_list(sshkey_ssh_name(key), in key_type_allowed_by_config() 1608 if (match_pattern_list("rsa-sha2-512", in key_type_allowed_by_config() 1611 if (match_pattern_list("rsa-sha2-256", in key_type_allowed_by_config() 1616 if (match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", in key_type_allowed_by_config() 1619 if (match_pattern_list("rsa-sha2-256-cert-v01@openssh.com", in key_type_allowed_by_config()
|
H A D | log.c | 482 if (match_pattern_list(tag, log_verbose[i], 0) == 1) { in sshlogv()
|
H A D | clientloop.c | 2405 match_pattern_list(alg, HOSTKEY_PROOF_RSA_ALGS, 0) != 1) { in client_global_hostkeys_prove_confirm() 2458 (match_pattern_list("rsa-sha2-256", hostkeyalgs, 0) == 1 || in key_accepted_by_hostkeyalgs() 2459 match_pattern_list("rsa-sha2-512", hostkeyalgs, 0) == 1)) in key_accepted_by_hostkeyalgs() 2461 return match_pattern_list(ktype, hostkeyalgs, 0) == 1; in key_accepted_by_hostkeyalgs()
|
H A D | session.c | 879 match_pattern_list(cp, allowlist, 0) != 1) in read_environment_file() 963 match_pattern_list(var_name, denylist, 0) != 1) { in copy_environment_denylist() 1127 match_pattern_list(ocp, in do_setup_env()
|
H A D | readconf.c | 744 r = match_pattern_list(ruser, arg, 0) == 1; in match_cfg_line() 749 r = match_pattern_list(pw->pw_name, arg, 0) == 1; in match_cfg_line() 764 r = match_pattern_list(criteria, arg, 0) == 1; in match_cfg_line() 886 match_pattern_list(cp, ignored_unknown, 1) == 1) in parse_token()
|
H A D | auth2-pubkey.c | 160 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { in userauth_pubkey()
|
H A D | ssh.c | 407 if (match_pattern_list(*namep, rule->source_list, 1) != 1 || in check_follow_cname() 408 match_pattern_list(cname, rule->target_list, 1) != 1) in check_follow_cname()
|
H A D | ssh-agent.c | 1417 if (match_pattern_list(sk_provider, in process_add_identity() 1611 if (match_pattern_list(canonical_provider, allowed_providers, 0) != 1) { in process_add_smartcard_key()
|
H A D | ssh_namespace.h | 416 #define match_pattern_list Fssh_match_pattern_list macro
|
H A D | sshd.c | 609 if (match_pattern_list(s, options.hostkeyalgorithms, 0) != 1) {
|
H A D | servconf.c | 1233 if (match_pattern_list(ci->rdomain, arg, 0) != 1) in match_cfg_line()
|