Home
last modified time | relevance | path

Searched refs:pkalg (Results 1 – 6 of 6) sorted by relevance

/freebsd/crypto/openssh/
H A Dauth2-hostbased.c65 char *pkalg, *cuser, *chost; in userauth_hostbased() local
71 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased()
79 cuser, chost, pkalg, slen); in userauth_hostbased()
84 pktype = sshkey_type_from_name(pkalg); in userauth_hostbased()
88 pkalg); in userauth_hostbased()
96 error_f("cannot decode key: %s", pkalg); in userauth_hostbased()
104 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { in userauth_hostbased()
106 "HostbasedAcceptedAlgorithms", pkalg); in userauth_hostbased()
135 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased()
152 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat, NULL) == 0) in userauth_hostbased()
[all …]
H A Dssh-keysign.c73 char *pkalg, *luser; in valid_request() local
118 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || in valid_request()
122 pktype = sshkey_type_from_name(pkalg); in valid_request()
164 *pkalgp = pkalg; in valid_request()
165 pkalg = NULL; in valid_request()
169 free(pkalg); in valid_request()
185 char *host, *fp, *pkalg; in main() local
278 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0) in main()
299 pkalg, NULL, NULL, 0)) != 0) in main()
H A Dauth2-pubkey.c95 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; in userauth_pubkey() local
106 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey()
133 have_sig ? "attempting" : "querying", pkalg, keystring); in userauth_pubkey()
138 pktype = sshkey_type_from_name(pkalg); in userauth_pubkey()
141 verbose_f("unsupported public key algorithm: %s", pkalg); in userauth_pubkey()
149 error_f("cannot decode key: %s", pkalg); in userauth_pubkey()
161 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { in userauth_pubkey()
163 "PubkeyAcceptedAlgorithms", pkalg); in userauth_pubkey()
184 method, pkalg, key_s, in userauth_pubkey()
212 (r = sshbuf_put_cstring(b, pkalg)) != 0 || in userauth_pubkey()
[all …]
H A Dsshconnect2.c688 char *pkalg = NULL, *fp = NULL, *ident = NULL; in input_userauth_pk_ok() local
695 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in input_userauth_pk_ok()
700 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok()
701 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok()
706 debug_r(r, "no key from blob. pkalg %s", pkalg); in input_userauth_pk_ok()
744 free(pkalg); in input_userauth_pk_ok()
H A Dssh-agent.c710 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; in parse_userauth_request() local
736 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */ in parse_userauth_request()
743 sshkey_type_from_name(pkalg) != expected_key->type) { in parse_userauth_request()
779 free(pkalg); in parse_userauth_request()
H A DPROTOCOL439 string pkalg