Searched refs:pkalg (Results 1 – 6 of 6) sorted by relevance
/freebsd/crypto/openssh/ |
H A D | auth2-hostbased.c | 65 char *pkalg, *cuser, *chost; in userauth_hostbased() local 71 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased() 79 cuser, chost, pkalg, slen); in userauth_hostbased() 84 pktype = sshkey_type_from_name(pkalg); in userauth_hostbased() 88 pkalg); in userauth_hostbased() 96 error_f("cannot decode key: %s", pkalg); in userauth_hostbased() 104 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { in userauth_hostbased() 106 "HostbasedAcceptedAlgorithms", pkalg); in userauth_hostbased() 135 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased() 152 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat, NULL) == 0) in userauth_hostbased() [all …]
|
H A D | ssh-keysign.c | 73 char *pkalg, *luser; in valid_request() local 118 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || in valid_request() 122 pktype = sshkey_type_from_name(pkalg); in valid_request() 164 *pkalgp = pkalg; in valid_request() 165 pkalg = NULL; in valid_request() 169 free(pkalg); in valid_request() 185 char *host, *fp, *pkalg; in main() local 278 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0) in main() 299 pkalg, NULL, NULL, 0)) != 0) in main()
|
H A D | auth2-pubkey.c | 95 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; in userauth_pubkey() local 106 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey() 133 have_sig ? "attempting" : "querying", pkalg, keystring); in userauth_pubkey() 138 pktype = sshkey_type_from_name(pkalg); in userauth_pubkey() 141 verbose_f("unsupported public key algorithm: %s", pkalg); in userauth_pubkey() 149 error_f("cannot decode key: %s", pkalg); in userauth_pubkey() 161 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { in userauth_pubkey() 163 "PubkeyAcceptedAlgorithms", pkalg); in userauth_pubkey() 184 method, pkalg, key_s, in userauth_pubkey() 212 (r = sshbuf_put_cstring(b, pkalg)) != 0 || in userauth_pubkey() [all …]
|
H A D | sshconnect2.c | 688 char *pkalg = NULL, *fp = NULL, *ident = NULL; in input_userauth_pk_ok() local 695 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in input_userauth_pk_ok() 700 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok() 701 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok() 706 debug_r(r, "no key from blob. pkalg %s", pkalg); in input_userauth_pk_ok() 744 free(pkalg); in input_userauth_pk_ok()
|
H A D | ssh-agent.c | 710 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; in parse_userauth_request() local 736 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */ in parse_userauth_request() 743 sshkey_type_from_name(pkalg) != expected_key->type) { in parse_userauth_request() 779 free(pkalg); in parse_userauth_request()
|
H A D | PROTOCOL | 439 string pkalg
|