Home
last modified time | relevance | path

Searched refs:pkalg (Results 1 – 6 of 6) sorted by relevance

/freebsd/crypto/openssh/
H A Dauth2-hostbased.c65 char *pkalg, *cuser, *chost; in userauth_hostbased() local
71 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased()
79 cuser, chost, pkalg, slen); in userauth_hostbased()
84 pktype = sshkey_type_from_name(pkalg); in userauth_hostbased()
88 pkalg); in userauth_hostbased()
96 error_f("cannot decode key: %s", pkalg); in userauth_hostbased()
100 sshkey_ecdsa_nid_from_name(pkalg) != key->ecdsa_nid)) { in userauth_hostbased()
102 "(received %s, expected %s)", sshkey_ssh_name(key), pkalg); in userauth_hostbased()
105 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { in userauth_hostbased()
107 "HostbasedAcceptedAlgorithms", pkalg); in userauth_hostbased()
[all …]
H A Dssh-keysign.c71 char *pkalg, *luser; in valid_request() local
116 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || in valid_request()
120 pktype = sshkey_type_from_name(pkalg); in valid_request()
164 *pkalgp = pkalg; in valid_request()
165 pkalg = NULL; in valid_request()
169 free(pkalg); in valid_request()
185 char *host, *fp, *pkalg; in main() local
274 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0) in main()
295 pkalg, NULL, NULL, 0)) != 0) in main()
H A Dauth2-pubkey.c94 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; in userauth_pubkey() local
105 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey()
132 have_sig ? "attempting" : "querying", pkalg, keystring); in userauth_pubkey()
137 pktype = sshkey_type_from_name(pkalg); in userauth_pubkey()
140 verbose_f("unsupported public key algorithm: %s", pkalg); in userauth_pubkey()
148 error_f("cannot decode key: %s", pkalg); in userauth_pubkey()
152 sshkey_ecdsa_nid_from_name(pkalg) != key->ecdsa_nid)) { in userauth_pubkey()
154 "(received %s, expected %s)", sshkey_ssh_name(key), pkalg); in userauth_pubkey()
161 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { in userauth_pubkey()
163 "PubkeyAcceptedAlgorithms", pkalg); in userauth_pubkey()
[all …]
H A Dsshconnect2.c689 char *pkalg = NULL, *fp = NULL, *ident = NULL; in input_userauth_pk_ok() local
696 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in input_userauth_pk_ok()
701 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok()
702 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok()
707 debug_r(r, "no key from blob. pkalg %s", pkalg); in input_userauth_pk_ok()
745 free(pkalg); in input_userauth_pk_ok()
H A Dssh-agent.c710 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; in parse_userauth_request() local
736 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */ in parse_userauth_request()
743 sshkey_type_from_name(pkalg) != expected_key->type) { in parse_userauth_request()
779 free(pkalg); in parse_userauth_request()
H A DPROTOCOL365 string pkalg