Searched refs:pkalg (Results 1 – 6 of 6) sorted by relevance
| /freebsd/crypto/openssh/ |
| H A D | auth2-hostbased.c | 65 char *pkalg, *cuser, *chost; in userauth_hostbased() local 71 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased() 79 cuser, chost, pkalg, slen); in userauth_hostbased() 84 pktype = sshkey_type_from_name(pkalg); in userauth_hostbased() 88 pkalg); in userauth_hostbased() 96 error_f("cannot decode key: %s", pkalg); in userauth_hostbased() 100 sshkey_ecdsa_nid_from_name(pkalg) != key->ecdsa_nid)) { in userauth_hostbased() 102 "(received %s, expected %s)", sshkey_ssh_name(key), pkalg); in userauth_hostbased() 105 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { in userauth_hostbased() 107 "HostbasedAcceptedAlgorithms", pkalg); in userauth_hostbased() [all …]
|
| H A D | ssh-keysign.c | 71 char *pkalg, *luser; in valid_request() local 116 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || in valid_request() 120 pktype = sshkey_type_from_name(pkalg); in valid_request() 164 *pkalgp = pkalg; in valid_request() 165 pkalg = NULL; in valid_request() 169 free(pkalg); in valid_request() 185 char *host, *fp, *pkalg; in main() local 274 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0) in main() 295 pkalg, NULL, NULL, 0)) != 0) in main()
|
| H A D | auth2-pubkey.c | 94 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; in userauth_pubkey() local 105 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey() 132 have_sig ? "attempting" : "querying", pkalg, keystring); in userauth_pubkey() 137 pktype = sshkey_type_from_name(pkalg); in userauth_pubkey() 140 verbose_f("unsupported public key algorithm: %s", pkalg); in userauth_pubkey() 148 error_f("cannot decode key: %s", pkalg); in userauth_pubkey() 152 sshkey_ecdsa_nid_from_name(pkalg) != key->ecdsa_nid)) { in userauth_pubkey() 154 "(received %s, expected %s)", sshkey_ssh_name(key), pkalg); in userauth_pubkey() 161 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { in userauth_pubkey() 163 "PubkeyAcceptedAlgorithms", pkalg); in userauth_pubkey() [all …]
|
| H A D | sshconnect2.c | 689 char *pkalg = NULL, *fp = NULL, *ident = NULL; in input_userauth_pk_ok() local 696 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in input_userauth_pk_ok() 701 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok() 702 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok() 707 debug_r(r, "no key from blob. pkalg %s", pkalg); in input_userauth_pk_ok() 745 free(pkalg); in input_userauth_pk_ok()
|
| H A D | ssh-agent.c | 710 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; in parse_userauth_request() local 736 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */ in parse_userauth_request() 743 sshkey_type_from_name(pkalg) != expected_key->type) { in parse_userauth_request() 779 free(pkalg); in parse_userauth_request()
|
| H A D | PROTOCOL | 365 string pkalg
|