HomeSort by: relevance | last modified time | path
    Searched defs:pkalg (Results 1 - 10 of 10) sorted by relevancy

  /src/crypto/external/bsd/openssh/dist/
auth2-hostbased.c 67 char *pkalg, *cuser, *chost; local
73 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 ||
80 debug_f("cuser %s chost %s pkalg %s slen %zu",
81 cuser, chost, pkalg, slen);
86 pktype = sshkey_type_from_name(pkalg);
90 pkalg);
98 error_f("cannot decode key: %s", pkalg);
106 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) {
108 "HostbasedAcceptedAlgorithms", pkalg);
137 (r = sshbuf_put_string(b, pkalg, alen)) != 0 |
    [all...]
auth2-hostbased.c 67 char *pkalg, *cuser, *chost; local
73 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 ||
80 debug_f("cuser %s chost %s pkalg %s slen %zu",
81 cuser, chost, pkalg, slen);
86 pktype = sshkey_type_from_name(pkalg);
90 pkalg);
98 error_f("cannot decode key: %s", pkalg);
106 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) {
108 "HostbasedAcceptedAlgorithms", pkalg);
137 (r = sshbuf_put_string(b, pkalg, alen)) != 0 |
    [all...]
ssh-keysign.c 72 char *pkalg, *luser; local
117 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 ||
121 pktype = sshkey_type_from_name(pkalg);
165 *pkalgp = pkalg;
166 pkalg = NULL;
170 free(pkalg);
186 char *host, *fp, *pkalg; local
281 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0)
302 pkalg, NULL, NULL, 0)) != 0)
ssh-keysign.c 72 char *pkalg, *luser; local
117 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 ||
121 pktype = sshkey_type_from_name(pkalg);
165 *pkalgp = pkalg;
166 pkalg = NULL;
170 free(pkalg);
186 char *host, *fp, *pkalg; local
281 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0)
302 pkalg, NULL, NULL, 0)) != 0)
auth2-pubkey.c 102 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; local
113 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 ||
140 have_sig ? "attempting" : "querying", pkalg, keystring);
145 pktype = sshkey_type_from_name(pkalg);
148 verbose_f("unsupported public key algorithm: %s", pkalg);
156 error_f("cannot decode key: %s", pkalg);
168 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) {
170 "PubkeyAcceptedAlgorithms", pkalg);
191 method, pkalg, key_s,
219 (r = sshbuf_put_cstring(b, pkalg)) != 0 |
    [all...]
auth2-pubkey.c 102 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; local
113 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 ||
140 have_sig ? "attempting" : "querying", pkalg, keystring);
145 pktype = sshkey_type_from_name(pkalg);
148 verbose_f("unsupported public key algorithm: %s", pkalg);
156 error_f("cannot decode key: %s", pkalg);
168 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) {
170 "PubkeyAcceptedAlgorithms", pkalg);
191 method, pkalg, key_s,
219 (r = sshbuf_put_cstring(b, pkalg)) != 0 |
    [all...]
ssh-agent.c 690 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; local
716 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */
723 sshkey_type_from_name(pkalg) != expected_key->type) {
759 free(pkalg);
sshconnect2.c 721 char *pkalg = NULL, *fp = NULL, *ident = NULL; local
728 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 ||
733 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) {
734 debug_f("server sent unknown pkalg %s", pkalg);
739 debug_r(r, "no key from blob. pkalg %s", pkalg);
777 free(pkalg);
ssh-agent.c 690 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; local
716 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */
723 sshkey_type_from_name(pkalg) != expected_key->type) {
759 free(pkalg);
sshconnect2.c 721 char *pkalg = NULL, *fp = NULL, *ident = NULL; local
728 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 ||
733 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) {
734 debug_f("server sent unknown pkalg %s", pkalg);
739 debug_r(r, "no key from blob. pkalg %s", pkalg);
777 free(pkalg);

Completed in 50 milliseconds