| /src/crypto/external/bsd/openssh/dist/ |
| auth2-hostbased.c | 67 char *pkalg, *cuser, *chost; local 73 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || 80 debug_f("cuser %s chost %s pkalg %s slen %zu", 81 cuser, chost, pkalg, slen); 86 pktype = sshkey_type_from_name(pkalg); 90 pkalg); 98 error_f("cannot decode key: %s", pkalg); 106 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { 108 "HostbasedAcceptedAlgorithms", pkalg); 137 (r = sshbuf_put_string(b, pkalg, alen)) != 0 | [all...] |
| auth2-hostbased.c | 67 char *pkalg, *cuser, *chost; local 73 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || 80 debug_f("cuser %s chost %s pkalg %s slen %zu", 81 cuser, chost, pkalg, slen); 86 pktype = sshkey_type_from_name(pkalg); 90 pkalg); 98 error_f("cannot decode key: %s", pkalg); 106 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { 108 "HostbasedAcceptedAlgorithms", pkalg); 137 (r = sshbuf_put_string(b, pkalg, alen)) != 0 | [all...] |
| ssh-keysign.c | 72 char *pkalg, *luser; local 117 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || 121 pktype = sshkey_type_from_name(pkalg); 165 *pkalgp = pkalg; 166 pkalg = NULL; 170 free(pkalg); 186 char *host, *fp, *pkalg; local 281 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0) 302 pkalg, NULL, NULL, 0)) != 0)
|
| ssh-keysign.c | 72 char *pkalg, *luser; local 117 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || 121 pktype = sshkey_type_from_name(pkalg); 165 *pkalgp = pkalg; 166 pkalg = NULL; 170 free(pkalg); 186 char *host, *fp, *pkalg; local 281 if (valid_request(pw, host, &key, &pkalg, data, dlen) < 0) 302 pkalg, NULL, NULL, 0)) != 0)
|
| auth2-pubkey.c | 102 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; local 113 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || 140 have_sig ? "attempting" : "querying", pkalg, keystring); 145 pktype = sshkey_type_from_name(pkalg); 148 verbose_f("unsupported public key algorithm: %s", pkalg); 156 error_f("cannot decode key: %s", pkalg); 168 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { 170 "PubkeyAcceptedAlgorithms", pkalg); 191 method, pkalg, key_s, 219 (r = sshbuf_put_cstring(b, pkalg)) != 0 | [all...] |
| auth2-pubkey.c | 102 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; local 113 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || 140 have_sig ? "attempting" : "querying", pkalg, keystring); 145 pktype = sshkey_type_from_name(pkalg); 148 verbose_f("unsupported public key algorithm: %s", pkalg); 156 error_f("cannot decode key: %s", pkalg); 168 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) { 170 "PubkeyAcceptedAlgorithms", pkalg); 191 method, pkalg, key_s, 219 (r = sshbuf_put_cstring(b, pkalg)) != 0 | [all...] |
| ssh-agent.c | 690 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; local 716 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */ 723 sshkey_type_from_name(pkalg) != expected_key->type) { 759 free(pkalg);
|
| sshconnect2.c | 721 char *pkalg = NULL, *fp = NULL, *ident = NULL; local 728 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || 733 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { 734 debug_f("server sent unknown pkalg %s", pkalg); 739 debug_r(r, "no key from blob. pkalg %s", pkalg); 777 free(pkalg);
|
| ssh-agent.c | 690 char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL; local 716 (r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || /* alg */ 723 sshkey_type_from_name(pkalg) != expected_key->type) { 759 free(pkalg);
|
| sshconnect2.c | 721 char *pkalg = NULL, *fp = NULL, *ident = NULL; local 728 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || 733 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { 734 debug_f("server sent unknown pkalg %s", pkalg); 739 debug_r(r, "no key from blob. pkalg %s", pkalg); 777 free(pkalg);
|