Home
last modified time | relevance | path

Searched refs:pkalg (Results 1 – 4 of 4) sorted by relevance

/external/openssh/
Dauth2-hostbased.c66 char *pkalg, *cuser, *chost; in userauth_hostbased() local
72 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased()
80 cuser, chost, pkalg, slen); in userauth_hostbased()
85 pktype = sshkey_type_from_name(pkalg); in userauth_hostbased()
89 __func__, pkalg); in userauth_hostbased()
97 error("%s: cannot decode key: %s", __func__, pkalg); in userauth_hostbased()
111 if (match_pattern_list(pkalg, options.hostbased_key_types, 0) != 1) { in userauth_hostbased()
137 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased()
154 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat, NULL)) == 0) in userauth_hostbased()
162 free(pkalg); in userauth_hostbased()
Dauth2-pubkey.c96 char *pkalg = NULL, *userstyle = NULL, *key_s = NULL, *ca_s = NULL; in userauth_pubkey() local
105 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey()
119 have_sig ? "attempting" : "querying", pkalg, keystring); in userauth_pubkey()
124 pktype = sshkey_type_from_name(pkalg); in userauth_pubkey()
128 __func__, pkalg); in userauth_pubkey()
136 error("%s: cannot decode key: %s", __func__, pkalg); in userauth_pubkey()
154 if (match_pattern_list(pkalg, options.pubkey_key_types, 0) != 1) { in userauth_pubkey()
172 __func__, pkalg, key_s, in userauth_pubkey()
205 (r = sshbuf_put_cstring(b, pkalg)) != 0 || in userauth_pubkey()
217 (ssh->compat & SSH_BUG_SIGTYPE) == 0 ? pkalg : NULL, in userauth_pubkey()
[all …]
Dssh-keysign.c73 char *pkalg, *luser; in valid_request() local
113 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 || in valid_request()
117 pktype = sshkey_type_from_name(pkalg); in valid_request()
125 free(pkalg); in valid_request()
Dsshconnect2.c648 char *pkalg = NULL, *fp = NULL, *ident = NULL; in input_userauth_pk_ok() local
655 if ((r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in input_userauth_pk_ok()
660 if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok()
661 debug("%s: server sent unknown pkalg %s", __func__, pkalg); in input_userauth_pk_ok()
665 debug("no key from blob. pkalg %s: %s", pkalg, ssh_err(r)); in input_userauth_pk_ok()
701 free(pkalg); in input_userauth_pk_ok()