version 1.130, 2019/09/06 05:23:55 |
version 1.131, 2019/12/15 19:47:10 |
|
|
#define KT_ECDSA (1<<2) |
#define KT_ECDSA (1<<2) |
#define KT_ED25519 (1<<3) |
#define KT_ED25519 (1<<3) |
#define KT_XMSS (1<<4) |
#define KT_XMSS (1<<4) |
|
#define KT_ECDSA_SK (1<<5) |
|
#define KT_ED25519_SK (1<<6) |
|
|
#define KT_MIN KT_DSA |
#define KT_MIN KT_DSA |
#define KT_MAX KT_XMSS |
#define KT_MAX KT_ED25519_SK |
|
|
int get_cert = 0; |
int get_cert = 0; |
int get_keytypes = KT_RSA|KT_ECDSA|KT_ED25519; |
int get_keytypes = KT_RSA|KT_ECDSA|KT_ED25519|KT_ECDSA_SK|KT_ED25519_SK; |
|
|
int hash_hosts = 0; /* Hash hostname on output */ |
int hash_hosts = 0; /* Hash hostname on output */ |
|
|
|
|
"ecdsa-sha2-nistp384," |
"ecdsa-sha2-nistp384," |
"ecdsa-sha2-nistp521"; |
"ecdsa-sha2-nistp521"; |
break; |
break; |
|
case KT_ECDSA_SK: |
|
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = get_cert ? |
|
"sk-ecdsa-sha2-nistp256-cert-v01@openssh.com" : |
|
"sk-ecdsa-sha2-nistp256@openssh.com"; |
|
break; |
|
case KT_ED25519_SK: |
|
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = get_cert ? |
|
"sk-ssh-ed25519-cert-v01@openssh.com" : |
|
"sk-ssh-ed25519@openssh.com"; |
|
break; |
default: |
default: |
fatal("unknown key type %d", c->c_keytype); |
fatal("unknown key type %d", c->c_keytype); |
break; |
break; |
|
|
break; |
break; |
case KEY_XMSS: |
case KEY_XMSS: |
get_keytypes |= KT_XMSS; |
get_keytypes |= KT_XMSS; |
|
break; |
|
case KEY_ED25519_SK: |
|
get_keytypes |= KT_ED25519_SK; |
|
break; |
|
case KEY_ECDSA_SK: |
|
get_keytypes |= KT_ECDSA_SK; |
break; |
break; |
case KEY_UNSPEC: |
case KEY_UNSPEC: |
default: |
default: |