version 1.315, 2020/01/21 05:56:27 |
version 1.316, 2020/01/23 02:46:49 |
|
|
for (i = 0; i < options.num_system_hostfiles; i++) |
for (i = 0; i < options.num_system_hostfiles; i++) |
load_hostkeys(hostkeys, hostname, options.system_hostfiles[i]); |
load_hostkeys(hostkeys, hostname, options.system_hostfiles[i]); |
|
|
oavail = avail = xstrdup(KEX_DEFAULT_PK_ALG); |
oavail = avail = xstrdup(kex_default_pk_alg()); |
maxlen = strlen(avail) + 1; |
maxlen = strlen(avail) + 1; |
first = xmalloc(maxlen); |
first = xmalloc(maxlen); |
last = xmalloc(maxlen); |
last = xmalloc(maxlen); |
|
|
if (options.hostkeyalgorithms != NULL) { |
if (options.hostkeyalgorithms != NULL) { |
all_key = sshkey_alg_list(0, 0, 1, ','); |
all_key = sshkey_alg_list(0, 0, 1, ','); |
if (kex_assemble_names(&options.hostkeyalgorithms, |
if (kex_assemble_names(&options.hostkeyalgorithms, |
KEX_DEFAULT_PK_ALG, all_key) != 0) |
kex_default_pk_alg(), all_key) != 0) |
fatal("%s: kex_assemble_namelist", __func__); |
fatal("%s: kex_assemble_namelist", __func__); |
free(all_key); |
free(all_key); |
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = |
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = |
compat_pkalg_proposal(options.hostkeyalgorithms); |
compat_pkalg_proposal(options.hostkeyalgorithms); |
} else { |
} else { |
/* Enforce default */ |
/* Enforce default */ |
options.hostkeyalgorithms = xstrdup(KEX_DEFAULT_PK_ALG); |
options.hostkeyalgorithms = xstrdup(kex_default_pk_alg()); |
/* Prefer algorithms that we already have keys for */ |
/* Prefer algorithms that we already have keys for */ |
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = |
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = |
compat_pkalg_proposal( |
compat_pkalg_proposal( |