version 1.354, 2021/12/19 22:14:47 |
version 1.355, 2022/01/06 22:06:51 |
|
|
if (authctxt->sensitive->keys[i] == NULL || |
if (authctxt->sensitive->keys[i] == NULL || |
authctxt->sensitive->keys[i]->type == KEY_UNSPEC) |
authctxt->sensitive->keys[i]->type == KEY_UNSPEC) |
continue; |
continue; |
if (match_pattern_list( |
if (!sshkey_match_keyname_to_sigalgs( |
sshkey_ssh_name(authctxt->sensitive->keys[i]), |
sshkey_ssh_name(authctxt->sensitive->keys[i]), |
authctxt->active_ktype, 0) != 1) |
authctxt->active_ktype)) |
continue; |
continue; |
/* we take and free the key */ |
/* we take and free the key */ |
private = authctxt->sensitive->keys[i]; |
private = authctxt->sensitive->keys[i]; |
|
|
error_f("sshkey_fingerprint failed"); |
error_f("sshkey_fingerprint failed"); |
goto out; |
goto out; |
} |
} |
debug_f("trying hostkey %s %s", sshkey_ssh_name(private), fp); |
debug_f("trying hostkey %s %s using sigalg %s", |
|
sshkey_ssh_name(private), fp, authctxt->active_ktype); |
|
|
/* figure out a name for the client host */ |
/* figure out a name for the client host */ |
lname = get_local_name(ssh_packet_get_connection_in(ssh)); |
lname = get_local_name(ssh_packet_get_connection_in(ssh)); |