version 1.119, 2021/07/23 03:37:52 |
version 1.120, 2022/01/06 22:05:42 |
|
|
return -1; |
return -1; |
} |
} |
|
|
|
int |
|
sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs) |
|
{ |
|
int ktype; |
|
|
|
if (sigalgs == NULL || *sigalgs == '\0' || |
|
(ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) |
|
return 0; |
|
else if (ktype == KEY_RSA) { |
|
return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || |
|
match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || |
|
match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; |
|
} else if (ktype == KEY_RSA_CERT) { |
|
return match_pattern_list("ssh-rsa-cert-v01@openssh.com", |
|
sigalgs, 0) == 1 || |
|
match_pattern_list("rsa-sha2-256-cert-v01@openssh.com", |
|
sigalgs, 0) == 1 || |
|
match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", |
|
sigalgs, 0) == 1; |
|
} else |
|
return match_pattern_list(keyname, sigalgs, 0) == 1; |
|
} |
|
|
char * |
char * |
sshkey_alg_list(int certs_only, int plain_only, int include_sigonly, char sep) |
sshkey_alg_list(int certs_only, int plain_only, int include_sigonly, char sep) |
{ |
{ |