Searched refs:match_pattern_list (Results 1 - 18 of 18) sorted by relevance

/freebsd-current/crypto/openssh/regress/unittests/match/
H A Dtests.c49 TEST_START("match_pattern_list");
50 ASSERT_INT_EQ(match_pattern_list("", "", 0), 0); /* no patterns */
51 ASSERT_INT_EQ(match_pattern_list("", "*", 0), 1);
52 ASSERT_INT_EQ(match_pattern_list("", "!*", 0), -1);
53 ASSERT_INT_EQ(match_pattern_list("", "!a,*", 0), 1);
54 ASSERT_INT_EQ(match_pattern_list("", "*,!a", 0), 1);
55 ASSERT_INT_EQ(match_pattern_list("", "a,!*", 0), -1);
56 ASSERT_INT_EQ(match_pattern_list("", "!*,a", 0), -1);
57 ASSERT_INT_EQ(match_pattern_list("a", "", 0), 0);
58 ASSERT_INT_EQ(match_pattern_list("
[all...]
/freebsd-current/crypto/openssh/
H A Dmatch.h18 int match_pattern_list(const char *, const char *, int);
H A Dcompat.c130 if (match_pattern_list(version, check[i].pat, 0) == 1) {
H A Dmatch.c122 match_pattern_list(const char *string, const char *pattern, int dolower) function
183 return match_pattern_list(string, pattern, 0);
200 r = match_pattern_list(hostcopy, pattern, 1);
338 r = match_pattern_list(cp, filter, 0);
H A Dauth2-hostbased.c103 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) {
H A Dsshsig.c261 match_pattern_list(hashalg, HASHALG_ALLOWED, 0) == 1)
371 if (match_pattern_list(sigtype, RSA_SIGN_ALLOWED, 0) != 1) {
769 if (match_pattern_list(required_principal,
944 match_pattern_list(sig_namespace, sigopts->namespaces, 0) != 1) {
H A Dlog.c480 if (match_pattern_list(tag, log_verbose[i], 0) == 1) {
H A Dsshkey.c304 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 ||
305 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 ||
306 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1;
308 return match_pattern_list("ssh-rsa-cert-v01@openssh.com",
310 match_pattern_list("rsa-sha2-256-cert-v01@openssh.com",
312 match_pattern_list("rsa-sha2-512-cert-v01@openssh.com",
315 return match_pattern_list(keyname, sigalgs, 0) == 1;
370 if (match_pattern_list(
2036 if (match_pattern_list(key->cert->signature_type, allowed, 0) != 1)
H A Dsshconnect2.c1601 if (match_pattern_list(sshkey_ssh_name(key),
1608 if (match_pattern_list("rsa-sha2-512",
1611 if (match_pattern_list("rsa-sha2-256",
1616 if (match_pattern_list("rsa-sha2-512-cert-v01@openssh.com",
1619 if (match_pattern_list("rsa-sha2-256-cert-v01@openssh.com",
H A Dclientloop.c2404 match_pattern_list(alg, HOSTKEY_PROOF_RSA_ALGS, 0) != 1) {
2457 (match_pattern_list("rsa-sha2-256", hostkeyalgs, 0) == 1 ||
2458 match_pattern_list("rsa-sha2-512", hostkeyalgs, 0) == 1))
2460 return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
H A Dsession.c879 match_pattern_list(cp, allowlist, 0) != 1)
963 match_pattern_list(var_name, denylist, 0) != 1) {
1127 match_pattern_list(ocp,
H A Dauth2-pubkey.c160 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) {
H A Dssh_namespace.h416 #define match_pattern_list Fssh_match_pattern_list macro
H A Dreadconf.c744 r = match_pattern_list(ruser, arg, 0) == 1;
749 r = match_pattern_list(pw->pw_name, arg, 0) == 1;
764 r = match_pattern_list(criteria, arg, 0) == 1;
886 match_pattern_list(cp, ignored_unknown, 1) == 1)
H A Dssh.c407 if (match_pattern_list(*namep, rule->source_list, 1) != 1 ||
408 match_pattern_list(cname, rule->target_list, 1) != 1)
H A Dssh-agent.c1417 if (match_pattern_list(sk_provider,
1611 if (match_pattern_list(canonical_provider, allowed_providers, 0) != 1) {
H A Dsshd.c611 if (match_pattern_list(s, options.hostkeyalgorithms, 0) != 1) {
H A Dservconf.c1233 if (match_pattern_list(ci->rdomain, arg, 0) != 1)

Completed in 223 milliseconds