/freebsd-current/crypto/openssh/regress/unittests/match/ |
H A D | tests.c | 49 TEST_START("match_pattern_list"); 50 ASSERT_INT_EQ(match_pattern_list("", "", 0), 0); /* no patterns */ 51 ASSERT_INT_EQ(match_pattern_list("", "*", 0), 1); 52 ASSERT_INT_EQ(match_pattern_list("", "!*", 0), -1); 53 ASSERT_INT_EQ(match_pattern_list("", "!a,*", 0), 1); 54 ASSERT_INT_EQ(match_pattern_list("", "*,!a", 0), 1); 55 ASSERT_INT_EQ(match_pattern_list("", "a,!*", 0), -1); 56 ASSERT_INT_EQ(match_pattern_list("", "!*,a", 0), -1); 57 ASSERT_INT_EQ(match_pattern_list("a", "", 0), 0); 58 ASSERT_INT_EQ(match_pattern_list(" [all...] |
/freebsd-current/crypto/openssh/ |
H A D | match.h | 18 int match_pattern_list(const char *, const char *, int);
|
H A D | compat.c | 130 if (match_pattern_list(version, check[i].pat, 0) == 1) {
|
H A D | match.c | 122 match_pattern_list(const char *string, const char *pattern, int dolower) function 183 return match_pattern_list(string, pattern, 0); 200 r = match_pattern_list(hostcopy, pattern, 1); 338 r = match_pattern_list(cp, filter, 0);
|
H A D | auth2-hostbased.c | 103 if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) {
|
H A D | sshsig.c | 261 match_pattern_list(hashalg, HASHALG_ALLOWED, 0) == 1) 371 if (match_pattern_list(sigtype, RSA_SIGN_ALLOWED, 0) != 1) { 769 if (match_pattern_list(required_principal, 944 match_pattern_list(sig_namespace, sigopts->namespaces, 0) != 1) {
|
H A D | log.c | 480 if (match_pattern_list(tag, log_verbose[i], 0) == 1) {
|
H A D | sshkey.c | 304 return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 || 305 match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 || 306 match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1; 308 return match_pattern_list("ssh-rsa-cert-v01@openssh.com", 310 match_pattern_list("rsa-sha2-256-cert-v01@openssh.com", 312 match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", 315 return match_pattern_list(keyname, sigalgs, 0) == 1; 370 if (match_pattern_list( 2036 if (match_pattern_list(key->cert->signature_type, allowed, 0) != 1)
|
H A D | sshconnect2.c | 1601 if (match_pattern_list(sshkey_ssh_name(key), 1608 if (match_pattern_list("rsa-sha2-512", 1611 if (match_pattern_list("rsa-sha2-256", 1616 if (match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", 1619 if (match_pattern_list("rsa-sha2-256-cert-v01@openssh.com",
|
H A D | clientloop.c | 2404 match_pattern_list(alg, HOSTKEY_PROOF_RSA_ALGS, 0) != 1) { 2457 (match_pattern_list("rsa-sha2-256", hostkeyalgs, 0) == 1 || 2458 match_pattern_list("rsa-sha2-512", hostkeyalgs, 0) == 1)) 2460 return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
|
H A D | session.c | 879 match_pattern_list(cp, allowlist, 0) != 1) 963 match_pattern_list(var_name, denylist, 0) != 1) { 1127 match_pattern_list(ocp,
|
H A D | auth2-pubkey.c | 160 if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) {
|
H A D | ssh_namespace.h | 416 #define match_pattern_list Fssh_match_pattern_list macro
|
H A D | readconf.c | 744 r = match_pattern_list(ruser, arg, 0) == 1; 749 r = match_pattern_list(pw->pw_name, arg, 0) == 1; 764 r = match_pattern_list(criteria, arg, 0) == 1; 886 match_pattern_list(cp, ignored_unknown, 1) == 1)
|
H A D | ssh.c | 407 if (match_pattern_list(*namep, rule->source_list, 1) != 1 || 408 match_pattern_list(cname, rule->target_list, 1) != 1)
|
H A D | ssh-agent.c | 1417 if (match_pattern_list(sk_provider, 1611 if (match_pattern_list(canonical_provider, allowed_providers, 0) != 1) {
|
H A D | sshd.c | 611 if (match_pattern_list(s, options.hostkeyalgorithms, 0) != 1) {
|
H A D | servconf.c | 1233 if (match_pattern_list(ci->rdomain, arg, 0) != 1)
|