summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2022-01-06 22:01:14 +0000
committerDamien Miller <djm@mindrot.org>2022-01-07 09:21:38 +1100
commitc2d9ced1da0276961d86690b3bd7ebdaca7fdbf7 (patch)
tree1e0e42403d4a87553281b19336cb51b4c889b9a8
parent7aa7b096cf2bafe2777085abdeed5ce00581f641 (diff)
downloadopenssh-git-c2d9ced1da0276961d86690b3bd7ebdaca7fdbf7.tar.gz
upstream: include rejected signature algorithm in error message
and not the (useless) key type; ok markus OpenBSD-Commit-ID: 4180b5ec7ab347b43f84e00b1972515296dab023
-rw-r--r--auth2-hostbased.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/auth2-hostbased.c b/auth2-hostbased.c
index 10f9ea14..36b9d2f5 100644
--- a/auth2-hostbased.c
+++ b/auth2-hostbased.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth2-hostbased.c,v 1.48 2021/12/19 22:12:07 djm Exp $ */
+/* $OpenBSD: auth2-hostbased.c,v 1.49 2022/01/06 22:01:14 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -108,8 +108,8 @@ userauth_hostbased(struct ssh *ssh, const char *method)
goto done;
}
if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) {
- logit_f("key type %s not in HostbasedAcceptedAlgorithms",
- sshkey_type(key));
+ logit_f("signature algorithm %s not in "
+ "HostbasedAcceptedAlgorithms", pkalg);
goto done;
}
if ((r = sshkey_check_cert_sigtype(key,