diff options
author | djm@openbsd.org <djm@openbsd.org> | 2022-01-06 22:01:14 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2022-01-07 09:21:38 +1100 |
commit | c2d9ced1da0276961d86690b3bd7ebdaca7fdbf7 (patch) | |
tree | 1e0e42403d4a87553281b19336cb51b4c889b9a8 | |
parent | 7aa7b096cf2bafe2777085abdeed5ce00581f641 (diff) | |
download | openssh-git-c2d9ced1da0276961d86690b3bd7ebdaca7fdbf7.tar.gz |
upstream: include rejected signature algorithm in error message
and not the (useless) key type; ok markus
OpenBSD-Commit-ID: 4180b5ec7ab347b43f84e00b1972515296dab023
-rw-r--r-- | auth2-hostbased.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/auth2-hostbased.c b/auth2-hostbased.c index 10f9ea14..36b9d2f5 100644 --- a/auth2-hostbased.c +++ b/auth2-hostbased.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth2-hostbased.c,v 1.48 2021/12/19 22:12:07 djm Exp $ */ +/* $OpenBSD: auth2-hostbased.c,v 1.49 2022/01/06 22:01:14 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -108,8 +108,8 @@ userauth_hostbased(struct ssh *ssh, const char *method) goto done; } if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) { - logit_f("key type %s not in HostbasedAcceptedAlgorithms", - sshkey_type(key)); + logit_f("signature algorithm %s not in " + "HostbasedAcceptedAlgorithms", pkalg); goto done; } if ((r = sshkey_check_cert_sigtype(key, |