summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Weisgerber <naddy@cvs.openbsd.org>2022-02-27 01:34:00 +0000
committerChristian Weisgerber <naddy@cvs.openbsd.org>2022-02-27 01:34:00 +0000
commit8eeea038b64fd69216520982e51f8c3823243df2 (patch)
tree252bce08d67b8ca70979c654a99500ed66f41a4e
parent6d783c0790a816cba949092aee967e2c823441a0 (diff)
include rejected signature algorithm in error message and not the
(useless) key type; ok djm@
-rw-r--r--usr.bin/ssh/auth2-pubkey.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/usr.bin/ssh/auth2-pubkey.c b/usr.bin/ssh/auth2-pubkey.c
index afde053dba5..115cf9ed696 100644
--- a/usr.bin/ssh/auth2-pubkey.c
+++ b/usr.bin/ssh/auth2-pubkey.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth2-pubkey.c,v 1.112 2021/12/19 22:12:30 djm Exp $ */
+/* $OpenBSD: auth2-pubkey.c,v 1.113 2022/02/27 01:33:59 naddy Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -163,8 +163,8 @@ userauth_pubkey(struct ssh *ssh, const char *method)
goto done;
}
if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) {
- logit_f("key type %s not in PubkeyAcceptedAlgorithms",
- sshkey_ssh_name(key));
+ logit_f("signature algorithm %s not in "
+ "PubkeyAcceptedAlgorithms", pkalg);
goto done;
}
if ((r = sshkey_check_cert_sigtype(key,