match_pattern_list
ASSERT_INT_EQ(match_pattern_list("", "", 0), 0); /* no patterns */
ASSERT_INT_EQ(match_pattern_list("", "*", 0), 1);
ASSERT_INT_EQ(match_pattern_list("", "!*", 0), -1);
ASSERT_INT_EQ(match_pattern_list("", "!a,*", 0), 1);
ASSERT_INT_EQ(match_pattern_list("", "*,!a", 0), 1);
ASSERT_INT_EQ(match_pattern_list("", "a,!*", 0), -1);
ASSERT_INT_EQ(match_pattern_list("", "!*,a", 0), -1);
ASSERT_INT_EQ(match_pattern_list("a", "", 0), 0);
ASSERT_INT_EQ(match_pattern_list("a", "*", 0), 1);
ASSERT_INT_EQ(match_pattern_list("a", "!*", 0), -1);
ASSERT_INT_EQ(match_pattern_list("a", "!a", 0), -1);
ASSERT_INT_EQ(match_pattern_list("a", "!a,*", 0), -1);
ASSERT_INT_EQ(match_pattern_list("b", "!a,*", 0), 1);
ASSERT_INT_EQ(match_pattern_list("a", "*,!a", 0), -1);
ASSERT_INT_EQ(match_pattern_list("b", "*,!a", 0), 1);
ASSERT_INT_EQ(match_pattern_list("a", "a,!*", 0), -1);
ASSERT_INT_EQ(match_pattern_list("b", "a,!*", 0), -1);
ASSERT_INT_EQ(match_pattern_list("a", "a,!a", 0), -1);
ASSERT_INT_EQ(match_pattern_list("a", "!*,a", 0), -1);
ASSERT_INT_EQ(match_pattern_list("b", "!*,a", 0), -1);
ASSERT_INT_EQ(match_pattern_list("abc", "ABC", 0), 0);
ASSERT_INT_EQ(match_pattern_list("ABC", "abc", 0), 0);
ASSERT_INT_EQ(match_pattern_list("abc", "ABC", 1), 1);
ASSERT_INT_EQ(match_pattern_list("ABC", "abc", 1), 0);
match_pattern_list(cp, benchmark_pattern, 1) != 1;
if (match_pattern_list(pkalg, options.hostbased_accepted_algos, 0) != 1) {
if (match_pattern_list(pkalg, options.pubkey_accepted_algos, 0) != 1) {
c->bulk = type != NULL && match_pattern_list(type, classifier, 0) == 1;
match_pattern_list(alg, HOSTKEY_PROOF_RSA_ALGS, 0) != 1) {
if (match_pattern_list(version, check[i].pat, 0) == 1) {
if (match_pattern_list(tag, log_verbose[i], 0) == 1) {
return match_pattern_list(string, pattern, 0);
r = match_pattern_list(hostcopy, pattern, 1);
r = match_pattern_list(cp, filter, 0);
int match_pattern_list(const char *, const char *, int);
r = match_pattern_list(ruser, arg, 0) == 1;
r = match_pattern_list(pw->pw_name, arg, 0) == 1;
r = match_pattern_list(SSH_RELEASE, arg, 0) == 1;
match_pattern_list(criteria, arg, 0) == 1;
match_pattern_list(criteria, arg, 0) == 1;
r = match_pattern_list(criteria, arg, 0) == 1;
match_pattern_list(cp, ignored_unknown, 1) == 1)
if (match_pattern_list(ci->rdomain, arg, 0) != 1)
if (match_pattern_list(SSH_RELEASE, arg, 0) != 1)
match_pattern_list(cp, allowlist, 0) != 1)
match_pattern_list(ocp,
if (match_pattern_list(sk_provider,
if (match_pattern_list(canonical_provider, allowed_providers, 0) != 1) {
match_pattern_list(id->key->sk_application,
if (match_pattern_list(*namep, rule->source_list, 1) != 1 ||
match_pattern_list(cname, rule->target_list, 1) != 1)
(match_pattern_list("rsa-sha2-256", hostkeyalgs, 0) == 1 ||
match_pattern_list("rsa-sha2-512", hostkeyalgs, 0) == 1))
(match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", hostkeyalgs, 0) == 1 ||
match_pattern_list("rsa-sha2-256-cert-v01@openssh.com", hostkeyalgs, 0) == 1))
return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
if (match_pattern_list(sshkey_ssh_name(key), allowlist, 0) == 1)
if (match_pattern_list("rsa-sha2-512", allowlist, 0) == 1)
if (match_pattern_list("rsa-sha2-256", allowlist, 0) == 1)
if (match_pattern_list("rsa-sha2-512-cert-v01@openssh.com",
if (match_pattern_list("rsa-sha2-256-cert-v01@openssh.com",
if (match_pattern_list(s, options.hostkeyalgorithms, 0) != 1) {
if (match_pattern_list(key->cert->signature_type, allowed, 0) != 1)
return match_pattern_list("ssh-rsa", sigalgs, 0) == 1 ||
match_pattern_list("rsa-sha2-256", sigalgs, 0) == 1 ||
match_pattern_list("rsa-sha2-512", sigalgs, 0) == 1;
return match_pattern_list("ssh-rsa-cert-v01@openssh.com",
match_pattern_list("rsa-sha2-256-cert-v01@openssh.com",
match_pattern_list("rsa-sha2-512-cert-v01@openssh.com",
return match_pattern_list("sk-ecdsa-sha2-nistp256@openssh.com",
sigalgs, 0) == 1 || match_pattern_list(
return match_pattern_list(
sigalgs, 0) == 1 || match_pattern_list(
return match_pattern_list(keyname, sigalgs, 0) == 1;
if (match_pattern_list(
match_pattern_list(hashalg, HASHALG_ALLOWED, 0) == 1)
if (match_pattern_list(sigtype, RSA_SIGN_ALLOWED, 0) != 1) {
if (match_pattern_list(required_principal,
match_pattern_list(sig_namespace, sigopts->namespaces, 0) != 1) {