)
var (
- sshOpLocker = sync.Mutex{}
- SSH_UNKNOWN_KEY_TYPE = fmt.Errorf("unknown key type")
+ sshOpLocker = sync.Mutex{}
+ SSHUnknownKeyType = fmt.Errorf("unknown key type")
)
type KeyType int
return "", 0, fmt.Errorf("public key check failed with error '%s': %s", err, stderr)
}
if strings.HasSuffix(stdout, "is not a public key file.") {
- return "", 0, SSH_UNKNOWN_KEY_TYPE
+ return "", 0, SSHUnknownKeyType
}
fields := strings.Split(stdout, " ")
if len(fields) < 4 {
pkey, err := ssh.ParsePublicKey(raw)
if err != nil {
if strings.HasPrefix(err.Error(), "ssh: unknown key algorithm") {
- return "", 0, SSH_UNKNOWN_KEY_TYPE
+ return "", 0, SSHUnknownKeyType
}
return "", 0, err
}
for name, pubkey := range keys {
keyTypeN, lengthN, errN := SSHNativeParsePublicKey(pubkey)
if errN != nil {
- if errN != SSH_UNKNOWN_KEY_TYPE {
+ if errN != SSHUnknownKeyType {
t.Errorf("error parsing public key '%s': %s", name, errN)
continue
}
t.Errorf("error parsing public key '%s': %s", name, errK)
continue
}
- // we know that ed25519 is currently not supported by native and returns SSH_UNKNOWN_KEY_TYPE
- if (keyTypeN != keyTypeK || lengthN != lengthK) && errN != SSH_UNKNOWN_KEY_TYPE {
+ // we know that ed25519 is currently not supported by native and returns SSHUnknownKeyType
+ if (keyTypeN != keyTypeK || lengthN != lengthK) && errN != SSHUnknownKeyType {
t.Errorf("key mismatch for '%s': native: %s(%d), ssh-keygen: %s(%d)", name, keyTypeN, lengthN, keyTypeK, lengthK)
}
}