Searched refs:pkalg (Results 1 - 4 of 4) sorted by relevance
/freebsd-10.1-release/crypto/openssh/ |
H A D | auth2-hostbased.c | 61 char *pkalg, *cuser, *chost, *service; local 71 pkalg = packet_get_string(&alen); 77 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 78 cuser, chost, pkalg, slen); 86 pktype = key_type_from_name(pkalg); 90 "public key algorithm: %s", pkalg); 95 error("userauth_hostbased: cannot decode key: %s", pkalg); 118 buffer_put_string(&b, pkalg, alen); 141 free(pkalg);
|
H A D | ssh-keysign.c | 69 char *pkalg, *p; local 102 pkalg = buffer_get_string(&b, NULL); 105 pktype = key_type_from_name(pkalg); 112 free(pkalg);
|
H A D | auth2-pubkey.c | 78 char *pkalg, *userstyle; local 91 /* no explicit pkalg given */ 95 /* so we have to extract the pkalg from the pkblob */ 96 pkalg = buffer_get_string(&b, &alen); 99 pkalg = packet_get_string(&alen); 102 pktype = key_type_from_name(pkalg); 106 pkalg); 111 error("userauth_pubkey: cannot decode key: %s", pkalg); 150 buffer_put_cstring(&b, pkalg); 167 debug("test whether pkalg/pkblo [all...] |
H A D | sshconnect2.c | 581 char *pkalg, *fp; local 592 pkalg = buffer_get_string(&b, &alen); 595 pkalg = packet_get_string(&alen); 600 debug("Server accepts key: pkalg %s blen %u", pkalg, blen); 602 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { 603 debug("unknown pkalg %s", pkalg); 607 debug("no key from blob. pkalg %s", pkalg); 1518 char *chost, *pkalg, *p; local [all...] |
Completed in 117 milliseconds