HomeSort by relevance Sort by last modified time
    Searched refs:newkeys (Results 1 - 5 of 5) sorted by null

  /external/dropbear/
common-kex.c 247 * ses.newkeys is the new set of keys which are generated, these are only
248 * taken into use after both sides have sent a newkeys message */
280 C2S_keysize = ses.newkeys->trans_algo_crypt->keysize;
281 S2C_keysize = ses.newkeys->recv_algo_crypt->keysize;
289 C2S_keysize = ses.newkeys->recv_algo_crypt->keysize;
290 S2C_keysize = ses.newkeys->trans_algo_crypt->keysize;
300 recv_cipher = find_cipher(ses.newkeys->recv_algo_crypt->cipherdesc->name);
305 ses.newkeys->recv_algo_crypt->keysize, 0,
306 &ses.newkeys->recv_symmetric_struct) != CRYPT_OK) {
309 trans_cipher = find_cipher(ses.newkeys->trans_algo_crypt->cipherdesc->name)
    [all...]
svr-kex.c 91 ses.newkeys->algo_hostkey);
99 ses.newkeys->algo_hostkey, ses.hash, SHA1_HASH_SIZE);
session.h 132 struct key_context *newkeys; member in struct:sshsession
cli-kex.c 74 type = ses.newkeys->algo_hostkey;
229 algoname = signkey_name_from_type(ses.newkeys->algo_hostkey, &algolen);
common-session.c 89 ses.newkeys = NULL;

Completed in 485 milliseconds