/external/openssh/ |
auth2-hostbased.c | 61 char *pkalg, *cuser, *chost, *service; local 71 pkalg = packet_get_string(&alen); 77 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 78 cuser, chost, pkalg, slen); 86 pktype = key_type_from_name(pkalg); 90 "public key algorithm: %s", pkalg); 95 error("userauth_hostbased: cannot decode key: %s", pkalg); 112 buffer_put_string(&b, pkalg, alen); 131 xfree(pkalg);
|
auth2-pubkey.c | 72 char *pkalg; local 85 /* no explicit pkalg given */ 89 /* so we have to extract the pkalg from the pkblob */ 90 pkalg = buffer_get_string(&b, &alen); 93 pkalg = packet_get_string(&alen); 96 pktype = key_type_from_name(pkalg); 100 pkalg); 105 error("userauth_pubkey: cannot decode key: %s", pkalg); 134 buffer_put_cstring(&b, pkalg); 149 debug("test whether pkalg/pkblob are acceptable") [all...] |
ssh-keysign.c | 69 char *pkalg, *p; local 102 pkalg = buffer_get_string(&b, NULL); 105 pktype = key_type_from_name(pkalg); 112 xfree(pkalg);
|
sshconnect2.c | 559 char *pkalg, *fp; local 570 pkalg = buffer_get_string(&b, &alen); 573 pkalg = packet_get_string(&alen); 578 debug("Server accepts key: pkalg %s blen %u", pkalg, blen); 580 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { 581 debug("unknown pkalg %s", pkalg); 585 debug("no key from blob. pkalg %s", pkalg); 1657 char *chost, *pkalg, *p; local [all...] |
monitor.c | 1296 buffer_skip_string(&b); /* pkalg * [all...] |