HomeSort by relevance Sort by last modified time
    Searched refs:pkalg (Results 1 - 4 of 4) sorted by null

  /external/openssh/
auth2-hostbased.c 63 char *pkalg, *cuser, *chost, *service; local
73 pkalg = packet_get_string(&alen);
79 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d",
80 cuser, chost, pkalg, slen);
88 pktype = key_type_from_name(pkalg);
92 "public key algorithm: %s", pkalg);
97 error("userauth_hostbased: cannot decode key: %s", pkalg);
127 buffer_put_string(&b, pkalg, alen);
150 free(pkalg);
ssh-keysign.c 76 char *pkalg, *luser; local
116 if ((r = sshbuf_get_cstring(b, &pkalg, NULL)) != 0 ||
120 pktype = sshkey_type_from_name(pkalg);
128 free(pkalg);
auth2-pubkey.c 82 char *pkalg, *userstyle; local
95 /* no explicit pkalg given */
99 /* so we have to extract the pkalg from the pkblob */
100 pkalg = buffer_get_string(&b, &alen);
103 pkalg = packet_get_string(&alen);
106 pktype = key_type_from_name(pkalg);
110 pkalg);
115 error("userauth_pubkey: cannot decode key: %s", pkalg);
165 buffer_put_cstring(&b, pkalg);
186 debug("test whether pkalg/pkblob are acceptable")
    [all...]
sshconnect2.c 557 char *pkalg, *fp; local
568 pkalg = buffer_get_string(&b, &alen);
571 pkalg = packet_get_string(&alen);
576 debug("Server accepts key: pkalg %s blen %u", pkalg, blen);
578 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) {
579 debug("unknown pkalg %s", pkalg);
583 debug("no key from blob. pkalg %s", pkalg);
    [all...]

Completed in 287 milliseconds