Searched refs:pktype (Results 1 – 5 of 5) sorted by relevance
/external/openssh/ |
D | auth2-hostbased.c | 66 int pktype; in userauth_hostbased() local 88 pktype = key_type_from_name(pkalg); in userauth_hostbased() 89 if (pktype == KEY_UNSPEC) { in userauth_hostbased() 100 if (key->type != pktype) { in userauth_hostbased() 102 "(received %d, expected %d)", key->type, pktype); in userauth_hostbased()
|
D | ssh-keysign.c | 80 int r, pktype, fail; in valid_request() local 123 pktype = sshkey_type_from_name(pkalg); in valid_request() 124 if (pktype == KEY_UNSPEC) in valid_request() 129 } else if (key->type != pktype) in valid_request()
|
D | auth2-pubkey.c | 85 int have_sig, pktype; in userauth_pubkey() local 106 pktype = key_type_from_name(pkalg); in userauth_pubkey() 107 if (pktype == KEY_UNSPEC) { in userauth_pubkey() 118 if (key->type != pktype) { in userauth_pubkey() 120 "(received %d, expected %d)", __func__, key->type, pktype); in userauth_pubkey()
|
D | sshconnect2.c | 580 int pktype, sent = 0; in input_userauth_pk_ok() local 603 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { in input_userauth_pk_ok() 611 if (key->type != pktype) { in input_userauth_pk_ok() 614 key->type, pktype); in input_userauth_pk_ok()
|
/external/curl/lib/vtls/ |
D | openssl.c | 944 int pktype; in cert_stuff() local 946 pktype = EVP_PKEY_id(priv_key); in cert_stuff() 948 pktype = priv_key->type; in cert_stuff() 950 if(pktype == EVP_PKEY_RSA) { in cert_stuff() 3129 int pktype; in get_cert_chain() local 3131 pktype = EVP_PKEY_id(pubkey); in get_cert_chain() 3133 pktype = pubkey->type; in get_cert_chain() 3135 switch(pktype) { in get_cert_chain()
|