Searched refs:SSH_BUG_RSASIGMD5 (Results 1 – 8 of 8) sorted by relevance
106 SSH_BUG_RSASIGMD5|SSH_BUG_HBSERVICE| in compat_datafellows()110 SSH_BUG_RSASIGMD5|SSH_BUG_HBSERVICE| in compat_datafellows()121 SSH_BUG_PKOK|SSH_BUG_RSASIGMD5| in compat_datafellows()129 SSH_BUG_RSASIGMD5|SSH_BUG_OPENFAILURE| in compat_datafellows()135 SSH_BUG_RSASIGMD5|SSH_BUG_OPENFAILURE| in compat_datafellows()140 SSH_BUG_RSASIGMD5|SSH_BUG_FIRSTKEX }, in compat_datafellows()141 { "2.3.*", SSH_BUG_DEBUG|SSH_BUG_RSASIGMD5| in compat_datafellows()271 if (!(datafellows & SSH_BUG_RSASIGMD5)) in compat_pkalg_proposal()
48 #define SSH_BUG_RSASIGMD5 0x00002000 macro
106 (datafellows & SSH_BUG_RSASIGMD5) != 0) { in userauth_hostbased()
124 (datafellows & SSH_BUG_RSASIGMD5) != 0) { in userauth_pubkey()
677 if ((datafellows & SSH_BUG_RSASIGMD5) != 0) in ssh_exchange_identification()
1149 (datafellows & SSH_BUG_RSASIGMD5) != 0) in mm_answer_keyallowed()
456 if ((ssh->compat & SSH_BUG_RSASIGMD5) != 0) { in sshd_exchange_identification()
1469 (datafellows & SSH_BUG_RSASIGMD5) != 0) { in try_identity()