Even if the same algorithms were used (e.g., using an RSA signature key as an RSA key to authenticate both ssh and IKE exchange), there could conceivably be problems depending on the exact format used to encode the signed data for each protocol... - Bill