HomeSort by relevance Sort by last modified time
    Searched refs:ses (Results 1 - 25 of 41) sorted by null

1 2

  /external/dropbear/
common-session.c 41 struct sshsession ses; /* GLOBAL */ variable in typeref:struct:sshsession
57 ses.remotehost = remotehost;
59 ses.sock = sock;
60 ses.maxfd = sock;
62 ses.connecttimeout = 0;
64 if (pipe(ses.signal_pipe) < 0) {
67 setnonblocking(ses.signal_pipe[0]);
68 setnonblocking(ses.signal_pipe[1]);
72 ses.writepayload = buf_new(MAX_TRANS_PAYLOAD_LEN);
73 ses.transseq = 0
    [all...]
process-packet.c 50 type = buf_getbyte(ses.payload);
53 ses.lastpacket = type;
76 if (ses.requirenext != 0) {
77 if (ses.requirenext != type) {
80 ses.requirenext);
83 ses.requirenext = 0;
89 if (ses.ignorenext) {
91 ses.ignorenext = 0;
100 if ( !ses.authstate.authdone && type > MAX_UNAUTH_PACKET_TYPE ) {
105 if (ses.packettypes[i].type == 0)
    [all...]
common-kex.c 69 buf_putbyte(ses.writepayload, SSH_MSG_KEXINIT);
72 genrandom(buf_getwriteptr(ses.writepayload, 16), 16);
73 buf_incrwritepos(ses.writepayload, 16);
76 buf_put_algolist(ses.writepayload, sshkex);
79 buf_put_algolist(ses.writepayload, sshhostkey);
82 buf_put_algolist(ses.writepayload, sshciphers);
85 buf_put_algolist(ses.writepayload, sshciphers);
88 buf_put_algolist(ses.writepayload, sshhashes);
91 buf_put_algolist(ses.writepayload, sshhashes);
94 buf_put_algolist(ses.writepayload, sshcompress)
    [all...]
packet.c 56 dropbear_assert(!isempty(&ses.writequeue));
59 writebuf = (buffer*)examine(&ses.writequeue);
64 written = write(ses.sock, buf_getptr(writebuf, len), len);
76 ses.remoteclosed();
81 dequeue(&ses.writequeue);
93 * ses's buffer, decrypting the length if encrypted, decrypting the
102 blocksize = ses.keys->recv_algo_crypt->blocksize;
104 if (ses.readbuf == NULL || ses.readbuf->len < blocksize) {
113 if (ses.decryptreadbuf->len == 0)
    [all...]
svr-auth.c 44 ses.authstate.failcount = 0;
54 memset(&ses.authstate, 0, sizeof(ses.authstate));
56 ses.authstate.authtypes |= AUTH_TYPE_PUBKEY;
60 ses.authstate.authtypes |= AUTH_TYPE_PASSWORD;
78 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_BANNER);
79 buf_putstring(ses.writepayload, buf_getptr(svr_opts.banner,
81 buf_putstring(ses.writepayload, "en", 2);
100 if (ses.authstate.authdone == 1) {
111 username = buf_getstring(ses.payload, &userlen)
    [all...]
svr-authpasswd.c 49 passwdcrypt = ses.authstate.pw->pw_passwd;
52 spasswd = getspnam(ses.authstate.printableuser);
68 ses.authstate.printableuser);
74 changepw = buf_getbool(ses.payload);
81 password = buf_getstring(ses.payload, &passwordlen);
92 ses.authstate.printableuser,
98 ses.authstate.printableuser,
svr-kex.c 50 if (!ses.kexstate.recvkexinit) {
55 if (buf_getmpint(ses.payload, &dh_e) != DROPBEAR_SUCCESS) {
64 ses.requirenext = SSH_MSG_NEWKEYS;
89 buf_putbyte(ses.writepayload, SSH_MSG_KEXDH_REPLY);
90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey,
91 ses.newkeys->algo_hostkey);
94 buf_putmpint(ses.writepayload, &dh_f);
98 buf_put_sign(ses.writepayload, svr_opts.hostkey,
99 ses.newkeys->algo_hostkey, ses.hash, SHA1_HASH_SIZE)
    [all...]
listener.c 33 ses.listeners = (struct Listener**)m_malloc(sizeof(struct Listener*));
34 ses.listensize = 1;
35 ses.listeners[0] = NULL;
45 for (i = 0; i < ses.listensize; i++) {
46 listener = ses.listeners[i];
63 for (i = 0; i < ses.listensize; i++) {
64 listener = ses.listeners[i];
87 for (i = 0; i < ses.listensize; i++) {
88 if (ses.listeners[i] == NULL) {
94 if (i == ses.listensize)
    [all...]
cli-authinteract.c 82 name = buf_getstring(ses.payload, NULL);
83 instruction = buf_getstring(ses.payload, NULL);
86 buf_eatstring(ses.payload);
88 num_prompts = buf_getint(ses.payload);
96 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_INFO_RESPONSE);
97 buf_putint(ses.writepayload, num_prompts);
113 prompt = buf_getstring(ses.payload, NULL);
116 echo = buf_getbool(ses.payload);
127 buf_putstring(ses.writepayload, response, response_len);
143 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST)
    [all...]
cli-auth.c 37 memset(&ses.authstate, 0, sizeof(ses.authstate));
48 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST);
49 buf_putstring(ses.writepayload, cli_opts.username,
51 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION,
53 buf_putstring(ses.writepayload, "none", 4); /* 'none' method */
67 if (ses.authstate.authdone) {
72 banner = buf_getstring(ses.payload, &bannerlen);
73 buf_eatstring(ses.payload); /* The language string */
173 methods = buf_getstring(ses.payload, &methlen)
    [all...]
cli-chansession.c 64 type = buf_getstring(ses.payload, NULL);
65 wantreply = buf_getbool(ses.payload);
68 cli_ses.retval = buf_getint(ses.payload);
87 if (ses.chancount > 1) {
99 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST);
100 buf_putint(ses.writepayload, channel->remotechan);
102 buf_putstring(ses.writepayload, type, strlen(type));
178 buf_putint(ses.writepayload, 1); /* Just the terminator */
179 buf_putbyte(ses.writepayload, 0); /* TTY_OP_END */
183 bufpos1 = ses.writepayload->pos
    [all...]
svr-session.c 98 ses.connecttimeout = timeout.tv_sec + AUTH_TIMEOUT;
101 ses.remoteclosed = svr_remoteclosed;
104 ses.packettypes = svr_packettypes;
105 ses.buf_match_algo = svr_buf_match_algo;
107 ses.isserver = 1;
135 } else if (ses.authstate.authdone) {
139 ses.authstate.printableuser, format);
140 } else if (ses.authstate.printableuser) {
144 ses.authstate.printableuser, ses.authstate.failcount, format)
    [all...]
cli-service.c 40 buf_putbyte(ses.writepayload, SSH_MSG_SERVICE_REQUEST);
41 buf_putstring(ses.writepayload, servicename, strlen(servicename));
56 servicename = buf_getstring(ses.payload, &len);
74 if (ses.authstate.authdone != 1) {
svr-service.c 44 name = buf_getstring(ses.payload, &len);
59 if (ses.authstate.authdone != 1) {
82 buf_putbyte(ses.writepayload, SSH_MSG_SERVICE_ACCEPT);
83 buf_putstring(ses.writepayload, name, len);
svr-authpubkey.c 67 testkey = (buf_getbool(ses.payload) == 0);
69 algo = buf_getstring(ses.payload, &algolen);
70 keybloblen = buf_getint(ses.payload);
71 keyblob = buf_getptr(ses.payload, keybloblen);
90 if (buf_get_pub_key(ses.payload, key, &type) == DROPBEAR_FAILURE) {
97 signbuf = buf_new(ses.payload->pos + 4 + SHA1_HASH_SIZE);
98 buf_putstring(signbuf, ses.session_id, SHA1_HASH_SIZE);
99 buf_putbytes(signbuf, ses.payload->data, ses.payload->pos);
104 if (buf_verify(ses.payload, key, buf_getptr(signbuf, signbuf->len)
    [all...]
cli-authpubkey.c 72 algotype = buf_getstring(ses.payload, &algolen);
79 remotelen = buf_getint(ses.payload);
106 buf_getptr(ses.payload, remotelen), remotelen) != 0) {
139 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST);
141 buf_putstring(ses.writepayload, cli_opts.username,
144 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION,
147 buf_putstring(ses.writepayload, AUTH_METHOD_PUBKEY,
150 buf_putbyte(ses.writepayload, realsign);
154 buf_putstring(ses.writepayload, algoname, algolen);
155 buf_put_pub_key(ses.writepayload, key, type)
    [all...]
svr-tcpfwd.c 80 reqname = buf_getstring(ses.payload, &namelen);
81 wantreply = buf_getbool(ses.payload);
114 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS);
122 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_FAILURE);
148 bindaddr = buf_getstring(ses.payload, &addrlen);
154 port = buf_getint(ses.payload);
182 bindaddr = buf_getstring(ses.payload, &addrlen);
188 port = buf_getint(ses.payload);
200 if (!ses.allowprivport && port < IPPORT_RESERVED) {
244 desthost = buf_getstring(ses.payload, &len)
    [all...]
common-channel.c 66 ses.channels = (struct Channel**)m_malloc(sizeof(struct Channel*));
67 ses.chansize = 1;
68 ses.channels[0] = NULL;
69 ses.chancount = 0;
71 ses.chantypes = chantypes;
85 for (i = 0; i < ses.chansize; i++) {
86 if (ses.channels[i] != NULL) {
88 remove_channel(ses.channels[i]);
91 m_free(ses.channels);
109 for (i = 0; i < ses.chansize; i++)
    [all...]
cli-authpasswd.c 133 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST);
135 buf_putstring(ses.writepayload, cli_opts.username,
138 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION,
141 buf_putstring(ses.writepayload, AUTH_METHOD_PASSWORD,
144 buf_putbyte(ses.writepayload, 0); /* FALSE - so says the spec */
146 buf_putstring(ses.writepayload, password, strlen(password));
cli-session.c 129 ses.remoteclosed = cli_remoteclosed;
130 ses.buf_match_algo = cli_buf_match_algo;
133 ses.packettypes = cli_packettypes;
135 ses.isserver = 0;
144 if (ses.lastpacket == SSH_MSG_KEXINIT && cli_ses.kex_state == KEX_NOTHING) {
159 if (cli_ses.kex_state != KEX_NOTHING && ses.kexstate.recvkexinit == 0
160 && ses.kexstate.sentkexinit == 0) {
172 if (ses.kexstate.donefirstkex == 0) {
246 if (ses.chancount < 1 && !cli_opts.no_cmd) {
297 close(ses.sock)
    [all...]
cli-channel.c 48 datatype = buf_getint(ses.payload);
tcp-accept.c 84 buf_putstring(ses.writepayload, addr, strlen(addr));
85 buf_putint(ses.writepayload, port);
88 buf_putstring(ses.writepayload, ipstring, strlen(ipstring));
90 buf_putint(ses.writepayload, atol(portstring));
122 DROPBEAR_MAX_SOCKS, &errstring, &ses.maxfd);
svr-chansession.c 131 if (write(ses.signal_pipe[1], &ses.isserver, 1) == 1
167 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST);
168 buf_putint(ses.writepayload, channel->remotechan);
169 buf_putstring(ses.writepayload, "exit-status", 11);
170 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */
171 buf_putint(ses.writepayload, chansess->exit.exitstatus);
203 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST);
204 buf_putint(ses.writepayload, channel->remotechan);
205 buf_putstring(ses.writepayload, "exit-signal", 11)
    [all...]
cli-tcpfwd.c 129 buf_putbyte(ses.writepayload, SSH_MSG_GLOBAL_REQUEST);
130 buf_putstring(ses.writepayload, "tcpip-forward", 13);
131 buf_putbyte(ses.writepayload, 0);
138 buf_putstring(ses.writepayload, listenspec, strlen(listenspec));
139 buf_putint(ses.writepayload, port);
174 buf_eatstring(ses.payload);
176 origport = buf_getint(ses.payload);
203 ses.maxfd = MAX(ses.maxfd, sock);
  /libcore/luni/src/test/java/tests/api/javax/net/ssl/
SSLSessionBindingEventTest.java 50 SSLSession ses = new MySSLSession(); local
53 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, "test");
57 if (!event.getSession().equals(ses)) {
72 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, null);
88 SSLSession ses = new MySSLSession(); local
89 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, "test");
91 event = new SSLSessionBindingEvent(ses, null);
105 SSLSession ses = new MySSLSession(); local
106 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, "test");
107 assertEquals("Incorrect session", ses, event.getSession())
    [all...]

Completed in 742 milliseconds

1 2