/external/dropbear/ |
common-session.c | 41 struct sshsession ses; /* GLOBAL */ variable in typeref:struct:sshsession 57 ses.remotehost = remotehost; 59 ses.sock = sock; 60 ses.maxfd = sock; 62 ses.connecttimeout = 0; 64 if (pipe(ses.signal_pipe) < 0) { 67 setnonblocking(ses.signal_pipe[0]); 68 setnonblocking(ses.signal_pipe[1]); 72 ses.writepayload = buf_new(MAX_TRANS_PAYLOAD_LEN); 73 ses.transseq = 0 [all...] |
process-packet.c | 50 type = buf_getbyte(ses.payload); 53 ses.lastpacket = type; 76 if (ses.requirenext != 0) { 77 if (ses.requirenext != type) { 80 ses.requirenext); 83 ses.requirenext = 0; 89 if (ses.ignorenext) { 91 ses.ignorenext = 0; 100 if ( !ses.authstate.authdone && type > MAX_UNAUTH_PACKET_TYPE ) { 105 if (ses.packettypes[i].type == 0) [all...] |
common-kex.c | 69 buf_putbyte(ses.writepayload, SSH_MSG_KEXINIT); 72 genrandom(buf_getwriteptr(ses.writepayload, 16), 16); 73 buf_incrwritepos(ses.writepayload, 16); 76 buf_put_algolist(ses.writepayload, sshkex); 79 buf_put_algolist(ses.writepayload, sshhostkey); 82 buf_put_algolist(ses.writepayload, sshciphers); 85 buf_put_algolist(ses.writepayload, sshciphers); 88 buf_put_algolist(ses.writepayload, sshhashes); 91 buf_put_algolist(ses.writepayload, sshhashes); 94 buf_put_algolist(ses.writepayload, sshcompress) [all...] |
packet.c | 56 dropbear_assert(!isempty(&ses.writequeue)); 59 writebuf = (buffer*)examine(&ses.writequeue); 64 written = write(ses.sock, buf_getptr(writebuf, len), len); 76 ses.remoteclosed(); 81 dequeue(&ses.writequeue); 93 * ses's buffer, decrypting the length if encrypted, decrypting the 102 blocksize = ses.keys->recv_algo_crypt->blocksize; 104 if (ses.readbuf == NULL || ses.readbuf->len < blocksize) { 113 if (ses.decryptreadbuf->len == 0) [all...] |
svr-auth.c | 44 ses.authstate.failcount = 0; 54 memset(&ses.authstate, 0, sizeof(ses.authstate)); 56 ses.authstate.authtypes |= AUTH_TYPE_PUBKEY; 60 ses.authstate.authtypes |= AUTH_TYPE_PASSWORD; 78 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_BANNER); 79 buf_putstring(ses.writepayload, buf_getptr(svr_opts.banner, 81 buf_putstring(ses.writepayload, "en", 2); 100 if (ses.authstate.authdone == 1) { 111 username = buf_getstring(ses.payload, &userlen) [all...] |
svr-authpasswd.c | 49 passwdcrypt = ses.authstate.pw->pw_passwd; 52 spasswd = getspnam(ses.authstate.printableuser); 68 ses.authstate.printableuser); 74 changepw = buf_getbool(ses.payload); 81 password = buf_getstring(ses.payload, &passwordlen); 92 ses.authstate.printableuser, 98 ses.authstate.printableuser,
|
svr-kex.c | 50 if (!ses.kexstate.recvkexinit) { 55 if (buf_getmpint(ses.payload, &dh_e) != DROPBEAR_SUCCESS) { 64 ses.requirenext = SSH_MSG_NEWKEYS; 89 buf_putbyte(ses.writepayload, SSH_MSG_KEXDH_REPLY); 90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey, 91 ses.newkeys->algo_hostkey); 94 buf_putmpint(ses.writepayload, &dh_f); 98 buf_put_sign(ses.writepayload, svr_opts.hostkey, 99 ses.newkeys->algo_hostkey, ses.hash, SHA1_HASH_SIZE) [all...] |
listener.c | 33 ses.listeners = (struct Listener**)m_malloc(sizeof(struct Listener*)); 34 ses.listensize = 1; 35 ses.listeners[0] = NULL; 45 for (i = 0; i < ses.listensize; i++) { 46 listener = ses.listeners[i]; 63 for (i = 0; i < ses.listensize; i++) { 64 listener = ses.listeners[i]; 87 for (i = 0; i < ses.listensize; i++) { 88 if (ses.listeners[i] == NULL) { 94 if (i == ses.listensize) [all...] |
cli-authinteract.c | 82 name = buf_getstring(ses.payload, NULL); 83 instruction = buf_getstring(ses.payload, NULL); 86 buf_eatstring(ses.payload); 88 num_prompts = buf_getint(ses.payload); 96 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_INFO_RESPONSE); 97 buf_putint(ses.writepayload, num_prompts); 113 prompt = buf_getstring(ses.payload, NULL); 116 echo = buf_getbool(ses.payload); 127 buf_putstring(ses.writepayload, response, response_len); 143 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST) [all...] |
cli-auth.c | 37 memset(&ses.authstate, 0, sizeof(ses.authstate)); 48 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 49 buf_putstring(ses.writepayload, cli_opts.username, 51 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 53 buf_putstring(ses.writepayload, "none", 4); /* 'none' method */ 67 if (ses.authstate.authdone) { 72 banner = buf_getstring(ses.payload, &bannerlen); 73 buf_eatstring(ses.payload); /* The language string */ 173 methods = buf_getstring(ses.payload, &methlen) [all...] |
cli-chansession.c | 64 type = buf_getstring(ses.payload, NULL); 65 wantreply = buf_getbool(ses.payload); 68 cli_ses.retval = buf_getint(ses.payload); 87 if (ses.chancount > 1) { 99 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); 100 buf_putint(ses.writepayload, channel->remotechan); 102 buf_putstring(ses.writepayload, type, strlen(type)); 178 buf_putint(ses.writepayload, 1); /* Just the terminator */ 179 buf_putbyte(ses.writepayload, 0); /* TTY_OP_END */ 183 bufpos1 = ses.writepayload->pos [all...] |
svr-session.c | 98 ses.connecttimeout = timeout.tv_sec + AUTH_TIMEOUT; 101 ses.remoteclosed = svr_remoteclosed; 104 ses.packettypes = svr_packettypes; 105 ses.buf_match_algo = svr_buf_match_algo; 107 ses.isserver = 1; 135 } else if (ses.authstate.authdone) { 139 ses.authstate.printableuser, format); 140 } else if (ses.authstate.printableuser) { 144 ses.authstate.printableuser, ses.authstate.failcount, format) [all...] |
cli-service.c | 40 buf_putbyte(ses.writepayload, SSH_MSG_SERVICE_REQUEST); 41 buf_putstring(ses.writepayload, servicename, strlen(servicename)); 56 servicename = buf_getstring(ses.payload, &len); 74 if (ses.authstate.authdone != 1) {
|
svr-service.c | 44 name = buf_getstring(ses.payload, &len); 59 if (ses.authstate.authdone != 1) { 82 buf_putbyte(ses.writepayload, SSH_MSG_SERVICE_ACCEPT); 83 buf_putstring(ses.writepayload, name, len);
|
svr-authpubkey.c | 67 testkey = (buf_getbool(ses.payload) == 0); 69 algo = buf_getstring(ses.payload, &algolen); 70 keybloblen = buf_getint(ses.payload); 71 keyblob = buf_getptr(ses.payload, keybloblen); 90 if (buf_get_pub_key(ses.payload, key, &type) == DROPBEAR_FAILURE) { 97 signbuf = buf_new(ses.payload->pos + 4 + SHA1_HASH_SIZE); 98 buf_putstring(signbuf, ses.session_id, SHA1_HASH_SIZE); 99 buf_putbytes(signbuf, ses.payload->data, ses.payload->pos); 104 if (buf_verify(ses.payload, key, buf_getptr(signbuf, signbuf->len) [all...] |
cli-authpubkey.c | 72 algotype = buf_getstring(ses.payload, &algolen); 79 remotelen = buf_getint(ses.payload); 106 buf_getptr(ses.payload, remotelen), remotelen) != 0) { 139 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 141 buf_putstring(ses.writepayload, cli_opts.username, 144 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 147 buf_putstring(ses.writepayload, AUTH_METHOD_PUBKEY, 150 buf_putbyte(ses.writepayload, realsign); 154 buf_putstring(ses.writepayload, algoname, algolen); 155 buf_put_pub_key(ses.writepayload, key, type) [all...] |
svr-tcpfwd.c | 80 reqname = buf_getstring(ses.payload, &namelen); 81 wantreply = buf_getbool(ses.payload); 114 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS); 122 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_FAILURE); 148 bindaddr = buf_getstring(ses.payload, &addrlen); 154 port = buf_getint(ses.payload); 182 bindaddr = buf_getstring(ses.payload, &addrlen); 188 port = buf_getint(ses.payload); 200 if (!ses.allowprivport && port < IPPORT_RESERVED) { 244 desthost = buf_getstring(ses.payload, &len) [all...] |
common-channel.c | 66 ses.channels = (struct Channel**)m_malloc(sizeof(struct Channel*)); 67 ses.chansize = 1; 68 ses.channels[0] = NULL; 69 ses.chancount = 0; 71 ses.chantypes = chantypes; 85 for (i = 0; i < ses.chansize; i++) { 86 if (ses.channels[i] != NULL) { 88 remove_channel(ses.channels[i]); 91 m_free(ses.channels); 109 for (i = 0; i < ses.chansize; i++) [all...] |
cli-authpasswd.c | 133 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 135 buf_putstring(ses.writepayload, cli_opts.username, 138 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 141 buf_putstring(ses.writepayload, AUTH_METHOD_PASSWORD, 144 buf_putbyte(ses.writepayload, 0); /* FALSE - so says the spec */ 146 buf_putstring(ses.writepayload, password, strlen(password));
|
cli-session.c | 129 ses.remoteclosed = cli_remoteclosed; 130 ses.buf_match_algo = cli_buf_match_algo; 133 ses.packettypes = cli_packettypes; 135 ses.isserver = 0; 144 if (ses.lastpacket == SSH_MSG_KEXINIT && cli_ses.kex_state == KEX_NOTHING) { 159 if (cli_ses.kex_state != KEX_NOTHING && ses.kexstate.recvkexinit == 0 160 && ses.kexstate.sentkexinit == 0) { 172 if (ses.kexstate.donefirstkex == 0) { 246 if (ses.chancount < 1 && !cli_opts.no_cmd) { 297 close(ses.sock) [all...] |
cli-channel.c | 48 datatype = buf_getint(ses.payload);
|
tcp-accept.c | 84 buf_putstring(ses.writepayload, addr, strlen(addr)); 85 buf_putint(ses.writepayload, port); 88 buf_putstring(ses.writepayload, ipstring, strlen(ipstring)); 90 buf_putint(ses.writepayload, atol(portstring)); 122 DROPBEAR_MAX_SOCKS, &errstring, &ses.maxfd);
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLSessionBindingEventTest.java | 38 SSLSession ses = new MySSLSession(); local 41 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, "test"); 45 if (!event.getSession().equals(ses)) { 60 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, null); 70 SSLSession ses = new MySSLSession(); local 71 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, "test"); 73 event = new SSLSessionBindingEvent(ses, null); 81 SSLSession ses = new MySSLSession(); local 82 SSLSessionBindingEvent event = new SSLSessionBindingEvent(ses, "test"); 83 assertEquals("Incorrect session", ses, event.getSession()) [all...] |
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 87 SSLSession ses = new MySSLSession(); local 89 HandshakeCompletedEvent event = new HandshakeCompletedEvent(soc, ses); 91 assertEquals(event.getCipherSuite(), ses.getCipherSuite()); 98 SSLSession ses = new MySSLSession(); local 99 HandshakeCompletedEvent event = new HandshakeCompletedEvent(soc, ses); 102 Certificate[] ses_certs = ses.getLocalCertificates(); 120 SSLSession ses = new MySSLSession(); local 121 HandshakeCompletedEvent event = new HandshakeCompletedEvent(soc, ses); 133 SSLSession ses = new MySSLSession(); local 134 HandshakeCompletedEvent event = new HandshakeCompletedEvent(soc, ses); 146 SSLSession ses = new MySSLSession(); local [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
SSLSessionContextImplTest.java | 52 SSLSession ses = context.getSession(ses1.getId()); local 53 assertSame(ses1, ses); 55 ses = context.getSession(ses3.getId()); 56 assertSame(ses3, ses);
|