/external/dropbear/ |
cli-chansession.c | 99 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); 100 buf_putint(ses.writepayload, channel->remotechan); 102 buf_putstring(ses.writepayload, type, strlen(type)); 178 buf_putint(ses.writepayload, 1); /* Just the terminator */ 179 buf_putbyte(ses.writepayload, 0); /* TTY_OP_END */ 183 bufpos1 = ses.writepayload->pos; 184 buf_putint(ses.writepayload, 0); /* A placeholder for the final length */ 223 buf_putbyte(ses.writepayload, sshcode); 224 buf_putint(ses.writepayload, value); 227 buf_putbyte(ses.writepayload, 0); /* THE END, aka TTY_OP_END * [all...] |
cli-authinteract.c | 96 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_INFO_RESPONSE); 97 buf_putint(ses.writepayload, num_prompts); 127 buf_putstring(ses.writepayload, response, response_len); 143 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 146 buf_putstring(ses.writepayload, cli_opts.username, 150 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 154 buf_putstring(ses.writepayload, AUTH_METHOD_INTERACT, 158 buf_putstring(ses.writepayload, "", 0); 161 buf_putstring(ses.writepayload, "", 0);
|
cli-authpasswd.c | 133 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 135 buf_putstring(ses.writepayload, cli_opts.username, 138 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 141 buf_putstring(ses.writepayload, AUTH_METHOD_PASSWORD, 144 buf_putbyte(ses.writepayload, 0); /* FALSE - so says the spec */ 146 buf_putstring(ses.writepayload, password, strlen(password));
|
cli-authpubkey.c | 139 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 141 buf_putstring(ses.writepayload, cli_opts.username, 144 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 147 buf_putstring(ses.writepayload, AUTH_METHOD_PUBKEY, 150 buf_putbyte(ses.writepayload, realsign); 154 buf_putstring(ses.writepayload, algoname, algolen); 155 buf_put_pub_key(ses.writepayload, key, type); 161 sigbuf = buf_new(4 + SHA1_HASH_SIZE + ses.writepayload->len); 163 buf_putbytes(sigbuf, ses.writepayload->data, ses.writepayload->len) [all...] |
svr-kex.c | 89 buf_putbyte(ses.writepayload, SSH_MSG_KEXDH_REPLY); 90 buf_put_pub_key(ses.writepayload, svr_opts.hostkey, 94 buf_putmpint(ses.writepayload, &dh_f); 98 buf_put_sign(ses.writepayload, svr_opts.hostkey,
|
cli-service.c | 40 buf_putbyte(ses.writepayload, SSH_MSG_SERVICE_REQUEST); 41 buf_putstring(ses.writepayload, servicename, strlen(servicename));
|
svr-service.c | 82 buf_putbyte(ses.writepayload, SSH_MSG_SERVICE_ACCEPT); 83 buf_putstring(ses.writepayload, name, len);
|
tcp-accept.c | 84 buf_putstring(ses.writepayload, addr, strlen(addr)); 85 buf_putint(ses.writepayload, port); 88 buf_putstring(ses.writepayload, ipstring, strlen(ipstring)); 90 buf_putint(ses.writepayload, atol(portstring));
|
common-channel.c | 361 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_CLOSE); 362 buf_putint(ses.writepayload, channel->remotechan); 380 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_EOF); 381 buf_putint(ses.writepayload, channel->remotechan); 601 ses.writepayload->size - 1 - 4 - 4 - (isextended ? 4 : 0)); 608 buf_putbyte(ses.writepayload, 610 buf_putint(ses.writepayload, channel->remotechan); 612 buf_putint(ses.writepayload, SSH_EXTENDED_DATA_STDERR); 615 size_pos = ses.writepayload->pos; 616 buf_putint(ses.writepayload, 0) [all...] |
process-packet.c | 138 buf_putbyte(ses.writepayload, SSH_MSG_UNIMPLEMENTED); 141 buf_putint(ses.writepayload, ses.recvseq - 1);
|
cli-tcpfwd.c | 129 buf_putbyte(ses.writepayload, SSH_MSG_GLOBAL_REQUEST); 130 buf_putstring(ses.writepayload, "tcpip-forward", 13); 131 buf_putbyte(ses.writepayload, 0); 138 buf_putstring(ses.writepayload, listenspec, strlen(listenspec)); 139 buf_putint(ses.writepayload, port);
|
svr-auth.c | 78 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_BANNER); 79 buf_putstring(ses.writepayload, buf_getptr(svr_opts.banner, 81 buf_putstring(ses.writepayload, "en", 2); 299 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_FAILURE); 316 buf_putstring(ses.writepayload, buf_getptr(typebuf, typebuf->len), 324 buf_putbyte(ses.writepayload, partial ? 1 : 0); 356 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_SUCCESS);
|
common-kex.c | 69 buf_putbyte(ses.writepayload, SSH_MSG_KEXINIT); 72 genrandom(buf_getwriteptr(ses.writepayload, 16), 16); 73 buf_incrwritepos(ses.writepayload, 16); 76 buf_put_algolist(ses.writepayload, sshkex); 79 buf_put_algolist(ses.writepayload, sshhostkey); 82 buf_put_algolist(ses.writepayload, sshciphers); 85 buf_put_algolist(ses.writepayload, sshciphers); 88 buf_put_algolist(ses.writepayload, sshhashes); 91 buf_put_algolist(ses.writepayload, sshhashes); 94 buf_put_algolist(ses.writepayload, sshcompress) [all...] |
cli-auth.c | 48 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST); 49 buf_putstring(ses.writepayload, cli_opts.username, 51 buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION, 53 buf_putstring(ses.writepayload, "none", 4); /* 'none' method */
|
packet.c | 408 /* encrypt the writepayload, putting into writebuf, ready for write_packet() 418 TRACE(("encrypt_packet type is %d", ses.writepayload->data[0])) 425 clearwritebuf = buf_new((ses.writepayload->len+4+1) + MIN_PACKET_LEN + 3 433 buf_setpos(ses.writepayload, 0); 438 buf_compress(clearwritebuf, ses.writepayload, ses.writepayload->len); 442 memcpy(buf_getwriteptr(clearwritebuf, ses.writepayload->len), 443 buf_getptr(ses.writepayload, ses.writepayload->len), 444 ses.writepayload->len) [all...] |
svr-chansession.c | 167 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); 168 buf_putint(ses.writepayload, channel->remotechan); 169 buf_putstring(ses.writepayload, "exit-status", 11); 170 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */ 171 buf_putint(ses.writepayload, chansess->exit.exitstatus); 203 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); 204 buf_putint(ses.writepayload, channel->remotechan); 205 buf_putstring(ses.writepayload, "exit-signal", 11); 206 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */ 207 buf_putstring(ses.writepayload, signame, strlen(signame)) [all...] |
svr-tcpfwd.c | 114 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS); 122 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_FAILURE);
|
svr-x11fwd.c | 196 buf_putstring(ses.writepayload, ipstring, strlen(ipstring)); 197 buf_putint(ses.writepayload, addr->sin_port);
|
svr-authpubkey.c | 142 buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_PK_OK); 143 buf_putstring(ses.writepayload, algo, algolen); 144 buf_putstring(ses.writepayload, keyblob, keybloblen);
|
session.h | 102 buffer *writepayload; /* Unencrypted payload to write - this is used member in struct:sshsession
|
cli-kex.c | 53 buf_putbyte(ses.writepayload, SSH_MSG_KEXDH_INIT); 54 buf_putmpint(ses.writepayload, cli_ses.dh_e);
|
common-session.c | 72 ses.writepayload = buf_new(MAX_TRANS_PAYLOAD_LEN);
|