/external/openssh/ |
kexc25519c.c | 38 #include "kex.h" 52 struct kex *kex = ssh->kex; local 55 kexc25519_keygen(kex->c25519_client_key, kex->c25519_client_pubkey); 57 dump_digest("client private key:", kex->c25519_client_key, 58 sizeof(kex->c25519_client_key)); 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 62 sizeof(kex->c25519_client_pubkey))) != 0 | 75 struct kex *kex = ssh->kex; local [all...] |
kexc25519s.c | 37 #include "kex.h" 58 struct kex *kex = ssh->kex; local 74 if (kex->load_host_public_key == NULL || 75 kex->load_host_private_key == NULL) { 79 server_host_public = kex->load_host_public_key(kex->hostkey_type, 80 kex->hostkey_nid, ssh); 81 server_host_private = kex->load_host_private_key(kex->hostkey_type [all...] |
kexdhc.c | 42 #include "kex.h" 57 struct kex *kex = ssh->kex; local 61 switch (kex->kex_type) { 63 kex->dh = dh_new_group1(); 66 kex->dh = dh_new_group14(); 72 if (kex->dh == NULL) { 77 if ((r = dh_gen_key(kex->dh, kex->we_need * 8)) != 0 | 99 struct kex *kex = ssh->kex; local [all...] |
kexdhs.c | 41 #include "kex.h" 57 struct kex *kex = ssh->kex; local 61 switch (kex->kex_type) { 63 kex->dh = dh_new_group1(); 66 kex->dh = dh_new_group14(); 72 if (kex->dh == NULL) { 76 if ((r = dh_gen_key(kex->dh, kex->we_need * 8)) != 0 90 struct kex *kex = ssh->kex; local [all...] |
kexecdhc.c | 42 #include "kex.h" 57 struct kex *kex = ssh->kex; local 63 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 84 kex->ec_client_key = client_key; 85 kex->ec_group = group; 86 client_key = NULL; /* owned by the kex */ 101 struct kex *kex = ssh->kex local [all...] |
kexecdhs.c | 40 #include "kex.h" 64 struct kex *kex = ssh->kex; local 78 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 93 if (kex->load_host_public_key == NULL || 94 kex->load_host_private_key == NULL) { 98 server_host_public = kex->load_host_public_key(kex->hostkey_type, 99 kex->hostkey_nid, ssh) [all...] |
kexgexc.c | 44 #include "kex.h" 60 struct kex *kex = ssh->kex; local 64 nbits = dh_estimate(kex->dh_need * 8); 66 kex->min = DH_GRP_MIN; 67 kex->max = DH_GRP_MAX; 68 kex->nbits = nbits; 70 kex->nbits = MIN(kex->nbits, 4096) 95 struct kex *kex = ssh->kex; local 149 struct kex *kex = ssh->kex; local [all...] |
kexgexs.c | 43 #include "kex.h" 73 struct kex *kex = ssh->kex; local 83 kex->nbits = nbits; 84 kex->min = min; 85 kex->max = max; 91 if (kex->max < kex->min || kex->nbits < kex->min | 126 struct kex *kex = ssh->kex; local [all...] |
packet.h | 40 struct kex; 57 struct kex *kex; member in struct:ssh
|
ssh_api.c | 47 * stubs for the server side implementation of kex. 97 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { 101 ssh->kex->server = is_server; 104 ssh->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 105 ssh->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server; 106 ssh->kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; 107 ssh->kex->kex[KEX_DH_GEX_SHA256] = kexgex_server 398 struct kex *kex = ssh->kex; local [all...] |
monitor_wrap.c | 56 #include "kex.h" 223 struct kex *kex = *pmonitor->m_pkex; local 229 buffer_put_int(&m, kex->host_key_index(key, 0, active_state));
|
kex.c | 1 /* $OpenBSD: kex.c,v 1.109 2015/07/30 00:01:34 djm Exp $ */ 46 #include "kex.h" 136 /* Validate KEX method name list */ 149 error("Unsupported KEX algorithm \"%.100s\"", p); 154 debug3("kex names ok: [%s]", names); 267 /* extract kex init proposal strings */ 273 /* first kex follows / reserved */ 306 error("Hm, kex protocol error: type %d seq %u", type, seq); 337 struct kex *kex = ssh->kex local 357 struct kex *kex = ssh->kex; local 387 struct kex *kex = ssh->kex; local 438 struct kex *kex; local 649 struct kex *kex = ssh->kex; local 762 struct kex *kex = ssh->kex; local 827 struct kex *kex = ssh->kex; local [all...] |
kex.h | 1 /* $OpenBSD: kex.h,v 1.73 2015/07/30 00:01:34 djm Exp $ */ 124 struct kex { struct 151 int (*kex[KEX_MAX])(struct ssh *); member in struct:kex 152 /* kex specific state */ 166 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); 169 void kex_free(struct kex *);
|
sshd.c | 105 #include "kex.h" 665 /* Store a pointer to the kex for later rekeying */ 666 pmonitor->m_pkex = &active_state->kex; 2551 struct kex *kex; local [all...] |
monitor.c | 75 #include "kex.h" 707 * Supported KEX types use SHA1 (20 bytes), SHA256 (32 bytes), 713 * XXX perform similar check for KEX signature requests too? 715 * than the full kex structure... 765 is_proof ? "KEX" : "hostkey proof", signature, siglen); 1851 struct kex *kex; local [all...] |
packet.c | 77 #include "kex.h" 962 /* move newkeys from kex to state */ 963 if ((state->newkeys[mode] = ssh->kex->newkeys[mode]) == NULL) 965 ssh->kex->newkeys[mode] = NULL; 2580 struct kex *kex; local [all...] |
sshconnect2.c | 57 #include "kex.h" 160 struct kex *kex; local 203 kex = active_state->kex; 205 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; 206 kex->kex[KEX_DH_GRP14_SHA1] = kexdh_client; 207 kex->kex[KEX_DH_GEX_SHA1] = kexgex_client [all...] |
/external/libjpeg-turbo/ |
jcarith.c | 595 int tbl, k, ke, kex; local 629 for (kex = ke; kex > 0; kex--) 630 if ((v = (*block)[jpeg_natural_order[kex]]) >= 0) { 640 if (k > kex)
|
jdarith.c | 436 int tbl, k, kex; local 456 for (kex = cinfo->Se; kex > 0; kex--) 457 if ((*block)[jpeg_natural_order[kex]]) break; 461 if (k > kex)
|