HomeSort by relevance Sort by last modified time
    Searched defs:ssh (Results 1 - 25 of 35) sorted by null

1 2

  /external/openssh/
audit-linux.c 102 struct ssh *ssh = active_state; /* XXX */ local
119 ssh_remote_ipaddr(ssh), "sshd", 0);
dispatch.c 44 struct ssh *ssh = active_state; /* XXX */ local
50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 ||
51 (r = sshpkt_put_u32(ssh, seq)) != 0 ||
52 (r = sshpkt_send(ssh)) != 0 ||
53 (r = ssh_packet_write_wait(ssh)) != 0)
54 sshpkt_fatal(ssh, __func__, r);
59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh)
66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt
    [all...]
kexc25519c.c 50 kexc25519_client(struct ssh *ssh)
52 struct kex *kex = ssh->kex;
60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 ||
61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey,
63 (r = sshpkt_send(ssh)) != 0)
67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply);
74 struct ssh *ssh = ctxt; local
75 struct kex *kex = ssh->kex
    [all...]
kexc25519s.c 47 kexc25519_server(struct ssh *ssh)
50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init);
57 struct ssh *ssh = ctxt; local
58 struct kex *kex = ssh->kex;
80 kex->hostkey_nid, ssh);
82 kex->hostkey_nid, ssh);
88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 ||
89 (r = sshpkt_get_end(ssh)) != 0
    [all...]
kexdhc.c 55 kexdh_client(struct ssh *ssh)
57 struct kex *kex = ssh->kex;
85 (r = sshpkt_start(ssh, SSH2_MSG_KEXDH_INIT)) != 0 ||
86 (r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 ||
87 (r = sshpkt_send(ssh)) != 0)
96 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_REPLY, &input_kex_dh);
105 struct ssh *ssh = ctxt; local
106 struct kex *kex = ssh->kex
    [all...]
kexdhs.c 55 kexdh_server(struct ssh *ssh)
57 struct kex *kex = ssh->kex;
87 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_INIT, &input_kex_dh_init);
96 struct ssh *ssh = ctxt; local
97 struct kex *kex = ssh->kex;
112 kex->hostkey_nid, ssh);
114 kex->hostkey_nid, ssh);
125 if ((r = sshpkt_get_bignum2(ssh, dh_client_pub)) != 0 |
    [all...]
kexecdhc.c 55 kexecdh_client(struct ssh *ssh)
57 struct kex *kex = ssh->kex;
74 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 ||
75 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 ||
76 (r = sshpkt_send(ssh)) != 0)
89 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_ecdh_reply);
100 struct ssh *ssh = ctxt; local
101 struct kex *kex = ssh->kex
    [all...]
kexecdhs.c 53 kexecdh_server(struct ssh *ssh)
56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init);
63 struct ssh *ssh = ctxt; local
64 struct kex *kex = ssh->kex;
99 kex->hostkey_nid, ssh);
101 kex->hostkey_nid, ssh);
110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 ||
111 (r = sshpkt_get_end(ssh)) != 0
    [all...]
auth2-hostbased.c 47 #include "ssh-gss.h"
118 service = datafellows & SSH_BUG_HBSERVICE ? "ssh-userauth" :
163 struct ssh *ssh = active_state; /* XXX */ local
172 resolvedname = auth_get_canonical_hostname(ssh, options.use_dns);
173 ipaddr = ssh_remote_ipaddr(ssh);
kexgexc.c 58 kexgex_client(struct ssh *ssh)
60 struct kex *kex = ssh->kex;
72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 ||
73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 ||
74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 ||
75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 ||
76 (r = sshpkt_send(ssh)) != 0)
84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP,
94 struct ssh *ssh = ctxt local
148 struct ssh *ssh = ctxt; local
    [all...]
kexgexs.c 49 #include "ssh-gss.h"
61 kexgex_server(struct ssh *ssh)
63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST,
72 struct ssh *ssh = ctxt; local
73 struct kex *kex = ssh->kex;
78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 ||
79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 ||
80 (r = sshpkt_get_u32(ssh, &max)) != 0 |
125 struct ssh *ssh = ctxt; local
    [all...]
packet.h 13 * called by a name other than "ssh" or "Secure Shell".
52 struct ssh { struct
84 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *,
87 struct ssh *ssh_alloc_session_state(void);
88 struct ssh *ssh_packet_set_connection(struct ssh *, int, int);
89 void ssh_packet_set_timeout(struct ssh *, int, int);
90 int ssh_packet_stop_discard(struct ssh *);
91 int ssh_packet_connection_af(struct ssh *);
92 void ssh_packet_set_nonblocking(struct ssh *);
    [all...]
auth-options.c 10 * called by a name other than "ssh" or "Secure Shell".
124 struct ssh *ssh = active_state; /* XXX */ local
278 const char *remote_ip = ssh_remote_ipaddr(ssh);
280 ssh, options.use_dns);
462 struct ssh *ssh = active_state; /* XXX */ local
536 remote_ip = ssh_remote_ipaddr(ssh);
auth.c 72 #include "ssh-gss.h"
91 * Check if the user is allowed to log in via ssh. If user is listed
102 struct ssh *ssh = active_state; /* XXX */ local
189 hostname = auth_get_canonical_hostname(ssh, options.use_dns);
190 ipaddr = ssh_remote_ipaddr(ssh);
291 struct ssh *ssh = active_state; /* XXX */ local
318 ssh_remote_ipaddr(ssh),
319 ssh_remote_port(ssh),
349 struct ssh *ssh = active_state; \/* XXX *\/ local
367 struct ssh *ssh = active_state; \/* XXX *\/ local
635 struct ssh *ssh = active_state; \/* XXX *\/ local
    [all...]
auth2.c 55 #include "ssh-gss.h"
189 if (strcmp(service, "ssh-userauth") == 0) {
215 struct ssh *ssh = active_state; /* XXX */ local
237 if (authctxt->pw && strcmp(service, "ssh-connection")==0) {
252 ssh_packet_set_log_preamble(ssh, "%suser %s",
299 struct ssh *ssh = active_state; /* XXX */ local
361 ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
ssh_api.c 34 int _ssh_exchange_banner(struct ssh *);
35 int _ssh_send_banner(struct ssh *, char **);
36 int _ssh_read_banner(struct ssh *, char **);
37 int _ssh_order_hostkeyalgs(struct ssh *);
38 int _ssh_verify_host_key(struct sshkey *, struct ssh *);
39 struct sshkey *_ssh_host_public_key(int, int, struct ssh *);
40 struct sshkey *_ssh_host_private_key(int, int, struct ssh *);
73 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params)
76 struct ssh *ssh; local
    [all...]
monitor_wrap.c 49 #include "ssh.h"
73 #include "ssh-gss.h"
471 struct ssh *ssh = active_state; /* XXX */ local
477 if ((r = ssh_packet_get_state(ssh, m)) != 0)
serverloop.c 12 * called by a name other than "ssh" or "Secure Shell".
284 struct ssh *ssh = active_state; /* XXX */ local
293 ssh_remote_ipaddr(ssh), ssh_remote_port(ssh));
300 ssh_remote_ipaddr(ssh),
301 ssh_remote_port(ssh), strerror(errno));
638 struct ssh *ssh = active_state; /* XXX */ local
650 while (ssh_packet_remaining(ssh) > 0)
    [all...]
auth-pam.c 103 #include "ssh-gss.h"
625 struct ssh *ssh = active_state; /* XXX */ local
646 pam_rhost = auth_get_canonical_hostname(ssh, options.use_dns);
660 debug("PAM: setting PAM_TTY to \"ssh\"");
661 sshpam_err = pam_set_item(sshpam_handle, PAM_TTY, "ssh");
717 struct ssh *ssh = active_state; /* XXX */ local
804 auth_get_canonical_hostname(ssh, options.use_dns));
1089 * during the ssh authentication process
    [all...]
kex.c 66 static int kex_choose_conf(struct ssh *);
328 struct ssh *ssh = active_state; /* XXX */ local
332 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 ||
333 (r = sshpkt_put_u32(ssh, seq)) != 0 ||
334 (r = sshpkt_send(ssh)) != 0)
340 kex_reset_dispatch(struct ssh *ssh)
342 ssh_dispatch_range(ssh, SSH2_MSG_TRANSPORT_MIN,
347 kex_send_ext_info(struct ssh *ssh
388 struct ssh *ssh = ctxt; local
427 struct ssh *ssh = ctxt; local
480 struct ssh *ssh = ctxt; local
    [all...]
monitor.c 70 #include "ssh.h"
98 #include "ssh-gss.h"
286 struct ssh *ssh = active_state; /* XXX */ local
360 ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
598 struct ssh *ssh = active_state; /* XXX */ local
636 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
666 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
700 struct ssh *ssh = active_state; /* XXX * local
1401 struct ssh *ssh = active_state; \/* XXX *\/ local
1589 struct ssh *ssh = active_state; \/* XXX *\/ local
    [all...]
  /external/devlib/devlib/utils/
ssh.py 41 ssh = None variable
46 logger = logging.getLogger('ssh')
57 else: # ssh
216 command = '{} {} {} {}@{} {}'.format(ssh, keyfile_string, port_string, self.username, self.host, command)
    [all...]
  /external/libnfnetlink/src/
libnfnetlink.c 343 struct nfnl_subsys_handle *ssh; local
353 ssh = &nfnlh->subsys[subsys_id];
354 if (ssh->cb) {
359 ssh->cb = calloc(cb_count, sizeof(*(ssh->cb)));
360 if (!ssh->cb)
363 ssh->nfnlh = nfnlh;
364 ssh->cb_count = cb_count;
365 ssh->subscriptions = subscriptions;
366 ssh->subsys_id = subsys_id
1247 const struct nfnl_subsys_handle *ssh; local
1295 struct nfnl_subsys_handle *ssh; local
1368 struct nfnl_subsys_handle *ssh; local
    [all...]
  /external/webrtc/webrtc/modules/audio_coding/codecs/isac/fix/source/
lpc_masking_model.c 540 int sh_lo, sh_hi, sh, ssh, shMem; local
872 ssh = sh_lo >> 1; // sqrt_nrg is in Qssh.
873 sh = ssh - 14;
880 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator)
882 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft)
883 sh = ssh-shft-7;
921 ssh = sh_hi >> 1; // |sqrt_nrg| is in Qssh.
922 sh = ssh - 14;
929 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator)
931 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft
    [all...]
  /external/curl/lib/
ssh.c 70 #include "ssh.h"
306 error code, and possibly add a few new SSH-related one. We must however
332 * SSH State machine related code
334 /* This is the ONLY way to change SSH state! */
575 infof(data, "SSH host check: %d, key: %s\n", keycheck,
672 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer);
682 "Denied establishing ssh session: mismatch md5 fingerprint. "
686 "Denied establishing ssh session: md5 fingerprint not available");
702 * ssh_statemach_act() runs the SSH state machine as far as it can without
742 failf(data, "Failure establishing ssh session")
2879 struct SSHPROTO *ssh; local
2900 struct ssh_conn *ssh; local
3058 struct ssh_conn *ssh = &conn->proto.sshc; local
    [all...]

Completed in 1231 milliseconds

1 2