/external/openssh/ |
audit-linux.c | 102 struct ssh *ssh = active_state; /* XXX */ local 119 ssh_remote_ipaddr(ssh), "sshd", 0);
|
dispatch.c | 44 struct ssh *ssh = active_state; /* XXX */ local 50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || 51 (r = sshpkt_put_u32(ssh, seq)) != 0 || 52 (r = sshpkt_send(ssh)) != 0 || 53 (r = ssh_packet_write_wait(ssh)) != 0) 54 sshpkt_fatal(ssh, __func__, r); 59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh) 66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt [all...] |
kexc25519c.c | 50 kexc25519_client(struct ssh *ssh) 52 struct kex *kex = ssh->kex; 60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 63 (r = sshpkt_send(ssh)) != 0) 67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply); 74 struct ssh *ssh = ctxt; local 75 struct kex *kex = ssh->kex [all...] |
kexc25519s.c | 47 kexc25519_server(struct ssh *ssh) 50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init); 57 struct ssh *ssh = ctxt; local 58 struct kex *kex = ssh->kex; 80 kex->hostkey_nid, ssh); 82 kex->hostkey_nid, ssh); 88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || 89 (r = sshpkt_get_end(ssh)) != 0 [all...] |
kexdhc.c | 55 kexdh_client(struct ssh *ssh) 57 struct kex *kex = ssh->kex; 85 (r = sshpkt_start(ssh, SSH2_MSG_KEXDH_INIT)) != 0 || 86 (r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 || 87 (r = sshpkt_send(ssh)) != 0) 96 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_REPLY, &input_kex_dh); 105 struct ssh *ssh = ctxt; local 106 struct kex *kex = ssh->kex [all...] |
kexdhs.c | 55 kexdh_server(struct ssh *ssh) 57 struct kex *kex = ssh->kex; 87 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_INIT, &input_kex_dh_init); 96 struct ssh *ssh = ctxt; local 97 struct kex *kex = ssh->kex; 112 kex->hostkey_nid, ssh); 114 kex->hostkey_nid, ssh); 125 if ((r = sshpkt_get_bignum2(ssh, dh_client_pub)) != 0 | [all...] |
kexecdhc.c | 55 kexecdh_client(struct ssh *ssh) 57 struct kex *kex = ssh->kex; 74 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || 75 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 || 76 (r = sshpkt_send(ssh)) != 0) 89 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_ecdh_reply); 100 struct ssh *ssh = ctxt; local 101 struct kex *kex = ssh->kex [all...] |
kexecdhs.c | 53 kexecdh_server(struct ssh *ssh) 56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init); 63 struct ssh *ssh = ctxt; local 64 struct kex *kex = ssh->kex; 99 kex->hostkey_nid, ssh); 101 kex->hostkey_nid, ssh); 110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 || 111 (r = sshpkt_get_end(ssh)) != 0 [all...] |
auth2-hostbased.c | 47 #include "ssh-gss.h" 118 service = datafellows & SSH_BUG_HBSERVICE ? "ssh-userauth" : 163 struct ssh *ssh = active_state; /* XXX */ local 172 resolvedname = auth_get_canonical_hostname(ssh, options.use_dns); 173 ipaddr = ssh_remote_ipaddr(ssh);
|
kexgexc.c | 58 kexgex_client(struct ssh *ssh) 60 struct kex *kex = ssh->kex; 72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || 73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || 74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || 75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || 76 (r = sshpkt_send(ssh)) != 0) 84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, 94 struct ssh *ssh = ctxt local 148 struct ssh *ssh = ctxt; local [all...] |
kexgexs.c | 49 #include "ssh-gss.h" 61 kexgex_server(struct ssh *ssh) 63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, 72 struct ssh *ssh = ctxt; local 73 struct kex *kex = ssh->kex; 78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || 79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || 80 (r = sshpkt_get_u32(ssh, &max)) != 0 | 125 struct ssh *ssh = ctxt; local [all...] |
packet.h | 13 * called by a name other than "ssh" or "Secure Shell". 52 struct ssh { struct 84 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *, 87 struct ssh *ssh_alloc_session_state(void); 88 struct ssh *ssh_packet_set_connection(struct ssh *, int, int); 89 void ssh_packet_set_timeout(struct ssh *, int, int); 90 int ssh_packet_stop_discard(struct ssh *); 91 int ssh_packet_connection_af(struct ssh *); 92 void ssh_packet_set_nonblocking(struct ssh *); [all...] |
auth-options.c | 10 * called by a name other than "ssh" or "Secure Shell". 124 struct ssh *ssh = active_state; /* XXX */ local 278 const char *remote_ip = ssh_remote_ipaddr(ssh); 280 ssh, options.use_dns); 462 struct ssh *ssh = active_state; /* XXX */ local 536 remote_ip = ssh_remote_ipaddr(ssh);
|
auth.c | 72 #include "ssh-gss.h" 91 * Check if the user is allowed to log in via ssh. If user is listed 102 struct ssh *ssh = active_state; /* XXX */ local 189 hostname = auth_get_canonical_hostname(ssh, options.use_dns); 190 ipaddr = ssh_remote_ipaddr(ssh); 291 struct ssh *ssh = active_state; /* XXX */ local 318 ssh_remote_ipaddr(ssh), 319 ssh_remote_port(ssh), 349 struct ssh *ssh = active_state; \/* XXX *\/ local 367 struct ssh *ssh = active_state; \/* XXX *\/ local 635 struct ssh *ssh = active_state; \/* XXX *\/ local [all...] |
auth2.c | 55 #include "ssh-gss.h" 189 if (strcmp(service, "ssh-userauth") == 0) { 215 struct ssh *ssh = active_state; /* XXX */ local 237 if (authctxt->pw && strcmp(service, "ssh-connection")==0) { 252 ssh_packet_set_log_preamble(ssh, "%suser %s", 299 struct ssh *ssh = active_state; /* XXX */ local 361 ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
|
ssh_api.c | 34 int _ssh_exchange_banner(struct ssh *); 35 int _ssh_send_banner(struct ssh *, char **); 36 int _ssh_read_banner(struct ssh *, char **); 37 int _ssh_order_hostkeyalgs(struct ssh *); 38 int _ssh_verify_host_key(struct sshkey *, struct ssh *); 39 struct sshkey *_ssh_host_public_key(int, int, struct ssh *); 40 struct sshkey *_ssh_host_private_key(int, int, struct ssh *); 73 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) 76 struct ssh *ssh; local [all...] |
monitor_wrap.c | 49 #include "ssh.h" 73 #include "ssh-gss.h" 471 struct ssh *ssh = active_state; /* XXX */ local 477 if ((r = ssh_packet_get_state(ssh, m)) != 0)
|
serverloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 284 struct ssh *ssh = active_state; /* XXX */ local 293 ssh_remote_ipaddr(ssh), ssh_remote_port(ssh)); 300 ssh_remote_ipaddr(ssh), 301 ssh_remote_port(ssh), strerror(errno)); 638 struct ssh *ssh = active_state; /* XXX */ local 650 while (ssh_packet_remaining(ssh) > 0) [all...] |
auth-pam.c | 103 #include "ssh-gss.h" 625 struct ssh *ssh = active_state; /* XXX */ local 646 pam_rhost = auth_get_canonical_hostname(ssh, options.use_dns); 660 debug("PAM: setting PAM_TTY to \"ssh\""); 661 sshpam_err = pam_set_item(sshpam_handle, PAM_TTY, "ssh"); 717 struct ssh *ssh = active_state; /* XXX */ local 804 auth_get_canonical_hostname(ssh, options.use_dns)); 1089 * during the ssh authentication process [all...] |
kex.c | 66 static int kex_choose_conf(struct ssh *); 328 struct ssh *ssh = active_state; /* XXX */ local 332 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || 333 (r = sshpkt_put_u32(ssh, seq)) != 0 || 334 (r = sshpkt_send(ssh)) != 0) 340 kex_reset_dispatch(struct ssh *ssh) 342 ssh_dispatch_range(ssh, SSH2_MSG_TRANSPORT_MIN, 347 kex_send_ext_info(struct ssh *ssh 388 struct ssh *ssh = ctxt; local 427 struct ssh *ssh = ctxt; local 480 struct ssh *ssh = ctxt; local [all...] |
monitor.c | 70 #include "ssh.h" 98 #include "ssh-gss.h" 286 struct ssh *ssh = active_state; /* XXX */ local 360 ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user); 598 struct ssh *ssh = active_state; /* XXX */ local 636 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) 666 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && 700 struct ssh *ssh = active_state; /* XXX * local 1401 struct ssh *ssh = active_state; \/* XXX *\/ local 1589 struct ssh *ssh = active_state; \/* XXX *\/ local [all...] |
/external/devlib/devlib/utils/ |
ssh.py | 41 ssh = None variable 46 logger = logging.getLogger('ssh') 57 else: # ssh 216 command = '{} {} {} {}@{} {}'.format(ssh, keyfile_string, port_string, self.username, self.host, command) [all...] |
/external/libnfnetlink/src/ |
libnfnetlink.c | 343 struct nfnl_subsys_handle *ssh; local 353 ssh = &nfnlh->subsys[subsys_id]; 354 if (ssh->cb) { 359 ssh->cb = calloc(cb_count, sizeof(*(ssh->cb))); 360 if (!ssh->cb) 363 ssh->nfnlh = nfnlh; 364 ssh->cb_count = cb_count; 365 ssh->subscriptions = subscriptions; 366 ssh->subsys_id = subsys_id 1247 const struct nfnl_subsys_handle *ssh; local 1295 struct nfnl_subsys_handle *ssh; local 1368 struct nfnl_subsys_handle *ssh; local [all...] |
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/fix/source/ |
lpc_masking_model.c | 540 int sh_lo, sh_hi, sh, ssh, shMem; local 872 ssh = sh_lo >> 1; // sqrt_nrg is in Qssh. 873 sh = ssh - 14; 880 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator) 882 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft) 883 sh = ssh-shft-7; 921 ssh = sh_hi >> 1; // |sqrt_nrg| is in Qssh. 922 sh = ssh - 14; 929 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator) 931 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft [all...] |
/external/curl/lib/ |
ssh.c | 70 #include "ssh.h" 306 error code, and possibly add a few new SSH-related one. We must however 332 * SSH State machine related code 334 /* This is the ONLY way to change SSH state! */ 575 infof(data, "SSH host check: %d, key: %s\n", keycheck, 672 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer); 682 "Denied establishing ssh session: mismatch md5 fingerprint. " 686 "Denied establishing ssh session: md5 fingerprint not available"); 702 * ssh_statemach_act() runs the SSH state machine as far as it can without 742 failf(data, "Failure establishing ssh session") 2879 struct SSHPROTO *ssh; local 2900 struct ssh_conn *ssh; local 3058 struct ssh_conn *ssh = &conn->proto.sshc; local [all...] |