Home
last modified time | relevance | path

Searched refs:ssh (Results 1 – 25 of 456) sorted by relevance

12345678910>>...19

/external/openssh/
Dpacket.h52 struct ssh { struct
84 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *, argument
87 struct ssh *ssh_alloc_session_state(void);
88 struct ssh *ssh_packet_set_connection(struct ssh *, int, int);
89 void ssh_packet_set_timeout(struct ssh *, int, int);
90 int ssh_packet_stop_discard(struct ssh *);
91 int ssh_packet_connection_af(struct ssh *);
92 void ssh_packet_set_nonblocking(struct ssh *);
93 int ssh_packet_get_connection_in(struct ssh *);
94 int ssh_packet_get_connection_out(struct ssh *);
[all …]
Dssh_api.c34 int _ssh_exchange_banner(struct ssh *);
35 int _ssh_send_banner(struct ssh *, char **);
36 int _ssh_read_banner(struct ssh *, char **);
37 int _ssh_order_hostkeyalgs(struct ssh *);
38 int _ssh_verify_host_key(struct sshkey *, struct ssh *);
39 struct sshkey *_ssh_host_public_key(int, int, struct ssh *);
40 struct sshkey *_ssh_host_private_key(int, int, struct ssh *);
73 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) in ssh_init()
76 struct ssh *ssh; in ssh_init() local
88 if ((ssh = ssh_packet_set_connection(NULL, -1, -1)) == NULL) in ssh_init()
[all …]
Dpacket.c229 struct ssh *
232 struct ssh *ssh = NULL; in ssh_alloc_session_state() local
235 if ((ssh = calloc(1, sizeof(*ssh))) == NULL || in ssh_alloc_session_state()
243 TAILQ_INIT(&ssh->private_keys); in ssh_alloc_session_state()
244 TAILQ_INIT(&ssh->public_keys); in ssh_alloc_session_state()
256 ssh->state = state; in ssh_alloc_session_state()
257 return ssh; in ssh_alloc_session_state()
266 free(ssh); in ssh_alloc_session_state()
271 ssh_packet_set_input_hook(struct ssh *ssh, ssh_packet_hook_fn *hook, void *ctx) in ssh_packet_set_input_hook() argument
273 ssh->state->hook_in = hook; in ssh_packet_set_input_hook()
[all …]
Dopacket.c9 struct ssh *active_state, *backup_state;
14 ssh_packet_start(struct ssh *ssh, u_char type) in ssh_packet_start() argument
18 if ((r = sshpkt_start(ssh, type)) != 0) in ssh_packet_start()
23 ssh_packet_put_char(struct ssh *ssh, int value) in ssh_packet_put_char() argument
28 if ((r = sshpkt_put_u8(ssh, ch)) != 0) in ssh_packet_put_char()
33 ssh_packet_put_int(struct ssh *ssh, u_int value) in ssh_packet_put_int() argument
37 if ((r = sshpkt_put_u32(ssh, value)) != 0) in ssh_packet_put_int()
42 ssh_packet_put_int64(struct ssh *ssh, u_int64_t value) in ssh_packet_put_int64() argument
46 if ((r = sshpkt_put_u64(ssh, value)) != 0) in ssh_packet_put_int64()
51 ssh_packet_put_string(struct ssh *ssh, const void *buf, u_int len) in ssh_packet_put_string() argument
[all …]
Dssh_api.h43 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params);
48 void ssh_free(struct ssh *);
53 void ssh_set_app_data(struct ssh *, void *);
54 void *ssh_get_app_data(struct ssh *);
64 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key);
72 int ssh_set_verify_host_key_callback(struct ssh *ssh,
73 int (*cb)(struct sshkey *, struct ssh *));
89 int ssh_packet_next(struct ssh *ssh, u_char *typep);
96 const u_char *ssh_packet_payload(struct ssh *ssh, size_t *lenp);
103 int ssh_packet_put(struct ssh *ssh, int type, const u_char *data,
[all …]
Ddispatch.c44 struct ssh *ssh = active_state; /* XXX */ in dispatch_protocol_error() local
50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in dispatch_protocol_error()
51 (r = sshpkt_put_u32(ssh, seq)) != 0 || in dispatch_protocol_error()
52 (r = sshpkt_send(ssh)) != 0 || in dispatch_protocol_error()
53 (r = ssh_packet_write_wait(ssh)) != 0) in dispatch_protocol_error()
54 sshpkt_fatal(ssh, __func__, r); in dispatch_protocol_error()
59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh) in dispatch_protocol_ignore() argument
66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt) in ssh_dispatch_init() argument
70 ssh->dispatch[i] = dflt; in ssh_dispatch_init()
74 ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn) in ssh_dispatch_range() argument
[all …]
Dssh-keysign.04 ssh-keysign M-bM-^@M-^S ssh helper program for host-based authentication
7 ssh-keysign
10 ssh-keysign is used by ssh(1) to access the local host keys and generate
13 ssh-keysign is disabled by default and can only be enabled in the global
14 client configuration file /etc/ssh/ssh_config by setting EnableSSHKeysign
17 ssh-keysign is not intended to be invoked by the user, but from ssh(1).
18 See ssh(1) and sshd(8) for more information about host-based
22 /etc/ssh/ssh_config
23 Controls whether ssh-keysign is enabled.
25 /etc/ssh/ssh_host_dsa_key
[all …]
Dkexgexs.c61 kexgex_server(struct ssh *ssh) in kexgex_server() argument
63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, in kexgex_server()
72 struct ssh *ssh = ctxt; in input_kex_dh_gex_request() local
73 struct kex *kex = ssh->kex; in input_kex_dh_gex_request()
78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || in input_kex_dh_gex_request()
79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || in input_kex_dh_gex_request()
80 (r = sshpkt_get_u32(ssh, &max)) != 0 || in input_kex_dh_gex_request()
81 (r = sshpkt_get_end(ssh)) != 0) in input_kex_dh_gex_request()
100 sshpkt_disconnect(ssh, "no matching DH grp found"); in input_kex_dh_gex_request()
105 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_GROUP)) != 0 || in input_kex_dh_gex_request()
[all …]
Dkex.c66 static int kex_choose_conf(struct ssh *);
328 struct ssh *ssh = active_state; /* XXX */ in kex_protocol_error() local
332 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in kex_protocol_error()
333 (r = sshpkt_put_u32(ssh, seq)) != 0 || in kex_protocol_error()
334 (r = sshpkt_send(ssh)) != 0) in kex_protocol_error()
340 kex_reset_dispatch(struct ssh *ssh) in kex_reset_dispatch() argument
342 ssh_dispatch_range(ssh, SSH2_MSG_TRANSPORT_MIN, in kex_reset_dispatch()
347 kex_send_ext_info(struct ssh *ssh) in kex_send_ext_info() argument
354 if ((r = sshpkt_start(ssh, SSH2_MSG_EXT_INFO)) != 0 || in kex_send_ext_info()
355 (r = sshpkt_put_u32(ssh, 1)) != 0 || in kex_send_ext_info()
[all …]
Dkexgexc.c58 kexgex_client(struct ssh *ssh) in kexgex_client() argument
60 struct kex *kex = ssh->kex; in kexgex_client()
72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || in kexgex_client()
73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || in kexgex_client()
74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || in kexgex_client()
75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || in kexgex_client()
76 (r = sshpkt_send(ssh)) != 0) in kexgex_client()
84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, in kexgex_client()
94 struct ssh *ssh = ctxt; in input_kex_dh_gex_group() local
95 struct kex *kex = ssh->kex; in input_kex_dh_gex_group()
[all …]
Dssh-add.04 ssh-add M-bM-^@M-^S adds private key identities to the authentication agent
7 ssh-add [-cDdkLlXx] [-E fingerprint_hash] [-t life] [file ...]
8 ssh-add -s pkcs11
9 ssh-add -e pkcs11
12 ssh-add adds private key identities to the authentication agent,
13 ssh-agent(1). When run without arguments, it adds the files
14 ~/.ssh/id_rsa, ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, ~/.ssh/id_ed25519 and
15 ~/.ssh/identity. After loading a private key, ssh-add will try to load
20 If any file requires a passphrase, ssh-add asks for the passphrase from
21 the user. The passphrase is read from the user's tty. ssh-add retries
[all …]
Dkex.h128 struct ssh;
153 int (*verify_host_key)(struct sshkey *, struct ssh *);
154 struct sshkey *(*load_host_public_key)(int, int, struct ssh *);
155 struct sshkey *(*load_host_private_key)(int, int, struct ssh *);
156 int (*host_key_index)(struct sshkey *, int, struct ssh *);
159 int (*kex[KEX_MAX])(struct ssh *);
174 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **);
175 int kex_setup(struct ssh *, char *[PROPOSAL_MAX]);
183 int kex_send_kexinit(struct ssh *);
186 int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *);
[all …]
Dopacket.h5 void ssh_packet_start(struct ssh *, u_char);
6 void ssh_packet_put_char(struct ssh *, int ch);
7 void ssh_packet_put_int(struct ssh *, u_int value);
8 void ssh_packet_put_int64(struct ssh *, u_int64_t value);
9 void ssh_packet_put_bignum(struct ssh *, BIGNUM * value);
10 void ssh_packet_put_bignum2(struct ssh *, BIGNUM * value);
11 void ssh_packet_put_ecpoint(struct ssh *, const EC_GROUP *, const EC_POINT *);
12 void ssh_packet_put_string(struct ssh *, const void *buf, u_int len);
13 void ssh_packet_put_cstring(struct ssh *, const char *str);
14 void ssh_packet_put_raw(struct ssh *, const void *buf, u_int len);
[all …]
Dkexc25519s.c47 kexc25519_server(struct ssh *ssh) in kexc25519_server() argument
50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init); in kexc25519_server()
57 struct ssh *ssh = ctxt; in input_kex_c25519_init() local
58 struct kex *kex = ssh->kex; in input_kex_c25519_init()
80 kex->hostkey_nid, ssh); in input_kex_c25519_init()
82 kex->hostkey_nid, ssh); in input_kex_c25519_init()
88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || in input_kex_c25519_init()
89 (r = sshpkt_get_end(ssh)) != 0) in input_kex_c25519_init()
138 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_c25519_init()
142 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_REPLY)) != 0 || in input_kex_c25519_init()
[all …]
Dkexc25519c.c50 kexc25519_client(struct ssh *ssh) in kexc25519_client() argument
52 struct kex *kex = ssh->kex; in kexc25519_client()
60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || in kexc25519_client()
61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, in kexc25519_client()
63 (r = sshpkt_send(ssh)) != 0) in kexc25519_client()
67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply); in kexc25519_client()
74 struct ssh *ssh = ctxt; in input_kex_c25519_reply() local
75 struct kex *kex = ssh->kex; in input_kex_c25519_reply()
90 if ((r = sshpkt_get_string(ssh, &server_host_key_blob, in input_kex_c25519_reply()
101 if (kex->verify_host_key(server_host_key, ssh) == -1) { in input_kex_c25519_reply()
[all …]
Dkexecdhs.c53 kexecdh_server(struct ssh *ssh) in kexecdh_server() argument
56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init); in kexecdh_server()
63 struct ssh *ssh = ctxt; in input_kex_ecdh_init() local
64 struct kex *kex = ssh->kex; in input_kex_ecdh_init()
99 kex->hostkey_nid, ssh); in input_kex_ecdh_init()
101 kex->hostkey_nid, ssh); in input_kex_ecdh_init()
110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 || in input_kex_ecdh_init()
111 (r = sshpkt_get_end(ssh)) != 0) in input_kex_ecdh_init()
119 sshpkt_disconnect(ssh, "invalid client public key"); in input_kex_ecdh_init()
173 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_ecdh_init()
[all …]
Dkexdhs.c55 kexdh_server(struct ssh *ssh) in kexdh_server() argument
57 struct kex *kex = ssh->kex; in kexdh_server()
87 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_INIT, &input_kex_dh_init); in kexdh_server()
96 struct ssh *ssh = ctxt; in input_kex_dh_init() local
97 struct kex *kex = ssh->kex; in input_kex_dh_init()
112 kex->hostkey_nid, ssh); in input_kex_dh_init()
114 kex->hostkey_nid, ssh); in input_kex_dh_init()
125 if ((r = sshpkt_get_bignum2(ssh, dh_client_pub)) != 0 || in input_kex_dh_init()
126 (r = sshpkt_get_end(ssh)) != 0) in input_kex_dh_init()
143 sshpkt_disconnect(ssh, "bad client public DH value"); in input_kex_dh_init()
[all …]
Dkexecdhc.c55 kexecdh_client(struct ssh *ssh) in kexecdh_client() argument
57 struct kex *kex = ssh->kex; in kexecdh_client()
74 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || in kexecdh_client()
75 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 || in kexecdh_client()
76 (r = sshpkt_send(ssh)) != 0) in kexecdh_client()
89 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_ecdh_reply); in kexecdh_client()
100 struct ssh *ssh = ctxt; in input_kex_ecdh_reply() local
101 struct kex *kex = ssh->kex; in input_kex_ecdh_reply()
122 if ((r = sshpkt_get_string(ssh, &server_host_key_blob, in input_kex_ecdh_reply()
133 if (kex->verify_host_key(server_host_key, ssh) == -1) { in input_kex_ecdh_reply()
[all …]
Dkexdhc.c55 kexdh_client(struct ssh *ssh) in kexdh_client() argument
57 struct kex *kex = ssh->kex; in kexdh_client()
85 (r = sshpkt_start(ssh, SSH2_MSG_KEXDH_INIT)) != 0 || in kexdh_client()
86 (r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 || in kexdh_client()
87 (r = sshpkt_send(ssh)) != 0) in kexdh_client()
96 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_REPLY, &input_kex_dh); in kexdh_client()
105 struct ssh *ssh = ctxt; in input_kex_dh() local
106 struct kex *kex = ssh->kex; in input_kex_dh()
119 if ((r = sshpkt_get_string(ssh, &server_host_key_blob, in input_kex_dh()
130 if (kex->verify_host_key(server_host_key, ssh) == -1) { in input_kex_dh()
[all …]
/external/autotest/site_utils/rpm_control_system/
Drpm_controller.py286 ssh = self._authenticate_with_hydra(admin_override=True)
287 if not ssh:
289 ssh.expect(RPMController.PASSWORD_PROMPT, timeout=60)
290 ssh.sendline(rpm_config.get('HYDRA', 'admin_password'))
291 ssh.expect(RPMController.HYDRA_PROMPT)
292 ssh.sendline(RPMController.CLI_CMD)
295 response = ssh.expect_list([cli_prompt_re, cli_held_re], timeout=60)
301 ssh.sendline(RPMController.CLI_KILL_PREVIOUS)
302 ssh.expect(RPMController.CLI_PROMPT)
303 ssh.sendline(RPMController.PORT_STATUS_CMD)
[all …]
/external/openssh/regress/unittests/sshkey/
Dmktestdata.sh10 ssh-keygen -f $_in -e -m pkcs8 | \
97 ssh-keygen -t rsa1 -b 1024 -C "RSA1 test key #1" -N "" -f rsa1_1
98 ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1
99 ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1
100 ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1
101 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1
103 ssh-keygen -t rsa1 -b 2048 -C "RSA1 test key #2" -N "" -f rsa1_2
104 ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2
105 ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_2
106 ssh-keygen -t ecdsa -b 521 -C "ECDSA test key #2" -N "" -f ecdsa_2
[all …]
/external/openssh/regress/
Dhostkey-rotate.sh52 dossh -oHostKeyAlgorithms=ssh-ed25519 -oStrictHostKeyChecking=no
55 check_key_present ssh-ed25519 || fail "unstrict didn't learn key"
62 check_key_present ssh-rsa || fail "didn't learn keys"
74 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old
75 rm -f $OBJ/hkr.ssh-rsa
76 ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa -N '' || fatal "ssh-keygen $k"
80 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present"
81 check_key_present ssh-rsa || fail "didn't learn changed key"
85 ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa-new -N '' || fatal "ssh-keygen $k"
86 ( cat $OBJ/sshd_proxy.orig ; echo HostKey $OBJ/hkr.ssh-rsa-new ) \
[all …]
/external/openssh/contrib/suse/
Dopenssh.spec20 Source1: x11-ssh-askpass-%{xversion}.tar.gz
25 Obsoletes: ssh
26 Provides: ssh
43 Obsoletes: ssh-extras
44 Provides: openssh:${_libdir}/ssh/ssh-askpass
86 - Updated for new gnome-ssh-askpass build
88 - Made symlink to gnome-ssh-askpass called ssh-askpass
137 --sysconfdir=%{_sysconfdir}/ssh \
141 --libexecdir=%{_libdir}/ssh
145 cd x11-ssh-askpass-%{xversion}
[all …]
/external/openssh/contrib/
DMakefile6 gnome-ssh-askpass1: gnome-ssh-askpass1.c
8 gnome-ssh-askpass1.c -o gnome-ssh-askpass1 \
11 gnome-ssh-askpass2: gnome-ssh-askpass2.c
13 gnome-ssh-askpass2.c -o gnome-ssh-askpass2 \
16 gnome-ssh-askpass3: gnome-ssh-askpass2.c
18 gnome-ssh-askpass2.c -o gnome-ssh-askpass3 \
22 rm -f *.o gnome-ssh-askpass gnome-ssh-askpass[123]
/external/openssh/regress/unittests/hostkeys/testdata/
Dknown_hosts2 sisyphus.example.com ssh-dss AAAAB3NzaC1kc3MAAACBAOqffHxEW4c+Z9q/r3l4sYK8F7qrBsU8XF9upGsW62T9InROFF…
4 sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK9ks7jkua5YWIwByRnnnc6UPJQWI75O0e/UJdPYU1…
6 sisyphus.example.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDg4hB4vAZHJ0PVRiJajOv/GlytFWNpv5/9xgB9+5…
9 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-dss AAAAB3NzaC1kc3MAAACBAI38Hy/61/O5Bp6yUG8J5XQCeN…
11 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIBp6PVW0z2o9C4Ukv…
13 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDmbUhNabB5AmBDX6…
16 *.example.com,192.0.2.*,2001:* ssh-dss AAAAB3NzaC1kc3MAAACBAI6lz2Ip9bzE7TGuDD4SjO9S4Ac90gq0h6ai1O06…
18 *.example.com,192.0.2.*,2001:* ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBlYfExtYZAPqYvYdrlpGlSWhh/XNHcH…
20 *.example.com,192.0.2.*,2001:* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDX8F93W3SH4ZSus4XUQ2cw9dqcuyUE…
23 |1|6FWxoqTCAfm8sZ7T/q73OmxCFGM=|S4eQmusok4cbyDzzGEFGIAthDbw= ssh-dss AAAAB3NzaC1kc3MAAACBALrFy7w5ih…
[all …]

12345678910>>...19