/external/openssh/ |
D | packet.h | 52 struct ssh { struct 84 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *, argument 87 struct ssh *ssh_alloc_session_state(void); 88 struct ssh *ssh_packet_set_connection(struct ssh *, int, int); 89 void ssh_packet_set_timeout(struct ssh *, int, int); 90 int ssh_packet_stop_discard(struct ssh *); 91 int ssh_packet_connection_af(struct ssh *); 92 void ssh_packet_set_nonblocking(struct ssh *); 93 int ssh_packet_get_connection_in(struct ssh *); 94 int ssh_packet_get_connection_out(struct ssh *); [all …]
|
D | ssh_api.c | 34 int _ssh_exchange_banner(struct ssh *); 35 int _ssh_send_banner(struct ssh *, char **); 36 int _ssh_read_banner(struct ssh *, char **); 37 int _ssh_order_hostkeyalgs(struct ssh *); 38 int _ssh_verify_host_key(struct sshkey *, struct ssh *); 39 struct sshkey *_ssh_host_public_key(int, int, struct ssh *); 40 struct sshkey *_ssh_host_private_key(int, int, struct ssh *); 73 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) in ssh_init() 76 struct ssh *ssh; in ssh_init() local 88 if ((ssh = ssh_packet_set_connection(NULL, -1, -1)) == NULL) in ssh_init() [all …]
|
D | packet.c | 229 struct ssh * 232 struct ssh *ssh = NULL; in ssh_alloc_session_state() local 235 if ((ssh = calloc(1, sizeof(*ssh))) == NULL || in ssh_alloc_session_state() 243 TAILQ_INIT(&ssh->private_keys); in ssh_alloc_session_state() 244 TAILQ_INIT(&ssh->public_keys); in ssh_alloc_session_state() 256 ssh->state = state; in ssh_alloc_session_state() 257 return ssh; in ssh_alloc_session_state() 266 free(ssh); in ssh_alloc_session_state() 271 ssh_packet_set_input_hook(struct ssh *ssh, ssh_packet_hook_fn *hook, void *ctx) in ssh_packet_set_input_hook() argument 273 ssh->state->hook_in = hook; in ssh_packet_set_input_hook() [all …]
|
D | opacket.c | 9 struct ssh *active_state, *backup_state; 14 ssh_packet_start(struct ssh *ssh, u_char type) in ssh_packet_start() argument 18 if ((r = sshpkt_start(ssh, type)) != 0) in ssh_packet_start() 23 ssh_packet_put_char(struct ssh *ssh, int value) in ssh_packet_put_char() argument 28 if ((r = sshpkt_put_u8(ssh, ch)) != 0) in ssh_packet_put_char() 33 ssh_packet_put_int(struct ssh *ssh, u_int value) in ssh_packet_put_int() argument 37 if ((r = sshpkt_put_u32(ssh, value)) != 0) in ssh_packet_put_int() 42 ssh_packet_put_int64(struct ssh *ssh, u_int64_t value) in ssh_packet_put_int64() argument 46 if ((r = sshpkt_put_u64(ssh, value)) != 0) in ssh_packet_put_int64() 51 ssh_packet_put_string(struct ssh *ssh, const void *buf, u_int len) in ssh_packet_put_string() argument [all …]
|
D | ssh_api.h | 43 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params); 48 void ssh_free(struct ssh *); 53 void ssh_set_app_data(struct ssh *, void *); 54 void *ssh_get_app_data(struct ssh *); 64 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key); 72 int ssh_set_verify_host_key_callback(struct ssh *ssh, 73 int (*cb)(struct sshkey *, struct ssh *)); 89 int ssh_packet_next(struct ssh *ssh, u_char *typep); 96 const u_char *ssh_packet_payload(struct ssh *ssh, size_t *lenp); 103 int ssh_packet_put(struct ssh *ssh, int type, const u_char *data, [all …]
|
D | dispatch.c | 44 struct ssh *ssh = active_state; /* XXX */ in dispatch_protocol_error() local 50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in dispatch_protocol_error() 51 (r = sshpkt_put_u32(ssh, seq)) != 0 || in dispatch_protocol_error() 52 (r = sshpkt_send(ssh)) != 0 || in dispatch_protocol_error() 53 (r = ssh_packet_write_wait(ssh)) != 0) in dispatch_protocol_error() 54 sshpkt_fatal(ssh, __func__, r); in dispatch_protocol_error() 59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh) in dispatch_protocol_ignore() argument 66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt) in ssh_dispatch_init() argument 70 ssh->dispatch[i] = dflt; in ssh_dispatch_init() 74 ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn) in ssh_dispatch_range() argument [all …]
|
D | ssh-keysign.0 | 4 ssh-keysign M-bM-^@M-^S ssh helper program for host-based authentication 7 ssh-keysign 10 ssh-keysign is used by ssh(1) to access the local host keys and generate 13 ssh-keysign is disabled by default and can only be enabled in the global 14 client configuration file /etc/ssh/ssh_config by setting EnableSSHKeysign 17 ssh-keysign is not intended to be invoked by the user, but from ssh(1). 18 See ssh(1) and sshd(8) for more information about host-based 22 /etc/ssh/ssh_config 23 Controls whether ssh-keysign is enabled. 25 /etc/ssh/ssh_host_dsa_key [all …]
|
D | kexgexs.c | 61 kexgex_server(struct ssh *ssh) in kexgex_server() argument 63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, in kexgex_server() 72 struct ssh *ssh = ctxt; in input_kex_dh_gex_request() local 73 struct kex *kex = ssh->kex; in input_kex_dh_gex_request() 78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || in input_kex_dh_gex_request() 79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || in input_kex_dh_gex_request() 80 (r = sshpkt_get_u32(ssh, &max)) != 0 || in input_kex_dh_gex_request() 81 (r = sshpkt_get_end(ssh)) != 0) in input_kex_dh_gex_request() 100 sshpkt_disconnect(ssh, "no matching DH grp found"); in input_kex_dh_gex_request() 105 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_GROUP)) != 0 || in input_kex_dh_gex_request() [all …]
|
D | kex.c | 66 static int kex_choose_conf(struct ssh *); 328 struct ssh *ssh = active_state; /* XXX */ in kex_protocol_error() local 332 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in kex_protocol_error() 333 (r = sshpkt_put_u32(ssh, seq)) != 0 || in kex_protocol_error() 334 (r = sshpkt_send(ssh)) != 0) in kex_protocol_error() 340 kex_reset_dispatch(struct ssh *ssh) in kex_reset_dispatch() argument 342 ssh_dispatch_range(ssh, SSH2_MSG_TRANSPORT_MIN, in kex_reset_dispatch() 347 kex_send_ext_info(struct ssh *ssh) in kex_send_ext_info() argument 354 if ((r = sshpkt_start(ssh, SSH2_MSG_EXT_INFO)) != 0 || in kex_send_ext_info() 355 (r = sshpkt_put_u32(ssh, 1)) != 0 || in kex_send_ext_info() [all …]
|
D | kexgexc.c | 58 kexgex_client(struct ssh *ssh) in kexgex_client() argument 60 struct kex *kex = ssh->kex; in kexgex_client() 72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || in kexgex_client() 73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || in kexgex_client() 74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || in kexgex_client() 75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || in kexgex_client() 76 (r = sshpkt_send(ssh)) != 0) in kexgex_client() 84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, in kexgex_client() 94 struct ssh *ssh = ctxt; in input_kex_dh_gex_group() local 95 struct kex *kex = ssh->kex; in input_kex_dh_gex_group() [all …]
|
D | ssh-add.0 | 4 ssh-add M-bM-^@M-^S adds private key identities to the authentication agent 7 ssh-add [-cDdkLlXx] [-E fingerprint_hash] [-t life] [file ...] 8 ssh-add -s pkcs11 9 ssh-add -e pkcs11 12 ssh-add adds private key identities to the authentication agent, 13 ssh-agent(1). When run without arguments, it adds the files 14 ~/.ssh/id_rsa, ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, ~/.ssh/id_ed25519 and 15 ~/.ssh/identity. After loading a private key, ssh-add will try to load 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries [all …]
|
D | kex.h | 128 struct ssh; 153 int (*verify_host_key)(struct sshkey *, struct ssh *); 154 struct sshkey *(*load_host_public_key)(int, int, struct ssh *); 155 struct sshkey *(*load_host_private_key)(int, int, struct ssh *); 156 int (*host_key_index)(struct sshkey *, int, struct ssh *); 159 int (*kex[KEX_MAX])(struct ssh *); 174 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); 175 int kex_setup(struct ssh *, char *[PROPOSAL_MAX]); 183 int kex_send_kexinit(struct ssh *); 186 int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *); [all …]
|
D | opacket.h | 5 void ssh_packet_start(struct ssh *, u_char); 6 void ssh_packet_put_char(struct ssh *, int ch); 7 void ssh_packet_put_int(struct ssh *, u_int value); 8 void ssh_packet_put_int64(struct ssh *, u_int64_t value); 9 void ssh_packet_put_bignum(struct ssh *, BIGNUM * value); 10 void ssh_packet_put_bignum2(struct ssh *, BIGNUM * value); 11 void ssh_packet_put_ecpoint(struct ssh *, const EC_GROUP *, const EC_POINT *); 12 void ssh_packet_put_string(struct ssh *, const void *buf, u_int len); 13 void ssh_packet_put_cstring(struct ssh *, const char *str); 14 void ssh_packet_put_raw(struct ssh *, const void *buf, u_int len); [all …]
|
D | kexc25519s.c | 47 kexc25519_server(struct ssh *ssh) in kexc25519_server() argument 50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init); in kexc25519_server() 57 struct ssh *ssh = ctxt; in input_kex_c25519_init() local 58 struct kex *kex = ssh->kex; in input_kex_c25519_init() 80 kex->hostkey_nid, ssh); in input_kex_c25519_init() 82 kex->hostkey_nid, ssh); in input_kex_c25519_init() 88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || in input_kex_c25519_init() 89 (r = sshpkt_get_end(ssh)) != 0) in input_kex_c25519_init() 138 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_c25519_init() 142 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_REPLY)) != 0 || in input_kex_c25519_init() [all …]
|
D | kexc25519c.c | 50 kexc25519_client(struct ssh *ssh) in kexc25519_client() argument 52 struct kex *kex = ssh->kex; in kexc25519_client() 60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || in kexc25519_client() 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, in kexc25519_client() 63 (r = sshpkt_send(ssh)) != 0) in kexc25519_client() 67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply); in kexc25519_client() 74 struct ssh *ssh = ctxt; in input_kex_c25519_reply() local 75 struct kex *kex = ssh->kex; in input_kex_c25519_reply() 90 if ((r = sshpkt_get_string(ssh, &server_host_key_blob, in input_kex_c25519_reply() 101 if (kex->verify_host_key(server_host_key, ssh) == -1) { in input_kex_c25519_reply() [all …]
|
D | kexecdhs.c | 53 kexecdh_server(struct ssh *ssh) in kexecdh_server() argument 56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init); in kexecdh_server() 63 struct ssh *ssh = ctxt; in input_kex_ecdh_init() local 64 struct kex *kex = ssh->kex; in input_kex_ecdh_init() 99 kex->hostkey_nid, ssh); in input_kex_ecdh_init() 101 kex->hostkey_nid, ssh); in input_kex_ecdh_init() 110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 || in input_kex_ecdh_init() 111 (r = sshpkt_get_end(ssh)) != 0) in input_kex_ecdh_init() 119 sshpkt_disconnect(ssh, "invalid client public key"); in input_kex_ecdh_init() 173 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_ecdh_init() [all …]
|
D | kexdhs.c | 55 kexdh_server(struct ssh *ssh) in kexdh_server() argument 57 struct kex *kex = ssh->kex; in kexdh_server() 87 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_INIT, &input_kex_dh_init); in kexdh_server() 96 struct ssh *ssh = ctxt; in input_kex_dh_init() local 97 struct kex *kex = ssh->kex; in input_kex_dh_init() 112 kex->hostkey_nid, ssh); in input_kex_dh_init() 114 kex->hostkey_nid, ssh); in input_kex_dh_init() 125 if ((r = sshpkt_get_bignum2(ssh, dh_client_pub)) != 0 || in input_kex_dh_init() 126 (r = sshpkt_get_end(ssh)) != 0) in input_kex_dh_init() 143 sshpkt_disconnect(ssh, "bad client public DH value"); in input_kex_dh_init() [all …]
|
D | kexecdhc.c | 55 kexecdh_client(struct ssh *ssh) in kexecdh_client() argument 57 struct kex *kex = ssh->kex; in kexecdh_client() 74 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || in kexecdh_client() 75 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 || in kexecdh_client() 76 (r = sshpkt_send(ssh)) != 0) in kexecdh_client() 89 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_ecdh_reply); in kexecdh_client() 100 struct ssh *ssh = ctxt; in input_kex_ecdh_reply() local 101 struct kex *kex = ssh->kex; in input_kex_ecdh_reply() 122 if ((r = sshpkt_get_string(ssh, &server_host_key_blob, in input_kex_ecdh_reply() 133 if (kex->verify_host_key(server_host_key, ssh) == -1) { in input_kex_ecdh_reply() [all …]
|
D | kexdhc.c | 55 kexdh_client(struct ssh *ssh) in kexdh_client() argument 57 struct kex *kex = ssh->kex; in kexdh_client() 85 (r = sshpkt_start(ssh, SSH2_MSG_KEXDH_INIT)) != 0 || in kexdh_client() 86 (r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 || in kexdh_client() 87 (r = sshpkt_send(ssh)) != 0) in kexdh_client() 96 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_REPLY, &input_kex_dh); in kexdh_client() 105 struct ssh *ssh = ctxt; in input_kex_dh() local 106 struct kex *kex = ssh->kex; in input_kex_dh() 119 if ((r = sshpkt_get_string(ssh, &server_host_key_blob, in input_kex_dh() 130 if (kex->verify_host_key(server_host_key, ssh) == -1) { in input_kex_dh() [all …]
|
/external/autotest/site_utils/rpm_control_system/ |
D | rpm_controller.py | 286 ssh = self._authenticate_with_hydra(admin_override=True) 287 if not ssh: 289 ssh.expect(RPMController.PASSWORD_PROMPT, timeout=60) 290 ssh.sendline(rpm_config.get('HYDRA', 'admin_password')) 291 ssh.expect(RPMController.HYDRA_PROMPT) 292 ssh.sendline(RPMController.CLI_CMD) 295 response = ssh.expect_list([cli_prompt_re, cli_held_re], timeout=60) 301 ssh.sendline(RPMController.CLI_KILL_PREVIOUS) 302 ssh.expect(RPMController.CLI_PROMPT) 303 ssh.sendline(RPMController.PORT_STATUS_CMD) [all …]
|
/external/openssh/regress/unittests/sshkey/ |
D | mktestdata.sh | 10 ssh-keygen -f $_in -e -m pkcs8 | \ 97 ssh-keygen -t rsa1 -b 1024 -C "RSA1 test key #1" -N "" -f rsa1_1 98 ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1 99 ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1 100 ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1 101 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1 103 ssh-keygen -t rsa1 -b 2048 -C "RSA1 test key #2" -N "" -f rsa1_2 104 ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2 105 ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_2 106 ssh-keygen -t ecdsa -b 521 -C "ECDSA test key #2" -N "" -f ecdsa_2 [all …]
|
/external/openssh/regress/ |
D | hostkey-rotate.sh | 52 dossh -oHostKeyAlgorithms=ssh-ed25519 -oStrictHostKeyChecking=no 55 check_key_present ssh-ed25519 || fail "unstrict didn't learn key" 62 check_key_present ssh-rsa || fail "didn't learn keys" 74 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old 75 rm -f $OBJ/hkr.ssh-rsa 76 ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa -N '' || fatal "ssh-keygen $k" 80 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present" 81 check_key_present ssh-rsa || fail "didn't learn changed key" 85 ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa-new -N '' || fatal "ssh-keygen $k" 86 ( cat $OBJ/sshd_proxy.orig ; echo HostKey $OBJ/hkr.ssh-rsa-new ) \ [all …]
|
/external/openssh/contrib/suse/ |
D | openssh.spec | 20 Source1: x11-ssh-askpass-%{xversion}.tar.gz 25 Obsoletes: ssh 26 Provides: ssh 43 Obsoletes: ssh-extras 44 Provides: openssh:${_libdir}/ssh/ssh-askpass 86 - Updated for new gnome-ssh-askpass build 88 - Made symlink to gnome-ssh-askpass called ssh-askpass 137 --sysconfdir=%{_sysconfdir}/ssh \ 141 --libexecdir=%{_libdir}/ssh 145 cd x11-ssh-askpass-%{xversion} [all …]
|
/external/openssh/contrib/ |
D | Makefile | 6 gnome-ssh-askpass1: gnome-ssh-askpass1.c 8 gnome-ssh-askpass1.c -o gnome-ssh-askpass1 \ 11 gnome-ssh-askpass2: gnome-ssh-askpass2.c 13 gnome-ssh-askpass2.c -o gnome-ssh-askpass2 \ 16 gnome-ssh-askpass3: gnome-ssh-askpass2.c 18 gnome-ssh-askpass2.c -o gnome-ssh-askpass3 \ 22 rm -f *.o gnome-ssh-askpass gnome-ssh-askpass[123]
|
/external/openssh/regress/unittests/hostkeys/testdata/ |
D | known_hosts | 2 sisyphus.example.com ssh-dss AAAAB3NzaC1kc3MAAACBAOqffHxEW4c+Z9q/r3l4sYK8F7qrBsU8XF9upGsW62T9InROFF… 4 sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK9ks7jkua5YWIwByRnnnc6UPJQWI75O0e/UJdPYU1… 6 sisyphus.example.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDg4hB4vAZHJ0PVRiJajOv/GlytFWNpv5/9xgB9+5… 9 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-dss AAAAB3NzaC1kc3MAAACBAI38Hy/61/O5Bp6yUG8J5XQCeN… 11 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIBp6PVW0z2o9C4Ukv… 13 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDmbUhNabB5AmBDX6… 16 *.example.com,192.0.2.*,2001:* ssh-dss AAAAB3NzaC1kc3MAAACBAI6lz2Ip9bzE7TGuDD4SjO9S4Ac90gq0h6ai1O06… 18 *.example.com,192.0.2.*,2001:* ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBlYfExtYZAPqYvYdrlpGlSWhh/XNHcH… 20 *.example.com,192.0.2.*,2001:* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDX8F93W3SH4ZSus4XUQ2cw9dqcuyUE… 23 |1|6FWxoqTCAfm8sZ7T/q73OmxCFGM=|S4eQmusok4cbyDzzGEFGIAthDbw= ssh-dss AAAAB3NzaC1kc3MAAACBALrFy7w5ih… [all …]
|