Home
last modified time | relevance | path

Searched refs:ssh (Results 1 – 25 of 198) sorted by relevance

12345678

/netbsd-src/crypto/external/bsd/openssh/dist/
H A Dserverloop.c98 static void server_init_dispatch(struct ssh *);
123 client_alive_check(struct ssh *ssh) in client_alive_check() argument
130 ssh_packet_inc_alive_timeouts(ssh) > in client_alive_check()
132 sshpkt_fmt_connection_id(ssh, remote_id, sizeof(remote_id)); in client_alive_check()
141 if ((channel_id = channel_find_open(ssh)) == -1) { in client_alive_check()
142 if ((r = sshpkt_start(ssh, SSH2_MSG_GLOBAL_REQUEST)) != 0 || in client_alive_check()
143 (r = sshpkt_put_cstring(ssh, "keepalive@openssh.com")) in client_alive_check()
145 (r = sshpkt_put_u8(ssh, 1)) != 0) /* boolean: want reply */ in client_alive_check()
148 channel_request_start(ssh, channel_id, in client_alive_check()
151 if ((r = sshpkt_send(ssh)) != 0) in client_alive_check()
[all …]
H A Dauth2-gss.c57 static int input_gssapi_token(int type, u_int32_t plen, struct ssh *ssh);
58 static int input_gssapi_mic(int type, u_int32_t plen, struct ssh *ssh);
59 static int input_gssapi_exchange_complete(int type, u_int32_t plen, struct ssh *ssh);
60 static int input_gssapi_errtok(int, u_int32_t, struct ssh *);
67 userauth_gssapi(struct ssh *ssh, const char *method) in userauth_gssapi() argument
69 Authctxt *authctxt = ssh->authctxt; in userauth_gssapi()
78 if ((r = sshpkt_get_u32(ssh, &mechs)) != 0) in userauth_gssapi()
96 if ((r = sshpkt_get_string(ssh, &doid, &len)) != 0) in userauth_gssapi()
132 if ((r = sshpkt_start(ssh, SSH2_MSG_USERAUTH_GSSAPI_RESPONSE)) != 0 || in userauth_gssapi()
133 (r = sshpkt_put_string(ssh, doid, len)) != 0 || in userauth_gssapi()
[all …]
H A Ddispatch.c41 dispatch_protocol_error(int type, u_int32_t seq, struct ssh *ssh) in dispatch_protocol_error() argument
46 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in dispatch_protocol_error()
47 (r = sshpkt_put_u32(ssh, seq)) != 0 || in dispatch_protocol_error()
48 (r = sshpkt_send(ssh)) != 0 || in dispatch_protocol_error()
49 (r = ssh_packet_write_wait(ssh)) < 0) in dispatch_protocol_error()
50 sshpkt_fatal(ssh, r, "%s", __func__); in dispatch_protocol_error()
55 dispatch_protocol_ignore(int type, u_int32_t seq, struct ssh *ssh) in dispatch_protocol_ignore() argument
62 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt) in ssh_dispatch_init() argument
66 ssh->dispatch[i] = dflt; in ssh_dispatch_init()
70 ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn) in ssh_dispatch_range() argument
[all …]
H A Dclientloop.c164 static void client_init_dispatch(struct ssh *ssh);
244 set_control_persist_exit_time(struct ssh *ssh) in set_control_persist_exit_time() argument
250 } else if (channel_still_open(ssh)) { in set_control_persist_exit_time()
288 client_x11_get_proto(struct ssh *ssh, const char *display, in client_x11_get_proto() argument
383 channel_set_x11_refuse_time(ssh, in client_x11_get_proto()
459 client_check_window_change(struct ssh *ssh) in client_check_window_change() argument
465 channel_send_window_changes(ssh); in client_check_window_change()
469 client_global_request_reply(int type, u_int32_t seq, struct ssh *ssh) in client_global_request_reply() argument
476 gc->cb(ssh, type, seq, gc->ctx); in client_global_request_reply()
482 ssh_packet_set_alive_timeouts(ssh, 0); in client_global_request_reply()
[all …]
H A Dssh_api.h44 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params);
49 void ssh_free(struct ssh *);
54 void ssh_set_app_data(struct ssh *, void *);
55 void *ssh_get_app_data(struct ssh *);
65 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key);
73 int ssh_set_verify_host_key_callback(struct ssh *ssh,
74 int (*cb)(struct sshkey *, struct ssh *));
90 int ssh_packet_next(struct ssh *ssh, u_char *typep);
97 const u_char *ssh_packet_payload(struct ssh *ssh, size_t *lenp);
104 int ssh_packet_put(struct ssh *ssh, int type, const u_char *data,
[all …]
H A Dsession.c108 void session_set_fds(struct ssh *, Session *, int, int, int, int, int);
111 int session_setup_x11fwd(struct ssh *, Session *);
112 int do_exec_pty(struct ssh *, Session *, const char *);
113 int do_exec_no_pty(struct ssh *, Session *, const char *);
114 int do_exec(struct ssh *, Session *, const char *);
115 void do_login(struct ssh *, Session *, const char *);
116 __dead void do_child(struct ssh *, Session *, const char *);
120 static void do_authenticated2(struct ssh *, Authctxt *);
122 static int session_pty_req(struct ssh *, Session *);
177 auth_input_request_forwarding(struct ssh *ssh, struct passwd * pw) in auth_input_request_forwarding() argument
[all …]
H A Dkexgexs.c56 static int input_kex_dh_gex_request(int, u_int32_t, struct ssh *);
57 static int input_kex_dh_gex_init(int, u_int32_t, struct ssh *);
60 kexgex_server(struct ssh *ssh) in kexgex_server() argument
62 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, in kexgex_server()
69 input_kex_dh_gex_request(int type, u_int32_t seq, struct ssh *ssh) in input_kex_dh_gex_request() argument
71 struct kex *kex = ssh->kex; in input_kex_dh_gex_request()
77 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, &kex_protocol_error); in input_kex_dh_gex_request()
79 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || in input_kex_dh_gex_request()
80 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || in input_kex_dh_gex_request()
81 (r = sshpkt_get_u32(ssh, &max)) != 0 || in input_kex_dh_gex_request()
[all …]
H A Dkexgexc.c54 static int input_kex_dh_gex_group(int, u_int32_t, struct ssh *);
55 static int input_kex_dh_gex_reply(int, u_int32_t, struct ssh *);
58 kexgex_client(struct ssh *ssh) in kexgex_client() argument
60 struct kex *kex = ssh->kex; in kexgex_client()
69 if (ssh->compat & SSH_BUG_DHGEX_LARGE) in kexgex_client()
72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || in kexgex_client()
73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || in kexgex_client()
74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || in kexgex_client()
75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || in kexgex_client()
76 (r = sshpkt_send(ssh)) != 0) in kexgex_client()
[all …]
H A Dauth2-chall.c54 static int auth2_challenge_start(struct ssh *);
55 static int send_userauth_info_request(struct ssh *);
56 static int input_userauth_info_response(int, u_int32_t, struct ssh *);
202 auth2_challenge(struct ssh *ssh, char *devs) in auth2_challenge() argument
204 Authctxt *authctxt = ssh->authctxt; in auth2_challenge()
213 return auth2_challenge_start(ssh); in auth2_challenge()
218 auth2_challenge_stop(struct ssh *ssh) in auth2_challenge_stop() argument
220 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_stop()
222 ssh_dispatch_set(ssh, SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL); in auth2_challenge_stop()
231 auth2_challenge_start(struct ssh *ssh) in auth2_challenge_start() argument
[all …]
H A Dauth.h48 struct ssh;
121 int (*userauth)(struct ssh *, const char *);
144 int auth_password(struct ssh *, const char *);
146 int hostbased_key_allowed(struct ssh *, struct passwd *,
148 int user_key_allowed(struct ssh *ssh, struct passwd *, struct sshkey *,
164 int auth_krb5(struct ssh *, krb5_data *auth, char **client, krb5_data *);
170 void do_authentication2(struct ssh *);
172 void auth_log(struct ssh *, int, int, const char *, const char *);
173 void auth_maxtries_exceeded(struct ssh *) __attribute__((noreturn));
174 void userauth_finish(struct ssh *, int, const char *, const char *);
[all …]
H A Dclientloop.h41 struct ssh;
44 int client_loop(struct ssh *, int, int, int);
45 int client_x11_get_proto(struct ssh *, const char *, const char *,
47 void client_session2_setup(struct ssh *, int, int, int,
49 char *client_request_tun_fwd(struct ssh *, int, int, int,
55 void client_filter_cleanup(struct ssh *, int, void *);
56 int client_simple_escape_filter(struct ssh *, Channel *, const char *, int);
59 typedef void global_confirm_cb(struct ssh *, int, u_int32_t, void *);
64 void client_expect_confirm(struct ssh *, int, const char *,
80 void muxserver_listen(struct ssh *);
[all …]
H A Dmonitor_wrap.h34 struct ssh;
46 int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *,
50 struct passwd *mm_getpwnamallow(struct ssh *, const char *);
52 int mm_auth_password(struct ssh *, const char *);
55 int mm_user_key_allowed(struct ssh *ssh, struct passwd *, struct sshkey *, int,
57 int mm_hostbased_key_allowed(struct ssh *, struct passwd *, const char *,
62 void mm_decode_activate_server_options(struct ssh *ssh, struct sshbuf *m);
73 void mm_start_pam(struct ssh *);
86 void mm_send_keystate(struct ssh *, struct monitor*);
104 void server_process_permitopen(struct ssh *);
[all …]
H A Ddispatch.h38 struct ssh;
40 typedef int dispatch_fn(int, u_int32_t, struct ssh *);
42 int dispatch_protocol_error(int, u_int32_t, struct ssh *);
43 int dispatch_protocol_ignore(int, u_int32_t, struct ssh *);
44 void ssh_dispatch_init(struct ssh *, dispatch_fn *);
45 void ssh_dispatch_set(struct ssh *, int, dispatch_fn *);
46 void ssh_dispatch_range(struct ssh *, u_int, u_int, dispatch_fn *);
47 int ssh_dispatch_run(struct ssh *, int, volatile sig_atomic_t *);
48 void ssh_dispatch_run_fatal(struct ssh *, int, volatile sig_atomic_t *);
H A Dauth2-pubkey.c95 userauth_pubkey(struct ssh *ssh, const char *method) in userauth_pubkey() argument
97 Authctxt *authctxt = ssh->authctxt; in userauth_pubkey()
111 if ((r = sshpkt_get_u8(ssh, &have_sig)) != 0 || in userauth_pubkey()
112 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey()
113 (r = sshpkt_get_string(ssh, &pkblob, &blen)) != 0) in userauth_pubkey()
118 if ((r = sshpkt_getb_froms(ssh, &b)) != 0 || in userauth_pubkey()
121 if (ssh->kex->initial_hostkey == NULL) in userauth_pubkey()
123 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey()
192 if ((r = sshpkt_get_string(ssh, &sig, &slen)) != 0 || in userauth_pubkey()
193 (r = sshpkt_get_end(ssh)) != 0) in userauth_pubkey()
[all …]
H A Dauth-passwd.c65 int sys_auth_passwd(struct ssh *, const char *);
81 auth_password(struct ssh *ssh, const char *password) in auth_password() argument
83 Authctxt *authctxt = ssh->authctxt; in auth_password()
107 return (sys_auth_passwd(ssh, password) && ok); in auth_password()
146 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
148 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd()
158 auth_restrict_session(ssh); in sys_auth_passwd()
175 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
177 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd()
H A Dsession.h69 void do_authenticated(struct ssh *, Authctxt *);
70 void do_cleanup(struct ssh *, Authctxt *);
74 int session_input_channel_req(struct ssh *, Channel *, const char *);
75 void session_close_by_pid(struct ssh *ssh, pid_t, int);
76 void session_close_by_channel(struct ssh *, int, int, void *);
77 void session_destroy_all(struct ssh *, void (*)(Session *));
82 void session_close(struct ssh *, Session *);
85 const char *session_get_remote_name_or_ip(struct ssh *, u_int, int);
H A Dauth2-hostbased.c62 userauth_hostbased(struct ssh *ssh, const char *method) in userauth_hostbased() argument
64 Authctxt *authctxt = ssh->authctxt; in userauth_hostbased()
73 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased()
74 (r = sshpkt_get_string(ssh, &pkblob, &blen)) != 0 || in userauth_hostbased()
75 (r = sshpkt_get_cstring(ssh, &chost, NULL)) != 0 || in userauth_hostbased()
76 (r = sshpkt_get_cstring(ssh, &cuser, NULL)) != 0 || in userauth_hostbased()
77 (r = sshpkt_get_string(ssh, &sig, &slen)) != 0) in userauth_hostbased()
132 if ((r = sshbuf_put_stringb(b, ssh->kex->session_id)) != 0 || in userauth_hostbased()
151 if (mm_hostbased_key_allowed(ssh, authctxt->pw, cuser, in userauth_hostbased()
154 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat, NULL) == 0) in userauth_hostbased()
[all …]
H A Dcompat.c43 compat_banner(struct ssh *ssh, const char *version) in compat_banner() argument
129 ssh->compat = 0; in compat_banner()
134 ssh->compat = check[i].bugs; in compat_banner()
143 compat_kex_proposal(struct ssh *ssh, const char *p) in compat_kex_proposal() argument
147 if ((ssh->compat & (SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX)) == 0) in compat_kex_proposal()
150 if ((ssh->compat & SSH_BUG_CURVE25519PAD) != 0) in compat_kex_proposal()
154 if ((ssh->compat & SSH_OLD_DHGEX) != 0) { in compat_kex_proposal()
H A Dssh.c186 static int ssh_session2(struct ssh *, const struct ssh_conn_info *);
661 struct ssh *ssh = NULL; in main() local
719 if ((ssh = ssh_alloc_session_state()) == NULL) in main()
721 channel_init_channels(ssh); in main()
1342 channel_set_af(ssh, options.address_family); in main()
1588 ssh_packet_set_connection(ssh, sock, sock); in main()
1589 ssh_packet_set_mux(ssh); in main()
1611 channel_clear_timeouts(ssh); in main()
1620 channel_add_timeout(ssh, cp, i); in main()
1625 if (ssh_connect(ssh, host, options.host_arg, addrs, &hostaddr, in main()
[all …]
H A Dauth2-passwd.c55 userauth_passwd(struct ssh *ssh, const char *method) in userauth_passwd() argument
62 if ((r = sshpkt_get_u8(ssh, &change)) != 0 || in userauth_passwd()
63 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || in userauth_passwd()
64 (change && (r = sshpkt_get_cstring(ssh, NULL, NULL)) != 0) || in userauth_passwd()
65 (r = sshpkt_get_end(ssh)) != 0) { in userauth_passwd()
72 else if (mm_auth_password(ssh, password) == 1) in userauth_passwd()
H A Dmonitor_wrap.c268 mm_sshkey_sign(struct ssh *ssh, struct sshkey *key, u_char **sigp, size_t *lenp, in mm_sshkey_sign() argument
274 u_int ndx = kex->host_key_index(key, 0, ssh); in mm_sshkey_sign()
298 mm_decode_activate_server_options(struct ssh *ssh, struct sshbuf *m) in mm_decode_activate_server_options() argument
350 mm_getpwnamallow(struct ssh *ssh, const char *username) in mm_getpwnamallow() argument
393 mm_decode_activate_server_options(ssh, m); in mm_getpwnamallow()
394 server_process_permitopen(ssh); in mm_getpwnamallow()
395 server_process_channel_timeouts(ssh); in mm_getpwnamallow()
396 kex_set_server_sig_algs(ssh, options.pubkey_accepted_algos); in mm_getpwnamallow()
453 mm_auth_password(struct ssh *ssh, const char *password) in mm_auth_password() argument
492 mm_user_key_allowed(struct ssh *ssh, struct passwd *pw, struct sshkey *key, in mm_user_key_allowed() argument
[all …]
H A Dsshconnect.h52 struct ssh;
71 int ssh_connect(struct ssh *, const char *, const char *,
76 void ssh_login(struct ssh *, Sensitive *, const char *,
86 void ssh_kex2(struct ssh *ssh, char *, struct sockaddr *, u_short,
89 void ssh_userauth2(struct ssh *ssh, const char *, const char *,
/netbsd-src/etc/ssh/
H A Dssh_known_hosts3 anoncvs.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA3QiBl8leG9fqIJpKeNov0PKq5YryFFiroMWOPUv4hDFn…
7 cvs.netbsd.org,cvs4.netbsd.org,cvs6.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA1b7MS3j0v6NzPr/S…
9 cvs.netbsd.org,cvs4.netbsd.org,cvs6.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKs9vV7cSDdIw8hF…
13 ftp.netbsd.org,ftp4.netbsd.org,ftp6.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAv+tO1aHHsW1McwHg…
15 morden.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAv+tO1aHHsW1McwHgnJ28qsXn8gH8z/61yopJzmOKuHH07…
17 ftp.netbsd.org,ftp4.netbsd.org,ftp6.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILx3zN5uEgRjNYqn…
19 morden.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILx3zN5uEgRjNYqndcHwVOocWXOcHsufGsZdxNcLnJdh
25 mail.netbsd.org,homeworld.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAt8UJLhW8iou8Ack7V5XrzfCgzO…
27 mail.netbsd.org,homeworld.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFnVCBKDY0sNBJM4ip5Ql0KPsD…
31 pkgbuild.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAz2c3dFuPdL75gpvwiYinwQ5jiRlfe3HvbXbMkTvpZxL…
[all …]
/netbsd-src/crypto/external/bsd/openssh/bin/
H A DMakefile7 SUBDIR= ssh sshd ssh-add ssh-copy-id ssh-keygen ssh-agent scp \
8 sftp-server ssh-keysign ssh-keyscan sftp ssh-pkcs11-helper
13 FILESDIR= /etc/ssh
/netbsd-src/external/mit/xorg/bin/ssh-askpass/
H A DMakefile5 PROG= ssh-askpass
6 SRCS= drawing.c dynlist.c resources.c x11-ssh-askpass.c
13 FILESDIR= ${X11ROOTDIR}/share/examples/ssh-askpass
32 SRCPATH= ${X11SRCDIR.local}/programs/x11-ssh-askpass
34 ssh-askpass.1: x11-ssh-askpass.man.in
36 -e 's#@DATE@#$(DATE)#g' < ${SRCPATH}/x11-ssh-askpass.man.in > $@
46 .PATH: ${X11SRCDIR.local}/programs/x11-ssh-askpass

12345678