/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | serverloop.c | 98 static void server_init_dispatch(struct ssh *); 123 client_alive_check(struct ssh *ssh) in client_alive_check() argument 130 ssh_packet_inc_alive_timeouts(ssh) > in client_alive_check() 132 sshpkt_fmt_connection_id(ssh, remote_id, sizeof(remote_id)); in client_alive_check() 141 if ((channel_id = channel_find_open(ssh)) == -1) { in client_alive_check() 142 if ((r = sshpkt_start(ssh, SSH2_MSG_GLOBAL_REQUEST)) != 0 || in client_alive_check() 143 (r = sshpkt_put_cstring(ssh, "keepalive@openssh.com")) in client_alive_check() 145 (r = sshpkt_put_u8(ssh, 1)) != 0) /* boolean: want reply */ in client_alive_check() 148 channel_request_start(ssh, channel_id, in client_alive_check() 151 if ((r = sshpkt_send(ssh)) != 0) in client_alive_check() [all …]
|
H A D | auth2-gss.c | 57 static int input_gssapi_token(int type, u_int32_t plen, struct ssh *ssh); 58 static int input_gssapi_mic(int type, u_int32_t plen, struct ssh *ssh); 59 static int input_gssapi_exchange_complete(int type, u_int32_t plen, struct ssh *ssh); 60 static int input_gssapi_errtok(int, u_int32_t, struct ssh *); 67 userauth_gssapi(struct ssh *ssh, const char *method) in userauth_gssapi() argument 69 Authctxt *authctxt = ssh->authctxt; in userauth_gssapi() 78 if ((r = sshpkt_get_u32(ssh, &mechs)) != 0) in userauth_gssapi() 96 if ((r = sshpkt_get_string(ssh, &doid, &len)) != 0) in userauth_gssapi() 132 if ((r = sshpkt_start(ssh, SSH2_MSG_USERAUTH_GSSAPI_RESPONSE)) != 0 || in userauth_gssapi() 133 (r = sshpkt_put_string(ssh, doid, len)) != 0 || in userauth_gssapi() [all …]
|
H A D | dispatch.c | 41 dispatch_protocol_error(int type, u_int32_t seq, struct ssh *ssh) in dispatch_protocol_error() argument 46 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in dispatch_protocol_error() 47 (r = sshpkt_put_u32(ssh, seq)) != 0 || in dispatch_protocol_error() 48 (r = sshpkt_send(ssh)) != 0 || in dispatch_protocol_error() 49 (r = ssh_packet_write_wait(ssh)) < 0) in dispatch_protocol_error() 50 sshpkt_fatal(ssh, r, "%s", __func__); in dispatch_protocol_error() 55 dispatch_protocol_ignore(int type, u_int32_t seq, struct ssh *ssh) in dispatch_protocol_ignore() argument 62 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt) in ssh_dispatch_init() argument 66 ssh->dispatch[i] = dflt; in ssh_dispatch_init() 70 ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn) in ssh_dispatch_range() argument [all …]
|
H A D | clientloop.c | 164 static void client_init_dispatch(struct ssh *ssh); 244 set_control_persist_exit_time(struct ssh *ssh) in set_control_persist_exit_time() argument 250 } else if (channel_still_open(ssh)) { in set_control_persist_exit_time() 288 client_x11_get_proto(struct ssh *ssh, const char *display, in client_x11_get_proto() argument 383 channel_set_x11_refuse_time(ssh, in client_x11_get_proto() 459 client_check_window_change(struct ssh *ssh) in client_check_window_change() argument 465 channel_send_window_changes(ssh); in client_check_window_change() 469 client_global_request_reply(int type, u_int32_t seq, struct ssh *ssh) in client_global_request_reply() argument 476 gc->cb(ssh, type, seq, gc->ctx); in client_global_request_reply() 482 ssh_packet_set_alive_timeouts(ssh, 0); in client_global_request_reply() [all …]
|
H A D | ssh_api.h | 44 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params); 49 void ssh_free(struct ssh *); 54 void ssh_set_app_data(struct ssh *, void *); 55 void *ssh_get_app_data(struct ssh *); 65 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key); 73 int ssh_set_verify_host_key_callback(struct ssh *ssh, 74 int (*cb)(struct sshkey *, struct ssh *)); 90 int ssh_packet_next(struct ssh *ssh, u_char *typep); 97 const u_char *ssh_packet_payload(struct ssh *ssh, size_t *lenp); 104 int ssh_packet_put(struct ssh *ssh, int type, const u_char *data, [all …]
|
H A D | session.c | 108 void session_set_fds(struct ssh *, Session *, int, int, int, int, int); 111 int session_setup_x11fwd(struct ssh *, Session *); 112 int do_exec_pty(struct ssh *, Session *, const char *); 113 int do_exec_no_pty(struct ssh *, Session *, const char *); 114 int do_exec(struct ssh *, Session *, const char *); 115 void do_login(struct ssh *, Session *, const char *); 116 __dead void do_child(struct ssh *, Session *, const char *); 120 static void do_authenticated2(struct ssh *, Authctxt *); 122 static int session_pty_req(struct ssh *, Session *); 177 auth_input_request_forwarding(struct ssh *ssh, struct passwd * pw) in auth_input_request_forwarding() argument [all …]
|
H A D | kexgexs.c | 56 static int input_kex_dh_gex_request(int, u_int32_t, struct ssh *); 57 static int input_kex_dh_gex_init(int, u_int32_t, struct ssh *); 60 kexgex_server(struct ssh *ssh) in kexgex_server() argument 62 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, in kexgex_server() 69 input_kex_dh_gex_request(int type, u_int32_t seq, struct ssh *ssh) in input_kex_dh_gex_request() argument 71 struct kex *kex = ssh->kex; in input_kex_dh_gex_request() 77 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, &kex_protocol_error); in input_kex_dh_gex_request() 79 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || in input_kex_dh_gex_request() 80 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || in input_kex_dh_gex_request() 81 (r = sshpkt_get_u32(ssh, &max)) != 0 || in input_kex_dh_gex_request() [all …]
|
H A D | kexgexc.c | 54 static int input_kex_dh_gex_group(int, u_int32_t, struct ssh *); 55 static int input_kex_dh_gex_reply(int, u_int32_t, struct ssh *); 58 kexgex_client(struct ssh *ssh) in kexgex_client() argument 60 struct kex *kex = ssh->kex; in kexgex_client() 69 if (ssh->compat & SSH_BUG_DHGEX_LARGE) in kexgex_client() 72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || in kexgex_client() 73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || in kexgex_client() 74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || in kexgex_client() 75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || in kexgex_client() 76 (r = sshpkt_send(ssh)) != 0) in kexgex_client() [all …]
|
H A D | auth2-chall.c | 54 static int auth2_challenge_start(struct ssh *); 55 static int send_userauth_info_request(struct ssh *); 56 static int input_userauth_info_response(int, u_int32_t, struct ssh *); 202 auth2_challenge(struct ssh *ssh, char *devs) in auth2_challenge() argument 204 Authctxt *authctxt = ssh->authctxt; in auth2_challenge() 213 return auth2_challenge_start(ssh); in auth2_challenge() 218 auth2_challenge_stop(struct ssh *ssh) in auth2_challenge_stop() argument 220 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_stop() 222 ssh_dispatch_set(ssh, SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL); in auth2_challenge_stop() 231 auth2_challenge_start(struct ssh *ssh) in auth2_challenge_start() argument [all …]
|
H A D | auth.h | 48 struct ssh; 121 int (*userauth)(struct ssh *, const char *); 144 int auth_password(struct ssh *, const char *); 146 int hostbased_key_allowed(struct ssh *, struct passwd *, 148 int user_key_allowed(struct ssh *ssh, struct passwd *, struct sshkey *, 164 int auth_krb5(struct ssh *, krb5_data *auth, char **client, krb5_data *); 170 void do_authentication2(struct ssh *); 172 void auth_log(struct ssh *, int, int, const char *, const char *); 173 void auth_maxtries_exceeded(struct ssh *) __attribute__((noreturn)); 174 void userauth_finish(struct ssh *, int, const char *, const char *); [all …]
|
H A D | clientloop.h | 41 struct ssh; 44 int client_loop(struct ssh *, int, int, int); 45 int client_x11_get_proto(struct ssh *, const char *, const char *, 47 void client_session2_setup(struct ssh *, int, int, int, 49 char *client_request_tun_fwd(struct ssh *, int, int, int, 55 void client_filter_cleanup(struct ssh *, int, void *); 56 int client_simple_escape_filter(struct ssh *, Channel *, const char *, int); 59 typedef void global_confirm_cb(struct ssh *, int, u_int32_t, void *); 64 void client_expect_confirm(struct ssh *, int, const char *, 80 void muxserver_listen(struct ssh *); [all …]
|
H A D | monitor_wrap.h | 34 struct ssh; 46 int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *, 50 struct passwd *mm_getpwnamallow(struct ssh *, const char *); 52 int mm_auth_password(struct ssh *, const char *); 55 int mm_user_key_allowed(struct ssh *ssh, struct passwd *, struct sshkey *, int, 57 int mm_hostbased_key_allowed(struct ssh *, struct passwd *, const char *, 62 void mm_decode_activate_server_options(struct ssh *ssh, struct sshbuf *m); 73 void mm_start_pam(struct ssh *); 86 void mm_send_keystate(struct ssh *, struct monitor*); 104 void server_process_permitopen(struct ssh *); [all …]
|
H A D | dispatch.h | 38 struct ssh; 40 typedef int dispatch_fn(int, u_int32_t, struct ssh *); 42 int dispatch_protocol_error(int, u_int32_t, struct ssh *); 43 int dispatch_protocol_ignore(int, u_int32_t, struct ssh *); 44 void ssh_dispatch_init(struct ssh *, dispatch_fn *); 45 void ssh_dispatch_set(struct ssh *, int, dispatch_fn *); 46 void ssh_dispatch_range(struct ssh *, u_int, u_int, dispatch_fn *); 47 int ssh_dispatch_run(struct ssh *, int, volatile sig_atomic_t *); 48 void ssh_dispatch_run_fatal(struct ssh *, int, volatile sig_atomic_t *);
|
H A D | auth2-pubkey.c | 95 userauth_pubkey(struct ssh *ssh, const char *method) in userauth_pubkey() argument 97 Authctxt *authctxt = ssh->authctxt; in userauth_pubkey() 111 if ((r = sshpkt_get_u8(ssh, &have_sig)) != 0 || in userauth_pubkey() 112 (r = sshpkt_get_cstring(ssh, &pkalg, NULL)) != 0 || in userauth_pubkey() 113 (r = sshpkt_get_string(ssh, &pkblob, &blen)) != 0) in userauth_pubkey() 118 if ((r = sshpkt_getb_froms(ssh, &b)) != 0 || in userauth_pubkey() 121 if (ssh->kex->initial_hostkey == NULL) in userauth_pubkey() 123 if (!sshkey_equal(hostkey, ssh->kex->initial_hostkey)) in userauth_pubkey() 192 if ((r = sshpkt_get_string(ssh, &sig, &slen)) != 0 || in userauth_pubkey() 193 (r = sshpkt_get_end(ssh)) != 0) in userauth_pubkey() [all …]
|
H A D | auth-passwd.c | 65 int sys_auth_passwd(struct ssh *, const char *); 81 auth_password(struct ssh *ssh, const char *password) in auth_password() argument 83 Authctxt *authctxt = ssh->authctxt; in auth_password() 107 return (sys_auth_passwd(ssh, password) && ok); in auth_password() 146 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument 148 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() 158 auth_restrict_session(ssh); in sys_auth_passwd() 175 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument 177 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd()
|
H A D | session.h | 69 void do_authenticated(struct ssh *, Authctxt *); 70 void do_cleanup(struct ssh *, Authctxt *); 74 int session_input_channel_req(struct ssh *, Channel *, const char *); 75 void session_close_by_pid(struct ssh *ssh, pid_t, int); 76 void session_close_by_channel(struct ssh *, int, int, void *); 77 void session_destroy_all(struct ssh *, void (*)(Session *)); 82 void session_close(struct ssh *, Session *); 85 const char *session_get_remote_name_or_ip(struct ssh *, u_int, int);
|
H A D | auth2-hostbased.c | 62 userauth_hostbased(struct ssh *ssh, const char *method) in userauth_hostbased() argument 64 Authctxt *authctxt = ssh->authctxt; in userauth_hostbased() 73 if ((r = sshpkt_get_cstring(ssh, &pkalg, &alen)) != 0 || in userauth_hostbased() 74 (r = sshpkt_get_string(ssh, &pkblob, &blen)) != 0 || in userauth_hostbased() 75 (r = sshpkt_get_cstring(ssh, &chost, NULL)) != 0 || in userauth_hostbased() 76 (r = sshpkt_get_cstring(ssh, &cuser, NULL)) != 0 || in userauth_hostbased() 77 (r = sshpkt_get_string(ssh, &sig, &slen)) != 0) in userauth_hostbased() 132 if ((r = sshbuf_put_stringb(b, ssh->kex->session_id)) != 0 || in userauth_hostbased() 151 if (mm_hostbased_key_allowed(ssh, authctxt->pw, cuser, in userauth_hostbased() 154 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat, NULL) == 0) in userauth_hostbased() [all …]
|
H A D | compat.c | 43 compat_banner(struct ssh *ssh, const char *version) in compat_banner() argument 129 ssh->compat = 0; in compat_banner() 134 ssh->compat = check[i].bugs; in compat_banner() 143 compat_kex_proposal(struct ssh *ssh, const char *p) in compat_kex_proposal() argument 147 if ((ssh->compat & (SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX)) == 0) in compat_kex_proposal() 150 if ((ssh->compat & SSH_BUG_CURVE25519PAD) != 0) in compat_kex_proposal() 154 if ((ssh->compat & SSH_OLD_DHGEX) != 0) { in compat_kex_proposal()
|
H A D | ssh.c | 186 static int ssh_session2(struct ssh *, const struct ssh_conn_info *); 661 struct ssh *ssh = NULL; in main() local 719 if ((ssh = ssh_alloc_session_state()) == NULL) in main() 721 channel_init_channels(ssh); in main() 1342 channel_set_af(ssh, options.address_family); in main() 1588 ssh_packet_set_connection(ssh, sock, sock); in main() 1589 ssh_packet_set_mux(ssh); in main() 1611 channel_clear_timeouts(ssh); in main() 1620 channel_add_timeout(ssh, cp, i); in main() 1625 if (ssh_connect(ssh, host, options.host_arg, addrs, &hostaddr, in main() [all …]
|
H A D | auth2-passwd.c | 55 userauth_passwd(struct ssh *ssh, const char *method) in userauth_passwd() argument 62 if ((r = sshpkt_get_u8(ssh, &change)) != 0 || in userauth_passwd() 63 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || in userauth_passwd() 64 (change && (r = sshpkt_get_cstring(ssh, NULL, NULL)) != 0) || in userauth_passwd() 65 (r = sshpkt_get_end(ssh)) != 0) { in userauth_passwd() 72 else if (mm_auth_password(ssh, password) == 1) in userauth_passwd()
|
H A D | monitor_wrap.c | 268 mm_sshkey_sign(struct ssh *ssh, struct sshkey *key, u_char **sigp, size_t *lenp, in mm_sshkey_sign() argument 274 u_int ndx = kex->host_key_index(key, 0, ssh); in mm_sshkey_sign() 298 mm_decode_activate_server_options(struct ssh *ssh, struct sshbuf *m) in mm_decode_activate_server_options() argument 350 mm_getpwnamallow(struct ssh *ssh, const char *username) in mm_getpwnamallow() argument 393 mm_decode_activate_server_options(ssh, m); in mm_getpwnamallow() 394 server_process_permitopen(ssh); in mm_getpwnamallow() 395 server_process_channel_timeouts(ssh); in mm_getpwnamallow() 396 kex_set_server_sig_algs(ssh, options.pubkey_accepted_algos); in mm_getpwnamallow() 453 mm_auth_password(struct ssh *ssh, const char *password) in mm_auth_password() argument 492 mm_user_key_allowed(struct ssh *ssh, struct passwd *pw, struct sshkey *key, in mm_user_key_allowed() argument [all …]
|
H A D | sshconnect.h | 52 struct ssh; 71 int ssh_connect(struct ssh *, const char *, const char *, 76 void ssh_login(struct ssh *, Sensitive *, const char *, 86 void ssh_kex2(struct ssh *ssh, char *, struct sockaddr *, u_short, 89 void ssh_userauth2(struct ssh *ssh, const char *, const char *,
|
/netbsd-src/etc/ssh/ |
H A D | ssh_known_hosts | 3 anoncvs.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA3QiBl8leG9fqIJpKeNov0PKq5YryFFiroMWOPUv4hDFn… 7 cvs.netbsd.org,cvs4.netbsd.org,cvs6.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA1b7MS3j0v6NzPr/S… 9 cvs.netbsd.org,cvs4.netbsd.org,cvs6.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKs9vV7cSDdIw8hF… 13 ftp.netbsd.org,ftp4.netbsd.org,ftp6.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAv+tO1aHHsW1McwHg… 15 morden.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAv+tO1aHHsW1McwHgnJ28qsXn8gH8z/61yopJzmOKuHH07… 17 ftp.netbsd.org,ftp4.netbsd.org,ftp6.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILx3zN5uEgRjNYqn… 19 morden.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILx3zN5uEgRjNYqndcHwVOocWXOcHsufGsZdxNcLnJdh 25 mail.netbsd.org,homeworld.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAt8UJLhW8iou8Ack7V5XrzfCgzO… 27 mail.netbsd.org,homeworld.netbsd.org ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFnVCBKDY0sNBJM4ip5Ql0KPsD… 31 pkgbuild.netbsd.org ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAz2c3dFuPdL75gpvwiYinwQ5jiRlfe3HvbXbMkTvpZxL… [all …]
|
/netbsd-src/crypto/external/bsd/openssh/bin/ |
H A D | Makefile | 7 SUBDIR= ssh sshd ssh-add ssh-copy-id ssh-keygen ssh-agent scp \ 8 sftp-server ssh-keysign ssh-keyscan sftp ssh-pkcs11-helper 13 FILESDIR= /etc/ssh
|
/netbsd-src/external/mit/xorg/bin/ssh-askpass/ |
H A D | Makefile | 5 PROG= ssh-askpass 6 SRCS= drawing.c dynlist.c resources.c x11-ssh-askpass.c 13 FILESDIR= ${X11ROOTDIR}/share/examples/ssh-askpass 32 SRCPATH= ${X11SRCDIR.local}/programs/x11-ssh-askpass 34 ssh-askpass.1: x11-ssh-askpass.man.in 36 -e 's#@DATE@#$(DATE)#g' < ${SRCPATH}/x11-ssh-askpass.man.in > $@ 46 .PATH: ${X11SRCDIR.local}/programs/x11-ssh-askpass
|