/freebsd/crypto/openssh/ |
H A D | packet.h | 13 * called by a name other than "ssh" or "Secure Shell". 54 struct ssh { struct 93 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *, argument 96 struct ssh *ssh_alloc_session_state(void); 97 struct ssh *ssh_packet_set_connection(struct ssh *, int, int); 98 void ssh_packet_set_timeout(struct ssh *, int, int); 99 int ssh_packet_stop_discard(struct ssh *); 100 int ssh_packet_connection_af(struct ssh *); 101 void ssh_packet_set_nonblocking(struct ssh *); 102 int ssh_packet_get_connection_in(struct ssh *); [all …]
|
H A D | ssh_api.c | 42 int _ssh_exchange_banner(struct ssh *); 43 int _ssh_send_banner(struct ssh *, struct sshbuf *); 44 int _ssh_read_banner(struct ssh *, struct sshbuf *); 45 int _ssh_order_hostkeyalgs(struct ssh *); 46 int _ssh_verify_host_key(struct sshkey *, struct ssh *); 47 struct sshkey *_ssh_host_public_key(int, int, struct ssh *); 48 struct sshkey *_ssh_host_private_key(int, int, struct ssh *); 49 int _ssh_host_key_sign(struct ssh *, struct sshkey *, struct sshkey *, 87 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) in ssh_init() 91 struct ssh *ssh; in ssh_init() local [all …]
|
H A D | packet.c | 13 * called by a name other than "ssh" or "Secure Shell". 95 #include "ssh.h" 230 struct ssh * 233 struct ssh *ssh = NULL; in ssh_alloc_session_state() local 236 if ((ssh = calloc(1, sizeof(*ssh))) == NULL || in ssh_alloc_session_state() 238 (ssh->kex = kex_new()) == NULL || in ssh_alloc_session_state() 245 TAILQ_INIT(&ssh->private_keys); in ssh_alloc_session_state() 246 TAILQ_INIT(&ssh->public_keys); in ssh_alloc_session_state() 258 ssh->state = state; in ssh_alloc_session_state() 259 return ssh; in ssh_alloc_session_state() [all …]
|
H A D | serverloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 95 static void server_init_dispatch(struct ssh *); 107 client_alive_check(struct ssh *ssh) in client_alive_check() argument 114 ssh_packet_inc_alive_timeouts(ssh) > in client_alive_check() 116 sshpkt_fmt_connection_id(ssh, remote_id, sizeof(remote_id)); in client_alive_check() 125 if ((channel_id = channel_find_open(ssh)) == -1) { in client_alive_check() 126 if ((r = sshpkt_start(ssh, SSH2_MSG_GLOBAL_REQUEST)) != 0 || in client_alive_check() 127 (r = sshpkt_put_cstring(ssh, "keepalive@openssh.com")) in client_alive_check() 129 (r = sshpkt_put_u8(ssh, 1)) != 0) /* boolean: want reply */ in client_alive_check() 132 channel_request_start(ssh, channel_id, in client_alive_check() [all …]
|
H A D | channels.h | 12 * called by a name other than "ssh" or "Secure Shell". 85 struct ssh; 89 typedef void channel_open_fn(struct ssh *, int, int, void *); 90 typedef void channel_callback_fn(struct ssh *, int, int, void *); 91 typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int); 92 typedef void channel_filter_cleanup_fn(struct ssh *, int, void *); 93 typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *, 97 typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *); 98 typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *); 115 typedef int mux_callback_fn(struct ssh *, struct Channel *); [all …]
|
H A D | auth2-gss.c | 48 #include "ssh-gss.h" 56 static int input_gssapi_token(int type, u_int32_t plen, struct ssh *ssh); 57 static int input_gssapi_mic(int type, u_int32_t plen, struct ssh *ssh); 58 static int input_gssapi_exchange_complete(int type, u_int32_t plen, struct ssh *ssh); 59 static int input_gssapi_errtok(int, u_int32_t, struct ssh *); 66 userauth_gssapi(struct ssh *ssh, const char *method) in userauth_gssapi() argument 68 Authctxt *authctxt = ssh->authctxt; in userauth_gssapi() 77 if ((r = sshpkt_get_u32(ssh, &mechs)) != 0) in userauth_gssapi() 95 if ((r = sshpkt_get_string(ssh, &doid, &len)) != 0) in userauth_gssapi() 131 if ((r = sshpkt_start(ssh, SSH2_MSG_USERAUTH_GSSAPI_RESPONSE)) != 0 || in userauth_gssapi() [all …]
|
H A D | kex.c | 45 #include "ssh.h" 68 static int kex_choose_conf(struct ssh *, uint32_t seq); 69 static int kex_input_newkeys(int, u_int32_t, struct ssh *); 91 kex_proposal_populate_entries(struct ssh *ssh, char *prop[PROPOSAL_MAX], in kex_proposal_populate_entries() argument 97 const char **defprop = ssh->kex->server ? defpropserver : defpropclient; in kex_proposal_populate_entries() 107 if ((cp = kex_names_cat(kexalgos, ssh->kex->server ? in kex_proposal_populate_entries() 115 prop[i] = compat_kex_proposal(ssh, cp); in kex_proposal_populate_entries() 236 kex_protocol_error(int type, u_int32_t seq, struct ssh *ssh) in kex_protocol_error() argument 241 if ((ssh->kex->flags & KEX_INITIAL) && ssh->kex->kex_strict) { in kex_protocol_error() 242 ssh_packet_disconnect(ssh, "strict KEX violation: " in kex_protocol_error() [all …]
|
H A D | sshconnect2.c | 51 #include "ssh.h" 75 #include "ssh-sk.h" 79 #include "ssh-gss.h" 94 verify_host_key_callback(struct sshkey *hostkey, struct ssh *ssh) in verify_host_key_callback() argument 218 ssh_kex2(struct ssh *ssh, char *host, struct sockaddr *hostaddr, u_short port, in ssh_kex2() argument 230 ssh_packet_set_rekey_limits(ssh, options.rekey_limit, in ssh_kex2() 253 kex_proposal_populate_entries(ssh, myproposal, in ssh_kex2() 261 if ((r = kex_setup(ssh, myproposal)) != 0) in ssh_kex2() 264 ssh->kex->kex[KEX_DH_GRP1_SHA1] = kex_gen_client; in ssh_kex2() 265 ssh->kex->kex[KEX_DH_GRP14_SHA1] = kex_gen_client; in ssh_kex2() [all …]
|
H A D | channels.c | 14 * called by a name other than "ssh" or "Secure Shell". 75 #include "ssh.h" 101 typedef void chan_fn(struct ssh *, Channel *c); 216 static void port_open_helper(struct ssh *ssh, Channel *c, char *rtype); 222 static Channel *rdynamic_connect_prepare(struct ssh *, char *, char *); 223 static int rdynamic_connect_finish(struct ssh *, Channel *); 231 channel_init_channels(struct ssh *ssh) in channel_init_channels() argument 242 ssh->chanctxt = sc; in channel_init_channels() 246 channel_by_id(struct ssh *ssh, int id) in channel_by_id() argument 250 if (id < 0 || (u_int)id >= ssh->chanctxt->channels_alloc) { in channel_by_id() [all …]
|
H A D | dispatch.c | 40 dispatch_protocol_error(int type, u_int32_t seq, struct ssh *ssh) in dispatch_protocol_error() argument 45 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || in dispatch_protocol_error() 46 (r = sshpkt_put_u32(ssh, seq)) != 0 || in dispatch_protocol_error() 47 (r = sshpkt_send(ssh)) != 0 || in dispatch_protocol_error() 48 (r = ssh_packet_write_wait(ssh)) != 0) in dispatch_protocol_error() 49 sshpkt_fatal(ssh, r, "%s", __func__); in dispatch_protocol_error() 54 dispatch_protocol_ignore(int type, u_int32_t seq, struct ssh *ssh) in dispatch_protocol_ignore() argument 61 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt) in ssh_dispatch_init() argument 65 ssh->dispatch[i] = dflt; in ssh_dispatch_init() 69 ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn) in ssh_dispatch_range() argument [all …]
|
H A D | nchan.c | 45 * SSH Protocol 1.5 aka New Channel Protocol 65 * See the debugging output from 'ssh -v' and 'sshd -d' of 66 * ssh-1.2.27 as an example. 77 static void chan_send_eof2(struct ssh *, Channel *); 78 static void chan_send_eow2(struct ssh *, Channel *); 81 static void chan_shutdown_write(struct ssh *, Channel *); 82 static void chan_shutdown_read(struct ssh *, Channel *); 83 static void chan_shutdown_extended_read(struct ssh *, Channel *); 113 chan_read_failed(struct ssh *ssh, Channel *c) in chan_read_failed() argument 118 chan_shutdown_read(ssh, c); in chan_read_failed() [all …]
|
H A D | ssh_api.h | 29 #include "ssh.h" 37 /* public SSH API functions */ 40 * ssh_init() create a ssh connection object with given (optional) 43 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params); 46 * release ssh connection state. 48 void ssh_free(struct ssh *); 53 void ssh_set_app_data(struct ssh *, void *); 54 void *ssh_get_app_data(struct ssh *); 57 * ssh_add_hostkey() registers a private/public hostkey for an ssh 64 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key); [all …]
|
H A D | clientloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 94 #include "ssh.h" 168 static void client_init_dispatch(struct ssh *ssh); 185 /* XXX move to struct ssh? */ 245 set_control_persist_exit_time(struct ssh *ssh) in set_control_persist_exit_time() argument 251 } else if (channel_still_open(ssh)) { in set_control_persist_exit_time() 289 client_x11_get_proto(struct ssh *ssh, const char *display, in client_x11_get_proto() argument 338 * ssh's willingness to forward X11 connections to in client_x11_get_proto() 384 channel_set_x11_refuse_time(ssh, in client_x11_get_proto() 460 client_check_window_change(struct ssh *ssh) in client_check_window_change() argument [all …]
|
H A D | Makefile.in | 23 SSH_PROGRAM=@bindir@/ssh 24 ASKPASS_PROGRAM=$(libexecdir)/ssh-askpass 26 SSH_KEYSIGN=$(libexecdir)/ssh-keysign 28 SSH_PKCS11_HELPER=$(libexecdir)/ssh-pkcs11-helper 29 SSH_SK_HELPER=$(libexecdir)/ssh-sk-helper 74 …ssh$(EXEEXT) sshd$(EXEEXT) sshd-session$(EXEEXT) ssh-add$(EXEEXT) ssh-keygen$(EXEEXT) ssh-keyscan$… 77 ssh-xmss.o \ 105 monitor_fdpass.o rijndael.o ssh-dss.o ssh-ecdsa.o ssh-ecdsa-sk.o \ 106 ssh-ed25519-sk.o ssh-rsa.o dh.o \ 108 ssh-pkcs11.o smult_curve25519_ref.o \ [all …]
|
H A D | kexgexs.c | 50 #include "ssh-gss.h" 58 static int input_kex_dh_gex_request(int, u_int32_t, struct ssh *); 59 static int input_kex_dh_gex_init(int, u_int32_t, struct ssh *); 62 kexgex_server(struct ssh *ssh) in kexgex_server() argument 64 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, in kexgex_server() 71 input_kex_dh_gex_request(int type, u_int32_t seq, struct ssh *ssh) in input_kex_dh_gex_request() argument 73 struct kex *kex = ssh->kex; in input_kex_dh_gex_request() 79 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, &kex_protocol_error); in input_kex_dh_gex_request() 81 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || in input_kex_dh_gex_request() 82 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || in input_kex_dh_gex_request() [all …]
|
H A D | ssh-add.1 | 1 .\" $OpenBSD: ssh-add.1,v 1.87 2024/06/17 08:30:29 djm Exp $ 11 .\" called by a name other than "ssh" or "Secure Shell". 42 .Nm ssh-add 45 .Nm ssh-add 53 .Nm ssh-add 57 .Nm ssh-add 59 .Nm ssh-add 65 .Xr ssh-agent 1 . 67 .Pa ~/.ssh/id_rsa , 68 .Pa ~/.ssh/id_ecdsa , [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshcfgparse.sh | 4 tid="ssh config parse" 9 ssh-dss) dsa=1 ;; 33 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 && 34 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 && 37 verbose "ssh -W opts" 38 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'` 40 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'` 42 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \ 46 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'` 48 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'` [all …]
|
H A D | agent.sh | 8 fail "ssh-add -l did not fail with exit code 2" 12 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s` >`ssh_logfile ssh-agent` 15 fatal "could not start ssh-agent: exit code $r" 21 fatal "could not start second ssh-agent: exit code $r" 26 fail "ssh-add -l did not fail with exit code 1" 31 || fatal "ssh-keygen failed" 40 fatal "ssh-keygen for $t-agent failed" 50 fail "ssh-add failed exit code $?" 55 fail "ssh-add failed exit code $?" 71 fail "ssh-add -l failed: exit code $r" [all …]
|
H A D | limit-keytype.sh | 18 ssh-rsa) ktype2=rsa ;; 20 ssh-dss) ktype4=dsa ;; 21 sk-ssh-ed25519@openssh.com) ktype5=ed25519-sk ;; 28 fatal "ssh-keygen failed" 32 fatal "ssh-keygen failed" 34 fatal "ssh-keygen failed" 36 fatal "ssh-keygen failed" 38 fatal "ssh-keygen failed" 40 fatal "ssh-keygen failed" 42 fatal "ssh-keygen failed" [all …]
|
H A D | cert-file.sh | 4 tid="ssh with certificates" 11 fatal "ssh-keygen failed" 13 fatal "ssh-keygen failed" 17 fatal "ssh-keygen failed" 19 fatal "ssh-keygen failed" 21 fatal "ssh-keygen failed" 23 fatal "ssh-keygen failed" 25 fatal "ssh-keygen failed" 59 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \ 61 [ $? -ne 52 ] && fail "ssh failed" [all …]
|
H A D | cert-userkey.sh | 10 PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'` 23 sk-ssh-ed25519*) n="sk-ssh-ed25519" ;; 25 *) n=$(echo $1 | sed 's/^dsa/ssh-dss/;s/^rsa/ssh-rsa/;s/^ed/ssh-ed/') ;; 28 echo "$n*,ssh-ed25519*" 30 echo "$n*,ssh-rsa*,ssh-ed25519*" 41 fail "ssh-keygen of user_ca_key failed" 48 fatal "ssh-keygen of cert_user_key_${ktype} failed" 82 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 85 fail "ssh cert connect succeeded unexpectedly" 91 ${SSH} -i $OBJ/cert_user_key_${ktype} \ [all …]
|
/freebsd/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 8 # The version of x11-ssh-askpass to use 14 Summary: OpenSSH, a free Secure Shell (SSH) protocol implementation 20 Source1: x11-ssh-askpass-%{xversion}.tar.gz 22 Group: Productivity/Networking/SSH 25 Obsoletes: ssh 26 Provides: ssh 41 Group: Productivity/Networking/SSH 43 Obsoletes: ssh-extras 44 Provides: openssh:${_libdir}/ssh/ssh-askpass 51 Ssh (Secure Shell) is a program for logging into a remote machine and for [all …]
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | mktestdata.sh | 89 ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1 -m PEM 90 ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1 -m PEM 91 ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1 -m PEM 92 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1 93 ssh-keygen -w "$SK_DUMMY" -t ecdsa-sk -C "ECDSA-SK test key #1" \ 95 ssh-keygen -w "$SK_DUMMY" -t ed25519-sk -C "ED25519-SK test key #1" \ 99 ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2 -m PEM 100 ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_2 -m PEM 101 ssh-keygen -t ecdsa -b 521 -C "ECDSA test key #2" -N "" -f ecdsa_2 -m PEM 102 ssh-keygen -t ed25519 -C "ED25519 test key #2" -N "" -f ed25519_2 [all …]
|
/freebsd/crypto/openssh/regress/unittests/hostkeys/testdata/ |
H A D | known_hosts | 2 sisyphus.example.com ssh-dss AAAAB3NzaC1kc3MAAACBAOqffHxEW4c+Z9q/r3l4sYK8F7qrBsU8XF9upGsW62T9InROFF… 4 sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK9ks7jkua5YWIwByRnnnc6UPJQWI75O0e/UJdPYU1… 5 sisyphus.example.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDg4hB4vAZHJ0PVRiJajOv/GlytFWNpv5/9xgB9+5… 8 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-dss AAAAB3NzaC1kc3MAAACBAI38Hy/61/O5Bp6yUG8J5XQCeN… 10 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIBp6PVW0z2o9C4Ukv… 11 prometheus.example.com,192.0.2.1,2001:db8::1 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDmbUhNabB5AmBDX6… 14 *.example.com,192.0.2.*,2001:* ssh-dss AAAAB3NzaC1kc3MAAACBAI6lz2Ip9bzE7TGuDD4SjO9S4Ac90gq0h6ai1O06… 16 *.example.com,192.0.2.*,2001:* ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBlYfExtYZAPqYvYdrlpGlSWhh/XNHcH… 17 *.example.com,192.0.2.*,2001:* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDX8F93W3SH4ZSus4XUQ2cw9dqcuyUE… 20 |1|z3xOIdT5ue3Vuf3MzT67kaioqjw=|GZhhe5uwDOBQrC9N4cCjpbLpSn4= ssh-dss AAAAB3NzaC1kc3MAAACBALrFy7w5ih… [all …]
|
/freebsd/crypto/openssh/contrib/ |
H A D | ssh-copy-id.1 | 28 .Nm ssh-copy-id 49 .Xr ssh 1 56 .Xr ssh-agent 1 59 .Xr ssh 1 , 62 .Pa ~/.ssh/authorized_keys 66 .Ql set ssh pka-dsa key ... 75 .Xr ssh-add 1 101 .Pa ~/.ssh/authorized_keys 107 (defaults to ".ssh/authorized_keys") 112 to ssh/sftp, [all …]
|