/external/libnetfilter_conntrack/src/expect/ |
H A D | build.c | 52 int __build_expect(struct nfnl_subsys_handle *ssh, argument 70 nfnl_fill_hdr(ssh, &req->nlh, 0, l3num, 0, type, flags);
|
H A D | api.c | 490 * \param ssh nfnetlink subsystem handler 504 int nfexp_build_expect(struct nfnl_subsys_handle *ssh, argument 511 assert(ssh != NULL); 515 return __build_expect(ssh, req, size, type, flags, exp); 519 __build_query_exp(struct nfnl_subsys_handle *ssh, argument 526 assert(ssh != NULL); 534 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_NEW, NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK|NLM_F_EXCL, data); 537 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_NEW, NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK, data); 540 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_GET, NLM_F_REQUEST|NLM_F_ACK, data); 543 __build_expect(ssh, re 588 nfexp_build_query(struct nfnl_subsys_handle *ssh, const enum nf_conntrack_query qt, const void *data, void *buffer, unsigned int size) argument [all...] |
/external/openssh/ |
H A D | kexc25519c.c | 50 kexc25519_client(struct ssh *ssh) argument 52 struct kex *kex = ssh->kex; 60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 63 (r = sshpkt_send(ssh)) != 0) 67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply); 74 struct ssh *ssh = ctxt; local 75 struct kex *kex = ssh [all...] |
H A D | kexdhc.c | 55 kexdh_client(struct ssh *ssh) argument 57 struct kex *kex = ssh->kex; 78 (r = sshpkt_start(ssh, SSH2_MSG_KEXDH_INIT)) != 0 || 79 (r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 || 80 (r = sshpkt_send(ssh)) != 0) 89 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_REPLY, &input_kex_dh); 98 struct ssh *ssh = ctxt; local 99 struct kex *kex = ssh [all...] |
H A D | dispatch.c | 44 struct ssh *ssh = active_state; /* XXX */ local 50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || 51 (r = sshpkt_put_u32(ssh, seq)) != 0 || 52 (r = sshpkt_send(ssh)) != 0 || 53 (r = ssh_packet_write_wait(ssh)) != 0) 54 sshpkt_fatal(ssh, __func__, r); 59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh) argument 66 ssh_dispatch_init(struct ssh *ssh, dispatch_f argument 74 ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn) argument 86 ssh_dispatch_set(struct ssh *ssh, int type, dispatch_fn *fn) argument 92 ssh_dispatch_run(struct ssh *ssh, int mode, volatile sig_atomic_t *done, void *ctxt) argument 135 ssh_dispatch_run_fatal(struct ssh *ssh, int mode, volatile sig_atomic_t *done, void *ctxt) argument [all...] |
H A D | kexc25519s.c | 47 kexc25519_server(struct ssh *ssh) argument 50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init); 57 struct ssh *ssh = ctxt; local 58 struct kex *kex = ssh->kex; 80 kex->hostkey_nid, ssh); 82 kex->hostkey_nid, ssh); 88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || 89 (r = sshpkt_get_end(ssh)) ! [all...] |
H A D | kexdhs.c | 55 kexdh_server(struct ssh *ssh) argument 57 struct kex *kex = ssh->kex; 80 ssh_dispatch_set(ssh, SSH2_MSG_KEXDH_INIT, &input_kex_dh_init); 89 struct ssh *ssh = ctxt; local 90 struct kex *kex = ssh->kex; 105 kex->hostkey_nid, ssh); 107 kex->hostkey_nid, ssh); 118 if ((r = sshpkt_get_bignum2(ssh, dh_client_pu [all...] |
H A D | kexecdhc.c | 55 kexecdh_client(struct ssh *ssh) argument 57 struct kex *kex = ssh->kex; 74 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || 75 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 || 76 (r = sshpkt_send(ssh)) != 0) 89 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_ecdh_reply); 100 struct ssh *ssh = ctxt; local 101 struct kex *kex = ssh [all...] |
H A D | kexecdhs.c | 53 kexecdh_server(struct ssh *ssh) argument 56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init); 63 struct ssh *ssh = ctxt; local 64 struct kex *kex = ssh->kex; 99 kex->hostkey_nid, ssh); 101 kex->hostkey_nid, ssh); 110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 || 111 (r = sshpkt_get_end(ssh)) ! [all...] |
H A D | kexgexc.c | 58 kexgex_client(struct ssh *ssh) argument 60 struct kex *kex = ssh->kex; 72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || 73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || 74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || 75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || 76 (r = sshpkt_send(ssh)) != 0) 84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, 94 struct ssh *ss local 148 struct ssh *ssh = ctxt; local [all...] |
H A D | kexgexs.c | 50 #include "ssh-gss.h" 61 kexgex_server(struct ssh *ssh) argument 63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, 72 struct ssh *ssh = ctxt; local 73 struct kex *kex = ssh->kex; 78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || 79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || 80 (r = sshpkt_get_u32(ssh, 125 struct ssh *ssh = ctxt; local [all...] |
H A D | packet.h | 13 * called by a name other than "ssh" or "Secure Shell". 52 struct ssh { struct 79 struct ssh *ssh_alloc_session_state(void); 80 struct ssh *ssh_packet_set_connection(struct ssh *, int, int); 81 void ssh_packet_set_timeout(struct ssh *, int, int); 82 int ssh_packet_stop_discard(struct ssh *); 83 int ssh_packet_connection_af(struct ssh *); 84 void ssh_packet_set_nonblocking(struct ssh *); 85 int ssh_packet_get_connection_in(struct ssh *); [all...] |
H A D | opacket.c | 9 struct ssh *active_state, *backup_state; 14 ssh_packet_start(struct ssh *ssh, u_char type) argument 18 if ((r = sshpkt_start(ssh, type)) != 0) 23 ssh_packet_put_char(struct ssh *ssh, int value) argument 28 if ((r = sshpkt_put_u8(ssh, ch)) != 0) 33 ssh_packet_put_int(struct ssh *ssh, u_int value) argument 37 if ((r = sshpkt_put_u32(ssh, valu 42 ssh_packet_put_int64(struct ssh *ssh, u_int64_t value) argument 51 ssh_packet_put_string(struct ssh *ssh, const void *buf, u_int len) argument 60 ssh_packet_put_cstring(struct ssh *ssh, const char *str) argument 69 ssh_packet_put_raw(struct ssh *ssh, const void *buf, u_int len) argument 79 ssh_packet_put_bignum(struct ssh *ssh, BIGNUM * value) argument 90 ssh_packet_put_bignum2(struct ssh *ssh, BIGNUM * value) argument 100 ssh_packet_put_ecpoint(struct ssh *ssh, const EC_GROUP *curve, const EC_POINT *point) argument 112 ssh_packet_send(struct ssh *ssh) argument 121 ssh_packet_get_char(struct ssh *ssh) argument 132 ssh_packet_get_int(struct ssh *ssh) argument 143 ssh_packet_get_int64(struct ssh *ssh) argument 155 ssh_packet_get_bignum(struct ssh *ssh, BIGNUM * value) argument 166 ssh_packet_get_bignum2(struct ssh *ssh, BIGNUM * value) argument 176 ssh_packet_get_ecpoint(struct ssh *ssh, const EC_GROUP *curve, EC_POINT *point) argument 187 ssh_packet_get_string(struct ssh *ssh, u_int *length_ptr) argument 201 ssh_packet_get_string_ptr(struct ssh *ssh, u_int *length_ptr) argument 215 ssh_packet_get_cstring(struct ssh *ssh, u_int *length_ptr) argument [all...] |
H A D | ssh_api.c | 36 int _ssh_exchange_banner(struct ssh *); 37 int _ssh_send_banner(struct ssh *, char **); 38 int _ssh_read_banner(struct ssh *, char **); 39 int _ssh_order_hostkeyalgs(struct ssh *); 40 int _ssh_verify_host_key(struct sshkey *, struct ssh *); 41 struct sshkey *_ssh_host_public_key(int, int, struct ssh *); 42 struct sshkey *_ssh_host_private_key(int, int, struct ssh *); 75 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) 78 struct ssh *ssh; local 134 ssh_free(struct ssh *ssh) argument 159 ssh_set_app_data(struct ssh *ssh, void *app_data) argument 165 ssh_get_app_data(struct ssh *ssh) argument 172 ssh_add_hostkey(struct ssh *ssh, struct sshkey *key) argument 206 ssh_set_verify_host_key_callback(struct ssh *ssh, int (*cb)(struct sshkey *, struct ssh *)) argument 218 ssh_input_append(struct ssh *ssh, const u_char *data, size_t len) argument 224 ssh_packet_next(struct ssh *ssh, u_char *typep) argument 265 ssh_packet_payload(struct ssh *ssh, size_t *lenp) argument 271 ssh_packet_put(struct ssh *ssh, int type, const u_char *data, size_t len) argument 283 ssh_output_ptr(struct ssh *ssh, size_t *len) argument 292 ssh_output_consume(struct ssh *ssh, size_t len) argument 298 ssh_output_space(struct ssh *ssh, size_t len) argument 304 ssh_input_space(struct ssh *ssh, size_t len) argument 311 _ssh_read_banner(struct ssh *ssh, char **bannerp) argument 380 _ssh_send_banner(struct ssh *ssh, char **bannerp) argument 396 _ssh_exchange_banner(struct ssh *ssh) argument 435 _ssh_host_public_key(int type, int nid, struct ssh *ssh) argument 450 _ssh_host_private_key(int type, int nid, struct ssh *ssh) argument 465 _ssh_verify_host_key(struct sshkey *hostkey, struct ssh *ssh) argument 480 _ssh_order_hostkeyalgs(struct ssh *ssh) argument [all...] |
H A D | kex.c | 68 static int kex_choose_conf(struct ssh *); 311 kex_reset_dispatch(struct ssh *ssh) argument 313 ssh_dispatch_range(ssh, SSH2_MSG_TRANSPORT_MIN, 315 ssh_dispatch_set(ssh, SSH2_MSG_KEXINIT, &kex_input_kexinit); 319 kex_send_newkeys(struct ssh *ssh) argument 323 kex_reset_dispatch(ssh); 324 if ((r = sshpkt_start(ssh, SSH2_MSG_NEWKEYS)) != 0 || 325 (r = sshpkt_send(ssh)) ! 336 struct ssh *ssh = ctxt; local 354 kex_send_kexinit(struct ssh *ssh) argument 386 struct ssh *ssh = ctxt; local 436 kex_new(struct ssh *ssh, char *proposal[PROPOSAL_MAX], struct kex **kexp) argument 519 kex_setup(struct ssh *ssh, char *proposal[PROPOSAL_MAX]) argument 553 choose_mac(struct ssh *ssh, struct sshmac *mac, char *client, char *server) argument 647 kex_choose_conf(struct ssh *ssh) argument 759 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, const struct sshbuf *shared_secret, u_char **keyp) argument 824 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, const struct sshbuf *shared_secret) argument 852 kex_derive_keys_bn(struct ssh *ssh, u_char *hash, u_int hashlen, const BIGNUM *secret) argument [all...] |
H A D | monitor_wrap.c | 49 #include "ssh.h" 72 #include "ssh-gss.h" 480 struct ssh *ssh = active_state; /* XXX */ local 486 if ((r = ssh_packet_get_state(ssh, m)) != 0)
|
H A D | serverloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 1156 struct ssh *ssh = active_state; /* XXX */ local 1168 while (ssh_packet_remaining(ssh) > 0) { 1171 if ((r = sshpkt_get_string_direct(ssh, &blob, &blen)) != 0 || 1181 if ((ndx = ssh->kex->host_key_index(key, 1, ssh)) == -1) { 1191 (key_pub = get_hostkey_public_by_index(ndx, ssh)) == NULL) { 1201 ssh->kex->session_id, ssh [all...] |
H A D | ssh-keyscan.c | 1 /* $OpenBSD: ssh-keyscan.c,v 1.101 2015/04/10 00:08:55 djm Exp $ */ 34 #include "ssh.h" 80 struct ssh *active_state = NULL; /* XXX needed for linking */ 93 int c_plen; /* Packet length field for ssh packet */ 103 struct ssh *c_ssh; /* SSH-connection */ 237 key_print_wrapper(struct sshkey *hostkey, struct ssh *ssh) argument 241 if ((c = ssh_get_app_data(ssh)) != NULL) 271 c->c_keytype == KT_DSA ? "ssh-dss" : 272 (c->c_keytype == KT_RSA ? "ssh [all...] |
H A D | clientloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 92 #include "ssh.h" 351 * ssh's willingness to forward X11 connections to 1027 {"^Z", "suspend ssh", SUPPRESS_MUXCLIENT}, 1029 {"&", "background ssh (when waiting for connections to terminate)", 1144 "%c^Z [suspend ssh]\r\n", escape_char); 1901 error("Warning: ssh server tried X11 forwarding."); 1940 error("Warning: ssh server tried agent forwarding."); 2256 struct ssh *ssh local 2329 struct ssh *ssh = active_state; /* XXX */ local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-jsch.jar | ... tools/ant/taskdefs/optional/ org/apache/tools/ant/taskdefs/optional/ssh/ org/apache/tools/ant/taskdefs/optional/ssh/AbstractSshMessage$1 ... |
/external/libnetfilter_conntrack/src/conntrack/ |
H A D | build.c | 462 int __build_conntrack(struct nfnl_subsys_handle *ssh, argument 478 nfnl_fill_hdr(ssh, &req->nlh, 0, l3num, 0, type, flags);
|
H A D | api.c | 756 * \param ssh nfnetlink subsystem handler 770 int nfct_build_conntrack(struct nfnl_subsys_handle *ssh, argument 777 assert(ssh != NULL); 781 return __build_conntrack(ssh, req, size, type, flags, ct); 785 __build_query_ct(struct nfnl_subsys_handle *ssh, argument 792 assert(ssh != NULL); 800 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_NEW, NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK|NLM_F_EXCL, data); 803 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_NEW, NLM_F_REQUEST|NLM_F_ACK, data); 806 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_DELETE, NLM_F_REQUEST|NLM_F_ACK, data); 809 __build_conntrack(ssh, re 874 nfct_build_query(struct nfnl_subsys_handle *ssh, const enum nf_conntrack_query qt, const void *data, void *buffer, unsigned int size) argument [all...] |
/external/curl/lib/ |
H A D | ssh.c | 70 #include "ssh.h" 682 "Denied establishing ssh session: mismatch md5 fingerprint. " 686 "Denied establishing ssh session: md5 fingerprint not available"); 742 failf(data, "Failure establishing ssh session"); 825 /* Try ~/.ssh first. */ 826 sshc->rsa = aprintf("%s/.ssh/id_rsa", home); 831 sshc->rsa = aprintf("%s/.ssh/id_dsa", home); 973 /* Connect to the ssh-agent */ 1096 * At this point we have an authenticated ssh session. 1818 err>= LIBSSH2_FX_OK?sftp_libssh2_strerror(err):"ssh erro 2878 struct SSHPROTO *ssh; local 2899 struct ssh_conn *ssh; local 3057 struct ssh_conn *ssh = &conn->proto.sshc; local [all...] |
/external/libnfnetlink/src/ |
H A D | libnfnetlink.c | 279 struct nfnl_subsys_handle *ssh; local 288 ssh = &nfnlh->subsys[subsys_id]; 289 if (ssh->cb) { 294 ssh->cb = calloc(cb_count, sizeof(*(ssh->cb))); 295 if (!ssh->cb) 298 ssh->nfnlh = nfnlh; 299 ssh->cb_count = cb_count; 300 ssh->subscriptions = subscriptions; 301 ssh 320 nfnl_subsys_close(struct nfnl_subsys_handle *ssh) argument 436 nfnl_fill_hdr(struct nfnl_subsys_handle *ssh, struct nlmsghdr *nlh, unsigned int len, u_int8_t family, u_int16_t res_id, u_int16_t msg_type, u_int16_t msg_flags) argument 1116 nfnl_callback_register(struct nfnl_subsys_handle *ssh, u_int8_t type, struct nfnl_callback *cb) argument 1140 nfnl_callback_unregister(struct nfnl_subsys_handle *ssh, u_int8_t type) argument 1165 const struct nfnl_subsys_handle *ssh; local 1213 struct nfnl_subsys_handle *ssh; local 1286 struct nfnl_subsys_handle *ssh; local [all...] |
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/fix/source/ |
H A D | lpc_masking_model.c | 540 int sh_lo, sh_hi, sh, ssh, shMem; local 872 ssh = sh_lo >> 1; // sqrt_nrg is in Qssh. 873 sh = ssh - 14; 880 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator) 882 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft) 883 sh = ssh-shft-7; 921 ssh = sh_hi >> 1; // |sqrt_nrg| is in Qssh. 922 sh = ssh - 14; 929 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator) 931 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh [all...] |