/freebsd-11-stable/crypto/openssh/ |
H A D | kexgexc.c | 43 #include "kex.h" 60 struct kex *kex = ssh->kex; local 64 nbits = dh_estimate(kex->dh_need * 8); 66 kex->min = DH_GRP_MIN; 67 kex->max = DH_GRP_MAX; 68 kex->nbits = nbits; 70 kex->nbits = MINIMUM(kex 95 struct kex *kex = ssh->kex; local 149 struct kex *kex = ssh->kex; local [all...] |
H A D | kexgexs.c | 42 #include "kex.h" 73 struct kex *kex = ssh->kex; local 83 kex->nbits = nbits; 84 kex->min = min; 85 kex->max = max; 91 if (kex->max < kex->min || kex 126 struct kex *kex = ssh->kex; local [all...] |
H A D | kexc25519c.c | 38 #include "kex.h" 52 struct kex *kex = ssh->kex; local 55 kexc25519_keygen(kex->c25519_client_key, kex->c25519_client_pubkey); 57 dump_digest("client private key:", kex->c25519_client_key, 58 sizeof(kex->c25519_client_key)); 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 62 sizeof(kex 75 struct kex *kex = ssh->kex; local [all...] |
H A D | kexecdhs.c | 40 #include "kex.h" 64 struct kex *kex = ssh->kex; local 78 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 93 if (kex->load_host_public_key == NULL || 94 kex->load_host_private_key == NULL) { 98 server_host_public = kex->load_host_public_key(kex->hostkey_type, 99 kex [all...] |
H A D | kexdhs.c | 41 #include "kex.h" 57 struct kex *kex = ssh->kex; local 61 switch (kex->kex_type) { 63 kex->dh = dh_new_group1(); 67 kex->dh = dh_new_group14(); 70 kex->dh = dh_new_group16(); 73 kex->dh = dh_new_group18(); 79 if (kex 97 struct kex *kex = ssh->kex; local [all...] |
H A D | kexc25519s.c | 37 #include "kex.h" 58 struct kex *kex = ssh->kex; local 74 if (kex->load_host_public_key == NULL || 75 kex->load_host_private_key == NULL) { 79 server_host_public = kex->load_host_public_key(kex->hostkey_type, 80 kex->hostkey_nid, ssh); 81 server_host_private = kex [all...] |
H A D | kexdhc.c | 42 #include "kex.h" 57 struct kex *kex = ssh->kex; local 61 switch (kex->kex_type) { 63 kex->dh = dh_new_group1(); 67 kex->dh = dh_new_group14(); 70 kex->dh = dh_new_group16(); 73 kex->dh = dh_new_group18(); 79 if (kex 106 struct kex *kex = ssh->kex; local [all...] |
H A D | kexecdhc.c | 42 #include "kex.h" 57 struct kex *kex = ssh->kex; local 63 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 84 kex->ec_client_key = client_key; 85 kex->ec_group = group; 86 client_key = NULL; /* owned by the kex */ 101 struct kex *kex local [all...] |
H A D | kex.c | 1 /* $OpenBSD: kex.c,v 1.131 2017/03/15 07:07:39 markus Exp $ */ 45 #include "kex.h" 169 debug3("kex names ok: [%s]", names); 289 /* extract kex init proposal strings */ 295 /* first kex follows / reserved */ 331 error("kex protocol error: type %d seq %u", type, seq); 379 if (ssh->kex->ext_info_c) 389 struct kex *kex = ssh->kex; local 428 struct kex *kex = ssh->kex; local 451 struct kex *kex = ssh->kex; local 481 struct kex *kex = ssh->kex; local 533 struct kex *kex; local 589 kex_free(struct kex *kex) argument 773 struct kex *kex = ssh->kex; local 887 struct kex *kex = ssh->kex; local 951 struct kex *kex = ssh->kex; local [all...] |
H A D | ssh_api.c | 45 * stubs for the server side implementation of kex. 95 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { 99 ssh->kex->server = is_server; 102 ssh->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 103 ssh->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server; 104 ssh->kex->kex[KEX_DH_GRP14_SHA256] = kexdh_server; 105 ssh->kex 402 struct kex *kex = ssh->kex; local [all...] |
H A D | kex.h | 1 /* $OpenBSD: kex.h,v 1.81 2016/09/28 21:44:52 djm Exp $ */ 130 struct kex { struct 159 int (*kex[KEX_MAX])(struct ssh *); member in struct:kex 160 /* kex specific state */ 174 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); 177 void kex_free(struct kex *);
|
H A D | packet.c | 78 #include "kex.h" 284 (ssh->state->rekeying || (ssh->kex != NULL && ssh->kex->done == 0)); 991 /* move newkeys from kex to state */ 992 if ((state->newkeys[mode] = ssh->kex->newkeys[mode]) == NULL) 994 ssh->kex->newkeys[mode] = NULL; 1057 if (ssh->kex == NULL || ssh_packet_is_rekeying(ssh)) 1684 if (ssh->kex) 2136 if (ssh && ssh->kex && ssh->kex 2493 kex_to_blob(struct sshbuf *m, struct kex *kex) argument 2689 struct kex *kex; local [all...] |
H A D | sshd.c | 115 #include "kex.h" 592 /* Store a pointer to the kex for later rekeying */ 593 pmonitor->m_pkex = &active_state->kex; 2225 struct kex *kex; local 2252 kex = active_state->kex; 2254 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 2255 kex [all...] |
H A D | ssh-keyscan.c | 39 #include "kex.h" 303 c->c_ssh->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; 304 c->c_ssh->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_client; 305 c->c_ssh->kex->kex[KEX_DH_GRP14_SHA256] = kexdh_client; 306 c->c_ssh->kex->kex[KEX_DH_GRP16_SHA512] = kexdh_client; 307 c->c_ssh->kex [all...] |
H A D | sshconnect2.c | 57 #include "kex.h" 162 struct kex *kex; local 202 kex = active_state->kex; 204 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; 205 kex->kex[KEX_DH_GRP14_SHA1] = kexdh_client; 206 kex [all...] |
H A D | monitor.h | 75 struct kex **m_pkex;
|
H A D | monitor.c | 76 #include "kex.h" 627 * than the full kex structure... 1585 struct kex *kex; local 1594 if ((kex = ssh->kex) != NULL) { 1597 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 1598 kex->kex[KEX_DH_GRP14_SHA [all...] |
H A D | packet.h | 40 struct kex; 57 struct kex *kex; member in struct:ssh
|
H A D | serverloop.c | 72 #include "kex.h" 663 if ((ndx = ssh->kex->host_key_index(key, 1, ssh)) == -1) { 669 * XXX refactor: make kex->sign just use an index rather 683 ssh->kex->session_id, ssh->kex->session_id_len)) != 0 || 685 (r = ssh->kex->sign(key_prv, key_pub, &sig, &slen,
|
/freebsd-11-stable/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 63 while (!server->kex->done || !client->kex->done) { 76 ASSERT_INT_EQ(server->kex->done, 1); 77 ASSERT_INT_EQ(client->kex->done, 1); 81 do_kex_with_key(char *kex, int keytype, int bits) argument 100 if (kex != NULL) 101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; 116 TEST_START("kex"); 142 kex_free(server2->kex); /* XXX or should ssh_packet_set_state()? */ 146 ASSERT_PTR_NE(server2->kex, NUL 179 do_kex(char *kex) argument [all...] |
/freebsd-11-stable/crypto/openssh/regress/unittests/ |
H A D | Makefile | 4 SUBDIR= test_helper sshbuf sshkey bitmap kex hostkeys utf8 match conversion
|
/freebsd-11-stable/crypto/openssh/regress/misc/kexfuzz/ |
H A D | kexfuzz.c | 181 while (!server->kex->done || !client->kex->done) { 194 ASSERT_INT_EQ(server->kex->done, 1); 195 ASSERT_INT_EQ(client->kex->done, 1); 199 do_kex_with_key(const char *kex, struct sshkey *prvkey, int *c2s, int *s2c, argument 217 if (kex != NULL) 218 kex_params.proposal[PROPOSAL_KEX_ALGS] = strdup(kex); 248 TEST_START("kex"); 271 kex_free(server2->kex); /* XXX or should ssh_packet_set_state()? */ 275 ASSERT_PTR_NE(server2->kex, NUL 349 const char *kex = NULL, *kpath = NULL, *data_path = NULL; local [all...] |
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | dhgex.sh | 10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange` 16 kex="$1"; shift 19 echo "KexAlgorithms=$kex" >> $OBJ/sshd_proxy 22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 26 verbose "$tid bits $bits $kex $cipher"
|
H A D | kextype.sh | 11 ALLKEX=`${SSH} -Q kex` 16 for k in `${SSH} -Q kex`; do 17 verbose "kex $k" 21 fail "ssh kex $k"
|
H A D | rekey.sh | 40 for i in `${SSH} -Q kex`; do 58 for kex in `${SSH} -Q kex`; do 59 verbose "client rekey $c $kex" 60 ssh_data_rekeying "KexAlgorithms=$kex" -oRekeyLimit=256k -oCiphers=$c
|