/freebsd-10-stable/crypto/openssh/ |
H A D | kexgexc.c | 44 #include "kex.h" 60 struct kex *kex = ssh->kex; local 64 nbits = dh_estimate(kex->dh_need * 8); 66 kex->min = DH_GRP_MIN; 67 kex->max = DH_GRP_MAX; 68 kex->nbits = nbits; 70 kex->nbits = MIN(kex 95 struct kex *kex = ssh->kex; local 149 struct kex *kex = ssh->kex; local [all...] |
H A D | kexgexs.c | 43 #include "kex.h" 73 struct kex *kex = ssh->kex; local 83 kex->nbits = nbits; 84 kex->min = min; 85 kex->max = max; 91 if (kex->max < kex->min || kex 126 struct kex *kex = ssh->kex; local [all...] |
H A D | kexc25519c.c | 38 #include "kex.h" 52 struct kex *kex = ssh->kex; local 55 kexc25519_keygen(kex->c25519_client_key, kex->c25519_client_pubkey); 57 dump_digest("client private key:", kex->c25519_client_key, 58 sizeof(kex->c25519_client_key)); 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 62 sizeof(kex 75 struct kex *kex = ssh->kex; local [all...] |
H A D | kexecdhs.c | 40 #include "kex.h" 64 struct kex *kex = ssh->kex; local 78 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 93 if (kex->load_host_public_key == NULL || 94 kex->load_host_private_key == NULL) { 98 server_host_public = kex->load_host_public_key(kex->hostkey_type, 99 kex [all...] |
H A D | kexdhs.c | 41 #include "kex.h" 57 struct kex *kex = ssh->kex; local 61 switch (kex->kex_type) { 63 kex->dh = dh_new_group1(); 67 kex->dh = dh_new_group14(); 70 kex->dh = dh_new_group16(); 73 kex->dh = dh_new_group18(); 79 if (kex 97 struct kex *kex = ssh->kex; local [all...] |
H A D | kexc25519s.c | 37 #include "kex.h" 58 struct kex *kex = ssh->kex; local 74 if (kex->load_host_public_key == NULL || 75 kex->load_host_private_key == NULL) { 79 server_host_public = kex->load_host_public_key(kex->hostkey_type, 80 kex->hostkey_nid, ssh); 81 server_host_private = kex [all...] |
H A D | kexdhc.c | 42 #include "kex.h" 57 struct kex *kex = ssh->kex; local 61 switch (kex->kex_type) { 63 kex->dh = dh_new_group1(); 67 kex->dh = dh_new_group14(); 70 kex->dh = dh_new_group16(); 73 kex->dh = dh_new_group18(); 79 if (kex 106 struct kex *kex = ssh->kex; local [all...] |
H A D | kexecdhc.c | 42 #include "kex.h" 57 struct kex *kex = ssh->kex; local 63 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 84 kex->ec_client_key = client_key; 85 kex->ec_group = group; 86 client_key = NULL; /* owned by the kex */ 101 struct kex *kex local [all...] |
H A D | kex.c | 1 /* $OpenBSD: kex.c,v 1.118 2016/05/02 10:26:04 djm Exp $ */ 46 #include "kex.h" 169 debug3("kex names ok: [%s]", names); 282 /* extract kex init proposal strings */ 288 /* first kex follows / reserved */ 324 error("kex protocol error: type %d seq %u", type, seq); 366 if (ssh->kex->ext_info_c) 376 struct kex *kex = ssh->kex; local 415 struct kex *kex = ssh->kex; local 435 struct kex *kex = ssh->kex; local 465 struct kex *kex = ssh->kex; local 516 struct kex *kex; local 571 kex_free(struct kex *kex) argument 750 struct kex *kex = ssh->kex; local 866 struct kex *kex = ssh->kex; local 930 struct kex *kex = ssh->kex; local [all...] |
H A D | ssh_api.c | 45 * stubs for the server side implementation of kex. 95 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { 99 ssh->kex->server = is_server; 102 ssh->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 103 ssh->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server; 104 ssh->kex->kex[KEX_DH_GRP14_SHA256] = kexdh_server; 105 ssh->kex 402 struct kex *kex = ssh->kex; local [all...] |
H A D | kex.h | 1 /* $OpenBSD: kex.h,v 1.78 2016/05/02 10:26:04 djm Exp $ */ 129 struct kex { struct 158 int (*kex[KEX_MAX])(struct ssh *); member in struct:kex 159 /* kex specific state */ 173 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); 176 void kex_free(struct kex *);
|
H A D | sshd.c | 116 #include "kex.h" 686 /* Store a pointer to the kex for later rekeying */ 687 pmonitor->m_pkex = &active_state->kex; 2674 struct kex *kex; local 2705 kex = active_state->kex; 2707 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 2708 kex [all...] |
H A D | packet.c | 79 #include "kex.h" 270 (ssh->state->rekeying || (ssh->kex != NULL && ssh->kex->done == 0)); 1024 /* move newkeys from kex to state */ 1025 if ((state->newkeys[mode] = ssh->kex->newkeys[mode]) == NULL) 1027 ssh->kex->newkeys[mode] = NULL; 1090 if (ssh->kex == NULL || ssh_packet_is_rekeying(ssh)) 2115 if (ssh && ssh->kex && ssh->kex->failed_choice) { 2119 ssh->kex 2478 kex_to_blob(struct sshbuf *m, struct kex *kex) argument 2678 struct kex *kex; local [all...] |
H A D | ssh-keyscan.c | 39 #include "kex.h" 303 c->c_ssh->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; 304 c->c_ssh->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_client; 305 c->c_ssh->kex->kex[KEX_DH_GRP14_SHA256] = kexdh_client; 306 c->c_ssh->kex->kex[KEX_DH_GRP16_SHA512] = kexdh_client; 307 c->c_ssh->kex [all...] |
H A D | sshconnect2.c | 57 #include "kex.h" 162 struct kex *kex; local 202 kex = active_state->kex; 204 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; 205 kex->kex[KEX_DH_GRP14_SHA1] = kexdh_client; 206 kex [all...] |
H A D | monitor.h | 78 struct kex **m_pkex;
|
H A D | monitor.c | 76 #include "kex.h" 715 * than the full kex structure... 1855 struct kex *kex; local 1864 if ((kex = ssh->kex) != NULL) { 1867 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 1868 kex->kex[KEX_DH_GRP14_SHA [all...] |
H A D | packet.h | 40 struct kex; 57 struct kex *kex; member in struct:ssh
|
/freebsd-10-stable/crypto/openssh/regress/unittests/ |
H A D | Makefile | 3 SUBDIR= test_helper sshbuf sshkey bitmap kex hostkeys utf8
|
/freebsd-10-stable/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 63 while (!server->kex->done || !client->kex->done) { 76 ASSERT_INT_EQ(server->kex->done, 1); 77 ASSERT_INT_EQ(client->kex->done, 1); 81 do_kex_with_key(char *kex, int keytype, int bits) argument 100 if (kex != NULL) 101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; 116 TEST_START("kex"); 142 kex_free(server2->kex); /* XXX or should ssh_packet_set_state()? */ 146 ASSERT_PTR_NE(server2->kex, NUL 179 do_kex(char *kex) argument [all...] |
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | dhgex.sh | 10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange` 16 kex="$1"; shift 19 echo "KexAlgorithms=$kex" >> $OBJ/sshd_proxy 22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 26 verbose "$tid bits $bits $kex $cipher"
|
H A D | kextype.sh | 11 ALLKEX=`${SSH} -Q kex` 16 for k in `${SSH} -Q kex`; do 17 verbose "kex $k" 21 fail "ssh kex $k"
|
H A D | rekey.sh | 40 for i in `${SSH} -Q kex`; do 58 for kex in `${SSH} -Q kex`; do 59 verbose "client rekey $c $kex" 60 ssh_data_rekeying "KexAlgorithms=$kex" -oRekeyLimit=256k -oCiphers=$c
|
/freebsd-10-stable/crypto/openssh/regress/misc/kexfuzz/ |
H A D | kexfuzz.c | 150 while (!server->kex->done || !client->kex->done) { 161 ASSERT_INT_EQ(server->kex->done, 1); 162 ASSERT_INT_EQ(client->kex->done, 1); 166 do_kex_with_key(const char *kex, struct sshkey *prvkey, int *c2s, int *s2c, argument 183 if (kex != NULL) 184 kex_params.proposal[PROPOSAL_KEX_ALGS] = strdup(kex); 199 TEST_START("kex"); 228 kex_free(server2->kex); /* XXX or should ssh_packet_set_state()? */ 232 ASSERT_PTR_NE(server2->kex, NUL 303 const char *kex = NULL, *kpath = NULL, *data_path = NULL; local [all...] |
/freebsd-10-stable/secure/lib/libssh/ |
H A D | Makefile | 23 kex.c kexdh.c kexgex.c kexecdh.c kexc25519.c \
|