Warning: Attempt to read property "date" on null in /usr/local/www/websvn.planix.org/blame.php on line 247

Warning: Attempt to read property "msg" on null in /usr/local/www/websvn.planix.org/blame.php on line 247
WebSVN – planix.SVN – Blame – /os/branches/planix-v0/sys/src/cmd/ssh2/magic.out – Rev 2

Subversion Repositories planix.SVN

Rev

Go to most recent revision | Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
2 - 1
cipher3des.c:18: uchar key[3][8];
2
cipher3des.c:44: "3des-cbc",
3
cipher3des.c:45: 8,
4
cipheraes.c:24: setupAESstate(&cs->state, c->s2cek, bits/8, c->s2civ);
5
cipheraes.c:26: setupAESstate(&cs->state, c->c2sek, bits/8, c->c2siv);
6
cipheraes.c:34: return initaes(c, dir, 128);
7
cipheraes.c:40: return initaes(c, dir, 192);
8
cipheraes.c:46: return initaes(c, dir, 256);
9
cipherblowfish.c:22: for(i = 0; i < 16; ++i)
10
cipherblowfish.c:25: for(i = 0; i < 16; ++i)
11
cipherblowfish.c:28: for(i = 0; i < 8; ++i)
12
cipherblowfish.c:31: for(i = 0; i < 8; ++i)
13
cipherblowfish.c:39: setupBFstate(&cs->state, c->s2cek, 16, c->s2civ);
14
cipherblowfish.c:41: setupBFstate(&cs->state, c->c2sek, 16, c->c2siv);
15
cipherblowfish.c:62: 8,
16
cipherrc4.c:21: setupRC4state(&cs->state, c->s2cek, 16);
17
cipherrc4.c:23: setupRC4state(&cs->state, c->c2sek, 16);
18
cipherrc4.c:41: 8,
19
dh.c:16: Errnokey = -2,	/* no key on keyring */
20
dh.c:30: "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
21
dh.c:37: * 2048-bit MODP group (id 14) from RFC 3526
22
dh.c:41: "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
23
dh.c:46: "83655D23DCA3AD961C62F356208552BB9ED529077096966D"
24
dh.c:47: "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
25
dh.c:50: "15728E5A8AACAA68FFFFFFFFFFFFFFFF";
26
dh.c:69: two = strtomp("2", nil, 10, nil);
27
dh.c:70: p1 = strtomp(group1p, nil, 16, nil);
28
dh.c:71: p14 = strtomp(group14p, nil, 16, nil);
29
dh.c:112: myrsakey.pub.n = strtomp(p+3, nil, 16, nil);
30
dh.c:123: myrsakey.pub.ek = strtomp(p+4, nil, 16, nil);
31
dh.c:136: myrsakey.dk = strtomp(p+5, nil, 16, nil);
32
dh.c:179: mydsskey.pub.p = strtomp(p+3, nil, 16, nil);
33
dh.c:186: mydsskey.pub.q = strtomp(p+3, nil, 16, nil);
34
dh.c:193: mydsskey.pub.alpha = strtomp(p+7, nil, 16, nil);
35
dh.c:200: mydsskey.pub.key = strtomp(p+5, nil, 16, nil);
36
dh.c:211: mydsskey.secret = strtomp(p+9, nil, 16, nil);
37
dh.c:242: n = nb - (nelem(sha1der) + SHA1dlen) - 3;
38
dh.c:266: n = (nbit + 7) / 8;
39
dh.c:269: /* Compute s: RFC 3447 */
40
dh.c:285: auth_rpc(ar, "start", "role=sign proto=rsa", 19) != ARok ||
41
dh.c:328: n = (nbit + 7) / 8;
42
dh.c:330: /* Compute s: RFC 3447 */
43
dh.c:333: s = mpnew(1024);
44
dh.c:350: buf = emalloc9p(Blobsz / 2);
45
dh.c:352: p = (char *)get_string(nil, (uchar *)sig, buf, Blobsz / 2, nil);
46
dh.c:406: uchar sstr[2*SHA1dlen];
47
dh.c:424: auth_rpc(ar, "start", "role=sign proto=dsa", 19) != ARok ||
48
dh.c:436: add_block(sig, sstr, 2*SHA1dlen);
49
dh.c:451: return dh_server(c, pack1, p1, 1024);
50
dh.c:457: return dh_server(c, pack1, p14, 2048);
51
dh.c:474: y = mprand(nbit / 8, genrandom, nil);
52
dh.c:491: /* Compute H: RFC 4253 */
53
dh.c:570: c->e = mpnew(1024);
54
dh.c:575: c->x = mprand(128, genrandom, nil);
55
dh.c:597: keymbox.msg = smprint("b%04ld%s", strlen(newkey), newkey);
56
dh.c:606: keymbox.msg = smprint("%c%04ld%s", n == NoKeyFile || n == NoKey?
57
dh.c:616: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
58
dh.c:690: char buf[10];
59
dh.c:704: q += nhgetl(q) + 4;
60
dh.c:707: k = mpnew(1024);
61
dh.c:710: /* Compute H: RFC 4253 */
62
dh.c:741: q += nhgetl(q) + 4;
63
dh.c:760: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
64
dh.c:764: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
65
dh.c:796: e = mpnew(2048);
66
dh.c:797: x = mprand(256, genrandom, nil);
67
dh.c:828: char buf[82], *bp, *be;			/* magic 82 */
68
dh.c:832: /* Compute 40 bytes (320 bits) of keys: each alg can use what it needs */
69
dh.c:900: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
70
dh.c:905: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
71
dh.c:910: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
72
dh.c:915: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
73
dial.c:14: Maxstring	= 128,
74
dial.c:15: Maxpath		= 256,
75
dial.c:17: Maxcsreply	= 64*80,	/* this is probably overly generous */
76
dial.c:22: Maxconnms	= 2*60*1000,	/* 2 minutes */
77
dial.c:171: char *fields[5];			/* pid + 3 times + error */
78
dial.c:177: if (n < 4)
79
dial.c:188: strncpy(conn->err, fields[4], sizeof conn->err - 1);
80
dial.c:210: char exitsts[2*ERRMAX];
81
dial.c:385: bleft = sizeof dp->addrlist - 2;	/* 2 is room for \n\0 */
82
dial.thread.c:22: Defstksize	= 8192,
83
dial.thread.c:24: Maxstring	= 128,
84
dial.thread.c:25: Maxpath		= 256,
85
dial.thread.c:27: Maxcsreply	= 64*80,	/* this is probably overly generous */
86
dial.thread.c:32: Maxconnms	= 2*60*1000,	/* 2 minutes */
87
dial.thread.c:57: int	kidthrids[64];		/* one per addr; ought to be enough */
88
dial.thread.c:393: bleft = sizeof dp->addrlist - 2;	/* 2 is room for \n\0 */
89
netssh.c:48: PKA *pkas[3];
90
netssh.c:71: char uid[32];
91
netssh.c:175: case '9':
92
netssh.c:209: keymbox.mchan = chancreate(4, 0);
93
netssh.c:259: werrstr("bad length in 9P2000 message header");
94
netssh.c:283: netsshsrv.tree = alloctree(uid, uid, 0777, nil);
95
netssh.c:284: rootfile = createfile(netsshsrv.tree->root, "ssh", uid, 0555|DMDIR,
96
netssh.c:286: clonefile = createfile(rootfile, "clone", uid, 0666, (void*)Qclone);
97
netssh.c:287: ctlfile = createfile(rootfile, "ctl", uid, 0666, (void*)Qctl);
98
netssh.c:288: keysfile = createfile(rootfile, "keys", uid, 0600, (void *)Qreqrem);
99
netssh.c:305: d.mode = 0666;
100
netssh.c:330: char buf[32];
101
netssh.c:347: /* should use dial(2) instead of diddling /net/tcp */
102
netssh.c:455: /* should use dial(2) instead of diddling /net/tcp */
103
netssh.c:541: hnputl(p2->payload + 5, c->chans[i]->id);
104
netssh.c:542: hnputl(p2->payload + 9, Maxpayload);
105
netssh.c:543: hnputl(p2->payload + 13, Maxrpcbuf);
106
netssh.c:544: p2->rlength = 18;
107
netssh.c:591: if (sc->rwindow < 16*1024) {		/* magic.  half-way, maybe? */
108
netssh.c:598: hnputl(p->payload+5, Maxpayload);
109
netssh.c:599: p->rlength += 8;
110
netssh.c:691: n = pread(c->ctlfd, buf, 10, 0); // magic 10
111
netssh.c:725: n = pread(c->ctlfd, buf, 10, 0); /* magic 10 */
112
netssh.c:813: n = ioread(io, c->ctlfd, buf, 10); /* magic 10 */
113
netssh.c:989: * should use dial(2) instead of doing it by hand.
114
netssh.c:991: sshdebug(c, "tcp connect %s %s", toks[1], ntok > 3? toks[2]: "");
115
netssh.c:992: return fprint(c->ctlfd, "connect %s %s", toks[1], ntok > 3? toks[2]: "");
116
netssh.c:999: char *attrs[5];
117
netssh.c:1002: if (ntok < 3 || ntok > 4)
118
netssh.c:1008: c->user = estrdup9p(toks[2]);
119
netssh.c:1011: if (ntok == 4 && strcmp(toks[1], "k") == 0) {
120
netssh.c:1018: c->password = estrdup9p(toks[3]);
121
netssh.c:1028: attrs[2] = smprint("user=%s", c->user);
122
netssh.c:1029: attrs[3] = smprint("sys=%s", c->remote);
123
netssh.c:1033: if (ntok == 3)
124
netssh.c:1034: c->authkey = factlookup(4, 2, attrs);
125
netssh.c:1036: attrs[4] = toks[3];
126
netssh.c:1037: c->authkey = factlookup(5, 2, attrs);
127
netssh.c:1039: free(attrs[2]);
128
netssh.c:1040: free(attrs[3]);
129
netssh.c:1080: char *tcpconn2, *buf, *toks[4];
130
netssh.c:1111: if (ntok < 2)
131
netssh.c:1118: if (ntok < 2)
132
netssh.c:1121: * should use dial(2) instead of doing it by hand.
133
netssh.c:1131: pkas[2] = nil;
134
netssh.c:1161: /* should use dial(2) instead of diddling /net/tcp */
135
netssh.c:1187: add_string(p, toks[2]);
136
netssh.c:1194: fprint(c->ctlfd, "reject %s %s", buf, toks[2]);
137
netssh.c:1271: char *cmd, *q, *buf, *toks[4];
138
netssh.c:1286: if (r->ifcall.count <= 10)
139
netssh.c:1287: buf = emalloc9p(10 + 1);
140
netssh.c:1357: for (n = 2; n < ntok; ++n) {
141
netssh.c:1396: p->rlength += 4;
142
netssh.c:1413: * called clunk.  But if there are no other references, a 9P Tclunk
143
netssh.c:1485: p->rlength += 4;
144
netssh.c:1603: c->dir = createfile(rootfile, buf, uid, 0555|DMDIR,
145
netssh.c:1605: c->clonefile = createfile(c->dir, "clone", uid, 0666,
146
netssh.c:1607: c->ctlfile = createfile(c->dir, "ctl", uid, 0666,
147
netssh.c:1609: c->datafile = createfile(c->dir, "data", uid, 0666,
148
netssh.c:1611: c->listenfile = createfile(c->dir, "listen", uid, 0666,
149
netssh.c:1613: c->localfile = createfile(c->dir, "local", uid, 0444,
150
netssh.c:1615: c->remotefile = createfile(c->dir, "remote", uid, 0444,
151
netssh.c:1617: c->statusfile = createfile(c->dir, "status", uid, 0444,
152
netssh.c:1619: c->tcpfile = createfile(c->dir, "tcp", uid, 0444,
153
netssh.c:1661: sc->dir = createfile(c->dir, buf, uid, 0555|DMDIR,
154
netssh.c:1663: sc->ctl = createfile(sc->dir, "ctl", uid, 0666,
155
netssh.c:1665: sc->data = createfile(sc->dir, "data", uid, 0666,
156
netssh.c:1667: sc->listen = createfile(sc->dir, "listen", uid, 0666,
157
netssh.c:1669: sc->request = createfile(sc->dir, "request", uid, 0666,
158
netssh.c:1671: sc->status = createfile(sc->dir, "status", uid, 0444,
159
netssh.c:1673: sc->tcp = createfile(sc->dir, "tcp", uid, 0444,
160
netssh.c:1688: sc->inchan = chancreate(4, 0);
161
netssh.c:1692: sc->reqchan = chancreate(4, 0);
162
netssh.c:1792: if (n < 5)		/* can't be a valid SSH id string */
163
netssh.c:1799: if (n < 5)		/* can't be a valid SSH id string */
164
netssh.c:1855: 0 && c->role == Client && strncmp(remid, "SSH-2", 5) != 0 &&
165
netssh.c:1856: strncmp(remid, "SSH-1.99", 8) != 0) {
166
netssh.c:1953: if (n < 5) {		/* can't be a valid SSH id string */
167
netssh.c:1961: strncmp(path, "SSH-2", 5) != 0 &&
168
netssh.c:1962: strncmp(path, "SSH-1.99", 8) != 0) {
169
netssh.c:1999: /* should use hangup in dial(2) instead of diddling /net/tcp */
170
netssh.c:2002: iowrite(io, fd, "hangup", 6);
171
netssh.c:2024: for (i = 0; i < 16; ++i)
172
netssh.c:2027: add_packet(c->skexinit, buf, 16);		/* cookie */
173
netssh.c:2063: memset(buf, 0, 5);
174
netssh.c:2064: add_packet(c->skexinit, buf, 5);
175
netssh.c:2094: get_string(p, p->payload + 5, buf, Arbbufsz, nil);
176
netssh.c:2104: memmove(c->c2siv, c->nc2siv, SHA1dlen*2);
177
netssh.c:2105: memmove(c->s2civ, c->ns2civ, SHA1dlen*2);
178
netssh.c:2106: memmove(c->c2sek, c->nc2sek, SHA1dlen*2);
179
netssh.c:2107: memmove(c->s2cek, c->ns2cek, SHA1dlen*2);
180
netssh.c:2108: memmove(c->c2sik, c->nc2sik, SHA1dlen*2);
181
netssh.c:2109: memmove(c->s2cik, c->ns2cik, SHA1dlen*2);
182
netssh.c:2231: add_block(p2, p->payload + 5, 4);
183
netssh.c:2232: hnputl(p2->payload + p2->rlength - 1, 4);
184
netssh.c:2233: p2->rlength += 4;
185
netssh.c:2256: get_string(p, p->payload + 5, buf, Arbbufsz, nil);
186
netssh.c:2265: get_string(p, p->payload + 2, buf, Arbbufsz, nil);
187
netssh.c:2299: ch->twindow = nhgetl(q+4);
188
netssh.c:2325: ch->otherid = nhgetl(p->payload+5);
189
netssh.c:2326: ch->twindow = nhgetl(p->payload+9);
190
netssh.c:2340: ch->twindow += nhgetl(p->payload + 5);
191
netssh.c:2354: pl->rem = nhgetl(p->payload + 5);
192
netssh.c:2355: pl->st = pl->pack->payload + 9;
193
netssh.c:2357: pl->rem = nhgetl(p->payload + 9);
194
netssh.c:2358: pl->st = pl->pack->payload + 13;
195
netssh.c:2386: p2->rlength += 4;
196
netssh.c:2411: q = get_string(p, p->payload+5, buf, Arbbufsz, nil);
197
netssh.c:2418: memmove(pl->pack->payload + n, q + 1, p->rlength - (11 + n-2));
198
netssh.c:2419: pl->rem = p->rlength - 11 + 2;
199
netssh.c:2458: nb = 4;
200
netssh.c:2477: np = ioreadn(c->rio, c->datafd, p->nlength + nb, p->rlength + 4 - nb);
201
netssh.c:2479: nm = ioreadn(c->rio, c->datafd, p->nlength + p->rlength + 4,
202
netssh.c:2480: SHA1dlen);		/* SHA1dlen was magic 20 */
203
netssh.c:2494: /* SHA1dlen was magic 20 */
204
netssh.c:2495: if (np != p->rlength + 4 - nb || c->inmac != -1 && nm != SHA1dlen) {
205
netssh.c:2500: p->rlength = n - 4;
206
netssh.c:2531: get_string(p, p->payload + 5, buf, Arbbufsz, nil);
207
netssh.c:2543: case -2:		/* can't happen, now at least */
208
netssh.c:2603: q = p->payload + 17;
209
netssh.c:2702: q = p->payload + 17;
210
netssh.c:2802: cap = emalloc9p(fromtosz + sizeof(rand)*3 + 1);
211
netssh.c:2803: snprint(cap, fromtosz + sizeof(rand)*3 + 1, "%s@%s", from, to);
212
netssh.c:2806: enc64(key, sizeof(rand)*3, rand, sizeof(rand));
213
netssh.c:2849: werrstr("Password mismatch 2");
214
netssh.c:2875: char method[32];
215
netssh.c:2938: char key1[DESKEYLEN], key2[DESKEYLEN], method[32];
216
netssh.c:3042: ek = strtomp(r+4, nil, 16, nil);
217
netssh.c:3043: nk = strtomp(s+3, nil, 16, nil);
218
netssh.c:3134: if (c->clonefile->ref <= 2 && c->ctlfile->ref <= 2 &&
219
netssh.c:3135: c->datafile->ref <= 2 && c->listenfile->ref <= 2 &&
220
netssh.c:3136: c->localfile->ref <= 2 && c->remotefile->ref <= 2 &&
221
netssh.c:3137: c->statusfile->ref <= 2)
222
pubkey.c:12: Arbsz =	256,
223
pubkey.c:22: n = strtoul(s, &p, 10);
224
pubkey.c:33: n = strtoul(s, &p, 10);
225
pubkey.c:79: if(parsepubkey(s, key, sp, 10) == 0 ||
226
pubkey.c:80: parsepubkey(s, key, sp, 16) == 0)
227
pubkey.c:164: Bprint(bw, "%s %d %.10M %.10M\n",
228
pubkey.c:169: Bprint(bw, "%s %d %.10M %.10M\n", host, mpsignif(hostkey->n),
229
pubkey.c:213: fd = create(keyfile, OWRITE, 0666);
230
pubkey.c:220: if(seek(fd, 0, 2) >= 0 &&
231
pubkey.c:221: fprint(fd, "%s %d %.10M %.10M\n", host, mpsignif(key->n),
232
rsa2ssh2.c:54: e = strtomp(ep+4, nil, 16, nil);
233
rsa2ssh2.c:55: n = strtomp(np+3, nil, 16, nil);
234
rsa2ssh2.c:61: sysfatal("base-64 encoding failed\n");
235
ssh.c:130: oalarm = alarm(5*1000);		/* don't get stuck here */
236
ssh.c:163: //		for (fd = 3; fd < 40; fd++)
237
ssh.c:219: if (buf[n-1] == ('u' & 037))
238
ssh.c:251: write(kconsfd, buf+5, n);
239
ssh.c:257: write(kconsfd, buf+5, n);
240
ssh.c:265: seek(keyfd, 0, 2);
241
ssh.c:266: if (readn(keyfd, buf, 5) <= 0)
242
ssh.c:268: buf[5] = 0;
243
ssh.c:269: n = strtol(buf+1, nil, 10);
244
ssh.c:270: n = readn(keyfd, buf+5, n);
245
ssh.c:273: buf[n+5] = 0;
246
ssh.c:278: fprint(kconsfd, "%s\n", buf+5);
247
ssh.c:292: if (size < 6)
248
ssh.c:306: n = read(keyfd, buf, 5);		/* reading /net/ssh/keys */
249
ssh.c:309: buf[5] = 0;
250
ssh.c:310: n = strtol(buf+1, nil, 10);
251
ssh.c:311: n = readn(keyfd, buf+5, n);
252
ssh.c:312: buf[n < 0? 5: n+5] = 0;
253
ssh.c:318: fprint(kconsfd, "%s\n", buf+5);
254
ssh.c:404: ds = netmkaddr(remote, dir, "22");		/* tcp port 22 is ssh */
255
ssh.c:578: char buf[64];
256
ssh.c:582: return strlen(buf) >= 9 && strcmp(buf+strlen(buf)-9, "/dev/cons") == 0;
257
sshsession.c:228: errfd = 2;
258
sshsession.c:411: q += 4;
259
sshsession.c:425: q += 4;
260
sshsession.c:475: dup(datafd, 2);
261
transport.c:42: p->rlength += 4;
262
transport.c:50: *data += 4;
263
transport.c:68: p->rlength += 4;
264
transport.c:77: uchar nn[4];
265
transport.c:82: memmove(q, nn, 4);
266
transport.c:83: memmove(q+4, s, n);
267
transport.c:84: p->rlength += n + 4;
268
transport.c:95: q += 4;
269
transport.c:115: n = mptobe(x, q + 4, Maxpktpay - p->rlength + 1 - 4, nil);
270
transport.c:116: if(q[4] & 0x80){
271
transport.c:117: memmove(q + 5, q + 4, n);
272
transport.c:118: q[4] = 0;
273
transport.c:122: p->rlength += n + 4;
274
transport.c:128: return betomp(q + 4, nhgetl(q), nil);
275
transport.c:139: blklen = 8;
276
transport.c:145: if(blklen < 8)
277
transport.c:146: blklen = 8;
278
transport.c:149: n2 = blklen - (n1 + 5) % blklen;
279
transport.c:150: if(n2 < 4)
280
transport.c:162: memmove(buf + 4, p->nlength, p->rlength + 4);
281
transport.c:163: hmac_sha1(buf, p->rlength + 8, c->outik, maclen, q, nil);
282
transport.c:167: cryptos[c->encrypt]->encrypt(c->enccs, p->nlength, p->rlength + 4);
283
transport.c:173: return p->rlength + 4 + maclen;
284
transport.c:189: nb = 4;
285
transport.c:193: p->rlength -= SHA1dlen;			/* was magic 20 */
286
transport.c:197: p->rlength + 4 - nb);
287
transport.c:201: memmove(buf + 4, p->nlength, nlength + 4);
288
transport.c:202: hmac_sha1(buf, nlength + 8, c->inik, SHA1dlen, rmac, nil);
289
transport.c:227: if(i % 16 == 15)
290
transport.c:229: if(q - buf > Copybufsz - 4){