Home
last modified time | relevance | path

Searched refs:flags (Results 1 – 25 of 64) sorted by relevance

123

/openssh-portable/
H A Dsftp-common.c57 a->flags = 0; in attrib_clear()
71 a->flags = 0; in stat_to_attrib()
72 a->flags |= SSH2_FILEXFER_ATTR_SIZE; in stat_to_attrib()
74 a->flags |= SSH2_FILEXFER_ATTR_UIDGID; in stat_to_attrib()
77 a->flags |= SSH2_FILEXFER_ATTR_PERMISSIONS; in stat_to_attrib()
79 a->flags |= SSH2_FILEXFER_ATTR_ACMODTIME; in stat_to_attrib()
90 if (a->flags & SSH2_FILEXFER_ATTR_SIZE) in attrib_to_stat()
92 if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) { in attrib_to_stat()
113 if (a->flags & SSH2_FILEXFER_ATTR_SIZE) { in decode_attrib()
117 if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) { in decode_attrib()
[all …]
H A Dcipher.c73 u_int flags; member
126 if ((c->flags & CFLAG_INTERNAL) != 0) in cipher_alg_list()
195 return (c->flags & CFLAG_CBC) != 0; in cipher_is_cbc()
278 if ((cc->cipher->flags & CFLAG_NONE) != 0) { in cipher_init()
283 if ((cc->cipher->flags & CFLAG_AESCTR) != 0) { in cipher_init()
354 if ((cc->cipher->flags & CFLAG_NONE) != 0) { in cipher_crypt()
359 if ((cc->cipher->flags & CFLAG_AESCTR) != 0) { in cipher_crypt()
449 if ((c->flags & CFLAG_CHACHAPOLY) != 0) in cipher_get_keyiv_len()
451 else if ((c->flags & CFLAG_AESCTR) != 0) in cipher_get_keyiv_len()
479 if ((cc->cipher->flags & CFLAG_NONE) != 0) in cipher_get_keyiv()
[all …]
H A Dnchan.c193 c->flags |= CHAN_EOF_SENT; in chan_send_eof2()
221 c->flags |= CHAN_CLOSE_SENT; in chan_send_close2()
254 c->flags |= CHAN_EOF_RCVD; in chan_rcvd_ieof()
267 if (!(c->flags & CHAN_LOCAL)) { in chan_rcvd_oclose()
268 if (c->flags & CHAN_CLOSE_RCVD) in chan_rcvd_oclose()
271 c->flags |= CHAN_CLOSE_RCVD; in chan_rcvd_oclose()
295 if (!(c->flags & CHAN_LOCAL)) in chan_rcvd_oclose()
345 if (c->flags & CHAN_LOCAL) { in chan_is_dead()
354 if (c->flags & CHAN_CLOSE_RCVD) { in chan_is_dead()
361 if ((c->flags & CHAN_CLOSE_SENT) && in chan_is_dead()
[all …]
H A Dreadpass.c123 read_passphrase(const char *prompt, int flags) in read_passphrase() argument
142 rppflags = (flags & RP_ECHO) ? RPP_ECHO_ON : RPP_ECHO_OFF; in read_passphrase()
145 else if (flags & RP_USE_ASKPASS) in read_passphrase()
147 else if (flags & RP_ALLOW_STDIN) { in read_passphrase()
171 if ((flags & RP_USE_ASKPASS) && !allow_askpass) in read_passphrase()
172 return (flags & RP_ALLOW_EOF) ? NULL : xstrdup(""); in read_passphrase()
179 if ((flags & RP_ASK_PERMISSION) != 0) in read_passphrase()
182 if (!(flags & RP_ALLOW_EOF)) in read_passphrase()
188 if (flags & RP_ALLOW_EOF) in read_passphrase()
H A Dsk-api.h55 uint8_t flags; member
68 uint8_t flags; member
85 const char *application, uint8_t flags, const char *pin,
91 uint8_t flags, const char *pin, struct sk_option **options,
H A Ddns.c208 struct sshkey *hostkey, int *flags) in verify_host_key_dns() argument
224 *flags = 0; in verify_host_key_dns()
243 *flags |= DNS_VERIFY_SECURE; in verify_host_key_dns()
260 *flags |= DNS_VERIFY_FOUND; in verify_host_key_dns()
295 *flags |= DNS_VERIFY_MATCH; in verify_host_key_dns()
303 if (*flags & DNS_VERIFY_FOUND) in verify_host_key_dns()
304 if (*flags & DNS_VERIFY_MATCH) in verify_host_key_dns()
H A Dssh-sk.c65 uint8_t flags, const char *pin, struct sk_option **opts,
81 uint8_t flags, const char *pin, struct sk_option **opts,
311 key->sk_flags = flags; in sshsk_key_from_response()
466 provider_path, device, application, userid, flags, in sshsk_enroll()
522 flags, pin, opts, &resp)) != 0) { in sshsk_enroll()
575 (r = sshbuf_put_u8(sig, resp->flags)) != 0 || in sshsk_ecdsa_sig()
608 (r = sshbuf_put_u8(sig, resp->flags)) != 0 || in sshsk_ed25519_sig()
701 __func__, resp->flags, resp->counter); in sshsk_sign()
755 uint8_t flags; in sshsk_load_resident() local
791 if ((rks[i]->flags & SSH_SK_USER_VERIFICATION_REQD)) in sshsk_load_resident()
[all …]
H A Dsftp-server.c241 int flags = 0; in flags_from_portable() local
245 flags = O_RDWR; in flags_from_portable()
247 flags = O_RDONLY; in flags_from_portable()
249 flags = O_WRONLY; in flags_from_portable()
252 flags |= O_APPEND; in flags_from_portable()
254 flags |= O_CREAT; in flags_from_portable()
256 flags |= O_TRUNC; in flags_from_portable()
258 flags |= O_EXCL; in flags_from_portable()
259 return flags; in flags_from_portable()
298 int flags; member
[all …]
H A Dcanohost.c68 get_socket_address(int sock, int remote, int flags) in get_socket_address() argument
98 sizeof(ntop), NULL, 0, flags)) != 0) { in get_socket_address()
100 flags, ssh_gai_strerror(r)); in get_socket_address()
H A Dgss-serv.c177 gss_buffer_desc *send_tok, OM_uint32 *flags) in ssh_gssapi_accept_ctx() argument
185 send_tok, flags, NULL, &ctx->client_creds); in ssh_gssapi_accept_ctx()
201 if (((flags == NULL) || ((*flags & GSS_C_MUTUAL_FLAG) && in ssh_gssapi_accept_ctx()
202 (*flags & GSS_C_INTEG_FLAG))) && (ctx->major == GSS_S_COMPLETE)) { in ssh_gssapi_accept_ctx()
H A DPROTOCOL.u2f30 the hardware-backed private key, some flags and signed attestation
77 uint8 flags
92 uint8 flags
139 uint8 flags
161 uint32 reserved flags
170 uint32 reserved flags
184 byte flags (including "user present", extensions present)
195 byte flags (including "user present")
206 byte flags
219 byte flags
[all …]
H A Dsftp-glob.c137 remote_glob(struct sftp_conn *conn, const char *pattern, int flags, in remote_glob() argument
149 return(glob(pattern, flags | GLOB_ALTDIRFUNC, errfunc, pglob)); in remote_glob()
H A Dsftp-common.h36 u_int32_t flags; member
H A Dsk-usbhid.c117 const char *application, uint8_t flags, const char *pin,
123 uint8_t flags, const char *pin, struct sk_option **options,
667 const char *application, uint8_t flags, const char *pin, in sk_enroll() argument
730 if ((r = fido_cred_set_rk(cred, (flags & SSH_SK_RESIDENT_KEY) != 0 ? in sk_enroll()
759 if ((flags & SSH_SK_USER_VERIFICATION_REQD)) in sk_enroll()
968 uint8_t flags, const char *pin, struct sk_option **options, in sk_sign() argument
995 else if (pin != NULL || (flags & SSH_SK_USER_VERIFICATION_REQD)) in sk_sign()
1023 (flags & SSH_SK_USER_PRESENCE_REQD) ? in sk_sign()
1028 if (pin == NULL && (flags & SSH_SK_USER_VERIFICATION_REQD) && in sk_sign()
1043 response->flags = fido_assert_flags(assert, 0); in sk_sign()
[all …]
H A Dssh-sk.h45 const char *application, const char *userid, uint8_t flags,
H A Dssh-ecdsa-sk.c79 uint8_t flags, const struct sshbuf *extensions, in webauthn_check_prepare_hash() argument
95 (flags & 0x40) != 0 /* AD */ || in webauthn_check_prepare_hash()
96 ((flags & 0x80) == 0 /* ED */) != (sshbuf_len(extensions) == 0)) { in webauthn_check_prepare_hash()
/openssh-portable/openbsd-compat/
H A Dbsd-snprintf.c189 int flags; in dopr() local
216 flags |= DP_F_MINUS; in dopr()
220 flags |= DP_F_PLUS; in dopr()
224 flags |= DP_F_SPACE; in dopr()
228 flags |= DP_F_NUM; in dopr()
232 flags |= DP_F_ZERO; in dopr()
366 flags |= DP_F_UP; in dopr()
397 flags |= DP_F_UP; in dopr()
408 flags |= DP_F_UP; in dopr()
519 if (flags & DP_F_MINUS) in fmtstr()
[all …]
H A Dfnmatch.c149 static int fnmatch_ch(const char **pattern, const char **string, int flags) in fnmatch_ch() argument
152 const int nocase = !!(flags & FNM_CASEFOLD); in fnmatch_ch()
153 const int escape = !(flags & FNM_NOESCAPE); in fnmatch_ch()
154 const int slash = !!(flags & FNM_PATHNAME); in fnmatch_ch()
289 int fnmatch(const char *pattern, const char *string, int flags) in fnmatch() argument
292 const int escape = !(flags & FNM_NOESCAPE); in fnmatch()
293 const int slash = !!(flags & FNM_PATHNAME); in fnmatch()
294 const int leading_dir = !!(flags & FNM_LEADING_DIR); in fnmatch()
324 if ((flags & FNM_PERIOD) && (*string == '.')) { in fnmatch()
432 flags); in fnmatch()
[all …]
H A Dreadpassphrase.c54 readpassphrase(const char *prompt, char *buf, size_t bufsiz, int flags) in readpassphrase() argument
79 if ((flags & RPP_STDIN) || in readpassphrase()
81 if (flags & RPP_REQUIRE_TTY) { in readpassphrase()
96 if (!(flags & RPP_ECHO_ON)) in readpassphrase()
128 if (!(flags & RPP_STDIN)) in readpassphrase()
134 if ((flags & RPP_SEVENBIT)) in readpassphrase()
137 if ((flags & RPP_FORCELOWER)) in readpassphrase()
139 if ((flags & RPP_FORCEUPPER)) in readpassphrase()
H A Dgetopt_long.c295 const struct option *long_options, int *idx, int flags) in getopt_internal() argument
318 flags |= FLAG_ALLARGS; in getopt_internal()
320 flags &= ~FLAG_PERMUTE; in getopt_internal()
351 if (flags & FLAG_ALLARGS) { in getopt_internal()
359 if (!(flags & FLAG_PERMUTE)) { in getopt_internal()
410 (*place == '-' || (flags & FLAG_LONGONLY))) { in getopt_internal()
H A Dbsd-cygwin_util.c47 binary_open(const char *filename, int flags, ...) in binary_open() argument
52 va_start(ap, flags); in binary_open()
55 return (open(filename, flags | O_BINARY, mode)); in binary_open()
H A Dport-aix.c420 size_t hostlen, char *serv, size_t servlen, int flags) in sshaix_getnameinfo() argument
425 if (flags & (NI_NUMERICHOST|NI_NUMERICSERV) && in sshaix_getnameinfo()
436 return getnameinfo(sa, salen, host, hostlen, serv, servlen, flags); in sshaix_getnameinfo()
/openssh-portable/regress/unittests/hostkeys/
H A Dtest_iterate.c41 int flags; member
914 ctx.flags = 0; in test_iterate()
925 ctx.flags = 0; in test_iterate()
937 ctx.flags = 0; in test_iterate()
973 ctx.flags = 0; in test_iterate()
995 ctx.flags = 0; in test_iterate()
1007 ctx.flags = 0; in test_iterate()
1012 ctx.flags, 0), 0); in test_iterate()
1037 ctx.flags, 0), 0); in test_iterate()
1045 ctx.flags = 0; in test_iterate()
[all …]
/openssh-portable/regress/misc/sk-dummy/
H A Dsk-dummy.c232 const char *application, uint8_t flags, const char *pin, in sk_enroll() argument
238 (void)flags; /* XXX; unused */ in sk_enroll()
305 const char *application, uint32_t counter, uint8_t flags, in sig_ecdsa() argument
355 dump("flags", &flags, sizeof(flags)); in sig_ecdsa()
358 SHA256_Update(&ctx, &flags, sizeof(flags)); in sig_ecdsa()
401 const char *application, uint32_t counter, uint8_t flags, in sig_ed25519() argument
409 uint8_t signbuf[sizeof(apphash) + sizeof(flags) + in sig_ed25519()
432 signbuf[o++] = flags; in sig_ed25519()
502 response->flags = flags; in sk_sign()
507 response->counter, flags, key_handle, key_handle_len, in sk_sign()
[all …]
/openssh-portable/regress/misc/fuzz-harness/
H A Dssh-sk-null.cc29 const char *application, const char *userid, uint8_t flags, in sshsk_enroll() argument

123