Home
last modified time | relevance | path

Searched refs:opts (Results 1 – 25 of 28) sorted by relevance

12

/openssh-portable/
H A Dauth-options.c206 if (opts == NULL) in sshauthopt_free()
216 free(opts->env); in sshauthopt_free()
226 freezero(opts, sizeof(*opts)); in sshauthopt_free()
336 while (*opts && *opts != ' ' && *opts != '\t') { in sshauthopt_parse()
453 if (*opts == '\0' || *opts == ' ' || *opts == '\t') in sshauthopt_parse()
460 opts++; in sshauthopt_parse()
837 if ((opts = calloc(1, sizeof(*opts))) == NULL) in sshauthopt_deserialise()
880 &opts->permitopen, &opts->npermitopen)) != 0 || in sshauthopt_deserialise()
882 &opts->permitlisten, &opts->npermitlisten)) != 0) in sshauthopt_deserialise()
887 *optsp = opts; in sshauthopt_deserialise()
[all …]
H A Dauth.c882 for (i = 0; i < opts->nenv; i++) { in auth_log_authopts()
886 loc, opts->env[i]); in auth_log_authopts()
892 if (opts->valid_before != 0) { in auth_log_authopts()
896 if (opts->cert_principals != NULL) { in auth_log_authopts()
898 loc, opts->cert_principals); in auth_log_authopts()
900 if (opts->force_command != NULL) in auth_log_authopts()
905 loc, opts->permitopen[i]); in auth_log_authopts()
911 loc, opts->permitlisten[i]); in auth_log_authopts()
963 if (opts->valid_before && now > 0 && in auth_authorise_keyopts()
971 if (opts->cert_principals != NULL && !opts->cert_authority) { in auth_authorise_keyopts()
[all …]
H A Dssh-sk.c358 if (opts == NULL) in sshsk_free_options()
361 free(opts[i]->name); in sshsk_free_options()
362 free(opts[i]->value); in sshsk_free_options()
363 free(opts[i]); in sshsk_free_options()
365 free(opts); in sshsk_free_options()
375 if ((opts = recallocarray(opts, nopts, nopts + 2, /* extra for NULL */ in sshsk_add_option()
380 *optsp = opts; in sshsk_add_option()
382 if ((opts[nopts] = calloc(1, sizeof(**opts))) == NULL) { in sshsk_add_option()
414 *optsp = opts; in make_options()
415 opts = NULL; in make_options()
[all …]
H A Dauth-options.h80 void sshauthopt_free(struct sshauthopt *opts);
82 int sshauthopt_serialise(const struct sshauthopt *opts, struct sshbuf *m, int);
83 int sshauthopt_deserialise(struct sshbuf *m, struct sshauthopt **opts);
H A Dsshsig.c631 if (opts == NULL || *opts == '\0') in sshsigopt_parse()
634 while (*opts && *opts != ' ' && *opts != '\t') { in sshsigopt_parse()
651 if (*opts == '\0' || *opts == ' ' || *opts == '\t') in sshsigopt_parse()
654 if (*opts != ',') { in sshsigopt_parse()
658 opts++; in sshsigopt_parse()
659 if (*opts == '\0') { in sshsigopt_parse()
676 if (opts == NULL) in sshsigopt_free()
678 free(opts->namespaces); in sshsigopt_free()
679 free(opts); in sshsigopt_free()
738 opts = cp; in parse_principals_key_and_options()
[all …]
H A Dauth2-pubkey.c366 *authoptsp = opts; in check_principals_line()
367 opts = NULL; in check_principals_line()
369 sshauthopt_free(opts); in check_principals_line()
1037 opts = NULL; in user_key_allowed()
1045 sshauthopt_free(opts); in user_key_allowed()
1046 opts = NULL; in user_key_allowed()
1050 sshauthopt_free(opts); in user_key_allowed()
1051 opts = NULL; in user_key_allowed()
1055 *authoptsp = opts; in user_key_allowed()
1056 opts = NULL; in user_key_allowed()
[all …]
H A Dsshsig.h92 struct sshsigopt *sshsigopt_parse(const char *opts,
96 void sshsigopt_free(struct sshsigopt *opts);
H A Dssh-keygen.c2811 errstr, opts[i]+7); in do_moduli_gen()
2822 opts[i]+12, errstr); in do_moduli_gen()
2826 "generation", opts[i]); in do_moduli_gen()
2871 opts[i]+10, errstr); in do_moduli_screen()
2878 opts[i]+12, errstr); in do_moduli_screen()
2882 "screening", opts[i]); in do_moduli_screen()
3257 opts = xrecallocarray(opts, nopts, nopts + 1, in main()
3258 sizeof(*opts)); in main()
3466 add_cert_option(opts[i]); in main()
3586 opts[i] + 10); in main()
[all …]
H A Dsshkey-xmss.c326 enum sshkey_serialize_rep opts) in sshkey_xmss_serialize_pk_info() argument
335 if (opts != SSHKEY_SERIALIZE_INFO) in sshkey_xmss_serialize_pk_info()
716 enum sshkey_serialize_rep opts) in sshkey_xmss_serialize_state_opt() argument
724 if ((r = sshbuf_put_u8(b, opts)) != 0) in sshkey_xmss_serialize_state_opt()
726 switch (opts) { in sshkey_xmss_serialize_state_opt()
840 enum sshkey_serialize_rep opts; in sshkey_xmss_deserialize_state_opt() local
847 opts = have_state; in sshkey_xmss_deserialize_state_opt()
848 switch (opts) { in sshkey_xmss_deserialize_state_opt()
H A Dmonitor_wrap.c457 struct sshauthopt *opts = NULL; in mm_key_allowed() local
482 (r = sshauthopt_deserialise(m, &opts)) != 0) in mm_key_allowed()
487 *authoptp = opts; in mm_key_allowed()
488 opts = NULL; in mm_key_allowed()
490 sshauthopt_free(opts); in mm_key_allowed()
H A Dmisc.c2381 const char *opts = *optsp; in opt_flag() local
2384 if (allow_negate && strncasecmp(opts, "no-", 3) == 0) { in opt_flag()
2385 opts += 3; in opt_flag()
2388 if (strncasecmp(opts, opt, opt_len) == 0) { in opt_flag()
2389 *optsp = opts + opt_len; in opt_flag()
2429 opt_match(const char **opts, const char *term) in opt_match() argument
2431 if (strncasecmp((*opts), term, strlen(term)) == 0 && in opt_match()
2432 (*opts)[strlen(term)] == '=') { in opt_match()
2433 *opts += strlen(term) + 1; in opt_match()
H A Dmisc.h192 int opt_match(const char **opts, const char *term);
H A Dmonitor.c1156 struct sshauthopt *opts = NULL; in mm_answer_keyallowed() local
1185 pubkey_auth_attempt, &opts); in mm_answer_keyallowed()
1223 key_opts = opts; in mm_answer_keyallowed()
1237 if (opts != NULL && (r = sshauthopt_serialise(opts, m, 1)) != 0) in mm_answer_keyallowed()
1242 sshauthopt_free(opts); in mm_answer_keyallowed()
/openssh-portable/regress/unittests/authopt/
H A Dtests.c93 ASSERT_PTR_NE(opts, NULL); in compare_opts()
136 struct sshauthopt *opts, *expected; in test_authkeys_parse() local
143 ASSERT_PTR_EQ(opts, NULL); \ in test_authkeys_parse()
151 compare_opts(opts, expected); \ in test_authkeys_parse()
153 sshauthopt_free(opts); \ in test_authkeys_parse()
241 opts = sshauthopt_parse( \ in test_authkeys_parse()
266 opts = sshauthopt_parse( \ in test_authkeys_parse()
294 compare_opts(opts, expected); \ in test_cert_parse()
296 sshauthopt_free(opts); \ in test_cert_parse()
327 opts = sshauthopt_from_cert(cert); in test_cert_parse()
[all …]
/openssh-portable/regress/
H A Dlimit-keytype.sh52 opts="-oProtocol=2 -F $OBJ/ssh_proxy -oIdentitiesOnly=yes"
89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
90 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
97 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
98 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
104 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
113 ${SSH} $opts -i $OBJ/user_key1 proxy true && fatal "key1 succeeded"
114 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded"
124 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
131 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
[all …]
H A Dcert-file.sh47 opts="-F $OBJ/ssh_proxy -oIdentitiesOnly=yes"
48 opts2="$opts -i $OBJ/user_key1 -i $OBJ/user_key2"
89 opts3="$opts -i $OBJ/user_key2"
140 opts="-F $OBJ/ssh_proxy"
142 ${SSH} $opts somehost exit 52
148 opts="$opts -oCertificateFile=$OBJ/cert_user_key1_2.pub"
149 ${SSH} $opts somehost exit 52
155 opts="$opts -oCertificateFile=$OBJ/cert_user_key1_1.pub"
156 ${SSH} $opts somehost exit 52
H A Dmultipubkey.sh31 opts="-oProtocol=2 -F $OBJ/ssh_proxy -oIdentitiesOnly=yes"
32 opts="$opts -i $OBJ/cert_user_key1 -i $OBJ/user_key1 -i $OBJ/user_key2"
47 ${SSH} $opts proxy true && fail "ssh succeeded with key"
52 ${SSH} $opts proxy true && fail "ssh succeeded with key+cert"
58 ${SSH} $opts proxy true || fail "ssh failed with multiple keys"
64 ${SSH} $opts proxy true || fail "ssh failed with key/cert"
H A Dkey-options.sh32 opts=$2
34 sed "s/.*/$opts &/" $origkeys >$authkeys
50 opts=$2
52 sed "s/.*/$opts &/" $origkeys >$authkeys
108 opts=$2
110 sed "s/.*/$opts &/" $origkeys >$authkeys
H A Drekey.sh39 opts=""
41 opts="$opts KexAlgorithms=$i"
44 opts="$opts Ciphers=$i"
47 opts="$opts MACs=$i"
50 for opt in $opts; do
H A Dproxy-connect.sh14 opts="-oCompression=$c -F $OBJ/ssh_proxy"
15 SSH_CONNECTION=`${SSH} $opts 999.999.999.999 'echo $SSH_CONNECTION'`
H A Ddhgex.sh22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher"
27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true
H A Dhostkey-agent.sh39 opts="-oHostKeyAlgorithms=$k -F $OBJ/ssh_proxy"
41 SSH_CONNECTION=`${SSH} $opts host 'echo $SSH_CONNECTION'`
/openssh-portable/regress/misc/fuzz-harness/
H A Dauthopt_fuzz.cc14 struct sshauthopt *opts = NULL, *merge = NULL, *add = sshauthopt_new(); in LLVMFuzzerTestOneInput() local
20 if ((opts = sshauthopt_parse(cp, NULL)) == NULL) in LLVMFuzzerTestOneInput()
22 if ((merge = sshauthopt_merge(opts, add, NULL)) == NULL) in LLVMFuzzerTestOneInput()
28 sshauthopt_free(opts); in LLVMFuzzerTestOneInput()
H A Dsshsigopt_fuzz.cc14 struct sshsigopt *opts = NULL; in LLVMFuzzerTestOneInput() local
20 if ((opts = sshsigopt_parse(cp, "libfuzzer", 0, NULL)) == NULL) in LLVMFuzzerTestOneInput()
25 sshsigopt_free(opts); in LLVMFuzzerTestOneInput()
/openssh-portable/openbsd-compat/
H A Dopenbsd-compat.h178 int BSDgetopt(int argc, char * const *argv, const char *opts);

12