zfs
dict
ffmpeg
dict
curl
dict
redis
dict
gcc
dict
wrk
dict
openssh
dict
null
null
null
null
null
null
{ "callees": { "targets": { "_ssh_verify_host_key": null, "client_simple_escape_filter": null, "key_print_wrapper": null, "mm_log_handler": null, "mux_master_process_alive_check": null, "mux_master_process_close_fwd": null, "mux_master_process_hello": null, "mux_master_process_new_session": null, "mux_master_process_open_fwd": null, "mux_master_process_proxy": null, "mux_master_process_stdio_fwd": null, "mux_master_process_stop_listening": null, "mux_master_process_terminate": null, "mux_session_confirm": null, "mux_stdio_confirm": null, "scpio": null, "sftpio": null, "sk_api_version": null, "sk_enroll": null, "ssh_ecdsa_equal": null, "ssh_ed25519_serialize_public": null, "ssh_rsa_alloc": null, "ssh_rsa_size": "", "ssh_session2_setup": null, "ssh_sk_enroll": null, "ssh_stdio_confirm": null, "ssh_tun_confirm": null, "sys_tun_infilter": null, "sys_tun_outfilter": null } }, "callsite": "impl->funcs->size", "chain_summary": [ { "parent": "", "source_code": [ "u_int", "sshkey_size(const struct sshkey *k)", "{", "\tconst struct sshkey_impl *impl;", "\tif ((impl = sshkey_impl_from_key(k)) == NULL)", "\t\treturn 0;", "\tif (impl->funcs->size != NULL)", "\t\treturn impl->funcs->size(k);", "\treturn impl->keybits;", "}" ] }, { "parent": "", "source_code": [ "static const struct sshkey_impl *", "sshkey_impl_from_key(const struct sshkey *k)", "{", "\tif (k == NULL)", "\t\treturn NULL;", "\treturn sshkey_impl_from_type_nid(k->type, k->ecdsa_nid);", "}" ] }, { "parent": "", "source_code": [ "static const struct sshkey_impl *", "sshkey_impl_from_type_nid(int type, int nid)", "{", "\tint i;", "\tfor (i = 0; keyimpls[i] != NULL; i++) {", "\t\tif (keyimpls[i]->type == type &&", "\t\t (keyimpls[i]->nid == 0 || keyimpls[i]->nid == nid))", "\t\t\treturn keyimpls[i];", "\t}", "\treturn NULL;", "}" ] }, { "parent": "", "source_code": [ "const struct sshkey_impl * const keyimpls[] = {", "\t&sshkey_ed25519_impl,", "\t&sshkey_ed25519_cert_impl,", "#ifdef ENABLE_SK", "\t&sshkey_ed25519_sk_impl,", "\t&sshkey_ed25519_sk_cert_impl,", "#endif", "#ifdef WITH_OPENSSL", "# ifdef OPENSSL_HAS_ECC", "\t&sshkey_ecdsa_nistp256_impl,", "\t&sshkey_ecdsa_nistp256_cert_impl,", "\t&sshkey_ecdsa_nistp384_impl,", "\t&sshkey_ecdsa_nistp384_cert_impl,", "# ifdef OPENSSL_HAS_NISTP521", "\t&sshkey_ecdsa_nistp521_impl,", "\t&sshkey_ecdsa_nistp521_cert_impl,", "# endif /* OPENSSL_HAS_NISTP521 */", "# ifdef ENABLE_SK", "\t&sshkey_ecdsa_sk_impl,", "\t&sshkey_ecdsa_sk_cert_impl,", "\t&sshkey_ecdsa_sk_webauthn_impl,", "# endif /* ENABLE_SK */", "# endif /* OPENSSL_HAS_ECC */", "\t&sshkey_dss_impl,", "\t&sshkey_dsa_cert_impl,", "\t&sshkey_rsa_impl,", "\t&sshkey_rsa_cert_impl,", "\t&sshkey_rsa_sha256_impl,", "\t&sshkey_rsa_sha256_cert_impl,", "\t&sshkey_rsa_sha512_impl,", "\t&sshkey_rsa_sha512_cert_impl,", "#endif /* WITH_OPENSSL */", "#ifdef WITH_XMSS", "\t&sshkey_xmss_impl,", "\t&sshkey_xmss_cert_impl,", "#endif", "\tNULL", "};" ] }, { "parent": "", "source_code": [ "const struct sshkey_impl sshkey_rsa_impl = {", "\t/* .name = */\t\t\"ssh-rsa\",", "\t/* .shortname = */\t\"RSA\",", "\t/* .sigalg = */\t\tNULL,", "\t/* .type = */\t\tKEY_RSA,", "\t/* .nid = */\t\t0,", "\t/* .cert = */\t\t0,", "\t/* .sigonly = */\t0,", "\t/* .keybits = */\t0,", "\t/* .funcs = */\t\t&sshkey_rsa_funcs,", "};" ] }, { "parent": "", "source_code": [ "static const struct sshkey_impl_funcs sshkey_rsa_funcs = {", "\t/* .size = */\t\tssh_rsa_size,", "\t/* .alloc = */\t\tssh_rsa_alloc,", "\t/* .cleanup = */\tssh_rsa_cleanup,", "\t/* .equal = */\t\tssh_rsa_equal,", "\t/* .ssh_serialize_public = */ ssh_rsa_serialize_public,", "\t/* .ssh_deserialize_public = */ ssh_rsa_deserialize_public,", "\t/* .ssh_serialize_private = */ ssh_rsa_serialize_private,", "\t/* .ssh_deserialize_private = */ ssh_rsa_deserialize_private,", "\t/* .generate = */\tssh_rsa_generate,", "\t/* .copy_public = */\tssh_rsa_copy_public,", "\t/* .sign = */\t\tssh_rsa_sign,", "\t/* .verify = */\t\tssh_rsa_verify,", "};" ] } ], "type": "fnptr-global-struct-array" }
null
null
null
null
null
null
{ "callees": { "targets": { "_ssh_verify_host_key": null, "client_simple_escape_filter": null, "key_print_wrapper": null, "mm_log_handler": null, "mux_master_process_alive_check": null, "mux_master_process_close_fwd": null, "mux_master_process_hello": null, "mux_master_process_new_session": null, "mux_master_process_open_fwd": null, "mux_master_process_proxy": null, "mux_master_process_stdio_fwd": null, "mux_master_process_stop_listening": null, "mux_master_process_terminate": null, "mux_session_confirm": null, "mux_stdio_confirm": null, "scpio": null, "sftpio": null, "sk_api_version": null, "sk_enroll": null, "ssh_ecdsa_equal": null, "ssh_ed25519_serialize_public": null, "ssh_rsa_alloc": "", "ssh_rsa_size": null, "ssh_session2_setup": null, "ssh_sk_enroll": null, "ssh_stdio_confirm": null, "ssh_tun_confirm": null, "sys_tun_infilter": null, "sys_tun_outfilter": null } }, "callsite": "impl->funcs->alloc", "chain_summary": [ { "parent": "", "source_code": [ "struct sshkey *", "sshkey_new(int type)", "{", "\tstruct sshkey *k;", "\tconst struct sshkey_impl *impl = NULL;", "\tif (type != KEY_UNSPEC &&", "\t (impl = sshkey_impl_from_type(type)) == NULL)", "\t\treturn NULL;", "\t/* All non-certificate types may act as CAs */", "\tif ((k = calloc(1, sizeof(*k))) == NULL)", "\t\treturn NULL;", "\tk->type = type;", "\tk->ecdsa_nid = -1;", "\tif (impl != NULL && impl->funcs->alloc != NULL) {", "\t\tif (impl->funcs->alloc(k) != 0) {", "\t\t\tfree(k);", "\t\t\treturn NULL;", "\t\t}", "\t}", "\tif (sshkey_is_cert(k)) {", "\t\tif ((k->cert = cert_new()) == NULL) {", "\t\t\tsshkey_free(k);", "\t\t\treturn NULL;", "\t\t}", "\t}", "\treturn k;", "}" ] }, { "parent": "", "source_code": [ "static const struct sshkey_impl *", "sshkey_impl_from_type(int type)", "{", "\tint i;", "\tfor (i = 0; keyimpls[i] != NULL; i++) {", "\t\tif (keyimpls[i]->type == type)", "\t\t\treturn keyimpls[i];", "\t}", "\treturn NULL;", "}" ] }, { "parent": "", "source_code": [ "const struct sshkey_impl * const keyimpls[] = {", "\t&sshkey_ed25519_impl,", "\t&sshkey_ed25519_cert_impl,", "#ifdef ENABLE_SK", "\t&sshkey_ed25519_sk_impl,", "\t&sshkey_ed25519_sk_cert_impl,", "#endif", "#ifdef WITH_OPENSSL", "# ifdef OPENSSL_HAS_ECC", "\t&sshkey_ecdsa_nistp256_impl,", "\t&sshkey_ecdsa_nistp256_cert_impl,", "\t&sshkey_ecdsa_nistp384_impl,", "\t&sshkey_ecdsa_nistp384_cert_impl,", "# ifdef OPENSSL_HAS_NISTP521", "\t&sshkey_ecdsa_nistp521_impl,", "\t&sshkey_ecdsa_nistp521_cert_impl,", "# endif /* OPENSSL_HAS_NISTP521 */", "# ifdef ENABLE_SK", "\t&sshkey_ecdsa_sk_impl,", "\t&sshkey_ecdsa_sk_cert_impl,", "\t&sshkey_ecdsa_sk_webauthn_impl,", "# endif /* ENABLE_SK */", "# endif /* OPENSSL_HAS_ECC */", "\t&sshkey_dss_impl,", "\t&sshkey_dsa_cert_impl,", "\t&sshkey_rsa_impl,", "\t&sshkey_rsa_cert_impl,", "\t&sshkey_rsa_sha256_impl,", "\t&sshkey_rsa_sha256_cert_impl,", "\t&sshkey_rsa_sha512_impl,", "\t&sshkey_rsa_sha512_cert_impl,", "#endif /* WITH_OPENSSL */", "#ifdef WITH_XMSS", "\t&sshkey_xmss_impl,", "\t&sshkey_xmss_cert_impl,", "#endif", "\tNULL", "};" ] }, { "parent": "", "source_code": [ "const struct sshkey_impl sshkey_rsa_impl = {", "\t/* .name = */\t\t\"ssh-rsa\",", "\t/* .shortname = */\t\"RSA\",", "\t/* .sigalg = */\t\tNULL,", "\t/* .type = */\t\tKEY_RSA,", "\t/* .nid = */\t\t0,", "\t/* .cert = */\t\t0,", "\t/* .sigonly = */\t0,", "\t/* .keybits = */\t0,", "\t/* .funcs = */\t\t&sshkey_rsa_funcs,", "};" ] }, { "parent": "", "source_code": [ "static const struct sshkey_impl_funcs sshkey_rsa_funcs = {", "\t/* .size = */\t\tssh_rsa_size,", "\t/* .alloc = */\t\tssh_rsa_alloc,", "\t/* .cleanup = */\tssh_rsa_cleanup,", "\t/* .equal = */\t\tssh_rsa_equal,", "\t/* .ssh_serialize_public = */ ssh_rsa_serialize_public,", "\t/* .ssh_deserialize_public = */ ssh_rsa_deserialize_public,", "\t/* .ssh_serialize_private = */ ssh_rsa_serialize_private,", "\t/* .ssh_deserialize_private = */ ssh_rsa_deserialize_private,", "\t/* .generate = */\tssh_rsa_generate,", "\t/* .copy_public = */\tssh_rsa_copy_public,", "\t/* .sign = */\t\tssh_rsa_sign,", "\t/* .verify = */\t\tssh_rsa_verify,", "};" ] } ], "type": "fnptr-global-struct-array" }
null
null
null
null
null
null
{ "callees": { "targets": { "_ssh_verify_host_key": null, "client_simple_escape_filter": null, "key_print_wrapper": null, "mm_log_handler": null, "mux_master_process_alive_check": "", "mux_master_process_close_fwd": "", "mux_master_process_hello": "", "mux_master_process_new_session": "", "mux_master_process_open_fwd": "", "mux_master_process_proxy": "", "mux_master_process_stdio_fwd": "", "mux_master_process_stop_listening": "", "mux_master_process_terminate": "", "mux_session_confirm": null, "mux_stdio_confirm": null, "scpio": null, "sftpio": null, "sk_api_version": null, "sk_enroll": null, "ssh_ecdsa_equal": null, "ssh_ed25519_serialize_public": null, "ssh_rsa_alloc": null, "ssh_rsa_size": null, "ssh_session2_setup": null, "ssh_sk_enroll": null, "ssh_stdio_confirm": null, "ssh_tun_confirm": null, "sys_tun_infilter": null, "sys_tun_outfilter": null } }, "callsite": "mux_master_handlers[i].handler", "chain_summary": [ { "parent": "", "source_code": [ "/* Channel callbacks fired on read/write from mux client fd */", "static int", "mux_master_read_cb(struct ssh *ssh, Channel *c)", "{", "\tstruct sshbuf *in = NULL, *out = NULL;", "\tu_int type, rid, i;", "\tint r, ret = -1;", "\tfor (i = 0; mux_master_handlers[i].handler != NULL; i++) {", "\t\tif (type == mux_master_handlers[i].type) {", "\t\t\tret = mux_master_handlers[i].handler(ssh, rid,", "\t\t\t c, in, out);", "\t\t\tbreak;", "\t\t}", "\t}", "\tif (mux_master_handlers[i].handler == NULL) {", "\t\terror_f(\"unsupported mux message 0x%08x\", type);", "\t\treply_error(out, MUX_S_FAILURE, rid, \"unsupported request\");", "\t\tret = 0;", "\t}", " out:", "\tsshbuf_free(in);", "\tsshbuf_free(out);", "\treturn ret;", "}" ] }, { "parent": "", "source_code": [ "static const struct {", "\tu_int type;", "\tint (*handler)(struct ssh *, u_int, Channel *,", "\t struct sshbuf *, struct sshbuf *);", "} mux_master_handlers[] = {", "\t{ MUX_MSG_HELLO, mux_master_process_hello },", "\t{ MUX_C_NEW_SESSION, mux_master_process_new_session },", "\t{ MUX_C_ALIVE_CHECK, mux_master_process_alive_check },", "\t{ MUX_C_TERMINATE, mux_master_process_terminate },", "\t{ MUX_C_OPEN_FWD, mux_master_process_open_fwd },", "\t{ MUX_C_CLOSE_FWD, mux_master_process_close_fwd },", "\t{ MUX_C_NEW_STDIO_FWD, mux_master_process_stdio_fwd },", "\t{ MUX_C_STOP_LISTENING, mux_master_process_stop_listening },", "\t{ MUX_C_PROXY, mux_master_process_proxy },", "\t{ 0, NULL }", "};" ] } ], "type": "fnptr-global-struct-array" }
null
null
null
null
null
null
{ "callees": { "targets": { "_ssh_verify_host_key": null, "client_simple_escape_filter": null, "key_print_wrapper": null, "mm_log_handler": null, "mux_master_process_alive_check": null, "mux_master_process_close_fwd": null, "mux_master_process_hello": null, "mux_master_process_new_session": null, "mux_master_process_open_fwd": null, "mux_master_process_proxy": null, "mux_master_process_stdio_fwd": null, "mux_master_process_stop_listening": null, "mux_master_process_terminate": null, "mux_session_confirm": null, "mux_stdio_confirm": null, "scpio": "", "sftpio": "", "sk_api_version": null, "sk_enroll": null, "ssh_ecdsa_equal": null, "ssh_ed25519_serialize_public": null, "ssh_rsa_alloc": null, "ssh_rsa_size": null, "ssh_session2_setup": null, "ssh_sk_enroll": null, "ssh_stdio_confirm": null, "ssh_tun_confirm": null, "sys_tun_infilter": null, "sys_tun_outfilter": null } }, "callsite": "cb", "chain_summary": [ { "parent": "", "source_code": [ "size_t", "atomicio6(ssize_t (*f) (int, void *, size_t), int fd, void *_s, size_t n,", " int (*cb)(void *, size_t), void *cb_arg)", "{", "\tchar *s = _s;", "\tsize_t pos = 0;", "\tssize_t res;", "\tstruct pollfd pfd;", "\tpfd.fd = fd;", "#ifndef BROKEN_READ_COMPARISON", "\tpfd.events = f == read ? POLLIN : POLLOUT;", "#else", "\tpfd.events = POLLIN|POLLOUT;", "#endif", "\twhile (n > pos) {", "\t\tres = (f) (fd, s + pos, n - pos);", "\t\tswitch (res) {", "\t\tcase -1:", "\t\t\tif (errno == EINTR) {", "\t\t\t\t/* possible SIGALARM, update callback */", "\t\t\t\tif (cb != NULL && cb(cb_arg, 0) == -1) {", "\t\t\t\t\terrno = EINTR;", "\t\t\t\t\treturn pos;", "\t\t\t\t}", "\t\t\t\tcontinue;", "\t\t\t} else if (errno == EAGAIN || errno == EWOULDBLOCK) {", "\t\t\t\t(void)poll(&pfd, 1, -1);", "\t\t\t\tcontinue;", "\t\t\t}", "\t\t\treturn 0;", "\t\tcase 0:", "\t\t\terrno = EPIPE;", "\t\t\treturn pos;", "\t\tdefault:", "\t\t\tpos += (size_t)res;", "\t\t\tif (cb != NULL && cb(cb_arg, (size_t)res) == -1) {", "\t\t\t\terrno = EINTR;", "\t\t\t\treturn pos;", "\t\t\t}", "\t\t}", "\t}", "\treturn pos;", "}" ] }, { "parent": "", "source_code": [ "void", "source(int argc, char **argv)", "{", " if (atomicio6(vwrite, remout, bp->buf, amt, scpio,", " &statbytes) != amt)", " haderr = errno;", "}" ] }, { "parent": "", "source_code": [ "static int", "scpio(void *_cnt, size_t s)", "{", "\toff_t *cnt = (off_t *)_cnt;", "\t*cnt += s;", "\trefresh_progress_meter(0);", "\tif (limit_kbps > 0)", "\t\tbandwidth_limit(&bwlimit, s);", "\treturn 0;", "}" ] }, { "parent": "", "source_code": [ "static void", "get_msg_extended(struct sftp_conn *conn, struct sshbuf *m, int initial)", "{", "\tu_int msg_len;", "\tu_char *p;", "\tint r;", "\tsshbuf_reset(m);", "\tif ((r = sshbuf_reserve(m, 4, &p)) != 0)", "\t\tfatal_fr(r, \"reserve\");", "\tif (atomicio6(read, conn->fd_in, p, 4, sftpio,", "\t conn->limit_kbps > 0 ? &conn->bwlimit_in : NULL) != 4) {", "\t\tif (errno == EPIPE || errno == ECONNRESET)", "\t\t\tfatal(\"Connection closed\");", "\t\telse", "\t\t\tfatal(\"Couldn't read packet: %s\", strerror(errno));", "\t}", "\tif ((r = sshbuf_get_u32(m, &msg_len)) != 0)", "\t\tfatal_fr(r, \"sshbuf_get_u32\");", "\tif (msg_len > SFTP_MAX_MSG_LENGTH) {", "\t\tdo_log2(initial ? SYSLOG_LEVEL_ERROR : SYSLOG_LEVEL_FATAL,", "\t\t \"Received message too long %u\", msg_len);", "\t\tfatal(\"Ensure the remote shell produces no output \"", "\t\t \"for non-interactive sessions.\");", "\t}", "\tif ((r = sshbuf_reserve(m, msg_len, &p)) != 0)", "\t\tfatal_fr(r, \"reserve\");", "\tif (atomicio6(read, conn->fd_in, p, msg_len, sftpio,", "\t conn->limit_kbps > 0 ? &conn->bwlimit_in : NULL)", "\t != msg_len) {", "\t\tif (errno == EPIPE)", "\t\t\tfatal(\"Connection closed\");", "\t\telse", "\t\t\tfatal(\"Read packet: %s\", strerror(errno));", "\t}", "}" ] }, { "parent": "", "source_code": [ "static int", "sftpio(void *_bwlimit, size_t amount)", "{", "\tstruct bwlimit *bwlimit = (struct bwlimit *)_bwlimit;", "\trefresh_progress_meter(0);", "\tif (bwlimit != NULL)", "\t\tbandwidth_limit(bwlimit, amount);", "\treturn 0;", "}" ] } ], "type": "fnptr-callback" }