zfs
dict | ffmpeg
dict | curl
dict | redis
dict | gcc
dict | wrk
dict | openssh
dict |
|---|---|---|---|---|---|---|
null | null | null | null | null | null |
{
"callees": {
"targets": {
"_ssh_verify_host_key": null,
"client_simple_escape_filter": null,
"key_print_wrapper": null,
"mm_log_handler": null,
"mux_master_process_alive_check": null,
"mux_master_process_close_fwd": null,
"mux_master_process_hello": null,
"mux_master_process_new_session": null,
"mux_master_process_open_fwd": null,
"mux_master_process_proxy": null,
"mux_master_process_stdio_fwd": null,
"mux_master_process_stop_listening": null,
"mux_master_process_terminate": null,
"mux_session_confirm": null,
"mux_stdio_confirm": null,
"scpio": null,
"sftpio": null,
"sk_api_version": null,
"sk_enroll": null,
"ssh_ecdsa_equal": null,
"ssh_ed25519_serialize_public": null,
"ssh_rsa_alloc": null,
"ssh_rsa_size": "",
"ssh_session2_setup": null,
"ssh_sk_enroll": null,
"ssh_stdio_confirm": null,
"ssh_tun_confirm": null,
"sys_tun_infilter": null,
"sys_tun_outfilter": null
}
},
"callsite": "impl->funcs->size",
"chain_summary": [
{
"parent": "",
"source_code": [
"u_int",
"sshkey_size(const struct sshkey *k)",
"{",
"\tconst struct sshkey_impl *impl;",
"\tif ((impl = sshkey_impl_from_key(k)) == NULL)",
"\t\treturn 0;",
"\tif (impl->funcs->size != NULL)",
"\t\treturn impl->funcs->size(k);",
"\treturn impl->keybits;",
"}"
]
},
{
"parent": "",
"source_code": [
"static const struct sshkey_impl *",
"sshkey_impl_from_key(const struct sshkey *k)",
"{",
"\tif (k == NULL)",
"\t\treturn NULL;",
"\treturn sshkey_impl_from_type_nid(k->type, k->ecdsa_nid);",
"}"
]
},
{
"parent": "",
"source_code": [
"static const struct sshkey_impl *",
"sshkey_impl_from_type_nid(int type, int nid)",
"{",
"\tint i;",
"\tfor (i = 0; keyimpls[i] != NULL; i++) {",
"\t\tif (keyimpls[i]->type == type &&",
"\t\t (keyimpls[i]->nid == 0 || keyimpls[i]->nid == nid))",
"\t\t\treturn keyimpls[i];",
"\t}",
"\treturn NULL;",
"}"
]
},
{
"parent": "",
"source_code": [
"const struct sshkey_impl * const keyimpls[] = {",
"\t&sshkey_ed25519_impl,",
"\t&sshkey_ed25519_cert_impl,",
"#ifdef ENABLE_SK",
"\t&sshkey_ed25519_sk_impl,",
"\t&sshkey_ed25519_sk_cert_impl,",
"#endif",
"#ifdef WITH_OPENSSL",
"# ifdef OPENSSL_HAS_ECC",
"\t&sshkey_ecdsa_nistp256_impl,",
"\t&sshkey_ecdsa_nistp256_cert_impl,",
"\t&sshkey_ecdsa_nistp384_impl,",
"\t&sshkey_ecdsa_nistp384_cert_impl,",
"# ifdef OPENSSL_HAS_NISTP521",
"\t&sshkey_ecdsa_nistp521_impl,",
"\t&sshkey_ecdsa_nistp521_cert_impl,",
"# endif /* OPENSSL_HAS_NISTP521 */",
"# ifdef ENABLE_SK",
"\t&sshkey_ecdsa_sk_impl,",
"\t&sshkey_ecdsa_sk_cert_impl,",
"\t&sshkey_ecdsa_sk_webauthn_impl,",
"# endif /* ENABLE_SK */",
"# endif /* OPENSSL_HAS_ECC */",
"\t&sshkey_dss_impl,",
"\t&sshkey_dsa_cert_impl,",
"\t&sshkey_rsa_impl,",
"\t&sshkey_rsa_cert_impl,",
"\t&sshkey_rsa_sha256_impl,",
"\t&sshkey_rsa_sha256_cert_impl,",
"\t&sshkey_rsa_sha512_impl,",
"\t&sshkey_rsa_sha512_cert_impl,",
"#endif /* WITH_OPENSSL */",
"#ifdef WITH_XMSS",
"\t&sshkey_xmss_impl,",
"\t&sshkey_xmss_cert_impl,",
"#endif",
"\tNULL",
"};"
]
},
{
"parent": "",
"source_code": [
"const struct sshkey_impl sshkey_rsa_impl = {",
"\t/* .name = */\t\t\"ssh-rsa\",",
"\t/* .shortname = */\t\"RSA\",",
"\t/* .sigalg = */\t\tNULL,",
"\t/* .type = */\t\tKEY_RSA,",
"\t/* .nid = */\t\t0,",
"\t/* .cert = */\t\t0,",
"\t/* .sigonly = */\t0,",
"\t/* .keybits = */\t0,",
"\t/* .funcs = */\t\t&sshkey_rsa_funcs,",
"};"
]
},
{
"parent": "",
"source_code": [
"static const struct sshkey_impl_funcs sshkey_rsa_funcs = {",
"\t/* .size = */\t\tssh_rsa_size,",
"\t/* .alloc = */\t\tssh_rsa_alloc,",
"\t/* .cleanup = */\tssh_rsa_cleanup,",
"\t/* .equal = */\t\tssh_rsa_equal,",
"\t/* .ssh_serialize_public = */ ssh_rsa_serialize_public,",
"\t/* .ssh_deserialize_public = */ ssh_rsa_deserialize_public,",
"\t/* .ssh_serialize_private = */ ssh_rsa_serialize_private,",
"\t/* .ssh_deserialize_private = */ ssh_rsa_deserialize_private,",
"\t/* .generate = */\tssh_rsa_generate,",
"\t/* .copy_public = */\tssh_rsa_copy_public,",
"\t/* .sign = */\t\tssh_rsa_sign,",
"\t/* .verify = */\t\tssh_rsa_verify,",
"};"
]
}
],
"type": "fnptr-global-struct-array"
}
|
null | null | null | null | null | null |
{
"callees": {
"targets": {
"_ssh_verify_host_key": null,
"client_simple_escape_filter": null,
"key_print_wrapper": null,
"mm_log_handler": null,
"mux_master_process_alive_check": null,
"mux_master_process_close_fwd": null,
"mux_master_process_hello": null,
"mux_master_process_new_session": null,
"mux_master_process_open_fwd": null,
"mux_master_process_proxy": null,
"mux_master_process_stdio_fwd": null,
"mux_master_process_stop_listening": null,
"mux_master_process_terminate": null,
"mux_session_confirm": null,
"mux_stdio_confirm": null,
"scpio": null,
"sftpio": null,
"sk_api_version": null,
"sk_enroll": null,
"ssh_ecdsa_equal": null,
"ssh_ed25519_serialize_public": null,
"ssh_rsa_alloc": "",
"ssh_rsa_size": null,
"ssh_session2_setup": null,
"ssh_sk_enroll": null,
"ssh_stdio_confirm": null,
"ssh_tun_confirm": null,
"sys_tun_infilter": null,
"sys_tun_outfilter": null
}
},
"callsite": "impl->funcs->alloc",
"chain_summary": [
{
"parent": "",
"source_code": [
"struct sshkey *",
"sshkey_new(int type)",
"{",
"\tstruct sshkey *k;",
"\tconst struct sshkey_impl *impl = NULL;",
"\tif (type != KEY_UNSPEC &&",
"\t (impl = sshkey_impl_from_type(type)) == NULL)",
"\t\treturn NULL;",
"\t/* All non-certificate types may act as CAs */",
"\tif ((k = calloc(1, sizeof(*k))) == NULL)",
"\t\treturn NULL;",
"\tk->type = type;",
"\tk->ecdsa_nid = -1;",
"\tif (impl != NULL && impl->funcs->alloc != NULL) {",
"\t\tif (impl->funcs->alloc(k) != 0) {",
"\t\t\tfree(k);",
"\t\t\treturn NULL;",
"\t\t}",
"\t}",
"\tif (sshkey_is_cert(k)) {",
"\t\tif ((k->cert = cert_new()) == NULL) {",
"\t\t\tsshkey_free(k);",
"\t\t\treturn NULL;",
"\t\t}",
"\t}",
"\treturn k;",
"}"
]
},
{
"parent": "",
"source_code": [
"static const struct sshkey_impl *",
"sshkey_impl_from_type(int type)",
"{",
"\tint i;",
"\tfor (i = 0; keyimpls[i] != NULL; i++) {",
"\t\tif (keyimpls[i]->type == type)",
"\t\t\treturn keyimpls[i];",
"\t}",
"\treturn NULL;",
"}"
]
},
{
"parent": "",
"source_code": [
"const struct sshkey_impl * const keyimpls[] = {",
"\t&sshkey_ed25519_impl,",
"\t&sshkey_ed25519_cert_impl,",
"#ifdef ENABLE_SK",
"\t&sshkey_ed25519_sk_impl,",
"\t&sshkey_ed25519_sk_cert_impl,",
"#endif",
"#ifdef WITH_OPENSSL",
"# ifdef OPENSSL_HAS_ECC",
"\t&sshkey_ecdsa_nistp256_impl,",
"\t&sshkey_ecdsa_nistp256_cert_impl,",
"\t&sshkey_ecdsa_nistp384_impl,",
"\t&sshkey_ecdsa_nistp384_cert_impl,",
"# ifdef OPENSSL_HAS_NISTP521",
"\t&sshkey_ecdsa_nistp521_impl,",
"\t&sshkey_ecdsa_nistp521_cert_impl,",
"# endif /* OPENSSL_HAS_NISTP521 */",
"# ifdef ENABLE_SK",
"\t&sshkey_ecdsa_sk_impl,",
"\t&sshkey_ecdsa_sk_cert_impl,",
"\t&sshkey_ecdsa_sk_webauthn_impl,",
"# endif /* ENABLE_SK */",
"# endif /* OPENSSL_HAS_ECC */",
"\t&sshkey_dss_impl,",
"\t&sshkey_dsa_cert_impl,",
"\t&sshkey_rsa_impl,",
"\t&sshkey_rsa_cert_impl,",
"\t&sshkey_rsa_sha256_impl,",
"\t&sshkey_rsa_sha256_cert_impl,",
"\t&sshkey_rsa_sha512_impl,",
"\t&sshkey_rsa_sha512_cert_impl,",
"#endif /* WITH_OPENSSL */",
"#ifdef WITH_XMSS",
"\t&sshkey_xmss_impl,",
"\t&sshkey_xmss_cert_impl,",
"#endif",
"\tNULL",
"};"
]
},
{
"parent": "",
"source_code": [
"const struct sshkey_impl sshkey_rsa_impl = {",
"\t/* .name = */\t\t\"ssh-rsa\",",
"\t/* .shortname = */\t\"RSA\",",
"\t/* .sigalg = */\t\tNULL,",
"\t/* .type = */\t\tKEY_RSA,",
"\t/* .nid = */\t\t0,",
"\t/* .cert = */\t\t0,",
"\t/* .sigonly = */\t0,",
"\t/* .keybits = */\t0,",
"\t/* .funcs = */\t\t&sshkey_rsa_funcs,",
"};"
]
},
{
"parent": "",
"source_code": [
"static const struct sshkey_impl_funcs sshkey_rsa_funcs = {",
"\t/* .size = */\t\tssh_rsa_size,",
"\t/* .alloc = */\t\tssh_rsa_alloc,",
"\t/* .cleanup = */\tssh_rsa_cleanup,",
"\t/* .equal = */\t\tssh_rsa_equal,",
"\t/* .ssh_serialize_public = */ ssh_rsa_serialize_public,",
"\t/* .ssh_deserialize_public = */ ssh_rsa_deserialize_public,",
"\t/* .ssh_serialize_private = */ ssh_rsa_serialize_private,",
"\t/* .ssh_deserialize_private = */ ssh_rsa_deserialize_private,",
"\t/* .generate = */\tssh_rsa_generate,",
"\t/* .copy_public = */\tssh_rsa_copy_public,",
"\t/* .sign = */\t\tssh_rsa_sign,",
"\t/* .verify = */\t\tssh_rsa_verify,",
"};"
]
}
],
"type": "fnptr-global-struct-array"
}
|
null | null | null | null | null | null |
{
"callees": {
"targets": {
"_ssh_verify_host_key": null,
"client_simple_escape_filter": null,
"key_print_wrapper": null,
"mm_log_handler": null,
"mux_master_process_alive_check": "",
"mux_master_process_close_fwd": "",
"mux_master_process_hello": "",
"mux_master_process_new_session": "",
"mux_master_process_open_fwd": "",
"mux_master_process_proxy": "",
"mux_master_process_stdio_fwd": "",
"mux_master_process_stop_listening": "",
"mux_master_process_terminate": "",
"mux_session_confirm": null,
"mux_stdio_confirm": null,
"scpio": null,
"sftpio": null,
"sk_api_version": null,
"sk_enroll": null,
"ssh_ecdsa_equal": null,
"ssh_ed25519_serialize_public": null,
"ssh_rsa_alloc": null,
"ssh_rsa_size": null,
"ssh_session2_setup": null,
"ssh_sk_enroll": null,
"ssh_stdio_confirm": null,
"ssh_tun_confirm": null,
"sys_tun_infilter": null,
"sys_tun_outfilter": null
}
},
"callsite": "mux_master_handlers[i].handler",
"chain_summary": [
{
"parent": "",
"source_code": [
"/* Channel callbacks fired on read/write from mux client fd */",
"static int",
"mux_master_read_cb(struct ssh *ssh, Channel *c)",
"{",
"\tstruct sshbuf *in = NULL, *out = NULL;",
"\tu_int type, rid, i;",
"\tint r, ret = -1;",
"\tfor (i = 0; mux_master_handlers[i].handler != NULL; i++) {",
"\t\tif (type == mux_master_handlers[i].type) {",
"\t\t\tret = mux_master_handlers[i].handler(ssh, rid,",
"\t\t\t c, in, out);",
"\t\t\tbreak;",
"\t\t}",
"\t}",
"\tif (mux_master_handlers[i].handler == NULL) {",
"\t\terror_f(\"unsupported mux message 0x%08x\", type);",
"\t\treply_error(out, MUX_S_FAILURE, rid, \"unsupported request\");",
"\t\tret = 0;",
"\t}",
" out:",
"\tsshbuf_free(in);",
"\tsshbuf_free(out);",
"\treturn ret;",
"}"
]
},
{
"parent": "",
"source_code": [
"static const struct {",
"\tu_int type;",
"\tint (*handler)(struct ssh *, u_int, Channel *,",
"\t struct sshbuf *, struct sshbuf *);",
"} mux_master_handlers[] = {",
"\t{ MUX_MSG_HELLO, mux_master_process_hello },",
"\t{ MUX_C_NEW_SESSION, mux_master_process_new_session },",
"\t{ MUX_C_ALIVE_CHECK, mux_master_process_alive_check },",
"\t{ MUX_C_TERMINATE, mux_master_process_terminate },",
"\t{ MUX_C_OPEN_FWD, mux_master_process_open_fwd },",
"\t{ MUX_C_CLOSE_FWD, mux_master_process_close_fwd },",
"\t{ MUX_C_NEW_STDIO_FWD, mux_master_process_stdio_fwd },",
"\t{ MUX_C_STOP_LISTENING, mux_master_process_stop_listening },",
"\t{ MUX_C_PROXY, mux_master_process_proxy },",
"\t{ 0, NULL }",
"};"
]
}
],
"type": "fnptr-global-struct-array"
}
|
null | null | null | null | null | null |
{
"callees": {
"targets": {
"_ssh_verify_host_key": null,
"client_simple_escape_filter": null,
"key_print_wrapper": null,
"mm_log_handler": null,
"mux_master_process_alive_check": null,
"mux_master_process_close_fwd": null,
"mux_master_process_hello": null,
"mux_master_process_new_session": null,
"mux_master_process_open_fwd": null,
"mux_master_process_proxy": null,
"mux_master_process_stdio_fwd": null,
"mux_master_process_stop_listening": null,
"mux_master_process_terminate": null,
"mux_session_confirm": null,
"mux_stdio_confirm": null,
"scpio": "",
"sftpio": "",
"sk_api_version": null,
"sk_enroll": null,
"ssh_ecdsa_equal": null,
"ssh_ed25519_serialize_public": null,
"ssh_rsa_alloc": null,
"ssh_rsa_size": null,
"ssh_session2_setup": null,
"ssh_sk_enroll": null,
"ssh_stdio_confirm": null,
"ssh_tun_confirm": null,
"sys_tun_infilter": null,
"sys_tun_outfilter": null
}
},
"callsite": "cb",
"chain_summary": [
{
"parent": "",
"source_code": [
"size_t",
"atomicio6(ssize_t (*f) (int, void *, size_t), int fd, void *_s, size_t n,",
" int (*cb)(void *, size_t), void *cb_arg)",
"{",
"\tchar *s = _s;",
"\tsize_t pos = 0;",
"\tssize_t res;",
"\tstruct pollfd pfd;",
"\tpfd.fd = fd;",
"#ifndef BROKEN_READ_COMPARISON",
"\tpfd.events = f == read ? POLLIN : POLLOUT;",
"#else",
"\tpfd.events = POLLIN|POLLOUT;",
"#endif",
"\twhile (n > pos) {",
"\t\tres = (f) (fd, s + pos, n - pos);",
"\t\tswitch (res) {",
"\t\tcase -1:",
"\t\t\tif (errno == EINTR) {",
"\t\t\t\t/* possible SIGALARM, update callback */",
"\t\t\t\tif (cb != NULL && cb(cb_arg, 0) == -1) {",
"\t\t\t\t\terrno = EINTR;",
"\t\t\t\t\treturn pos;",
"\t\t\t\t}",
"\t\t\t\tcontinue;",
"\t\t\t} else if (errno == EAGAIN || errno == EWOULDBLOCK) {",
"\t\t\t\t(void)poll(&pfd, 1, -1);",
"\t\t\t\tcontinue;",
"\t\t\t}",
"\t\t\treturn 0;",
"\t\tcase 0:",
"\t\t\terrno = EPIPE;",
"\t\t\treturn pos;",
"\t\tdefault:",
"\t\t\tpos += (size_t)res;",
"\t\t\tif (cb != NULL && cb(cb_arg, (size_t)res) == -1) {",
"\t\t\t\terrno = EINTR;",
"\t\t\t\treturn pos;",
"\t\t\t}",
"\t\t}",
"\t}",
"\treturn pos;",
"}"
]
},
{
"parent": "",
"source_code": [
"void",
"source(int argc, char **argv)",
"{",
" if (atomicio6(vwrite, remout, bp->buf, amt, scpio,",
" &statbytes) != amt)",
" haderr = errno;",
"}"
]
},
{
"parent": "",
"source_code": [
"static int",
"scpio(void *_cnt, size_t s)",
"{",
"\toff_t *cnt = (off_t *)_cnt;",
"\t*cnt += s;",
"\trefresh_progress_meter(0);",
"\tif (limit_kbps > 0)",
"\t\tbandwidth_limit(&bwlimit, s);",
"\treturn 0;",
"}"
]
},
{
"parent": "",
"source_code": [
"static void",
"get_msg_extended(struct sftp_conn *conn, struct sshbuf *m, int initial)",
"{",
"\tu_int msg_len;",
"\tu_char *p;",
"\tint r;",
"\tsshbuf_reset(m);",
"\tif ((r = sshbuf_reserve(m, 4, &p)) != 0)",
"\t\tfatal_fr(r, \"reserve\");",
"\tif (atomicio6(read, conn->fd_in, p, 4, sftpio,",
"\t conn->limit_kbps > 0 ? &conn->bwlimit_in : NULL) != 4) {",
"\t\tif (errno == EPIPE || errno == ECONNRESET)",
"\t\t\tfatal(\"Connection closed\");",
"\t\telse",
"\t\t\tfatal(\"Couldn't read packet: %s\", strerror(errno));",
"\t}",
"\tif ((r = sshbuf_get_u32(m, &msg_len)) != 0)",
"\t\tfatal_fr(r, \"sshbuf_get_u32\");",
"\tif (msg_len > SFTP_MAX_MSG_LENGTH) {",
"\t\tdo_log2(initial ? SYSLOG_LEVEL_ERROR : SYSLOG_LEVEL_FATAL,",
"\t\t \"Received message too long %u\", msg_len);",
"\t\tfatal(\"Ensure the remote shell produces no output \"",
"\t\t \"for non-interactive sessions.\");",
"\t}",
"\tif ((r = sshbuf_reserve(m, msg_len, &p)) != 0)",
"\t\tfatal_fr(r, \"reserve\");",
"\tif (atomicio6(read, conn->fd_in, p, msg_len, sftpio,",
"\t conn->limit_kbps > 0 ? &conn->bwlimit_in : NULL)",
"\t != msg_len) {",
"\t\tif (errno == EPIPE)",
"\t\t\tfatal(\"Connection closed\");",
"\t\telse",
"\t\t\tfatal(\"Read packet: %s\", strerror(errno));",
"\t}",
"}"
]
},
{
"parent": "",
"source_code": [
"static int",
"sftpio(void *_bwlimit, size_t amount)",
"{",
"\tstruct bwlimit *bwlimit = (struct bwlimit *)_bwlimit;",
"\trefresh_progress_meter(0);",
"\tif (bwlimit != NULL)",
"\t\tbandwidth_limit(bwlimit, amount);",
"\treturn 0;",
"}"
]
}
],
"type": "fnptr-callback"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.