Lines Matching defs:input

131 	/* Buffer for raw input data from the socket. */
132 struct sshbuf *input;
232 (state->input = sshbuf_new()) == NULL ||
255 sshbuf_free(state->input);
377 if (sshbuf_len(state->input) >= discard)
379 state->packet_discard = discard - sshbuf_len(state->input);
546 sshbuf_free(state->input);
683 /* Input is the contents of the input buffer. */
1001 debug("set_newkeys: rekeying, input %llu bytes %llu blocks, "
1582 /* Check if input size is less than minimum packet size. */
1583 if (sshbuf_len(state->input) < 4 + 8)
1586 len = PEEK_U32(sshbuf_ptr(state->input));
1596 if (sshbuf_len(state->input) < 4 + padded_len)
1602 if ((r = sshbuf_consume(state->input, 4)) != 0)
1613 sshbuf_ptr(state->input), padded_len)) {
1640 sshbuf_ptr(state->input), padded_len, 0, 0)) != 0)
1643 if ((r = sshbuf_consume(state->input, padded_len)) != 0)
1672 error("Corrupted check bytes on input");
1739 sshbuf_ptr(state->input), sshbuf_len(state->input)) != 0)
1744 sshbuf_dump(state->input, stderr);
1754 * check if input size is less than the cipher block size,
1757 if (sshbuf_len(state->input) < block_size)
1764 state->p_send.seqnr, cp, sshbuf_ptr(state->input),
1771 fprintf(stderr, "input: \n");
1772 sshbuf_dump(state->input, stderr);
1780 if ((r = sshbuf_consume(state->input, block_size)) != 0)
1783 DBG(debug("input: packet len %u", state->packlen+4));
1811 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen)
1815 sshbuf_dump(state->input, stderr);
1817 /* EtM: check mac over encrypted input */
1820 sshbuf_ptr(state->input), aadlen + need,
1821 sshbuf_ptr(state->input) + aadlen + need + authlen,
1824 logit("Corrupted MAC on input.");
1832 sshbuf_ptr(state->input), need, aadlen, authlen)) != 0)
1834 if ((r = sshbuf_consume(state->input, aadlen + need + authlen)) != 0)
1841 sshbuf_ptr(state->input), maclen)) != 0) {
1844 logit("Corrupted MAC on input.");
1851 /* Remove MAC from input buffer */
1853 if ((r = sshbuf_consume(state->input, mac->mac_len)) != 0)
1868 DBG(debug("input: padlen %d", padlen));
1871 "Corrupted padlen %d on input.", padlen)) != 0 ||
1882 DBG(debug("input: len before de-compress %zd",
1893 DBG(debug("input: len after de-compress %zd",
2018 * Buffers the given amount of input characters. This is intended to be used
2037 if ((r = sshbuf_put(ssh->state->input, buf, len)) != 0)
2443 return (void *)ssh->state->input;
2597 (r = sshbuf_put_stringb(m, state->input)) != 0 ||
2723 const u_char *ssh1key, *ivin, *ivout, *keyin, *keyout, *input, *output;
2783 sshbuf_reset(state->input);
2785 if ((r = sshbuf_get_string_direct(m, &input, &ilen)) != 0 ||
2787 (r = sshbuf_put(state->input, input, ilen)) != 0 ||