/freebsd-12-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 103 sshbuf_ptr(b), sshbuf_len(b), sig_alg, 0), 0); 429 ASSERT_INT_EQ(sshkey_from_blob(sshbuf_ptr(b), sshbuf_len(b), &k3), 0); 499 ASSERT_INT_EQ(sshkey_from_blob(sshbuf_ptr(b), sshbuf_len(b), &k4),
|
H A D | test_fuzz.c | 62 ASSERT_INT_EQ(sshkey_from_blob(sshbuf_ptr(buf), sshbuf_len(buf),
|
/freebsd-12-stable/crypto/openssh/ |
H A D | auth2-hostbased.c | 152 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat)) == 0)
|
H A D | gss-genr.c | 152 ret = xstrdup((const char *)sshbuf_ptr(b));
|
H A D | ssh-dss.c | 107 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | ssh-xmss.c | 86 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | sshbuf-getput-crypto.c | 51 const u_char *d = sshbuf_ptr(buf);
|
H A D | serverloop.c | 734 sshbuf_ptr(sigbuf), sshbuf_len(sigbuf), 853 ssh_packet_put_raw(ssh, sshbuf_ptr(resp),
|
H A D | ssh_api.c | 292 return sshbuf_ptr(output); 327 s = (const char *)sshbuf_ptr(input);
|
H A D | sshbuf.h | 116 const u_char *sshbuf_ptr(const struct sshbuf *buf);
|
H A D | sshkey.c | 617 if (timingsafe_bcmp(sshbuf_ptr(a->certblob), sshbuf_ptr(b->certblob), 872 memcpy(*blobp, sshbuf_ptr(b), len); 1438 if (fwrite(sshbuf_ptr(b), sshbuf_len(b), 1, f) != 1) { 1979 sshbuf_ptr(key->cert->certblob), signed_len, NULL, 0)) != 0) 2629 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), 3495 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) 3573 cp = sshbuf_ptr(blob); 3608 if ((r = sshbuf_b64tod(decoded, (char *)sshbuf_ptr(encoded))) != 0) 3613 memcmp(sshbuf_ptr(decode [all...] |
H A D | clientloop.c | 1457 (u_char *)sshbuf_ptr(stderr_buffer), 1974 sshbuf_ptr(signdata), sshbuf_len(signdata), 2288 len, (const u_char*)sshbuf_ptr(cmd)); 2294 len, (const u_char*)sshbuf_ptr(cmd)); 2298 packet_put_string(sshbuf_ptr(cmd), sshbuf_len(cmd));
|
H A D | krl.c | 815 sshbuf_ptr(buf), sshbuf_len(buf), NULL, 0)) != 0) 1000 memcmp(sshbuf_ptr(buf), KRL_MAGIC, sizeof(KRL_MAGIC) - 1) != 0) { 1081 sshbuf_ptr(buf), sig_off, NULL, 0)) != 0)
|
H A D | sshkey-xmss.c | 903 (r = cipher_crypt(ciphercontext, 0, cp, sshbuf_ptr(encoded), 964 memcmp(sshbuf_ptr(encoded), XMSS_MAGIC, sizeof(XMSS_MAGIC))) { 995 (r = cipher_crypt(ciphercontext, 0, dp, sshbuf_ptr(copy),
|
H A D | ssh-rsa.c | 232 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | channels.c | 1248 p = sshbuf_ptr(input); 1281 p = sshbuf_ptr(input); 1302 p = sshbuf_ptr(input); 1370 p = sshbuf_ptr(input); 1531 p = sshbuf_ptr(c->input); 1595 p = sshbuf_ptr(c->output); 2083 len = write(c->efd, sshbuf_ptr(c->extended), 2239 need = PEEK_U32(sshbuf_ptr(c->input)); 2267 len = write(c->wfd, sshbuf_ptr(c->output), sshbuf_len(c->output)); 2586 (r = sshpkt_put_string(ssh, sshbuf_ptr( [all...] |
H A D | ssh-agent.c | 708 cp = sshbuf_ptr(e->input); 896 sshbuf_ptr(sockets[socknum].output),
|
H A D | sshd.c | 897 packet_put_string(sshbuf_ptr(buf), sshbuf_len(buf)); 1460 if (ssh_digest_update(ctx, sshbuf_ptr(server_cfg), 1477 if (ssh_digest_update(ctx, sshbuf_ptr(buf), sshbuf_len(buf)) != 0)
|
H A D | auth2.c | 416 userauth_send_banner(sshbuf_ptr(loginmsg));
|
H A D | monitor.c | 668 memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0) 1273 p = sshbuf_ptr(b);
|
H A D | sftp-server.c | 1412 cp = sshbuf_ptr(iqueue); 1688 len = write(out, sshbuf_ptr(oqueue), olen);
|
H A D | auth2-pubkey.c | 197 sshbuf_ptr(b), sshbuf_len(b),
|
H A D | ssh_namespace.h | 685 #define sshbuf_ptr Fssh_sshbuf_ptr macro
|
H A D | mux.c | 1526 ptr = sshbuf_ptr(queue); 1581 need = PEEK_U32(sshbuf_ptr(queue));
|
/freebsd-12-stable/crypto/openssh/regress/misc/kexfuzz/ |
H A D | kexfuzz.c | 83 fwrite(sshbuf_ptr(packet), sshbuf_len(packet),
|