Searched refs:sshbuf_consume (Results 1 - 17 of 17) sorted by relevance
/freebsd-10-stable/crypto/openssh/regress/unittests/sshbuf/ |
H A D | test_sshbuf.c | 69 ASSERT_INT_EQ(sshbuf_consume(p1, 0), 0); 70 ASSERT_INT_EQ(sshbuf_consume(p1, 1), SSH_ERR_MESSAGE_INCOMPLETE); 112 ASSERT_INT_EQ(sshbuf_consume(p1, 0), 0); 114 r = sshbuf_consume(p1, 64); 117 ASSERT_INT_EQ(sshbuf_consume(p1, 1), 0); 122 ASSERT_INT_EQ(sshbuf_consume(p1, 2), 0); 127 r = sshbuf_consume(p1, 2); 130 ASSERT_INT_EQ(sshbuf_consume(p1, 1), 0); 132 r = sshbuf_consume(p1, 1); 181 ASSERT_INT_EQ(sshbuf_consume(p [all...] |
H A D | test_sshbuf_fuzz.c | 77 sshbuf_consume : sshbuf_consume_end)(p1, r);
|
/freebsd-10-stable/crypto/openssh/ |
H A D | sshbuf-getput-basic.c | 37 if ((r = sshbuf_consume(buf, len)) < 0) 50 if ((r = sshbuf_consume(buf, 8)) < 0) 63 if ((r = sshbuf_consume(buf, 4)) < 0) 76 if ((r = sshbuf_consume(buf, 2)) < 0) 89 if ((r = sshbuf_consume(buf, 1)) < 0) 140 if (sshbuf_consume(buf, len + 4) != 0) { 392 if ((r = sshbuf_consume(buf, len + 4)) != 0 || /* Shouldn't happen */ 457 if (sshbuf_consume(buf, olen + 4) != 0) {
|
H A D | buffer.c | 83 int ret = sshbuf_consume(buffer, bytes);
|
H A D | packet.c | 902 if ((r = sshbuf_consume(state->outgoing_packet, 8)) != 0) 929 if ((r = sshbuf_consume(state->outgoing_packet, 8 - padding)) != 0) 1213 if ((r = sshbuf_consume(state->outgoing_packet, 5)) != 0) 1602 if ((r = sshbuf_consume(state->input, 4)) != 0) 1643 if ((r = sshbuf_consume(state->input, padded_len)) != 0) 1656 if ((r = sshbuf_consume(state->incoming_packet, 8 - len % 8)) != 0) 1780 if ((r = sshbuf_consume(state->input, block_size)) != 0) 1834 if ((r = sshbuf_consume(state->input, aadlen + need + authlen)) != 0) 1853 if ((r = sshbuf_consume(state->input, mac->mac_len)) != 0) 1878 if ((r = sshbuf_consume(stat [all...] |
H A D | sshbuf-getput-crypto.c | 66 if (sshbuf_consume(buf, 2 + len_bytes) != 0) {
|
H A D | sshbuf.h | 152 int sshbuf_consume(struct sshbuf *buf, size_t len);
|
H A D | ssh_api.c | 298 return sshbuf_consume(ssh_packet_get_output(ssh), len); 354 if ((r = sshbuf_consume(input, j)) != 0)
|
H A D | sshbuf.c | 372 sshbuf_consume(struct sshbuf *buf, size_t len) function
|
H A D | ssh-keyscan.c | 208 (r = sshbuf_consume(msg, 8 - (c->c_plen & 7))) != 0 || /* padding */ 216 if ((r = sshbuf_consume(msg, 8)) != 0 || /* cookie */
|
H A D | sftp-server.c | 1422 if ((r = sshbuf_consume(iqueue, 4)) != 0) 1470 (r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) 1691 } else if ((r = sshbuf_consume(oqueue, len)) != 0) {
|
H A D | krl.c | 947 if ((r = sshbuf_consume(copy, sizeof(KRL_MAGIC) - 1)) != 0) 1056 if ((r = sshbuf_consume(copy, sects_off)) != 0)
|
H A D | sshkey.c | 3250 if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 || 3327 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0) 3615 if ((r = sshbuf_consume(copy, sizeof(LEGACY_BEGIN))) != 0) 3686 if ((r = sshbuf_consume(copy, sizeof(LEGACY_BEGIN))) != 0)
|
H A D | ssh_namespace.h | 736 #define sshbuf_consume Fssh_sshbuf_consume macro
|
H A D | kex.c | 280 if ((r = sshbuf_consume(b, KEX_COOKIE_LEN)) != 0) /* skip cookie */
|
H A D | ssh-agent.c | 1123 if ((r = sshbuf_consume(sockets[i].output,
|
H A D | ssh-keygen.c | 425 if ((r = sshbuf_consume(b, bytes)) != 0)
|
Completed in 365 milliseconds