/freebsd-10-stable/crypto/openssh/ |
H A D | kexdh.c | 69 (r = sshbuf_put(b, ckexinit, ckexinitlen)) != 0 || 72 (r = sshbuf_put(b, skexinit, skexinitlen)) != 0 ||
|
H A D | kexc25519.c | 109 (r = sshbuf_put(b, ckexinit, ckexinitlen)) < 0 || 112 (r = sshbuf_put(b, skexinit, skexinitlen)) < 0 || 116 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) {
|
H A D | kexgex.c | 72 (r = sshbuf_put(b, ckexinit, ckexinitlen)) != 0 || 75 (r = sshbuf_put(b, skexinit, skexinitlen)) != 0 ||
|
H A D | kexecdh.c | 75 (r = sshbuf_put(b, ckexinit, ckexinitlen)) != 0 || 78 (r = sshbuf_put(b, skexinit, skexinitlen)) != 0 ||
|
H A D | buffer.c | 34 if ((ret = sshbuf_put(buffer, data, len)) != 0)
|
H A D | sshbuf-misc.c | 129 if ((r = sshbuf_put(buf, p, nlen)) < 0) {
|
H A D | packet.c | 344 if ((r = sshbuf_put(state->incoming_packet, buf, 703 if ((r = sshbuf_put(out, buf, sizeof(buf) - 739 if ((r = sshbuf_put(out, buf, sizeof(buf) - 905 if ((r = sshbuf_put(state->compression_buffer, 936 if ((r = sshbuf_put(state->outgoing_packet, buf, 4)) != 0) 946 if ((r = sshbuf_put(state->output, buf, 4)) != 0) 1220 if ((r = sshbuf_put(state->outgoing_packet, 1309 if ((r = sshbuf_put(state->output, macbuf, mac->mac_len)) != 0) 2037 if ((r = sshbuf_put(ssh->state->input, buf, len)) != 0) 2521 (r = sshbuf_put( [all...] |
H A D | ssh_api.c | 224 return sshbuf_put(ssh_packet_get_input(ssh), data, len); 348 if ((r = sshbuf_put(ssh_packet_get_output(ssh), 390 if ((r = sshbuf_put(ssh_packet_get_output(ssh), buf, strlen(buf))) != 0)
|
H A D | sshbuf-getput-basic.c | 236 sshbuf_put(struct sshbuf *buf, const void *v, size_t len) function 251 return sshbuf_put(buf, sshbuf_ptr(v), sshbuf_len(v));
|
H A D | sshbuf.h | 162 int sshbuf_put(struct sshbuf *buf, const void *v, size_t len);
|
H A D | authfd.c | 160 if ((r = sshbuf_put(reply, buf, l)) != 0) 406 (r = sshbuf_put(msg, session_id, 16)) != 0 ||
|
H A D | authfile.c | 117 if ((r = sshbuf_put(blob, buf, len)) != 0)
|
H A D | ssh-agent.c | 369 (r = sshbuf_put(msg, mdbuf, sizeof(mdbuf))) != 0) 1138 if ((r = sshbuf_put(sockets[i].input,
|
H A D | sshkey.c | 3088 if ((r = sshbuf_put(encoded, AUTH_MAGIC, sizeof(AUTH_MAGIC))) != 0 || 3136 if ((r = sshbuf_put(blob, MARK_BEGIN, MARK_BEGIN_LEN)) != 0) 3147 if ((r = sshbuf_put(blob, MARK_END, MARK_END_LEN)) != 0) 3445 if ((r = sshbuf_put(buffer, buf, 8 - (sshbuf_len(buffer) % 8))) != 0) 3455 if ((r = sshbuf_put(encrypted, LEGACY_BEGIN, 3545 if ((r = sshbuf_put(blob, bptr, blen)) != 0)
|
H A D | ssh_namespace.h | 769 #define sshbuf_put Fssh_sshbuf_put macro
|
H A D | ssh-keyscan.c | 207 if ((r = sshbuf_put(msg, c->c_data, c->c_plen)) != 0 ||
|
H A D | kex.c | 476 if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0)
|
H A D | krl.c | 723 if ((r = sshbuf_put(buf, KRL_MAGIC, sizeof(KRL_MAGIC) - 1)) != 0 ||
|
H A D | sftp-server.c | 1680 } else if ((r = sshbuf_put(iqueue, buf, len)) != 0) {
|
/freebsd-10-stable/crypto/openssh/regress/unittests/sshbuf/ |
H A D | test_sshbuf_getput_basic.c | 77 TEST_START("sshbuf_put"); 80 ASSERT_INT_EQ(sshbuf_put(p1, x, 5), 0); 105 TEST_START("sshbuf_put truncated"); 107 r = sshbuf_put(p1, x, 5); 116 ASSERT_INT_EQ(sshbuf_put(p1, x, 10), 0); 134 ASSERT_INT_EQ(sshbuf_put(p1, x, 10), 0); 155 ASSERT_INT_EQ(sshbuf_put(p1, x, 9), 0); 182 ASSERT_INT_EQ(sshbuf_put(p1, x, 2), 0); 291 ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); 307 ASSERT_INT_EQ(sshbuf_put(p [all...] |
H A D | test_sshbuf_misc.c | 147 ASSERT_INT_EQ(sshbuf_put(p1, "quad1", strlen("quad1")), 0); 154 ASSERT_INT_EQ(sshbuf_put(p1, "\0", 1), 0); 161 ASSERT_INT_EQ(sshbuf_put(p1, "quad2", strlen("quad2")), 0);
|
H A D | test_sshbuf_getput_crypto.c | 182 ASSERT_INT_EQ(sshbuf_put(p1, expbn1, sizeof(expbn1)), 0); 199 ASSERT_INT_EQ(sshbuf_put(p1, expbn1, sizeof(expbn1) - 1), 0); 231 ASSERT_INT_EQ(sshbuf_put(p1, expbn2, sizeof(expbn2)), 0); 248 ASSERT_INT_EQ(sshbuf_put(p1, expbn2, sizeof(expbn2) - 1), 0); 264 ASSERT_INT_EQ(sshbuf_put(p1, expbn1, sizeof(expbn1)), 0); 281 ASSERT_INT_EQ(sshbuf_put(p1, expbn1, sizeof(expbn1) - 1), 0); 312 ASSERT_INT_EQ(sshbuf_put(p1, expbn2, sizeof(expbn2)), 0); 330 ASSERT_INT_EQ(sshbuf_put(p1, expbn2, sizeof(expbn2) - 1), 0); 345 ASSERT_INT_EQ(sshbuf_put(p1, expbn2, sizeof(expbn2)), 0);
|
H A D | test_sshbuf_fixed.c | 74 ASSERT_INT_EQ(sshbuf_put(p1, test_buf, sizeof(test_buf) - 1), 0);
|
H A D | test_sshbuf_getput_fuzz.c | 48 ASSERT_INT_EQ(sshbuf_put(p1, blob, len), 0);
|
/freebsd-10-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_fuzz.c | 119 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 140 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 161 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 181 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 201 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 221 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 242 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 262 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); 283 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
|