/freebsd-10-stable/crypto/openssh/ |
H A D | kexc25519.c | 113 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) < 0 || 114 (r = sshbuf_put_string(b, client_dh_pub, CURVE25519_SIZE)) < 0 || 115 (r = sshbuf_put_string(b, server_dh_pub, CURVE25519_SIZE)) < 0 ||
|
H A D | kexdh.c | 73 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||
|
H A D | kexgex.c | 76 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||
|
H A D | kexecdh.c | 79 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||
|
H A D | sshbuf-getput-crypto.c | 160 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { 212 ret = sshbuf_put_string(buf, d, len);
|
H A D | sshbuf-getput-basic.c | 348 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) function 368 return sshbuf_put_string(buf, (u_char *)v, v == NULL ? 0 : strlen(v)); 374 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v));
|
H A D | bufaux.c | 207 if ((ret = sshbuf_put_string(buffer, buf, len)) != 0)
|
H A D | ssh-ed25519.c | 70 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0)
|
H A D | sftp-client.c | 171 (r = sshbuf_put_string(msg, s, len)) != 0) 189 (r = sshbuf_put_string(msg, s, len)) != 0 || 497 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 557 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 994 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 1114 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 1135 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || 1685 (r = sshbuf_put_string(msg, handle, 1688 (r = sshbuf_put_string(msg, data, len)) != 0)
|
H A D | authfd.c | 467 (r = sshbuf_put_string(msg, blob, blen)) != 0 || 468 (r = sshbuf_put_string(msg, data, datalen)) != 0 || 638 (r = sshbuf_put_string(msg, blob, blen)) != 0)
|
H A D | krl.c | 562 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) 568 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) 728 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || 746 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) 757 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) 778 if ((r = sshbuf_put_string(buf, sblob, slen)) != 0)
|
H A D | ssh-keysign.c | 302 if ((r = sshbuf_put_string(b, signature, slen)) != 0)
|
H A D | sshbuf.h | 188 int sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len);
|
H A D | ssh-dss.c | 107 (ret = sshbuf_put_string(b, sigblob, SIGBLOB_LEN)) != 0)
|
H A D | packet.c | 774 if ((r = sshbuf_put_string(b, &state->compression_in_stream, 777 } else if ((r = sshbuf_put_string(b, NULL, 0)) != 0) 780 if ((r = sshbuf_put_string(b, &state->compression_out_stream, 783 } else if ((r = sshbuf_put_string(b, NULL, 0)) != 0) 2482 if ((r = sshbuf_put_string(m, kex->session_id, 2524 (r = sshbuf_put_string(b, enc->key, enc->key_len)) != 0 || 2525 (r = sshbuf_put_string(b, enc->iv, enc->iv_len)) != 0) 2530 (r = sshbuf_put_string(b, mac->key, mac->key_len)) != 0) 2558 (r = sshbuf_put_string(m, state->ssh1_key, state->ssh1_keylen)) != 0 || 2834 return sshbuf_put_string(ss [all...] |
H A D | ssh-rsa.c | 140 (ret = sshbuf_put_string(b, sig, slen)) != 0)
|
H A D | sshkey.c | 789 (ret = sshbuf_put_string(b, 2399 if ((ret = sshbuf_put_string(cert, nonce, sizeof(nonce))) != 0) 2429 if ((ret = sshbuf_put_string(cert, 2457 (ret = sshbuf_put_string(cert, NULL, 0)) != 0 || /* Reserved */ 2458 (ret = sshbuf_put_string(cert, ca_blob, ca_len)) != 0) 2467 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) 2642 if ((r = sshbuf_put_string(b, key->ed25519_pk, 2644 (r = sshbuf_put_string(b, key->ed25519_sk, 2654 (r = sshbuf_put_string(b, key->ed25519_pk, 2656 (r = sshbuf_put_string( [all...] |
H A D | serverloop.c | 1194 (r = sshbuf_put_string(sigbuf, 1199 (r = sshbuf_put_string(resp, sig, slen)) != 0) {
|
H A D | sshconnect2.c | 1624 (r = sshbuf_put_string(b, data, datalen)) != 0) 1765 if ((r = sshbuf_put_string(b, session_id2, session_id2_len)) != 0 || 1771 (r = sshbuf_put_string(b, keyblob, keylen)) != 0 ||
|
H A D | ssh-agent.c | 292 if ((r = sshbuf_put_string(msg, blob, blen)) != 0) 442 (r = sshbuf_put_string(msg, signature, slen)) != 0)
|
H A D | monitor.c | 729 (r = sshbuf_put_string(sigbuf, session_id2, 768 if ((r = sshbuf_put_string(m, signature, siglen)) != 0)
|
/freebsd-10-stable/crypto/openssh/regress/unittests/sshbuf/ |
H A D | test_sshbuf_getput_basic.c | 379 TEST_START("sshbuf_put_string"); 382 ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); 389 TEST_START("sshbuf_put_string limited"); 393 r = sshbuf_put_string(p1, x, sizeof(x)); 399 TEST_START("sshbuf_put_string giant"); 402 r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc);
|
H A D | test_sshbuf_getput_crypto.c | 384 ASSERT_INT_EQ(sshbuf_put_string(p1, expec256, sizeof(expec256)), 0);
|
/freebsd-10-stable/crypto/openssh/openbsd-compat/ |
H A D | port-tun.c | 247 if ((r = sshbuf_put_string(&c->input, ptr, len)) != 0)
|
/freebsd-10-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 100 ASSERT_INT_EQ(sshbuf_put_string(b, NULL, 0), 0); /* reserved */ 104 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */
|