/freebsd-11.0-release/crypto/openssh/regress/unittests/sshbuf/ |
H A D | test_sshbuf_misc.c | 66 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x11), 0); 77 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x11), 0); 78 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x22), 0); 89 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x11), 0); 90 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x22), 0); 91 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x33), 0);
|
H A D | test_sshbuf_fixed.c | 105 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x01), 0);
|
H A D | test_sshbuf_getput_crypto.c | 311 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x00), 0); 329 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x00), 0); 386 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x00), 0);
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | kexdh.c | 67 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || 70 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 ||
|
H A D | kexecdh.c | 74 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || 77 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 ||
|
H A D | kexgex.c | 71 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || 74 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 ||
|
H A D | authfd.c | 189 if ((r = sshbuf_put_u8(msg, type)) != 0 || 295 if ((r = sshbuf_put_u8(msg, code1)) != 0) 401 if ((r = sshbuf_put_u8(msg, SSH_AGENTC_RSA_CHALLENGE)) != 0 || 466 if ((r = sshbuf_put_u8(msg, SSH2_AGENTC_SIGN_REQUEST)) != 0 || 535 if ((r = sshbuf_put_u8(m, SSH_AGENT_CONSTRAIN_LIFETIME)) != 0 || 540 if ((r = sshbuf_put_u8(m, SSH_AGENT_CONSTRAIN_CONFIRM)) != 0) 569 if ((r = sshbuf_put_u8(msg, type)) != 0 || 587 if ((r = sshbuf_put_u8(msg, type)) != 0 || 625 if ((r = sshbuf_put_u8(msg, 636 if ((r = sshbuf_put_u8(ms [all...] |
H A D | kexc25519.c | 108 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) < 0 || 111 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) < 0 ||
|
H A D | sftp-client.c | 168 if ((r = sshbuf_put_u8(msg, code)) != 0 || 186 if ((r = sshbuf_put_u8(msg, code)) != 0 || 395 if ((r = sshbuf_put_u8(msg, SSH2_FXP_INIT)) != 0 || 494 if ((r = sshbuf_put_u8(msg, SSH2_FXP_CLOSE)) != 0 || 530 if ((r = sshbuf_put_u8(msg, SSH2_FXP_OPENDIR)) != 0 || 555 if ((r = sshbuf_put_u8(msg, SSH2_FXP_READDIR)) != 0 || 878 if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED)) != 0 || 884 if ((r = sshbuf_put_u8(msg, SSH2_FXP_RENAME)) != 0 || 922 if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED)) != 0 || 958 if ((r = sshbuf_put_u8(ms [all...] |
H A D | bufaux.c | 247 if ((ret = sshbuf_put_u8(buffer, value)) != 0)
|
H A D | krl.c | 607 if ((r = sshbuf_put_u8(buf, state)) != 0 || 680 if ((r = sshbuf_put_u8(buf, state)) != 0 || 694 if ((r = sshbuf_put_u8(buf, KRL_SECTION_CERT_KEY_ID)) != 0 || 737 if ((r = sshbuf_put_u8(buf, KRL_SECTION_CERTIFICATES)) != 0 || 750 if ((r = sshbuf_put_u8(buf, KRL_SECTION_EXPLICIT_KEY)) != 0 || 761 if ((r = sshbuf_put_u8(buf, 770 if ((r = sshbuf_put_u8(buf, KRL_SECTION_SIGNATURE)) != 0 ||
|
H A D | ssh-agent.c | 262 (r = sshbuf_put_u8(e->output, success ? 278 if ((r = sshbuf_put_u8(msg, (version == 1) ? 380 if ((r = sshbuf_put_u8(msg, SSH_AGENT_RSA_RESPONSE)) != 0 || 388 if ((r = sshbuf_put_u8(msg, SSH_AGENT_FAILURE)) != 0) 453 if ((r = sshbuf_put_u8(msg, SSH2_AGENT_SIGN_RESPONSE)) != 0 || 456 } else if ((r = sshbuf_put_u8(msg, SSH_AGENT_FAILURE)) != 0) 758 if ((r = sshbuf_put_u8(msg,
|
H A D | sshbuf.h | 178 int sshbuf_put_u8(struct sshbuf *buf, u_char val);
|
H A D | sftp-server.c | 526 if ((r = sshbuf_put_u8(msg, SSH2_FXP_STATUS)) != 0 || 547 if ((r = sshbuf_put_u8(msg, type)) != 0 || 582 if ((r = sshbuf_put_u8(msg, SSH2_FXP_NAME)) != 0 || 606 if ((r = sshbuf_put_u8(msg, SSH2_FXP_ATTRS)) != 0 || 626 if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED_REPLY)) != 0 || 657 if ((r = sshbuf_put_u8(msg, SSH2_FXP_VERSION)) != 0 ||
|
H A D | sshbuf-getput-basic.c | 334 sshbuf_put_u8(struct sshbuf *buf, u_char val) function
|
H A D | auth2-pubkey.c | 358 r = sshbuf_put_u8(arg, c); 363 if ((r = sshbuf_put_u8(arg, '\\')) != 0) 367 r = sshbuf_put_u8(arg, c); 371 fatal("%s: sshbuf_put_u8: %s", 374 if ((i != 0 && (r = sshbuf_put_u8(buf, ' ')) != 0) || 375 (ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0) || 377 (ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0))
|
H A D | kex.c | 246 if ((r = sshbuf_put_u8(b, 0)) != 0) 253 if ((r = sshbuf_put_u8(b, 0)) != 0 || /* first_kex_packet_follows */
|
H A D | sshkey.c | 3110 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) 3136 if ((r = sshbuf_put_u8(blob, b64[i])) != 0) 3139 if (i % 70 == 69 && (r = sshbuf_put_u8(blob, '\n')) != 0) 3142 if (i % 70 != 69 && (r = sshbuf_put_u8(blob, '\n')) != 0) 3215 if ((r = sshbuf_put_u8(encoded, *cp)) != 0) 3225 if ((r = sshbuf_put_u8(encoded, 0)) != 0) 3457 if ((r = sshbuf_put_u8(encrypted, cipher_num)) != 0 ||
|
H A D | ssh_namespace.h | 774 #define sshbuf_put_u8 Fssh_sshbuf_put_u8 macro
|
H A D | sshconnect2.c | 1776 (r = sshbuf_put_u8(b, SSH2_MSG_USERAUTH_REQUEST)) != 0 ||
|
H A D | packet.c | 2774 return sshbuf_put_u8(ssh->state->outgoing_packet, val);
|
/freebsd-11.0-release/crypto/openssh/regress/unittests/sshkey/ |
H A D | common.c | 69 ASSERT_INT_EQ(sshbuf_put_u8(ret, 0), 0);
|