| /freebsd-12.1/crypto/openssh/ |
| H A D | kexc25519.c | 113 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) < 0 || in kex_c25519_hash() 114 (r = sshbuf_put_string(b, client_dh_pub, CURVE25519_SIZE)) < 0 || in kex_c25519_hash() 115 (r = sshbuf_put_string(b, server_dh_pub, CURVE25519_SIZE)) < 0 || in kex_c25519_hash()
|
| H A D | auth2-hostbased.c | 124 if ((r = sshbuf_put_string(b, session_id2, session_id2_len)) != 0 || in userauth_hostbased() 129 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased() 130 (r = sshbuf_put_string(b, pkblob, blen)) != 0 || in userauth_hostbased()
|
| H A D | sshbuf-getput-crypto.c | 160 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { in sshbuf_put_bignum2() 212 ret = sshbuf_put_string(buf, d, len); in sshbuf_put_ec()
|
| H A D | monitor_wrap.c | 234 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_sign() 552 (r = sshbuf_put_string(m, sig, siglen)) != 0 || in mm_sshkey_verify() 553 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_verify() 958 if ((r = sshbuf_put_string(m, goid->elements, goid->length)) != 0) in mm_ssh_gssapi_server_ctx() 982 if ((r = sshbuf_put_string(m, in->value, in->length)) != 0) in mm_ssh_gssapi_accept_ctx() 1011 if ((r = sshbuf_put_string(m, gssbuf->value, gssbuf->length)) != 0 || in mm_ssh_gssapi_checkmic() 1012 (r = sshbuf_put_string(m, gssmic->value, gssmic->length)) != 0) in mm_ssh_gssapi_checkmic()
|
| H A D | sshkey-xmss.c | 300 (r = sshbuf_put_string(b, state->enc_keyiv, in sshkey_xmss_serialize_enc_key() 691 (r = sshbuf_put_string(b, state->stack, num_stack(state))) != 0 || in sshkey_xmss_serialize_state() 693 (r = sshbuf_put_string(b, state->stacklevels, num_stacklevels(state))) != 0 || in sshkey_xmss_serialize_state() 694 (r = sshbuf_put_string(b, state->auth, num_auth(state))) != 0 || in sshkey_xmss_serialize_state() 695 (r = sshbuf_put_string(b, state->keep, num_keep(state))) != 0 || in sshkey_xmss_serialize_state() 696 (r = sshbuf_put_string(b, state->th_nodes, num_th_nodes(state))) != 0 || in sshkey_xmss_serialize_state() 697 (r = sshbuf_put_string(b, state->retain, num_retain(state))) != 0 || in sshkey_xmss_serialize_state()
|
| H A D | ssh-pkcs11-client.c | 136 (r = sshbuf_put_string(msg, blob, blen)) != 0 || in pkcs11_rsa_private_encrypt() 137 (r = sshbuf_put_string(msg, from, flen)) != 0 || in pkcs11_rsa_private_encrypt()
|
| H A D | sshbuf-getput-basic.c | 349 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) in sshbuf_put_string() function 369 return sshbuf_put_string(buf, v, v == NULL ? 0 : strlen(v)); in sshbuf_put_cstring() 375 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
| H A D | sshkey.c | 807 (ret = sshbuf_put_string(b, in to_blob_buf() 818 (ret = sshbuf_put_string(b, in to_blob_buf() 2552 if ((ret = sshbuf_put_string(cert, in sshkey_certify_custom() 2563 (ret = sshbuf_put_string(cert, in sshkey_certify_custom() 2807 if ((r = sshbuf_put_string(b, key->ed25519_pk, in sshkey_private_serialize_opt() 2809 (r = sshbuf_put_string(b, key->ed25519_sk, in sshkey_private_serialize_opt() 2819 (r = sshbuf_put_string(b, key->ed25519_pk, in sshkey_private_serialize_opt() 2832 (r = sshbuf_put_string(b, key->xmss_pk, in sshkey_private_serialize_opt() 2834 (r = sshbuf_put_string(b, key->xmss_sk, in sshkey_private_serialize_opt() 2847 (r = sshbuf_put_string(b, key->xmss_pk, in sshkey_private_serialize_opt() [all …]
|
| H A D | kexecdh.c | 79 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || in kex_ecdh_hash()
|
| H A D | kexdh.c | 75 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || in kex_dh_hash()
|
| H A D | krl.c | 561 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 567 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 727 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || in ssh_krl_to_blob() 745 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 756 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 777 if ((r = sshbuf_put_string(buf, sblob, slen)) != 0) in ssh_krl_to_blob()
|
| H A D | sftp-client.c | 187 (r = sshbuf_put_string(msg, s, len)) != 0) in send_string_request() 205 (r = sshbuf_put_string(msg, s, len)) != 0 || in send_string_attrs_request() 513 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_close() 573 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_lsreaddir() 1012 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_fsync() 1132 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_fstatvfs() 1153 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || in send_read_request() 1705 (r = sshbuf_put_string(msg, handle, in do_upload() 1708 (r = sshbuf_put_string(msg, data, len)) != 0) in do_upload()
|
| H A D | kexgex.c | 78 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || in kexgex_hash()
|
| H A D | ssh-pkcs11-helper.c | 135 if ((r = sshbuf_put_string(msg, blob, blen)) != 0 || in process_add() 212 (r = sshbuf_put_string(msg, signature, slen)) != 0) in process_sign()
|
| H A D | authfd.c | 361 (r = sshbuf_put_string(msg, data, datalen)) != 0 || in ssh_agent_sign() 493 (r = sshbuf_put_string(msg, blob, blen)) != 0) in ssh_remove_identity()
|
| H A D | entropy.c | 196 if ((r = sshbuf_put_string(m, buf, len)) != 0) in rexec_send_rng_seed()
|
| H A D | ssh-ed25519.c | 70 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_ed25519_sign()
|
| H A D | ssh-dss.c | 98 (ret = sshbuf_put_string(b, sigblob, SIGBLOB_LEN)) != 0) in ssh_dss_sign()
|
| H A D | ssh-xmss.c | 78 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_xmss_sign()
|
| H A D | serverloop.c | 730 (r = sshbuf_put_string(sigbuf, in server_input_hostkeys_prove() 736 (r = sshbuf_put_string(resp, sig, slen)) != 0) { in server_input_hostkeys_prove()
|
| H A D | gss-genr.c | 267 if ((r = sshbuf_put_string(b, session_id2, session_id2_len)) != 0 || in ssh_gssapi_buildmic()
|
| H A D | ssh-keysign.c | 297 if ((r = sshbuf_put_string(b, signature, slen)) != 0) in main()
|
| /freebsd-12.1/crypto/openssh/regress/unittests/sshbuf/ |
| H A D | test_sshbuf_getput_basic.c | 382 ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); in sshbuf_getput_basic_tests() 393 r = sshbuf_put_string(p1, x, sizeof(x)); in sshbuf_getput_basic_tests() 402 r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc); in sshbuf_getput_basic_tests()
|
| /freebsd-12.1/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 100 ASSERT_INT_EQ(sshbuf_put_string(b, NULL, 0), 0); /* reserved */ in build_cert() 104 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */ in build_cert()
|
| /freebsd-12.1/crypto/openssh/openbsd-compat/ |
| H A D | port-net.c | 343 if ((r = sshbuf_put_string(c->input, ptr, len)) != 0) in sys_tun_infilter()
|