/dragonfly/crypto/openssh/ |
H A D | sshbuf-misc.c | 69 fprintf(f, "buffer len = %zu\n", sshbuf_len(buf)); in sshbuf_dump() 70 sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f); in sshbuf_dump() 76 size_t i, j, len = sshbuf_len(buf); in sshbuf_dtob16() 102 if (sshbuf_len(d) == 0) in sshbuf_dtob64() 104 slen = ((sshbuf_len(d) + 2) / 3) * 4 + 1; in sshbuf_dtob64() 186 l = sshbuf_len(b); in sshbuf_dtourlb64() 197 l = sshbuf_len(b); in sshbuf_dtourlb64() 218 size_t l = sshbuf_len(buf); in sshbuf_dup_string() 245 if (offset + len > sshbuf_len(b)) in sshbuf_cmp() 264 if (start_offset > sshbuf_len(b) || start_offset + len > sshbuf_len(b)) in sshbuf_find() [all …]
|
H A D | ssh_api.c | 249 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next() 250 sshbuf_len(ssh->kex->server_version) == 0) in ssh_packet_next() 301 *len = sshbuf_len(output); in ssh_output_ptr() 339 if (j >= sshbuf_len(input)) in _ssh_read_banner() 352 if (sshbuf_len(banner) > SSH_MAX_BANNER_LEN) in _ssh_read_banner() 355 if (sshbuf_len(banner) >= 4 && in _ssh_read_banner() 358 debug_f("%.*s", (int)sshbuf_len(banner), in _ssh_read_banner() 440 if (sshbuf_len(ssh->kex->server_version) == 0) in _ssh_exchange_banner() 444 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner() 447 if (sshbuf_len(ssh->kex->server_version) == 0) in _ssh_exchange_banner() [all …]
|
H A D | kexsntrup761x25519.c | 91 if (sshbuf_len(client_blob) != need) { in kex_kem_sntrup761x25519_enc() 137 sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_enc() 145 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_enc() 173 if (sshbuf_len(server_blob) != need) { in kex_kem_sntrup761x25519_dec() 202 sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_dec() 209 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_dec()
|
H A D | sshbuf-io.c | 60 if (sshbuf_len(blob) > SSHBUF_SIZE_MAX) { in sshbuf_load_fd() 66 st.st_size != (off_t)sshbuf_len(blob)) { in sshbuf_load_fd() 108 sshbuf_len(buf)) != sshbuf_len(buf) || close(fd) != 0) { in sshbuf_write_file()
|
H A D | krl.c | 718 if (sshbuf_len(sect) != 0) { in revoked_certs_generate() 774 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob() 785 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob() 797 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob() 865 while (sshbuf_len(buf) > 0) { in parse_revoked_certs() 963 while (sshbuf_len(sect) > 0) { in blob_section() 1038 if (sshbuf_len(buf) < sshbuf_len(copy)) { in ssh_krl_from_blob() 1043 sects_off = sshbuf_len(buf) - sshbuf_len(copy); in ssh_krl_from_blob() 1065 if (sshbuf_len(buf) < sshbuf_len(copy)) { in ssh_krl_from_blob() 1070 sig_off = sshbuf_len(buf) - sshbuf_len(copy); in ssh_krl_from_blob() [all …]
|
H A D | packet.c | 425 if (sshbuf_len(state->input) >= discard) in ssh_packet_start_discard() 741 if (sshbuf_len(in) == 0) in compress_buffer() 1121 len = sshbuf_len(state->outgoing_packet); in ssh_packet_send2_wrapped() 1162 len = sshbuf_len(state->outgoing_packet); in ssh_packet_send2_wrapped() 1300 sshbuf_len(p->payload))) { in ssh_packet_send2() 1453 if (sshbuf_len(state->input) < 4 + 1) in ssh_packet_read_poll2_mux() 1461 if (sshbuf_len(state->input) < need) in ssh_packet_read_poll2_mux() 1614 sshbuf_len(state->incoming_packet), in ssh_packet_read_poll2() 1979 int len = sshbuf_len(state->output); in ssh_packet_write_poll() 2347 if (sshbuf_len(b) != 0) { in newkeys_from_blob() [all …]
|
H A D | kexc25519.c | 127 if (sshbuf_len(client_blob) != CURVE25519_SIZE) { in kex_c25519_enc() 152 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_c25519_enc() 175 if (sshbuf_len(server_blob) != CURVE25519_SIZE) { in kex_c25519_dec() 192 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_c25519_dec()
|
H A D | ssh-pkcs11-helper.c | 263 buf_len = sshbuf_len(iqueue); in process() 296 if (buf_len < sshbuf_len(iqueue)) { in process() 300 consumed = buf_len - sshbuf_len(iqueue); in process() 378 if (sshbuf_len(oqueue) > 0) in main() 402 sshbuf_len(oqueue)); in main()
|
H A D | nchan.c | 132 if (sshbuf_len(c->input)) { in chan_ibuf_empty() 154 if (sshbuf_len(c->output)) { in chan_obuf_empty() 262 sshbuf_len(c->output) == 0 && in chan_rcvd_ieof() 344 sshbuf_len(c->extended) > 0) { in chan_is_dead() 346 c->self, c->efd, sshbuf_len(c->extended)); in chan_is_dead()
|
H A D | ssh-ecdsa-sk.c | 96 ((flags & 0x80) == 0 /* ED */) != (sshbuf_len(extensions) == 0)) { in webauthn_check_prepare_hash() 124 if ((r = sshbuf_cmp(wrapper, 0, sshbuf_ptr(m), sshbuf_len(m))) != 0) in webauthn_check_prepare_hash() 202 if (sshbuf_len(b) != 0) { in ssh_ecdsa_sk_verify() 213 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_sk_verify()
|
H A D | ssh-ecdsa.c | 93 len = sshbuf_len(b); in ssh_ecdsa_sign() 148 if (sshbuf_len(b) != 0) { in ssh_ecdsa_verify() 169 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify()
|
H A D | ssh-agent.c | 594 if (sshbuf_len(sess_id) == 0) { in parse_userauth_request() 621 if (sshbuf_len(b) != 0) { in parse_userauth_request() 672 if (sshbuf_len(b) != 0) { in parse_sshsig_request() 713 if (sshbuf_len(a) != sshbuf_len(b)) in buf_equal() 983 while (sshbuf_len(b) != 0) { in parse_dest_constraint_hop() 1099 while (sshbuf_len(b) != 0) { in parse_key_constraint_extension() 1132 while (sshbuf_len(m)) { in parse_key_constraints() 1607 if (sshbuf_len(e->input) < 5) in process_message() 1616 if (sshbuf_len(e->input) < msg_len + 4) in process_message() 1796 if (sshbuf_len(sockets[socknum].output) == 0) in handle_conn_write() [all …]
|
H A D | channels.c | 1174 if (sshbuf_len(b) < 12) in x11_open_helper() 1192 if (sshbuf_len(b) < in x11_open_helper() 1289 have = sshbuf_len(input); in channel_decode_socks4() 1325 have = sshbuf_len(input); in channel_decode_socks4() 1343 have = sshbuf_len(input); in channel_decode_socks4() 1411 have = sshbuf_len(input); in channel_decode_socks5() 1551 have = sshbuf_len(c->input); in channel_pre_dynamic() 1580 if (sshbuf_len(c->output)) in channel_pre_dynamic() 1609 have = sshbuf_len(c->output); in channel_before_prepare_io_rdynamic() 1641 len = sshbuf_len(c->input); in channel_before_prepare_io_rdynamic() [all …]
|
H A D | kexgex.c | 72 (r = sshbuf_put_u32(b, sshbuf_len(client_kexinit) + 1)) != 0 || in kexgex_hash() 75 (r = sshbuf_put_u32(b, sshbuf_len(server_kexinit) + 1)) != 0 || in kexgex_hash()
|
H A D | sshbuf.c | 126 if ((ret = sshbuf_from(sshbuf_ptr(buf), sshbuf_len(buf))) == NULL) in sshbuf_fromb() 258 sshbuf_len(const struct sshbuf *buf) in sshbuf_len() function 378 if (len > sshbuf_len(buf)) in sshbuf_consume() 398 if (len > sshbuf_len(buf)) in sshbuf_consume_end()
|
H A D | sshkey.c | 720 if (sshbuf_len(a->certblob) != sshbuf_len(b->certblob)) in cert_compare() 723 sshbuf_len(a->certblob)) != 0) in cert_compare() 989 len = sshbuf_len(b); in to_blob() 2080 enclen = sshbuf_len(prvbuf); in sshkey_shield_private() 2137 while (sshbuf_len(decrypted)) { in private2_check_padding() 2272 signed_len = sshbuf_len(key->cert->certblob) - sshbuf_len(b); in cert_parse() 2286 while (sshbuf_len(principals) > 0) { in cert_parse() 2324 while (sshbuf_len(crit) != 0) { in cert_parse() 4083 encoded_len = sshbuf_len(blob); in private2_uudecode() 4246 if (sshbuf_len(decoded) != 0) { in private2_decrypt() [all …]
|
H A D | sshbuf-getput-basic.c | 106 if (offset + len > sshbuf_len(buf)) { in check_offset() 250 if (sshbuf_len(buf) < 4) { in sshbuf_peek_string_direct() 259 if (sshbuf_len(buf) - 4 < len) { in sshbuf_peek_string_direct() 343 return sshbuf_put(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_putb() 543 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
H A D | sshsig.c | 119 if ((r = sshbuf_consume_end(sbuf, sshbuf_len(sbuf)-eoffset)) != 0) { in sshsig_dearmor() 187 sshbuf_ptr(tosign), sshbuf_len(tosign), in sshsig_wrap_sign() 194 sshbuf_ptr(tosign), sshbuf_len(tosign), in sshsig_wrap_sign() 300 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify() 333 if (sshbuf_len(signature) != 0) { in sshsig_wrap_verify() 368 sshbuf_len(toverify), NULL, 0, sig_details)) != 0) { in sshsig_wrap_verify() 851 sshbuf_len(nprincipals) != 0 ? "," : "", in cert_filter_principals() 859 if (sshbuf_len(nprincipals) == 0) { in cert_filter_principals()
|
H A D | ssh-ed25519-sk.c | 90 if (sshbuf_len(b) != 0) { in ssh_ed25519_sk_verify() 134 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify()
|
H A D | ssh-ed25519.c | 72 len = sshbuf_len(b); in ssh_ed25519_sign() 121 if (sshbuf_len(b) != 0) { in ssh_ed25519_verify()
|
H A D | digest-openssl.c | 155 return ssh_digest_update(ctx, sshbuf_ptr(b), sshbuf_len(b)); in ssh_digest_update_buffer() 205 return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen); in ssh_digest_buffer()
|
H A D | kex.c | 566 if (sshbuf_len(kex->my) < KEX_COOKIE_LEN) { in kex_send_kexinit() 568 sshbuf_len(kex->my), KEX_COOKIE_LEN); in kex_send_kexinit() 1113 if (sshbuf_len(kex->session_id) != 0) { in kex_derive_keys() 1119 } else if (sshbuf_len(kex->session_id) == 0) { in kex_derive_keys() 1243 sshbuf_len(our_version)) != sshbuf_len(our_version)) { in kex_exchange_identification() 1321 if (sshbuf_len(peer_version) > SSH_MAX_BANNER_LEN) { in kex_exchange_identification() 1327 if (sshbuf_len(peer_version) > 4 && in kex_exchange_identification() 1350 if ((remote_version = calloc(1, sshbuf_len(peer_version))) == NULL) { in kex_exchange_identification()
|
H A D | ssh-dss.c | 101 len = sshbuf_len(b); in ssh_dss_sign() 151 if (sshbuf_len(b) != 0) { in ssh_dss_verify()
|
H A D | ttymodes.c | 372 while (sshbuf_len(buf) > 0) { in ssh_tty_parse_modes() 438 len = sshbuf_len(buf); in ssh_tty_parse_modes()
|
H A D | ssh-sk-client.c | 272 if (sshbuf_len(resp) != 0) { in sshsk_sign() 342 if (sshbuf_len(resp) != 0) { in sshsk_enroll() 427 while (sshbuf_len(resp) != 0) { in sshsk_load_resident()
|