Home
last modified time | relevance | path

Searched refs:sshbuf_len (Results 1 – 25 of 54) sorted by relevance

123

/dragonfly/crypto/openssh/
H A Dsshbuf-misc.c69 fprintf(f, "buffer len = %zu\n", sshbuf_len(buf)); in sshbuf_dump()
70 sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f); in sshbuf_dump()
76 size_t i, j, len = sshbuf_len(buf); in sshbuf_dtob16()
102 if (sshbuf_len(d) == 0) in sshbuf_dtob64()
104 slen = ((sshbuf_len(d) + 2) / 3) * 4 + 1; in sshbuf_dtob64()
186 l = sshbuf_len(b); in sshbuf_dtourlb64()
197 l = sshbuf_len(b); in sshbuf_dtourlb64()
218 size_t l = sshbuf_len(buf); in sshbuf_dup_string()
245 if (offset + len > sshbuf_len(b)) in sshbuf_cmp()
264 if (start_offset > sshbuf_len(b) || start_offset + len > sshbuf_len(b)) in sshbuf_find()
[all …]
H A Dssh_api.c249 if (sshbuf_len(ssh->kex->client_version) == 0 || in ssh_packet_next()
250 sshbuf_len(ssh->kex->server_version) == 0) in ssh_packet_next()
301 *len = sshbuf_len(output); in ssh_output_ptr()
339 if (j >= sshbuf_len(input)) in _ssh_read_banner()
352 if (sshbuf_len(banner) > SSH_MAX_BANNER_LEN) in _ssh_read_banner()
355 if (sshbuf_len(banner) >= 4 && in _ssh_read_banner()
358 debug_f("%.*s", (int)sshbuf_len(banner), in _ssh_read_banner()
440 if (sshbuf_len(ssh->kex->server_version) == 0) in _ssh_exchange_banner()
444 sshbuf_len(ssh->kex->client_version) == 0) in _ssh_exchange_banner()
447 if (sshbuf_len(ssh->kex->server_version) == 0) in _ssh_exchange_banner()
[all …]
H A Dkexsntrup761x25519.c91 if (sshbuf_len(client_blob) != need) { in kex_kem_sntrup761x25519_enc()
137 sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_enc()
145 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_enc()
173 if (sshbuf_len(server_blob) != need) { in kex_kem_sntrup761x25519_dec()
202 sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_dec()
209 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_dec()
H A Dsshbuf-io.c60 if (sshbuf_len(blob) > SSHBUF_SIZE_MAX) { in sshbuf_load_fd()
66 st.st_size != (off_t)sshbuf_len(blob)) { in sshbuf_load_fd()
108 sshbuf_len(buf)) != sshbuf_len(buf) || close(fd) != 0) { in sshbuf_write_file()
H A Dkrl.c718 if (sshbuf_len(sect) != 0) { in revoked_certs_generate()
774 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob()
785 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob()
797 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob()
865 while (sshbuf_len(buf) > 0) { in parse_revoked_certs()
963 while (sshbuf_len(sect) > 0) { in blob_section()
1038 if (sshbuf_len(buf) < sshbuf_len(copy)) { in ssh_krl_from_blob()
1043 sects_off = sshbuf_len(buf) - sshbuf_len(copy); in ssh_krl_from_blob()
1065 if (sshbuf_len(buf) < sshbuf_len(copy)) { in ssh_krl_from_blob()
1070 sig_off = sshbuf_len(buf) - sshbuf_len(copy); in ssh_krl_from_blob()
[all …]
H A Dpacket.c425 if (sshbuf_len(state->input) >= discard) in ssh_packet_start_discard()
741 if (sshbuf_len(in) == 0) in compress_buffer()
1121 len = sshbuf_len(state->outgoing_packet); in ssh_packet_send2_wrapped()
1162 len = sshbuf_len(state->outgoing_packet); in ssh_packet_send2_wrapped()
1300 sshbuf_len(p->payload))) { in ssh_packet_send2()
1453 if (sshbuf_len(state->input) < 4 + 1) in ssh_packet_read_poll2_mux()
1461 if (sshbuf_len(state->input) < need) in ssh_packet_read_poll2_mux()
1614 sshbuf_len(state->incoming_packet), in ssh_packet_read_poll2()
1979 int len = sshbuf_len(state->output); in ssh_packet_write_poll()
2347 if (sshbuf_len(b) != 0) { in newkeys_from_blob()
[all …]
H A Dkexc25519.c127 if (sshbuf_len(client_blob) != CURVE25519_SIZE) { in kex_c25519_enc()
152 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_c25519_enc()
175 if (sshbuf_len(server_blob) != CURVE25519_SIZE) { in kex_c25519_dec()
192 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_c25519_dec()
H A Dssh-pkcs11-helper.c263 buf_len = sshbuf_len(iqueue); in process()
296 if (buf_len < sshbuf_len(iqueue)) { in process()
300 consumed = buf_len - sshbuf_len(iqueue); in process()
378 if (sshbuf_len(oqueue) > 0) in main()
402 sshbuf_len(oqueue)); in main()
H A Dnchan.c132 if (sshbuf_len(c->input)) { in chan_ibuf_empty()
154 if (sshbuf_len(c->output)) { in chan_obuf_empty()
262 sshbuf_len(c->output) == 0 && in chan_rcvd_ieof()
344 sshbuf_len(c->extended) > 0) { in chan_is_dead()
346 c->self, c->efd, sshbuf_len(c->extended)); in chan_is_dead()
H A Dssh-ecdsa-sk.c96 ((flags & 0x80) == 0 /* ED */) != (sshbuf_len(extensions) == 0)) { in webauthn_check_prepare_hash()
124 if ((r = sshbuf_cmp(wrapper, 0, sshbuf_ptr(m), sshbuf_len(m))) != 0) in webauthn_check_prepare_hash()
202 if (sshbuf_len(b) != 0) { in ssh_ecdsa_sk_verify()
213 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_sk_verify()
H A Dssh-ecdsa.c93 len = sshbuf_len(b); in ssh_ecdsa_sign()
148 if (sshbuf_len(b) != 0) { in ssh_ecdsa_verify()
169 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify()
H A Dssh-agent.c594 if (sshbuf_len(sess_id) == 0) { in parse_userauth_request()
621 if (sshbuf_len(b) != 0) { in parse_userauth_request()
672 if (sshbuf_len(b) != 0) { in parse_sshsig_request()
713 if (sshbuf_len(a) != sshbuf_len(b)) in buf_equal()
983 while (sshbuf_len(b) != 0) { in parse_dest_constraint_hop()
1099 while (sshbuf_len(b) != 0) { in parse_key_constraint_extension()
1132 while (sshbuf_len(m)) { in parse_key_constraints()
1607 if (sshbuf_len(e->input) < 5) in process_message()
1616 if (sshbuf_len(e->input) < msg_len + 4) in process_message()
1796 if (sshbuf_len(sockets[socknum].output) == 0) in handle_conn_write()
[all …]
H A Dchannels.c1174 if (sshbuf_len(b) < 12) in x11_open_helper()
1192 if (sshbuf_len(b) < in x11_open_helper()
1289 have = sshbuf_len(input); in channel_decode_socks4()
1325 have = sshbuf_len(input); in channel_decode_socks4()
1343 have = sshbuf_len(input); in channel_decode_socks4()
1411 have = sshbuf_len(input); in channel_decode_socks5()
1551 have = sshbuf_len(c->input); in channel_pre_dynamic()
1580 if (sshbuf_len(c->output)) in channel_pre_dynamic()
1609 have = sshbuf_len(c->output); in channel_before_prepare_io_rdynamic()
1641 len = sshbuf_len(c->input); in channel_before_prepare_io_rdynamic()
[all …]
H A Dkexgex.c72 (r = sshbuf_put_u32(b, sshbuf_len(client_kexinit) + 1)) != 0 || in kexgex_hash()
75 (r = sshbuf_put_u32(b, sshbuf_len(server_kexinit) + 1)) != 0 || in kexgex_hash()
H A Dsshbuf.c126 if ((ret = sshbuf_from(sshbuf_ptr(buf), sshbuf_len(buf))) == NULL) in sshbuf_fromb()
258 sshbuf_len(const struct sshbuf *buf) in sshbuf_len() function
378 if (len > sshbuf_len(buf)) in sshbuf_consume()
398 if (len > sshbuf_len(buf)) in sshbuf_consume_end()
H A Dsshkey.c720 if (sshbuf_len(a->certblob) != sshbuf_len(b->certblob)) in cert_compare()
723 sshbuf_len(a->certblob)) != 0) in cert_compare()
989 len = sshbuf_len(b); in to_blob()
2080 enclen = sshbuf_len(prvbuf); in sshkey_shield_private()
2137 while (sshbuf_len(decrypted)) { in private2_check_padding()
2272 signed_len = sshbuf_len(key->cert->certblob) - sshbuf_len(b); in cert_parse()
2286 while (sshbuf_len(principals) > 0) { in cert_parse()
2324 while (sshbuf_len(crit) != 0) { in cert_parse()
4083 encoded_len = sshbuf_len(blob); in private2_uudecode()
4246 if (sshbuf_len(decoded) != 0) { in private2_decrypt()
[all …]
H A Dsshbuf-getput-basic.c106 if (offset + len > sshbuf_len(buf)) { in check_offset()
250 if (sshbuf_len(buf) < 4) { in sshbuf_peek_string_direct()
259 if (sshbuf_len(buf) - 4 < len) { in sshbuf_peek_string_direct()
343 return sshbuf_put(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_putb()
543 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
H A Dsshsig.c119 if ((r = sshbuf_consume_end(sbuf, sshbuf_len(sbuf)-eoffset)) != 0) { in sshsig_dearmor()
187 sshbuf_ptr(tosign), sshbuf_len(tosign), in sshsig_wrap_sign()
194 sshbuf_ptr(tosign), sshbuf_len(tosign), in sshsig_wrap_sign()
300 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify()
333 if (sshbuf_len(signature) != 0) { in sshsig_wrap_verify()
368 sshbuf_len(toverify), NULL, 0, sig_details)) != 0) { in sshsig_wrap_verify()
851 sshbuf_len(nprincipals) != 0 ? "," : "", in cert_filter_principals()
859 if (sshbuf_len(nprincipals) == 0) { in cert_filter_principals()
H A Dssh-ed25519-sk.c90 if (sshbuf_len(b) != 0) { in ssh_ed25519_sk_verify()
134 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify()
H A Dssh-ed25519.c72 len = sshbuf_len(b); in ssh_ed25519_sign()
121 if (sshbuf_len(b) != 0) { in ssh_ed25519_verify()
H A Ddigest-openssl.c155 return ssh_digest_update(ctx, sshbuf_ptr(b), sshbuf_len(b)); in ssh_digest_update_buffer()
205 return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen); in ssh_digest_buffer()
H A Dkex.c566 if (sshbuf_len(kex->my) < KEX_COOKIE_LEN) { in kex_send_kexinit()
568 sshbuf_len(kex->my), KEX_COOKIE_LEN); in kex_send_kexinit()
1113 if (sshbuf_len(kex->session_id) != 0) { in kex_derive_keys()
1119 } else if (sshbuf_len(kex->session_id) == 0) { in kex_derive_keys()
1243 sshbuf_len(our_version)) != sshbuf_len(our_version)) { in kex_exchange_identification()
1321 if (sshbuf_len(peer_version) > SSH_MAX_BANNER_LEN) { in kex_exchange_identification()
1327 if (sshbuf_len(peer_version) > 4 && in kex_exchange_identification()
1350 if ((remote_version = calloc(1, sshbuf_len(peer_version))) == NULL) { in kex_exchange_identification()
H A Dssh-dss.c101 len = sshbuf_len(b); in ssh_dss_sign()
151 if (sshbuf_len(b) != 0) { in ssh_dss_verify()
H A Dttymodes.c372 while (sshbuf_len(buf) > 0) { in ssh_tty_parse_modes()
438 len = sshbuf_len(buf); in ssh_tty_parse_modes()
H A Dssh-sk-client.c272 if (sshbuf_len(resp) != 0) { in sshsk_sign()
342 if (sshbuf_len(resp) != 0) { in sshsk_enroll()
427 while (sshbuf_len(resp) != 0) { in sshsk_load_resident()

123