/dragonfly/crypto/openssh/ |
H A D | sshbuf-getput-crypto.c | 144 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { in sshbuf_put_bignum2() 168 ret = sshbuf_put_string(buf, d, len); in sshbuf_put_ec()
|
H A D | monitor_wrap.c | 230 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_sign() 519 (r = sshbuf_put_string(m, sig, siglen)) != 0 || in mm_sshkey_verify() 520 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_verify() 934 if ((r = sshbuf_put_string(m, goid->elements, goid->length)) != 0) in mm_ssh_gssapi_server_ctx() 958 if ((r = sshbuf_put_string(m, in->value, in->length)) != 0) in mm_ssh_gssapi_accept_ctx() 987 if ((r = sshbuf_put_string(m, gssbuf->value, gssbuf->length)) != 0 || in mm_ssh_gssapi_checkmic() 988 (r = sshbuf_put_string(m, gssmic->value, gssmic->length)) != 0) in mm_ssh_gssapi_checkmic()
|
H A D | sshbuf-getput-basic.c | 514 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) in sshbuf_put_string() function 534 return sshbuf_put_string(buf, v, v == NULL ? 0 : strlen(v)); in sshbuf_put_cstring() 541 return sshbuf_put_string(buf, NULL, 0); in sshbuf_put_stringb() 543 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
H A D | kexsntrup761x25519.c | 141 if ((r = sshbuf_put_string(buf, hash, in kex_kem_sntrup761x25519_enc() 205 if ((r = sshbuf_put_string(buf, hash, in kex_kem_sntrup761x25519_dec()
|
H A D | authfd.c | 425 (r = sshbuf_put_string(msg, data, datalen)) != 0 || in ssh_agent_sign() 470 (r = sshbuf_put_string(b, NULL, 0)) != 0) /* reserved */ in encode_dest_constraint_hop() 496 (r = sshbuf_put_string(b, NULL, 0)) != 0) /* reserved */ in encode_dest_constraint() 642 (r = sshbuf_put_string(msg, blob, blen)) != 0) in ssh_remove_identity()
|
H A D | auth2-hostbased.c | 141 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased() 142 (r = sshbuf_put_string(b, pkblob, blen)) != 0 || in userauth_hostbased()
|
H A D | krl.c | 588 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 594 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 753 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || in ssh_krl_to_blob() 771 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 782 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 794 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 815 if ((r = sshbuf_put_string(buf, sblob, slen)) != 0) in ssh_krl_to_blob()
|
H A D | entropy.c | 74 if ((r = sshbuf_put_string(m, buf, len)) != 0) in rexec_send_rng_seed()
|
H A D | sftp-client.c | 244 (r = sshbuf_put_string(msg, s, len)) != 0) in send_string_request() 262 (r = sshbuf_put_string(msg, s, len)) != 0 || in send_string_attrs_request() 675 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_close() 735 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_lsreaddir() 1345 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_fsync() 1469 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_fstatvfs() 1522 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || in send_read_request() 2105 (r = sshbuf_put_string(msg, handle, in do_upload() 2108 (r = sshbuf_put_string(msg, data, len)) != 0) in do_upload() 2524 (r = sshbuf_put_string(msg, to_handle, in do_crossload() [all …]
|
H A D | sshkey.c | 911 (ret = sshbuf_put_string(b, in to_blob_buf() 927 (ret = sshbuf_put_string(b, in to_blob_buf() 3031 if ((ret = sshbuf_put_string(cert, in sshkey_certify_custom() 3047 (ret = sshbuf_put_string(cert, in sshkey_certify_custom() 3363 if ((r = sshbuf_put_string(b, key->ed25519_pk, in sshkey_private_serialize_opt() 3365 (r = sshbuf_put_string(b, key->ed25519_sk, in sshkey_private_serialize_opt() 3375 (r = sshbuf_put_string(b, key->ed25519_pk, in sshkey_private_serialize_opt() 3411 (r = sshbuf_put_string(b, key->xmss_pk, in sshkey_private_serialize_opt() 3413 (r = sshbuf_put_string(b, key->xmss_sk, in sshkey_private_serialize_opt() 3426 (r = sshbuf_put_string(b, key->xmss_pk, in sshkey_private_serialize_opt() [all …]
|
H A D | ssh-pkcs11-helper.c | 144 if ((r = sshbuf_put_string(msg, blob, blen)) != 0 || in process_add() 240 (r = sshbuf_put_string(msg, signature, slen)) != 0) in process_sign()
|
H A D | sshsig.c | 174 (r = sshbuf_put_string(tosign, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_sign() 205 (r = sshbuf_put_string(blob, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_sign() 207 (r = sshbuf_put_string(blob, sig, slen)) != 0) { in sshsig_wrap_sign() 314 (r = sshbuf_put_string(toverify, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_verify()
|
H A D | ssh-ed25519.c | 70 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_ed25519_sign()
|
H A D | ssh-dss.c | 98 (ret = sshbuf_put_string(b, sigblob, SIGBLOB_LEN)) != 0) in ssh_dss_sign()
|
H A D | monitor.c | 651 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 686 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) in mm_answer_sign() 703 if ((r = sshbuf_put_string(b, \ 767 if ((r = sshbuf_put_string(m, &options, sizeof(options))) != 0) in mm_answer_pwnamallow() 1882 (r = sshbuf_put_string(m, out.value, out.length)) != 0 || in mm_answer_gss_accept_ctx()
|
H A D | ssh-keysign.c | 300 if ((r = sshbuf_put_string(b, signature, slen)) != 0) in main()
|
H A D | sshbuf.h | 207 int sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len);
|
H A D | ssh-rsa.c | 224 (ret = sshbuf_put_string(b, sig, slen)) != 0) in ssh_rsa_sign()
|
H A D | ssh-sk-client.c | 256 (r = sshbuf_put_string(req, data, datalen)) != 0 || in sshsk_sign()
|
H A D | packet.c | 2250 (r = sshbuf_put_string(b, enc->key, enc->key_len)) != 0 || in newkeys_to_blob() 2251 (r = sshbuf_put_string(b, enc->iv, enc->iv_len)) != 0) in newkeys_to_blob() 2256 (r = sshbuf_put_string(b, mac->key, mac->key_len)) != 0) in newkeys_to_blob() 2488 return sshbuf_put_string(ssh->state->outgoing_packet, v, len); in sshpkt_put_string()
|
H A D | sshconnect2.c | 1488 if ((r = sshbuf_put_string(b, signature, slen)) != 0) in sign_and_send_pubkey() 2109 (r = sshbuf_put_string(b, data, datalen)) != 0) in ssh_keysign() 2249 (r = sshbuf_put_string(b, keyblob, keylen)) != 0 || in userauth_hostbased()
|
H A D | auth2-pubkey.c | 218 (r = sshbuf_put_string(b, pkblob, blen)) != 0) in userauth_pubkey()
|
H A D | serverloop.c | 747 (r = sshbuf_put_string(resp, sig, slen)) != 0) { in server_input_hostkeys_prove()
|
H A D | mux.c | 1897 (r = sshbuf_put_string(m, NULL, 0)) != 0 || /* reserved */ in mux_client_request_session() 2112 (r = sshbuf_put_string(m, NULL, 0)) != 0 || /* reserved */ in mux_client_request_stdio_fwd()
|
/dragonfly/lib/libssh/openbsd-compat/ |
H A D | port-net.c | 347 if ((r = sshbuf_put_string(c->input, ptr, len)) != 0) in sys_tun_infilter()
|