/external/openssh/ |
D | kexc25519.c | 113 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) < 0 || in kex_c25519_hash() 114 (r = sshbuf_put_string(b, client_dh_pub, CURVE25519_SIZE)) < 0 || in kex_c25519_hash() 115 (r = sshbuf_put_string(b, server_dh_pub, CURVE25519_SIZE)) < 0 || in kex_c25519_hash()
|
D | sshbuf-getput-crypto.c | 160 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { in sshbuf_put_bignum2() 212 ret = sshbuf_put_string(buf, d, len); in sshbuf_put_ec()
|
D | sshbuf-getput-basic.c | 348 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) in sshbuf_put_string() function 368 return sshbuf_put_string(buf, (u_char *)v, v == NULL ? 0 : strlen(v)); in sshbuf_put_cstring() 374 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
D | kexecdh.c | 79 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || in kex_ecdh_hash()
|
D | kexdh.c | 73 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || in kex_dh_hash()
|
D | kexgex.c | 76 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || in kexgex_hash()
|
D | krl.c | 561 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 567 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 727 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || in ssh_krl_to_blob() 745 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 756 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 777 if ((r = sshbuf_put_string(buf, sblob, slen)) != 0) in ssh_krl_to_blob()
|
D | sftp-client.c | 177 (r = sshbuf_put_string(msg, s, len)) != 0) in send_string_request() 195 (r = sshbuf_put_string(msg, s, len)) != 0 || in send_string_attrs_request() 503 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_close() 563 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_lsreaddir() 1002 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_fsync() 1122 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in do_fstatvfs() 1143 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || in send_read_request() 1693 (r = sshbuf_put_string(msg, handle, in do_upload() 1696 (r = sshbuf_put_string(msg, data, len)) != 0) in do_upload()
|
D | authfd.c | 467 (r = sshbuf_put_string(msg, blob, blen)) != 0 || in ssh_agent_sign() 468 (r = sshbuf_put_string(msg, data, datalen)) != 0 || in ssh_agent_sign() 638 (r = sshbuf_put_string(msg, blob, blen)) != 0) in ssh_remove_identity()
|
D | ssh-ed25519.c | 70 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_ed25519_sign()
|
D | ssh-dss.c | 107 (ret = sshbuf_put_string(b, sigblob, SIGBLOB_LEN)) != 0) in ssh_dss_sign()
|
D | bufaux.c | 207 if ((ret = sshbuf_put_string(buffer, buf, len)) != 0) in buffer_put_string()
|
D | sshkey.c | 791 (ret = sshbuf_put_string(b, in to_blob_buf() 2407 if ((ret = sshbuf_put_string(cert, nonce, sizeof(nonce))) != 0) in sshkey_certify() 2437 if ((ret = sshbuf_put_string(cert, in sshkey_certify() 2465 (ret = sshbuf_put_string(cert, NULL, 0)) != 0 || /* Reserved */ in sshkey_certify() 2466 (ret = sshbuf_put_string(cert, ca_blob, ca_len)) != 0) in sshkey_certify() 2475 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) in sshkey_certify() 2650 if ((r = sshbuf_put_string(b, key->ed25519_pk, in sshkey_private_serialize() 2652 (r = sshbuf_put_string(b, key->ed25519_sk, in sshkey_private_serialize() 2662 (r = sshbuf_put_string(b, key->ed25519_pk, in sshkey_private_serialize() 2664 (r = sshbuf_put_string(b, key->ed25519_sk, in sshkey_private_serialize() [all …]
|
D | serverloop.c | 682 (r = sshbuf_put_string(sigbuf, in server_input_hostkeys_prove() 687 (r = sshbuf_put_string(resp, sig, slen)) != 0) { in server_input_hostkeys_prove()
|
D | ssh-rsa.c | 140 (ret = sshbuf_put_string(b, sig, slen)) != 0) in ssh_rsa_sign()
|
D | sshbuf.h | 196 int sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len);
|
D | ssh-keysign.c | 302 if ((r = sshbuf_put_string(b, signature, slen)) != 0) in main()
|
D | packet.c | 2494 if ((r = sshbuf_put_string(m, kex->session_id, in kex_to_blob() 2536 (r = sshbuf_put_string(b, enc->key, enc->key_len)) != 0 || in newkeys_to_blob() 2537 (r = sshbuf_put_string(b, enc->iv, enc->iv_len)) != 0) in newkeys_to_blob() 2542 (r = sshbuf_put_string(b, mac->key, mac->key_len)) != 0) in newkeys_to_blob() 2569 (r = sshbuf_put_string(m, state->ssh1_key, state->ssh1_keylen)) != 0 || in ssh_packet_get_state() 2841 return sshbuf_put_string(ssh->state->outgoing_packet, v, len); in sshpkt_put_string()
|
D | sshconnect2.c | 1673 (r = sshbuf_put_string(b, data, datalen)) != 0) in ssh_keysign() 1814 if ((r = sshbuf_put_string(b, session_id2, session_id2_len)) != 0 || in userauth_hostbased() 1820 (r = sshbuf_put_string(b, keyblob, keylen)) != 0 || in userauth_hostbased()
|
D | ssh-agent.c | 279 if ((r = sshbuf_put_string(msg, blob, blen)) != 0) in process_request_identities() 429 (r = sshbuf_put_string(msg, signature, slen)) != 0) in process_sign_request2()
|
D | monitor.c | 641 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 680 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) in mm_answer_sign()
|
/external/openssh/regress/unittests/sshbuf/ |
D | test_sshbuf_getput_basic.c | 382 ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); in sshbuf_getput_basic_tests() 393 r = sshbuf_put_string(p1, x, sizeof(x)); in sshbuf_getput_basic_tests() 402 r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc); in sshbuf_getput_basic_tests()
|
D | test_sshbuf_getput_crypto.c | 384 ASSERT_INT_EQ(sshbuf_put_string(p1, expec256, sizeof(expec256)), 0); in sshbuf_getput_crypto_tests()
|
/external/openssh/openbsd-compat/ |
D | port-tun.c | 247 if ((r = sshbuf_put_string(&c->input, ptr, len)) != 0) in sys_tun_infilter()
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 100 ASSERT_INT_EQ(sshbuf_put_string(b, NULL, 0), 0); /* reserved */ in build_cert() 104 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */ in build_cert()
|