/external/openssh/ |
D | krl.c | 693 if (sshbuf_len(sect) != 0) { in revoked_certs_generate() 749 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob() 760 if (sshbuf_len(sect) != 0) { in ssh_krl_to_blob() 775 sshbuf_ptr(buf), sshbuf_len(buf), 0)) == -1) in ssh_krl_to_blob() 828 while (sshbuf_len(buf) > 0) { in parse_revoked_certs() 841 while (sshbuf_len(subsect) > 0) { in parse_revoked_certs() 887 while (sshbuf_len(subsect) > 0) { in parse_revoked_certs() 903 if (sshbuf_len(subsect) > 0) { in parse_revoked_certs() 938 if (sshbuf_len(buf) < sizeof(KRL_MAGIC) - 1 || in ssh_krl_from_blob() 980 if (sshbuf_len(buf) < sshbuf_len(copy)) { in ssh_krl_from_blob() [all …]
|
D | sshbuf-misc.c | 68 fprintf(f, "buffer %p len = %zu\n", buf, sshbuf_len(buf)); in sshbuf_dump() 69 sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f); in sshbuf_dump() 75 size_t i, j, len = sshbuf_len(buf); in sshbuf_dtob16() 95 size_t len = sshbuf_len(buf), plen; in sshbuf_dtob64()
|
D | packet.c | 330 while (sshbuf_len(state->incoming_packet) < in ssh_packet_stop_discard() 358 if (sshbuf_len(state->input) >= discard && in ssh_packet_start_discard() 361 state->packet_discard = discard - sshbuf_len(state->input); in ssh_packet_start_discard() 622 if (sshbuf_len(in) == 0) in compress_buffer() 629 ssh->state->compression_out_stream.avail_in = sshbuf_len(in); in compress_buffer() 670 ssh->state->compression_in_stream.avail_in = sshbuf_len(in); in uncompress_buffer() 857 len = sshbuf_len(state->outgoing_packet) + 4 - 8; in ssh_packet_send1() 874 sshbuf_len(state->outgoing_packet)); in ssh_packet_send1() 889 sshbuf_len(state->outgoing_packet), &cp)) != 0) in ssh_packet_send1() 893 sshbuf_len(state->outgoing_packet), 0, 0)) != 0) in ssh_packet_send1() [all …]
|
D | kexc25519s.c | 115 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_c25519_init() 116 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_c25519_init() 120 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_c25519_init()
|
D | kexc25519c.c | 135 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_c25519_reply() 136 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_c25519_reply() 140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_c25519_reply()
|
D | ssh-ecdsa.c | 89 len = sshbuf_len(b); in ssh_ecdsa_sign() 145 if (sshbuf_len(b) != 0) { in ssh_ecdsa_verify() 160 if (sshbuf_len(sigbuf) != 0) { in ssh_ecdsa_verify()
|
D | sshkey.c | 672 if (sshbuf_len(a->certblob) != sshbuf_len(b->certblob)) in cert_compare() 675 sshbuf_len(a->certblob)) != 0) in cert_compare() 868 len = sshbuf_len(b); in to_blob() 1333 sshbuf_len(blob), &k)) != 0) { in sshkey_read() 1425 if (sshbuf_len(key->cert->certblob) == 0) in sshkey_write() 1483 if (fwrite(sshbuf_ptr(b), sshbuf_len(b), 1, f) != 1) { in sshkey_write() 1875 signed_len = sshbuf_len(key->cert->certblob) - sshbuf_len(b); in cert_parse() 1889 while (sshbuf_len(principals) > 0) { in cert_parse() 1928 while (sshbuf_len(crit) != 0) { in cert_parse() 1936 while (exts != NULL && sshbuf_len(exts) != 0) { in cert_parse() [all …]
|
D | sshbuf.c | 125 if ((ret = sshbuf_from(sshbuf_ptr(buf), sshbuf_len(buf))) == NULL) in sshbuf_fromb() 273 sshbuf_len(const struct sshbuf *buf) in sshbuf_len() function 383 if (len > sshbuf_len(buf)) in sshbuf_consume() 400 if (len > sshbuf_len(buf)) in sshbuf_consume_end()
|
D | sshbuf-getput-basic.c | 158 if (sshbuf_len(buf) < 4) { in sshbuf_peek_string_direct() 167 if (sshbuf_len(buf) - 4 < len) { in sshbuf_peek_string_direct() 249 return sshbuf_put(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_putb() 372 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
D | authfile.c | 64 sshbuf_len(keybuf)) != sshbuf_len(keybuf)) { in sshkey_save_private_blob() 119 if (sshbuf_len(blob) > MAX_KEY_FILE_SIZE) { in sshkey_load_file() 125 st.st_size != (off_t)sshbuf_len(blob)) { in sshkey_load_file()
|
D | ssh-ed25519.c | 72 len = sshbuf_len(b); in ssh_ed25519_sign() 122 if (sshbuf_len(b) != 0) { in ssh_ed25519_verify()
|
D | digest-openssl.c | 152 return ssh_digest_update(ctx, sshbuf_ptr(b), sshbuf_len(b)); in ssh_digest_update_buffer() 203 return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen); in ssh_digest_buffer()
|
D | kexecdhs.c | 151 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_ecdh_init() 152 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_ecdh_init()
|
D | kexecdhc.c | 182 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_ecdh_reply() 183 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_ecdh_reply()
|
D | ssh-dss.c | 109 len = sshbuf_len(b); in ssh_dss_sign() 167 if (sshbuf_len(b) != 0) { in ssh_dss_verify()
|
D | kexdhc.c | 169 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_dh() 170 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_dh()
|
D | sshbuf-getput-crypto.c | 56 if (sshbuf_len(buf) < 2) in sshbuf_get_bignum1() 62 if (sshbuf_len(buf) < 2 + len_bytes) in sshbuf_get_bignum1()
|
D | kexdhs.c | 163 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_dh_init() 164 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_dh_init()
|
D | digest-libc.c | 211 return ssh_digest_update(ctx, sshbuf_ptr(b), sshbuf_len(b)); in ssh_digest_update_buffer() 262 return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen); in ssh_digest_buffer()
|
D | ssh-agent.c | 313 if (sshbuf_len(e->request) == 0) in process_authentication_challenge1() 612 while (sshbuf_len(e->request)) { in process_add_identity() 719 while (sshbuf_len(e->request)) { in process_add_smartcard_key() 815 if (sshbuf_len(e->input) < 5) in process_message() 823 if (sshbuf_len(e->input) < msg_len + 4) in process_message() 988 if (sshbuf_len(sockets[i].output) > 0) in prepare_select() 1051 if (sshbuf_len(sockets[i].output) > 0 && in after_select() 1055 sshbuf_len(sockets[i].output)); in after_select()
|
D | msg.c | 48 u_int mlen = sshbuf_len(m); in ssh_msg_send()
|
D | auth-options.c | 445 while (sshbuf_len(c) > 0) { in parse_option_list() 455 name, sshbuf_len(data)); in parse_option_list() 546 } else if (sshbuf_len(data) != 0) { in parse_option_list()
|
D | ssh-rsa.c | 97 len = sshbuf_len(b); in ssh_rsa_sign() 149 if (sshbuf_len(b) != 0) { in ssh_rsa_verify()
|
D | kexgexs.c | 223 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_dh_gex_init() 224 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_dh_gex_init()
|
D | kexgexc.c | 234 sshbuf_ptr(kex->my), sshbuf_len(kex->my), in input_kex_dh_gex_reply() 235 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), in input_kex_dh_gex_reply()
|