| /freebsd/crypto/openssh/ |
| H A D | kexgex.c | 74 (r = sshbuf_putb(b, client_kexinit)) != 0 || in kexgex_hash() 77 (r = sshbuf_putb(b, server_kexinit)) != 0 || in kexgex_hash()
|
| H A D | kexgen.c | 72 (r = sshbuf_putb(b, client_kexinit)) != 0 || in kex_gen_hash() 75 (r = sshbuf_putb(b, server_kexinit)) != 0 || in kex_gen_hash() 79 (r = sshbuf_putb(b, shared_secret)) != 0) { in kex_gen_hash()
|
| H A D | ssh-sk-client.c | 162 (r = sshbuf_putb(req, msg)) != 0) { in client_converse() 351 if (attest != NULL && (r = sshbuf_putb(attest, abuf)) != 0) { in sshsk_enroll()
|
| H A D | sshkey.c | 896 if ((ret = sshbuf_putb(b, key->cert->certblob)) != 0) in to_blob_buf() 1544 if ((r = sshbuf_putb(to->certblob, from->certblob)) != 0 || in sshkey_cert_copy() 1545 (r = sshbuf_putb(to->critical, from->critical)) != 0 || in sshkey_cert_copy() 1546 (r = sshbuf_putb(to->extensions, from->extensions)) != 0) in sshkey_cert_copy() 1876 if ((ret = sshbuf_putb(key->cert->certblob, certbuf)) != 0) in cert_parse() 1940 if ((ret = sshbuf_putb(key->cert->critical, crit)) != 0 || in cert_parse() 1942 (ret = sshbuf_putb(key->cert->extensions, exts)) != 0)) in cert_parse() 2584 r = sshbuf_putb(buf, b); in sshkey_private_serialize_opt() 3389 r = sshbuf_putb(buf, blob); in sshkey_private_to_blob_pem_pkcs8()
|
| H A D | sshbuf-misc.c | 208 r = sshbuf_putb(b64, b); in sshbuf_dtourlb64()
|
| H A D | sshbuf.h | 148 int sshbuf_putb(struct sshbuf *buf, const struct sshbuf *v);
|
| H A D | ssh-ecdsa-sk.c | 365 (ret = sshbuf_putb(original_signed, webauthn_exts)) != 0 || in ssh_ecdsa_sk_verify()
|
| H A D | packet.c | 1206 (r = sshbuf_putb(state->outgoing_packet, in ssh_packet_send2_wrapped() 1749 if ((r = sshbuf_putb(state->incoming_packet, in ssh_packet_read_poll2() 2608 return sshbuf_putb(ssh->state->outgoing_packet, b); in sshpkt_putb() 2792 if ((r = sshbuf_putb(state->output, in ssh_packet_send_mux()
|
| H A D | sshkey-xmss.c | 936 if ((r = sshbuf_putb(padded, b)) != 0) in sshkey_xmss_encrypt_state() 951 if ((r = sshbuf_putb(encoded, padded)) != 0) in sshkey_xmss_encrypt_state()
|
| H A D | sshbuf-getput-basic.c | 339 sshbuf_putb(struct sshbuf *buf, const struct sshbuf *v) in sshbuf_putb() function
|
| H A D | ssh_api.c | 432 if ((r = sshbuf_putb(ssh_packet_get_output(ssh), banner)) != 0) in _ssh_send_banner()
|
| H A D | auth2-pubkey.c | 197 if ((r = sshbuf_putb(b, ssh->kex->session_id)) != 0) in userauth_pubkey()
|
| H A D | ssh-agent.c | 677 (r = sshbuf_putb(msg, keys)) != 0) in process_request_identities() 1796 if ((r = sshbuf_putb(e->session_ids[i].sid, sid)) != 0) in process_ext_session_bind()
|
| H A D | ssh_namespace.h | 822 #define sshbuf_putb Fssh_sshbuf_putb macro
|
| H A D | misc.c | 2174 (r = sshbuf_putb(buf, arg)) != 0 || in argv_assemble()
|
| H A D | sshconnect2.c | 1403 if ((r = sshbuf_putb(b, ssh->kex->session_id)) != 0) in sign_and_send_pubkey()
|
| H A D | channels.c | 3185 (r = sshbuf_putb(modified, original)) != 0) { in channel_proxy_downstream() 3214 (r = sshbuf_putb(modified, original)) != 0) { in channel_proxy_downstream()
|
| /freebsd/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 94 ASSERT_INT_EQ(sshbuf_putb(b, pk), 0); /* public key serialisation */ in build_cert()
|
| /freebsd/crypto/openssh/regress/unittests/sshbuf/ |
| H A D | test_sshbuf_getput_basic.c | 423 ASSERT_INT_EQ(sshbuf_putb(p2, p1), 0); in sshbuf_getput_basic_tests()
|