| /freebsd/crypto/openssh/ |
| H A D | ssh-ed25519.c | 61 if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0) in ssh_ed25519_serialize_public() 73 if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0 || in ssh_ed25519_serialize_private() 74 (r = sshbuf_put_string(b, key->ed25519_sk, ED25519_SK_SZ)) != 0) in ssh_ed25519_serialize_private() 207 (r = sshbuf_put_string(b, sig, slen)) != 0) in ssh_ed25519_encode_store_sig()
|
| H A D | sshbuf-getput-crypto.c | 144 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { in sshbuf_put_bignum2() 168 ret = sshbuf_put_string(buf, d, len); in sshbuf_put_ec()
|
| H A D | ssh-sk.c | 229 if ((r = sshbuf_put_string(b, in sshsk_ecdsa_assemble() 460 (r = sshbuf_put_string(attest, in fill_attestation_blob() 462 (r = sshbuf_put_string(attest, in fill_attestation_blob() 464 (r = sshbuf_put_string(attest, in fill_attestation_blob() 467 (r = sshbuf_put_string(attest, NULL, 0)) != 0 /* resvd */) { in fill_attestation_blob() 633 if ((r = sshbuf_put_string(sig, in sshsk_ed25519_sig()
|
| H A D | kexsntrup761x25519.c | 145 if ((r = sshbuf_put_string(buf, hash, in kex_kem_sntrup761x25519_enc() 209 if ((r = sshbuf_put_string(buf, hash, in kex_kem_sntrup761x25519_dec()
|
| H A D | sshbuf-getput-basic.c | 512 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) in sshbuf_put_string() function 532 return sshbuf_put_string(buf, v, v == NULL ? 0 : strlen(v)); in sshbuf_put_cstring() 539 return sshbuf_put_string(buf, NULL, 0); in sshbuf_put_stringb() 541 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
| H A D | auth2-hostbased.c | 136 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased() 137 (r = sshbuf_put_string(b, pkblob, blen)) != 0 || in userauth_hostbased()
|
| H A D | monitor_wrap.c | 284 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_sign() 597 (r = sshbuf_put_string(m, sig, siglen)) != 0 || in mm_sshkey_verify() 598 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_verify() 1076 if ((r = sshbuf_put_string(m, goid->elements, goid->length)) != 0) in mm_ssh_gssapi_server_ctx() 1100 if ((r = sshbuf_put_string(m, in->value, in->length)) != 0) in mm_ssh_gssapi_accept_ctx() 1129 if ((r = sshbuf_put_string(m, gssbuf->value, gssbuf->length)) != 0 || in mm_ssh_gssapi_checkmic() 1130 (r = sshbuf_put_string(m, gssmic->value, gssmic->length)) != 0) in mm_ssh_gssapi_checkmic()
|
| H A D | kexmlkem768x25519.c | 164 if ((r = sshbuf_put_string(buf, hash, in kex_kem_mlkem768x25519_enc() 240 if ((r = sshbuf_put_string(buf, hash, in kex_kem_mlkem768x25519_dec()
|
| H A D | authfd.c | 423 (r = sshbuf_put_string(msg, data, datalen)) != 0 || in ssh_agent_sign() 475 (r = sshbuf_put_string(b, NULL, 0)) != 0) /* reserved */ in encode_dest_constraint_hop() 501 (r = sshbuf_put_string(b, NULL, 0)) != 0) /* reserved */ in encode_dest_constraint() 658 (r = sshbuf_put_string(msg, blob, blen)) != 0) in ssh_remove_identity()
|
| H A D | sftp-client.c | 231 (r = sshbuf_put_string(msg, s, len)) != 0) in send_string_request() 249 (r = sshbuf_put_string(msg, s, len)) != 0 || in send_string_attrs_request() 672 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_close() 732 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_lsreaddir() 1177 (r = sshbuf_put_string(msg, old_handle, old_handle_len)) != 0 || in sftp_copy() 1180 (r = sshbuf_put_string(msg, new_handle, new_handle_len)) != 0 || in sftp_copy() 1340 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_fsync() 1464 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_fstatvfs() 1517 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || in send_read_request() 2132 (r = sshbuf_put_string(msg, handle, in sftp_upload() [all …]
|
| H A D | krl.c | 588 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 594 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 752 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || in ssh_krl_to_blob() 770 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 781 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 793 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob()
|
| H A D | ssh-sk-helper.c | 152 (r = sshbuf_put_string(resp, sig, siglen)) != 0) in process_sign() 275 (r = sshbuf_put_string(resp, srks[i]->user_id, in process_load_resident()
|
| H A D | sshsig.c | 185 (r = sshbuf_put_string(tosign, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_sign() 221 (r = sshbuf_put_string(blob, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_sign() 223 (r = sshbuf_put_string(blob, sig, slen)) != 0) { in sshsig_wrap_sign() 330 (r = sshbuf_put_string(toverify, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_verify()
|
| H A D | ssh-pkcs11-helper.c | 137 (r = sshbuf_put_string(msg, signature, slen)) != 0) in process_sign()
|
| H A D | ssh-keysign.c | 301 if ((r = sshbuf_put_string(b, signature, slen)) != 0) in main()
|
| H A D | monitor.c | 784 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_sign() 819 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) in mm_answer_sign() 836 if ((r = sshbuf_put_string(b, \ 848 if ((r = sshbuf_put_string(m, &options, sizeof(options))) != 0) in mm_encode_server_options() 2045 (r = sshbuf_put_string(m, out.value, out.length)) != 0 || in mm_answer_gss_accept_ctx()
|
| H A D | sshbuf.h | 213 int sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len);
|
| H A D | sshd-session.c | 284 if ((r = sshbuf_put_string(hostkeys, NULL, 0)) != 0) in pack_hostkeys() 294 if ((r = sshbuf_put_string(hostkeys, NULL, 0)) != 0) in pack_hostkeys()
|
| H A D | sshkey.c | 2319 if ((ret = sshbuf_put_string(cert, nonce, sizeof(nonce))) != 0) in sshkey_certify_custom() 2347 (ret = sshbuf_put_string(cert, NULL, 0)) != 0 || /* Reserved */ in sshkey_certify_custom() 2348 (ret = sshbuf_put_string(cert, ca_blob, ca_len)) != 0) in sshkey_certify_custom() 2367 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) in sshkey_certify_custom() 2863 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || in sshkey_private_to_blob2() 2881 (r = sshbuf_put_string(encoded, pubkeyblob, pubkeylen)) != 0) in sshkey_private_to_blob2()
|
| H A D | ssh-sk-client.c | 274 (r = sshbuf_put_string(req, data, datalen)) != 0 || in sshsk_sign()
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | port-net.c | 347 if ((r = sshbuf_put_string(c->input, ptr, len)) != 0) in sys_tun_infilter()
|
| /freebsd/crypto/openssh/regress/unittests/sshbuf/ |
| H A D | test_sshbuf_getput_basic.c | 379 ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); in sshbuf_getput_basic_tests() 390 r = sshbuf_put_string(p1, x, sizeof(x)); in sshbuf_getput_basic_tests() 399 r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc); in sshbuf_getput_basic_tests()
|
| H A D | test_sshbuf_getput_crypto.c | 253 ASSERT_INT_EQ(sshbuf_put_string(p1, expec256, sizeof(expec256)), 0); in sshbuf_getput_crypto_tests()
|
| /freebsd/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 101 ASSERT_INT_EQ(sshbuf_put_string(b, NULL, 0), 0); /* reserved */ in build_cert() 105 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */ in build_cert()
|
| /freebsd/crypto/openssh/regress/misc/ssh-verify-attestation/ |
| H A D | ssh-verify-attestation.c | 228 if ((r = sshbuf_put_string(b, pubkey, pubkey_len)) != 0) { in cred_matches_key_ecdsa()
|