/dflybsd-src/crypto/openssh/ |
H A D | sshbuf-misc.c | 70 sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f); in sshbuf_dump() 77 const u_char *p = sshbuf_ptr(buf); in sshbuf_dtob16() 107 if (b64_ntop(sshbuf_ptr(d), sshbuf_len(d), s, slen) == -1) { in sshbuf_dtob64() 187 if (l <= 1 || sshbuf_ptr(b) == NULL) { in sshbuf_dtourlb64() 191 if (sshbuf_ptr(b)[l - 1] != '=') in sshbuf_dtourlb64() 217 const u_char *p = NULL, *s = sshbuf_ptr(buf); in sshbuf_dup_string() 241 if (sshbuf_ptr(b) == NULL) in sshbuf_cmp() 247 if (timingsafe_bcmp(sshbuf_ptr(b) + offset, s, len) != 0) in sshbuf_cmp() 260 if (sshbuf_ptr(b) == NULL) in sshbuf_find() 266 if ((p = memmem(sshbuf_ptr(b) + start_offset, in sshbuf_find() [all …]
|
H A D | kexsntrup761x25519.c | 95 client_pub = sshbuf_ptr(client_blob); in kex_kem_sntrup761x25519_enc() 137 sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_enc() 145 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_enc() 177 ciphertext = sshbuf_ptr(server_blob); in kex_kem_sntrup761x25519_dec() 202 sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_dec() 209 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_kem_sntrup761x25519_dec()
|
H A D | sshbuf-getput-basic.c | 37 const u_char *p = sshbuf_ptr(buf); in sshbuf_get() 50 const u_char *p = sshbuf_ptr(buf); in sshbuf_get_u64() 63 const u_char *p = sshbuf_ptr(buf); in sshbuf_get_u32() 76 const u_char *p = sshbuf_ptr(buf); in sshbuf_get_u16() 89 const u_char *p = sshbuf_ptr(buf); in sshbuf_get_u8() 102 if (sshbuf_ptr(buf) == NULL) /* calls sshbuf_check_sanity() */ in check_offset() 122 *p = sshbuf_ptr(buf) + offset; in check_roffset() 244 const u_char *p = sshbuf_ptr(buf); in sshbuf_peek_string_direct() 343 return sshbuf_put(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_putb() 543 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
H A D | kexc25519.c | 131 client_pub = sshbuf_ptr(client_blob); in kex_c25519_enc() 152 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_c25519_enc() 179 server_pub = sshbuf_ptr(server_blob); in kex_c25519_dec() 192 dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf)); in kex_c25519_dec()
|
H A D | packet.c | 397 sshbuf_ptr(state->incoming_packet), dlen, in ssh_packet_stop_discard() 1187 type = (sshbuf_ptr(state->outgoing_packet))[5]; in ssh_packet_send2_wrapped() 1271 sshbuf_ptr(state->outgoing_packet), len, in ssh_packet_send2_wrapped() 1281 sshbuf_ptr(state->outgoing_packet), in ssh_packet_send2_wrapped() 1353 type = sshbuf_ptr(state->outgoing_packet)[5]; in ssh_packet_send2() 1531 cp = sshbuf_ptr(state->input); in ssh_packet_read_poll2_mux() 1593 sshbuf_ptr(state->input), sshbuf_len(state->input)) != 0) in ssh_packet_read_poll2() 1618 state->p_send.seqnr, cp, sshbuf_ptr(state->input), in ssh_packet_read_poll2() 1621 state->packlen = PEEK_U32(sshbuf_ptr(state->incoming_packet)); in ssh_packet_read_poll2() 1674 sshbuf_ptr(state->input), aadlen + need, in ssh_packet_read_poll2() [all …]
|
H A D | digest-openssl.c | 155 return ssh_digest_update(ctx, sshbuf_ptr(b), sshbuf_len(b)); in ssh_digest_update_buffer() 205 return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen); in ssh_digest_buffer()
|
H A D | digest-libc.c | 215 return ssh_digest_update(ctx, sshbuf_ptr(b), sshbuf_len(b)); in ssh_digest_update_buffer() 265 return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen); in ssh_digest_buffer()
|
H A D | ssh_api.c | 317 return sshbuf_ptr(output); in ssh_output_ptr() 344 const u_char *s = sshbuf_ptr(input); in _ssh_read_banner() 371 memcmp(sshbuf_ptr(banner), "SSH-", 4) == 0) in _ssh_read_banner() 374 sshbuf_ptr(banner)); in _ssh_read_banner()
|
H A D | ssh-pkcs11-helper.c | 266 cp = sshbuf_ptr(iqueue); in process() 401 len = write(out, sshbuf_ptr(oqueue), in main()
|
H A D | sshbuf.c | 149 if ((ret = sshbuf_from(sshbuf_ptr(buf), sshbuf_len(buf))) == NULL) in sshbuf_fromb() 297 sshbuf_ptr(const struct sshbuf *buf) in sshbuf_ptr() function
|
H A D | sshkey.c | 682 if (timingsafe_bcmp(sshbuf_ptr(a->certblob), sshbuf_ptr(b->certblob), in cert_compare() 831 memcpy(*blobp, sshbuf_ptr(b), len); in to_blob() 1304 if (fwrite(sshbuf_ptr(b), sshbuf_len(b), 1, f) != 1) { in sshkey_write() 1605 sshbuf_ptr(prvbuf), sshbuf_len(prvbuf), 0, 0)) != 0) in sshkey_shield_private() 1870 sshbuf_ptr(key->cert->certblob), signed_len, NULL, 0, NULL)) != 0) in cert_parse() 2255 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), in sshkey_certify_custom() 2846 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) in sshkey_private_to_blob2() 2894 cp = sshbuf_ptr(blob); in private2_uudecode() 2929 if ((r = sshbuf_b64tod(decoded, (char *)sshbuf_ptr(encoded))) != 0) in private2_uudecode() 2934 memcmp(sshbuf_ptr(decoded), AUTH_MAGIC, sizeof(AUTH_MAGIC))) { in private2_uudecode() [all …]
|
H A D | ssh-agent.c | 826 if (sshbuf_ptr(a) == NULL || sshbuf_ptr(b) == NULL) in buf_equal() 830 if (timingsafe_bcmp(sshbuf_ptr(a), sshbuf_ptr(b), sshbuf_len(a)) != 0) in buf_equal() 942 sshbuf_ptr(data), sshbuf_len(data), agent_decode_alg(key, flags), in process_sign_request2() 1710 if ((r = sshkey_verify(key, sshbuf_ptr(sig), sshbuf_len(sig), in process_ext_session_bind() 1711 sshbuf_ptr(sid), sshbuf_len(sid), NULL, 0, NULL)) != 0) { in process_ext_session_bind() 1807 cp = sshbuf_ptr(e->input); in process_message() 1997 sshbuf_ptr(sockets[socknum].output), in handle_conn_write()
|
H A D | kexgexs.c | 179 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_dh_gex_init()
|
H A D | ssh-ed25519-sk.c | 219 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify()
|
H A D | auth2-hostbased.c | 152 sshbuf_ptr(b), sshbuf_len(b), pkalg, ssh->compat, NULL) == 0) in userauth_hostbased()
|
H A D | sshsig.c | 198 sshbuf_ptr(tosign), sshbuf_len(tosign), in sshsig_wrap_sign() 205 sshbuf_ptr(tosign), sshbuf_len(tosign), in sshsig_wrap_sign() 378 if ((r = sshkey_verify(key, sig, siglen, sshbuf_ptr(toverify), in sshsig_wrap_verify()
|
H A D | kexgexc.c | 201 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_dh_gex_reply()
|
H A D | ssh-ed25519.c | 190 memcpy(*sigp, sshbuf_ptr(b), len); in ssh_ed25519_sign()
|
H A D | channels.c | 1462 p = sshbuf_ptr(input); in channel_decode_socks4() 1495 p = sshbuf_ptr(input); in channel_decode_socks4() 1513 p = sshbuf_ptr(input); in channel_decode_socks4() 1577 p = sshbuf_ptr(input); in channel_decode_socks5() 1731 p = sshbuf_ptr(c->input); in channel_pre_dynamic() 1789 p = sshbuf_ptr(c->output); in channel_before_prepare_io_rdynamic() 2289 len = write(c->efd, sshbuf_ptr(c->extended), in channel_handle_efd_write() 2434 need = PEEK_U32(sshbuf_ptr(c->input)); in channel_post_mux_client_read() 2462 len = write(c->wfd, sshbuf_ptr(c->output), sshbuf_len(c->output)); in channel_post_mux_client_write() 3006 (r = sshpkt_put_string(ssh, sshbuf_ptr(c->input), len)) != 0 || in channel_output_poll_input_open() [all …]
|
H A D | gss-genr.c | 150 ret = xstrdup((const char *)sshbuf_ptr(b)); in ssh_gssapi_last_error()
|
H A D | sshkey-xmss.c | 960 (r = cipher_crypt(ciphercontext, 0, cp, sshbuf_ptr(encoded), in sshkey_xmss_encrypt_state() 1021 memcmp(sshbuf_ptr(encoded), XMSS_MAGIC, sizeof(XMSS_MAGIC))) { in sshkey_xmss_decrypt_state() 1053 (r = cipher_crypt(ciphercontext, 0, dp, sshbuf_ptr(copy), in sshkey_xmss_decrypt_state()
|
H A D | sshbuf.h | 101 const u_char *sshbuf_ptr(const struct sshbuf *buf);
|
H A D | ssh-ecdsa-sk.c | 217 if ((r = sshbuf_cmp(wrapper, 0, sshbuf_ptr(m), sshbuf_len(m))) != 0) in webauthn_check_prepare_hash()
|
H A D | ssh-xmss.c | 250 memcpy(*sigp, sshbuf_ptr(b), len); in ssh_xmss_sign()
|
H A D | ssh-ecdsa.c | 277 memcpy(*sigp, sshbuf_ptr(b), len); in ssh_ecdsa_sign()
|