| /openbsd-src/usr.bin/ssh/ |
| H A D | ssh-ed25519.c | 59 if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0) in ssh_ed25519_serialize_public() 71 if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0 || in ssh_ed25519_serialize_private() 72 (r = sshbuf_put_string(b, key->ed25519_sk, ED25519_SK_SZ)) != 0) in ssh_ed25519_serialize_private() 179 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_ed25519_sign()
|
| H A D | ssh-xmss.c | 73 (r = sshbuf_put_string(b, key->xmss_pk, in ssh_xmss_serialize_public() 91 (r = sshbuf_put_string(b, key->xmss_pk, in ssh_xmss_serialize_private() 93 (r = sshbuf_put_string(b, key->xmss_sk, in ssh_xmss_serialize_private() 237 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_xmss_sign()
|
| H A D | sshbuf-getput-crypto.c | 137 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { in sshbuf_put_bignum2() 160 ret = sshbuf_put_string(buf, d, len); in sshbuf_put_ec()
|
| H A D | monitor_wrap.c | 260 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_sign() 543 (r = sshbuf_put_string(m, sig, siglen)) != 0 || in mm_sshkey_verify() 544 (r = sshbuf_put_string(m, data, datalen)) != 0 || in mm_sshkey_verify() 834 if ((r = sshbuf_put_string(m, goid->elements, goid->length)) != 0) in mm_ssh_gssapi_checkmic() 858 if ((r = sshbuf_put_string(m, in->value, in->length)) != 0) in mm_ssh_gssapi_userok() 887 if ((r = sshbuf_put_string(m, gssbuf->value, gssbuf->length)) != 0 || in server_process_permitopen_list() 888 (r = sshbuf_put_string(m, gssmic->value, gssmic->length)) != 0) in server_process_permitopen_list()
|
| H A D | kexsntrup761x25519.c | 141 if ((r = sshbuf_put_string(buf, hash, in kex_kem_sntrup761x25519_enc() 205 if ((r = sshbuf_put_string(buf, hash, in kex_kem_sntrup761x25519_dec()
|
| H A D | ssh-sk.c | 212 if ((r = sshbuf_put_string(b, in sshsk_ecdsa_assemble() 214 error_fr(r, "sshbuf_put_string"); in sshsk_ecdsa_assemble() 443 (r = sshbuf_put_string(attest, 445 (r = sshbuf_put_string(attest, in sshsk_enroll() 447 (r = sshbuf_put_string(attest, in sshsk_enroll() 450 (r = sshbuf_put_string(attest, NULL, 0)) != 0 /* resvd */) { in sshsk_enroll() 616 if ((r = sshbuf_put_string(sig,
|
| H A D | sshbuf-getput-basic.c | 510 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) in sshbuf_put_string() function 530 return sshbuf_put_string(buf, v, v == NULL ? 0 : strlen(v)); in sshbuf_put_cstring() 537 return sshbuf_put_string(buf, NULL, 0); in sshbuf_put_stringb() 539 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v)); in sshbuf_put_stringb()
|
| H A D | auth2-hostbased.c | 134 (r = sshbuf_put_string(b, pkalg, alen)) != 0 || in userauth_hostbased() 135 (r = sshbuf_put_string(b, pkblob, blen)) != 0 || in userauth_hostbased()
|
| H A D | ssh-pkcs11-client.c | 268 (r = sshbuf_put_string(msg, blob, blen)) != 0 || in rsa_encrypt() 269 (r = sshbuf_put_string(msg, from, flen)) != 0 || in rsa_encrypt() 351 (r = sshbuf_put_string(msg, blob, blen)) != 0 || in ecdsa_do_sign() 352 (r = sshbuf_put_string(msg, dgst, dgst_len)) != 0 || in ecdsa_do_sign()
|
| H A D | authfd.c | 423 (r = sshbuf_put_string(msg, data, datalen)) != 0 || in ssh_agent_sign() 468 (r = sshbuf_put_string(b, NULL, 0)) != 0) /* reserved */ in encode_dest_constraint_hop() 494 (r = sshbuf_put_string(b, NULL, 0)) != 0) /* reserved */ in encode_dest_constraint() 662 (r = sshbuf_put_string(msg, blob, blen)) != 0) in ssh_remove_identity()
|
| H A D | sshkey-xmss.c | 296 (r = sshbuf_put_string(b, state->enc_keyiv, in sshkey_xmss_serialize_enc_key() 686 (r = sshbuf_put_string(b, state->stack, num_stack(state))) != 0 || in sshkey_xmss_serialize_state() 688 (r = sshbuf_put_string(b, state->stacklevels, num_stacklevels(state))) != 0 || in sshkey_xmss_serialize_state() 689 (r = sshbuf_put_string(b, state->auth, num_auth(state))) != 0 || in sshkey_xmss_serialize_state() 690 (r = sshbuf_put_string(b, state->keep, num_keep(state))) != 0 || in sshkey_xmss_serialize_state() 691 (r = sshbuf_put_string(b, state->th_nodes, num_th_nodes(state))) != 0 || in sshkey_xmss_serialize_state() 692 (r = sshbuf_put_string(b, state->retain, num_retain(state))) != 0 || in sshkey_xmss_serialize_state()
|
| H A D | sftp-client.c | 223 (r = sshbuf_put_string(msg, s, len)) != 0) in send_string_request() 241 (r = sshbuf_put_string(msg, s, len)) != 0 || in send_string_attrs_request() 667 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_close() 727 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_lsreaddir() 1172 (r = sshbuf_put_string(msg, old_handle, old_handle_len)) != 0 || in sftp_copy() 1175 (r = sshbuf_put_string(msg, new_handle, new_handle_len)) != 0 || in sftp_copy() 1335 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_fsync() 1459 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) in sftp_fstatvfs() 1512 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || in send_read_request() 2121 (r = sshbuf_put_string(msg, handle, in sftp_upload() [all …]
|
| H A D | ssh-pkcs11-helper.c | 137 if ((r = sshbuf_put_string(msg, blob, blen)) != 0 || in process_add() 238 (r = sshbuf_put_string(msg, signature, slen)) != 0) in process_sign()
|
| H A D | ssh-sk-helper.c | 132 (r = sshbuf_put_string(resp, sig, siglen)) != 0) in process_sign() 255 (r = sshbuf_put_string(resp, srks[i]->user_id, in process_load_resident()
|
| H A D | krl.c | 586 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 592 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) in revoked_certs_generate() 749 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || in ssh_krl_to_blob() 767 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 778 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob() 790 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) in ssh_krl_to_blob()
|
| H A D | sshsig.c | 183 (r = sshbuf_put_string(tosign, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_sign() 219 (r = sshbuf_put_string(blob, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_sign() 221 (r = sshbuf_put_string(blob, sig, slen)) != 0) { in sshsig_wrap_sign() 328 (r = sshbuf_put_string(toverify, NULL, 0)) != 0 || /* reserved */ in sshsig_wrap_verify()
|
| H A D | monitor.c | 679 (r = sshbuf_put_string(sigbuf, session_id2, in mm_answer_pwnamallow() 714 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) in mm_answer_pwnamallow() 731 if ((r = sshbuf_put_string(b, \ in mm_answer_pwnamallow() 743 if ((r = sshbuf_put_string(m, &options, sizeof(options))) != 0) in mm_answer_pwnamallow() 1687 (r = sshbuf_put_string(m, out.value, out.length)) != 0 ||
|
| H A D | ssh-keysign.c | 302 if ((r = sshbuf_put_string(b, signature, slen)) != 0) in main()
|
| H A D | sshbuf.h | 199 int sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len);
|
| H A D | ssh-sk-client.c | 250 (r = sshbuf_put_string(req, data, datalen)) != 0 || in sshsk_sign()
|
| H A D | ssh-dss.c | 301 (ret = sshbuf_put_string(b, sigblob, SIGBLOB_LEN)) != 0) in ssh_dss_sign()
|
| H A D | sshkey.c | 2287 if ((ret = sshbuf_put_string(cert, nonce, sizeof(nonce))) != 0) in sshkey_cert_check_authority() 2315 (ret = sshbuf_put_string(cert, NULL, 0)) != 0 || /* Reserved */ in sshkey_cert_check_authority() 2316 (ret = sshbuf_put_string(cert, ca_blob, ca_len)) != 0) in sshkey_cert_check_authority() 2335 if ((ret = sshbuf_put_string(cert, sig_blob, sig_len)) != 0) in sshkey_cert_check_authority_now() 2847 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || in private2_uudecode() 2865 (r = sshbuf_put_string(encoded, pubkeyblob, pubkeylen)) != 0) in private2_uudecode()
|
| /openbsd-src/regress/usr.bin/ssh/unittests/sshbuf/ |
| H A D | test_sshbuf_getput_basic.c | 377 ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); in sshbuf_getput_basic_tests() 388 r = sshbuf_put_string(p1, x, sizeof(x)); in sshbuf_getput_basic_tests() 397 r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc); in sshbuf_getput_basic_tests()
|
| H A D | test_sshbuf_getput_crypto.c | 242 ASSERT_INT_EQ(sshbuf_put_string(p1, expec256, sizeof(expec256)), 0); in sshbuf_getput_crypto_tests()
|
| /openbsd-src/regress/usr.bin/ssh/unittests/sshkey/ |
| H A D | test_sshkey.c | 93 ASSERT_INT_EQ(sshbuf_put_string(b, NULL, 0), 0); /* reserved */ in build_cert() 97 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */ in build_cert()
|