| /openbsd-src/regress/usr.bin/ssh/unittests/sshbuf/ |
| H A D | test_sshbuf_fixed.c | 108 ASSERT_INT_EQ(sshbuf_froms(p2, &p3), 0); in sshbuf_fixed() 117 ASSERT_INT_EQ(sshbuf_froms(p2, &p3), SSH_ERR_MESSAGE_INCOMPLETE); in sshbuf_fixed()
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | ssh-ecdsa-sk.c | 264 if (sshbuf_froms(b, &sigbuf) != 0 || in ssh_ecdsa_sk_verify() 272 sshbuf_froms(b, &webauthn_wrapper) != 0 || in ssh_ecdsa_sk_verify() 273 sshbuf_froms(b, &webauthn_exts) != 0) { in ssh_ecdsa_sk_verify()
|
| H A D | ssh-sk-helper.c | 99 if ((r = sshbuf_froms(req, &kbuf)) != 0 || in process_sign() 166 (r = sshbuf_froms(req, &challenge)) != 0) in process_enroll()
|
| H A D | ssh-agent.c | 699 if ((r = sshbuf_froms(b, &sess_id)) != 0) in parse_userauth_request() 1135 if ((r = sshbuf_froms(m, &b)) != 0 || in parse_dest_constraint() 1136 (r = sshbuf_froms(b, &frombuf)) != 0 || in parse_dest_constraint() 1137 (r = sshbuf_froms(b, &tobuf)) != 0 || in parse_dest_constraint() 1212 if ((r = sshbuf_froms(m, &b)) != 0) { in parse_key_constraint_extension() 1239 (r = sshbuf_froms(m, &b)) != 0) { in parse_key_constraint_extension() 1699 (r = sshbuf_froms(e->request, &sid)) != 0 || in process_ext_session_bind() 1700 (r = sshbuf_froms(e->request, &sig)) != 0 || in process_ext_session_bind()
|
| H A D | krl.c | 833 (r = sshbuf_froms(subsect, &value)) != 0) { in cert_extension_subsection() 889 (r = sshbuf_froms(buf, &subsect)) != 0) in parse_revoked_certs() 1013 (r = sshbuf_froms(sect, &value)) != 0) { in extension_section() 1094 (r = sshbuf_froms(copy, §)) != 0) in ssh_krl_from_blob()
|
| H A D | sshbuf.h | 72 int sshbuf_froms(struct sshbuf *buf, struct sshbuf **bufp);
|
| H A D | auth-options.c | 89 (r = sshbuf_froms(c, &data)) != 0) { in cert_option_list() 737 (r = sshbuf_froms(m, &b)) != 0) in deserialise_array()
|
| H A D | ssh-ecdsa.c | 401 sshbuf_froms(b, &sigbuf) != 0) {
|
| H A D | sshd-session.c | 599 if ((r = sshbuf_froms(hostkeys, &kbuf)) != 0) in notify_hostkeys() 652 (r = sshbuf_froms(m, &hostkeys)) != 0 || in parse_hostkeys()
|
| H A D | sshkey.c | 1843 (ret = sshbuf_froms(b, &principals)) != 0 || in cert_parse() 1846 (ret = sshbuf_froms(b, &crit)) != 0 || in cert_parse() 1847 (ret = sshbuf_froms(b, &exts)) != 0 || in cert_parse() 1849 (ret = sshbuf_froms(b, &ca)) != 0) { in cert_parse() 2053 if ((r = sshbuf_froms(buf, &b)) != 0) 3029 (r = sshbuf_froms(decoded, &kdf)) != 0 || in private2_decrypt()
|
| H A D | sshbuf-getput-basic.c | 543 sshbuf_froms(struct sshbuf *buf, struct sshbuf **bufp) in sshbuf_froms() function
|
| H A D | sftp-server.c | 1705 if ((r = sshbuf_froms(iqueue, &uids)) != 0 || in process_extended_get_users_groups_by_id() 1706 (r = sshbuf_froms(iqueue, &gids)) != 0) in process_extended_get_users_groups_by_id()
|
| H A D | packet.c | 2419 if ((r = sshbuf_froms(m, &b)) != 0) in newkeys_from_blob() 2685 return sshbuf_froms(ssh->state->incoming_packet, valp);
|
| H A D | sftp-client.c | 2887 if ((r = sshbuf_froms(msg, &uidbuf)) != 0 || in sftp_get_users_groups_by_id() 2888 (r = sshbuf_froms(msg, &gidbuf)) != 0) in sftp_get_users_groups_by_id()
|
| H A D | mux.c | 1166 if ((r = sshbuf_froms(c->input, &in)) != 0) { in mux_master_read_cb()
|
| H A D | ssh-keygen.c | 2094 (r = sshbuf_froms(options, &option)) != 0) in show_options()
|