| /openbsd-src/usr.bin/ssh/ |
| H A D | kexgex.c | 68 (r = sshbuf_putb(b, client_kexinit)) != 0 || in kexgex_hash() 71 (r = sshbuf_putb(b, server_kexinit)) != 0 || in kexgex_hash()
|
| H A D | kexgen.c | 69 (r = sshbuf_putb(b, client_kexinit)) != 0 || in kex_gen_hash() 72 (r = sshbuf_putb(b, server_kexinit)) != 0 || in kex_gen_hash() 76 (r = sshbuf_putb(b, shared_secret)) != 0) { in kex_gen_hash()
|
| H A D | ssh-sk-client.c | 160 (r = sshbuf_putb(req, msg)) != 0) { in client_converse() 341 if (attest != NULL && (r = sshbuf_putb(attest, abuf)) != 0) { in sshsk_enroll()
|
| H A D | sshkey.c | 856 if ((ret = sshbuf_putb(b, key->cert->certblob)) != 0) in sshkey_fingerprint_raw() 1504 if ((r = sshbuf_putb(to->certblob, from->certblob)) != 0 || in sshkey_shield_private() 1505 (r = sshbuf_putb(to->critical, from->critical)) != 0 || in sshkey_shield_private() 1506 (r = sshbuf_putb(to->extensions, from->extensions)) != 0) in sshkey_shield_private() 1836 if ((ret = sshbuf_putb(key->cert->certblob, certbuf)) != 0) in cert_parse() 1900 if ((ret = sshbuf_putb(key->cert->critical, crit)) != 0 || in sshkey_from_blob_internal() 1902 (ret = sshbuf_putb(key->cert->extensions, exts)) != 0)) in sshkey_from_blob_internal() 2544 r = sshbuf_putb(buf, b); in sshkey_private_deserialize() 3347 r = sshbuf_putb(buf, blob); in clear_libcrypto_errors()
|
| H A D | sshbuf-misc.c | 204 r = sshbuf_putb(b64, b); in sshbuf_dtourlb64()
|
| H A D | sshbuf.h | 154 int sshbuf_putb(struct sshbuf *buf, const struct sshbuf *v);
|
| H A D | ssh-ecdsa-sk.c | 347 (ret = sshbuf_putb(original_signed, webauthn_exts)) != 0 || in ssh_ecdsa_sk_verify()
|
| H A D | packet.c | 1182 (r = sshbuf_putb(state->outgoing_packet, in ssh_packet_send2_wrapped() 1724 if ((r = sshbuf_putb(state->incoming_packet, in ssh_packet_read_poll2() 2573 return sshbuf_putb(ssh->state->outgoing_packet, b); in sshpkt_putb() 2753 if ((r = sshbuf_putb(state->output, in ssh_packet_send_mux()
|
| H A D | sshkey-xmss.c | 930 if ((r = sshbuf_putb(padded, b)) != 0) in sshkey_xmss_encrypt_state() 945 if ((r = sshbuf_putb(encoded, padded)) != 0) in sshkey_xmss_encrypt_state()
|
| H A D | sshbuf-getput-basic.c | 335 sshbuf_putb(struct sshbuf *buf, const struct sshbuf *v) in sshbuf_putb() function
|
| H A D | ssh_api.c | 426 if ((r = sshbuf_putb(ssh_packet_get_output(ssh), banner)) != 0) in _ssh_send_banner()
|
| H A D | auth2-pubkey.c | 190 if ((r = sshbuf_putb(b, ssh->kex->session_id)) != 0) in userauth_pubkey()
|
| H A D | ssh-agent.c | 646 (r = sshbuf_putb(msg, keys)) != 0) in process_request_identities() 1760 if ((r = sshbuf_putb(e->session_ids[i].sid, sid)) != 0) in process_extension() 1761 fatal_fr(r, "sshbuf_putb session ID"); in process_extension()
|
| H A D | misc.c | 2079 (r = sshbuf_putb(buf, arg)) != 0 || in argv_next()
|
| H A D | sshconnect2.c | 1393 if ((r = sshbuf_putb(b, ssh->kex->session_id)) != 0) in sign_and_send_pubkey() 1394 fatal_fr(r, "sshbuf_putb"); in sign_and_send_pubkey()
|
| H A D | channels.c | 3143 (r = sshbuf_putb(modified, original)) != 0) { in channel_proxy_downstream() 3172 (r = sshbuf_putb(modified, original)) != 0) { in channel_proxy_downstream()
|
| /openbsd-src/regress/usr.bin/ssh/unittests/sshkey/ |
| H A D | test_sshkey.c | 84 ASSERT_INT_EQ(sshbuf_putb(b, pk), 0); /* public key serialisation */ in build_cert()
|
| /openbsd-src/regress/usr.bin/ssh/unittests/sshbuf/ |
| H A D | test_sshbuf_getput_basic.c | 419 ASSERT_INT_EQ(sshbuf_putb(p2, p1), 0); in sshbuf_getput_basic_tests()
|