/external/openssh/ |
kexc25519.c | 113 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) < 0 || 114 (r = sshbuf_put_string(b, client_dh_pub, CURVE25519_SIZE)) < 0 || 115 (r = sshbuf_put_string(b, server_dh_pub, CURVE25519_SIZE)) < 0 ||
|
kexdh.c | 73 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||
|
kexecdh.c | 79 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||
|
kexgex.c | 76 (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||
|
sshbuf-getput-crypto.c | 160 if ((r = sshbuf_put_string(buf, d + 1 - prepend, len + prepend)) < 0) { 212 ret = sshbuf_put_string(buf, d, len);
|
sshbuf-getput-basic.c | 348 sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len) function 368 return sshbuf_put_string(buf, (u_char *)v, v == NULL ? 0 : strlen(v)); 374 return sshbuf_put_string(buf, sshbuf_ptr(v), sshbuf_len(v));
|
bufaux.c | 207 if ((ret = sshbuf_put_string(buffer, buf, len)) != 0)
|
ssh-ed25519.c | 70 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0)
|
sftp-client.c | 177 (r = sshbuf_put_string(msg, s, len)) != 0) 195 (r = sshbuf_put_string(msg, s, len)) != 0 || 503 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 563 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 1002 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 1122 (r = sshbuf_put_string(msg, handle, handle_len)) != 0) 1143 (r = sshbuf_put_string(msg, handle, handle_len)) != 0 || [all...] |
authfd.c | 467 (r = sshbuf_put_string(msg, blob, blen)) != 0 || 468 (r = sshbuf_put_string(msg, data, datalen)) != 0 || 638 (r = sshbuf_put_string(msg, blob, blen)) != 0)
|
krl.c | 561 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) 567 if ((r = sshbuf_put_string(buf, NULL, 0)) != 0) 727 (r = sshbuf_put_string(buf, NULL, 0)) != 0 || 745 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) 756 if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) 777 if ((r = sshbuf_put_string(buf, sblob, slen)) != 0) [all...] |
ssh-dss.c | 107 (ret = sshbuf_put_string(b, sigblob, SIGBLOB_LEN)) != 0)
|
ssh-keysign.c | 302 if ((r = sshbuf_put_string(b, signature, slen)) != 0)
|
sshbuf.h | 196 int sshbuf_put_string(struct sshbuf *buf, const void *v, size_t len);
|
serverloop.c | 682 (r = sshbuf_put_string(sigbuf, 687 (r = sshbuf_put_string(resp, sig, slen)) != 0) {
|
ssh-rsa.c | 140 (ret = sshbuf_put_string(b, sig, slen)) != 0)
|
sshkey.c | 791 (ret = sshbuf_put_string(b, [all...] |
packet.c | [all...] |
sshconnect2.c | [all...] |
ssh-agent.c | 279 if ((r = sshbuf_put_string(msg, blob, blen)) != 0) 429 (r = sshbuf_put_string(msg, signature, slen)) != 0) [all...] |
monitor.c | 641 (r = sshbuf_put_string(sigbuf, session_id2, 680 if ((r = sshbuf_put_string(m, signature, siglen)) != 0) [all...] |
/external/openssh/regress/unittests/sshbuf/ |
test_sshbuf_getput_basic.c | 379 TEST_START("sshbuf_put_string"); 382 ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); 389 TEST_START("sshbuf_put_string limited"); 393 r = sshbuf_put_string(p1, x, sizeof(x)); 399 TEST_START("sshbuf_put_string giant"); 402 r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc);
|
test_sshbuf_getput_crypto.c | 384 ASSERT_INT_EQ(sshbuf_put_string(p1, expec256, sizeof(expec256)), 0);
|
/external/openssh/openbsd-compat/ |
port-tun.c | 247 if ((r = sshbuf_put_string(&c->input, ptr, len)) != 0)
|
/external/openssh/regress/unittests/sshkey/ |
test_sshkey.c | 100 ASSERT_INT_EQ(sshbuf_put_string(b, NULL, 0), 0); /* reserved */ 104 ASSERT_INT_EQ(sshbuf_put_string(b, sigblob, siglen), 0); /* signature */
|