/external/dropbear/ |
bignum.c | 73 sha1_process(hs, buf_getptr(buf, i), i);
|
packet.c | 64 written = write(ses.sock, buf_getptr(writebuf, len), len); 123 len = read(ses.sock, buf_getptr(ses.readbuf, maxlen), maxlen); 198 buf_getptr(ses.readbuf, blocksize), 202 if (cbc_decrypt(buf_getptr(ses.readbuf, blocksize), 252 buf_getptr(ses.readbuf, len), len); 256 if (cbc_decrypt(buf_getptr(ses.readbuf, blocksize), 300 memcpy(ses.payload->data, buf_getptr(ses.decryptreadbuf, len), len); 345 if (hmac_process(&hmac, buf_getptr(sourcebuf, len), len) != CRYPT_OK) { 355 if (memcmp(tempbuf, buf_getptr(macbuf, macsize), macsize) != 0) { 374 zstream->next_in = buf_getptr(buf, len) [all...] |
buffer.c | 185 unsigned char* buf_getptr(buffer* buf, unsigned int len) { function 188 dropbear_exit("bad buf_getptr"); 193 /* like buf_getptr, but checks against total size, not used length. 219 memcpy(ret, buf_getptr(buf, len), len); 237 LOAD32H(ret, buf_getptr(buf, 4)); 328 if (*buf_getptr(buf, 1) & (1 << (CHAR_BIT-1))) { 332 if (mp_read_unsigned_bin(mp, buf_getptr(buf, len), len) != MP_OKAY) {
|
signkey.c | 215 buf_putstring(buf, buf_getptr(pubkeys, pubkeys->len), 379 buf_putstring(buf, buf_getptr(sigblob, sigblob->len), 452 if (base64_decode(buf_getptr(line, len), len, 462 *fingerprint = sign_key_fingerprint(buf_getptr(decodekey, decodekeylen), 468 || memcmp( buf_getptr(decodekey, decodekey->len), 477 filealgo = buf_getptr(decodekey, filealgolen);
|
buffer.h | 55 unsigned char* buf_getptr(buffer* buf, unsigned int len);
|
cli-kex.c | 80 keyblob = buf_getptr(ses.payload, keybloblen); 247 if (strncmp(cli_opts.remotehost, buf_getptr(line, hostlen), 260 if (strncmp(buf_getptr(line, algolen), algoname, algolen) != 0) { 319 fwrite(buf_getptr(line, line->len), line->len, 1, hostsfile);
|
cli-authpubkey.c | 105 if (memcmp(buf_getptr(keybuf, remotelen), 106 buf_getptr(ses.payload, remotelen), remotelen) != 0) {
|
dropbearkey.c | 313 err = base64_encode(buf_getptr(buf, len), len, base64key, &base64len); 321 fp = sign_key_fingerprint(buf_getptr(buf, len), len); 356 len = write(fd, buf_getptr(buf, buf->len - buf->pos),
|
svr-auth.c | 79 buf_putstring(ses.writepayload, buf_getptr(svr_opts.banner, 316 buf_putstring(ses.writepayload, buf_getptr(typebuf, typebuf->len), 320 buf_getptr(typebuf, typebuf->len)));
|
svr-authpubkey.c | 71 keyblob = buf_getptr(ses.payload, keybloblen); 104 if (buf_verify(ses.payload, key, buf_getptr(signbuf, signbuf->len), 213 if (strncmp(buf_getptr(line, algolen), algo, algolen) != 0) {
|
keyimport.c | 171 len = fwrite(buf_getptr(buf, buf->len - buf->pos), 750 numbers[2].start = buf_getptr(keyblob, numbers[2].bytes); 755 numbers[1].start = buf_getptr(keyblob, numbers[1].bytes); 760 numbers[3].start = buf_getptr(keyblob, numbers[3].bytes); 765 numbers[4].start = buf_getptr(keyblob, numbers[4].bytes); 770 numbers[5].start = buf_getptr(keyblob, numbers[5].bytes); 817 numbers[6].start = buf_getptr(extrablob, numbers[6].bytes); 822 numbers[7].start = buf_getptr(extrablob, numbers[7].bytes); 827 numbers[8].start = buf_getptr(extrablob, numbers[8].bytes); 841 numbers[1].start = buf_getptr(keyblob, numbers[1].bytes) [all...] |
rsa.c | 237 if (mp_read_unsigned_bin(&rsa_s, buf_getptr(buf, buf->len - buf->pos), 419 bytes_to_mp(rsa_em, buf_getptr(rsa_EM, rsa_EM->size),
|
common-kex.c | 564 sha1_process(&hs, buf_getptr(ses.kexhashbuf, ses.kexhashbuf->len),
|
common-channel.c | 705 buf_getptr(ses.payload, buflen), buflen);
|
svr-chansession.c | 811 buf_getptr(motdbuf, len), len);
|