/external/openssh/regress/unittests/sshbuf/ |
D | test_sshbuf_misc.c | 66 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x11), 0); in sshbuf_misc_tests() 77 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x11), 0); in sshbuf_misc_tests() 78 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x22), 0); in sshbuf_misc_tests() 89 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x11), 0); in sshbuf_misc_tests() 90 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x22), 0); in sshbuf_misc_tests() 91 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x33), 0); in sshbuf_misc_tests()
|
D | test_sshbuf_getput_crypto.c | 311 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x00), 0); in sshbuf_getput_crypto_tests() 329 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x00), 0); in sshbuf_getput_crypto_tests() 386 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x00), 0); in sshbuf_getput_crypto_tests()
|
D | test_sshbuf_fixed.c | 105 ASSERT_INT_EQ(sshbuf_put_u8(p1, 0x01), 0); in sshbuf_fixed()
|
/external/openssh/ |
D | authfd.c | 189 if ((r = sshbuf_put_u8(msg, type)) != 0 || in ssh_lock_agent() 295 if ((r = sshbuf_put_u8(msg, code1)) != 0) in ssh_fetch_identitylist() 401 if ((r = sshbuf_put_u8(msg, SSH_AGENTC_RSA_CHALLENGE)) != 0 || in ssh_decrypt_challenge() 466 if ((r = sshbuf_put_u8(msg, SSH2_AGENTC_SIGN_REQUEST)) != 0 || in ssh_agent_sign() 535 if ((r = sshbuf_put_u8(m, SSH_AGENT_CONSTRAIN_LIFETIME)) != 0 || in encode_constraints() 540 if ((r = sshbuf_put_u8(m, SSH_AGENT_CONSTRAIN_CONFIRM)) != 0) in encode_constraints() 569 if ((r = sshbuf_put_u8(msg, type)) != 0 || in ssh_add_identity_constrained() 587 if ((r = sshbuf_put_u8(msg, type)) != 0 || in ssh_add_identity_constrained() 625 if ((r = sshbuf_put_u8(msg, in ssh_remove_identity() 636 if ((r = sshbuf_put_u8(msg, in ssh_remove_identity() [all …]
|
D | kexdh.c | 68 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || in kex_dh_hash() 71 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || in kex_dh_hash()
|
D | kexecdh.c | 74 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || in kex_ecdh_hash() 77 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || in kex_ecdh_hash()
|
D | kexgex.c | 71 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || in kexgex_hash() 74 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || in kexgex_hash()
|
D | sftp-client.c | 175 if ((r = sshbuf_put_u8(msg, code)) != 0 || in send_string_request() 193 if ((r = sshbuf_put_u8(msg, code)) != 0 || in send_string_attrs_request() 402 if ((r = sshbuf_put_u8(msg, SSH2_FXP_INIT)) != 0 || in do_init() 501 if ((r = sshbuf_put_u8(msg, SSH2_FXP_CLOSE)) != 0 || in do_close() 536 if ((r = sshbuf_put_u8(msg, SSH2_FXP_OPENDIR)) != 0 || in do_lsreaddir() 561 if ((r = sshbuf_put_u8(msg, SSH2_FXP_READDIR)) != 0 || in do_lsreaddir() 886 if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED)) != 0 || in do_rename() 892 if ((r = sshbuf_put_u8(msg, SSH2_FXP_RENAME)) != 0 || in do_rename() 930 if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED)) != 0 || in do_hardlink() 966 if ((r = sshbuf_put_u8(msg, SSH2_FXP_SYMLINK)) != 0 || in do_symlink() [all …]
|
D | kexc25519.c | 108 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) < 0 || in kex_c25519_hash() 111 (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) < 0 || in kex_c25519_hash()
|
D | auth2-pubkey.c | 358 r = sshbuf_put_u8(arg, c); in assemble_argv() 363 if ((r = sshbuf_put_u8(arg, '\\')) != 0) in assemble_argv() 367 r = sshbuf_put_u8(arg, c); in assemble_argv() 374 if ((i != 0 && (r = sshbuf_put_u8(buf, ' ')) != 0) || in assemble_argv() 375 (ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0) || in assemble_argv() 377 (ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0)) in assemble_argv()
|
D | krl.c | 606 if ((r = sshbuf_put_u8(buf, state)) != 0 || in revoked_certs_generate() 679 if ((r = sshbuf_put_u8(buf, state)) != 0 || in revoked_certs_generate() 693 if ((r = sshbuf_put_u8(buf, KRL_SECTION_CERT_KEY_ID)) != 0 || in revoked_certs_generate() 736 if ((r = sshbuf_put_u8(buf, KRL_SECTION_CERTIFICATES)) != 0 || in ssh_krl_to_blob() 749 if ((r = sshbuf_put_u8(buf, KRL_SECTION_EXPLICIT_KEY)) != 0 || in ssh_krl_to_blob() 760 if ((r = sshbuf_put_u8(buf, in ssh_krl_to_blob() 769 if ((r = sshbuf_put_u8(buf, KRL_SECTION_SIGNATURE)) != 0 || in ssh_krl_to_blob()
|
D | ssh-agent.c | 237 (r = sshbuf_put_u8(e->output, success ? in send_status() 253 if ((r = sshbuf_put_u8(msg, (version == 1) ? in process_request_identities() 355 if ((r = sshbuf_put_u8(msg, SSH_AGENT_RSA_RESPONSE)) != 0 || in process_authentication_challenge1() 363 if ((r = sshbuf_put_u8(msg, SSH_AGENT_FAILURE)) != 0) in process_authentication_challenge1() 428 if ((r = sshbuf_put_u8(msg, SSH2_AGENT_SIGN_RESPONSE)) != 0 || in process_sign_request2() 431 } else if ((r = sshbuf_put_u8(msg, SSH_AGENT_FAILURE)) != 0) in process_sign_request2() 734 if ((r = sshbuf_put_u8(msg, in no_identities()
|
D | sftp-server.c | 522 if ((r = sshbuf_put_u8(msg, SSH2_FXP_STATUS)) != 0 || in send_status() 543 if ((r = sshbuf_put_u8(msg, type)) != 0 || in send_data_or_handle() 578 if ((r = sshbuf_put_u8(msg, SSH2_FXP_NAME)) != 0 || in send_names() 602 if ((r = sshbuf_put_u8(msg, SSH2_FXP_ATTRS)) != 0 || in send_attrib() 622 if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED_REPLY)) != 0 || in send_statvfs() 653 if ((r = sshbuf_put_u8(msg, SSH2_FXP_VERSION)) != 0 || in process_init()
|
D | bufaux.c | 247 if ((ret = sshbuf_put_u8(buffer, value)) != 0) in buffer_put_char()
|
D | sshbuf.h | 186 int sshbuf_put_u8(struct sshbuf *buf, u_char val);
|
D | sshbuf-getput-basic.c | 336 sshbuf_put_u8(struct sshbuf *buf, u_char val) in sshbuf_put_u8() function
|
D | sshkey.c | 3127 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) in sshkey_private_to_blob2() 3153 if ((r = sshbuf_put_u8(blob, b64[i])) != 0) in sshkey_private_to_blob2() 3156 if (i % 70 == 69 && (r = sshbuf_put_u8(blob, '\n')) != 0) in sshkey_private_to_blob2() 3159 if (i % 70 != 69 && (r = sshbuf_put_u8(blob, '\n')) != 0) in sshkey_private_to_blob2() 3231 if ((r = sshbuf_put_u8(encoded, *cp)) != 0) in sshkey_parse_private2() 3241 if ((r = sshbuf_put_u8(encoded, 0)) != 0) in sshkey_parse_private2() 3473 if ((r = sshbuf_put_u8(encrypted, cipher_num)) != 0 || in sshkey_private_rsa1_to_blob()
|
D | kex.c | 257 if ((r = sshbuf_put_u8(b, 0)) != 0) in kex_prop2buf() 264 if ((r = sshbuf_put_u8(b, 0)) != 0 || /* first_kex_packet_follows */ in kex_prop2buf()
|
D | clientloop.c | 1914 if ((r = sshbuf_put_u8(b, 0)) != 0 || /* padlen */ in client_request_forwarded_tcpip() 1915 (r = sshbuf_put_u8(b, SSH2_MSG_CHANNEL_OPEN)) != 0 || in client_request_forwarded_tcpip()
|
D | sshconnect2.c | 1815 (r = sshbuf_put_u8(b, SSH2_MSG_USERAUTH_REQUEST)) != 0 || in userauth_hostbased()
|
D | channels.c | 2673 if ((r = sshbuf_put_u8(b, 0)) != 0 || /* padlen */ 2674 (r = sshbuf_put_u8(b, type)) != 0 ||
|
D | packet.c | 2823 return sshbuf_put_u8(ssh->state->outgoing_packet, val); in sshpkt_put_u8()
|
/external/openssh/regress/unittests/sshkey/ |
D | common.c | 69 ASSERT_INT_EQ(sshbuf_put_u8(ret, 0), 0); in load_text_file()
|