Home
last modified time | relevance | path

Searched refs:data (Results 1 – 25 of 76) sorted by relevance

1234

/openssh-portable/openbsd-compat/
H A Dblowfish.c547 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3]; in blf_ecb_encrypt()
548 r = data[4] << 24 | data[5] << 16 | data[6] << 8 | data[7]; in blf_ecb_encrypt()
569 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3]; in blf_ecb_decrypt()
570 r = data[4] << 24 | data[5] << 16 | data[6] << 8 | data[7]; in blf_ecb_decrypt()
593 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3]; in blf_cbc_encrypt()
594 r = data[4] << 24 | data[5] << 16 | data[6] << 8 | data[7]; in blf_cbc_encrypt()
617 data = data + len - 8; in blf_cbc_decrypt()
619 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3]; in blf_cbc_decrypt()
620 r = data[4] << 24 | data[5] << 16 | data[6] << 8 | data[7]; in blf_cbc_decrypt()
635 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3]; in blf_cbc_decrypt()
[all …]
H A Dsha2.c369 data += 4; \
465 BE_8_TO_32(W256[j], data); in SHA256Transform()
466 data += 4; in SHA256Transform()
541 data += freespace; in SHA256Update()
557 data += SHA256_BLOCK_LENGTH; in SHA256Update()
649 data += 8; \
746 BE_8_TO_64(W512[j], data); in SHA512Transform()
747 data += 8; in SHA512Transform()
822 data += freespace; in SHA512Update()
838 data += SHA512_BLOCK_LENGTH; in SHA512Update()
[all …]
H A Dport-net.c354 u_char **data, size_t *dlen) in sys_tun_outfilter() argument
361 if ((r = sshbuf_get_string(c->output, data, dlen)) != 0) in sys_tun_outfilter()
365 buf = *data; in sys_tun_outfilter()
370 buf = *data + sizeof(af); in sys_tun_outfilter()
/openssh-portable/regress/misc/fuzz-harness/
H A Dsig_fuzz.cc36 static const char *data = "If everyone started announcing his nose had " in LLVMFuzzerTestOneInput() local
38 static const size_t dlen = strlen(data); in LLVMFuzzerTestOneInput()
41 sshkey_verify(rsa, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); in LLVMFuzzerTestOneInput()
44 sshkey_verify(dsa, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); in LLVMFuzzerTestOneInput()
47 sshkey_verify(ecdsa256, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); in LLVMFuzzerTestOneInput()
50 sshkey_verify(ecdsa384, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); in LLVMFuzzerTestOneInput()
53 sshkey_verify(ecdsa521, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); in LLVMFuzzerTestOneInput()
57 sshkey_verify(ed25519, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); in LLVMFuzzerTestOneInput()
H A Dsshsig_fuzz.cc20 static const char *data = "If everyone started announcing his nose had " in LLVMFuzzerTestOneInput() local
23 struct sshbuf *message = sshbuf_from(data, strlen(data)); in LLVMFuzzerTestOneInput()
H A Dpubkey_fuzz.cc9 int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) in LLVMFuzzerTestOneInput() argument
12 int r = sshkey_from_blob(data, size, &k); in LLVMFuzzerTestOneInput()
H A Dprivkey_fuzz.cc10 int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) in LLVMFuzzerTestOneInput() argument
13 struct sshbuf *b = sshbuf_from(data, size); in LLVMFuzzerTestOneInput()
H A Dsshsigopt_fuzz.cc11 int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) in LLVMFuzzerTestOneInput() argument
18 memcpy(cp, data, size); in LLVMFuzzerTestOneInput()
H A Dauthopt_fuzz.cc11 int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) in LLVMFuzzerTestOneInput() argument
18 memcpy(cp, data, size); in LLVMFuzzerTestOneInput()
/openssh-portable/regress/unittests/sshsig/
H A Dmktestdata.sh19 rm -f signed-data namespace
23 printf "This is a test, this is only a test" > signed-data
35 ssh-keygen -Y sign -f rsa -n $NAMESPACE - < signed-data > rsa.sig
36 ssh-keygen -Y sign -f dsa -n $NAMESPACE - < signed-data > dsa.sig
37 ssh-keygen -Y sign -f ecdsa -n $NAMESPACE - < signed-data > ecdsa.sig
38 ssh-keygen -Y sign -f ed25519 -n $NAMESPACE - < signed-data > ed25519.sig
40 -Y sign -f ecdsa_sk -n $NAMESPACE - < signed-data > ecdsa_sk.sig
42 -Y sign -f ed25519_sk -n $NAMESPACE - < signed-data > ed25519_sk.sig
/openssh-portable/
H A Dsshkey.h285 u_char **sigp, size_t *lenp, const u_char *data, size_t datalen,
291 const u_char *data, size_t datalen, u_int compat);
294 const u_char *data, size_t datalen, u_int compat);
296 const u_char *data, size_t datalen, u_int compat);
299 const u_char *data, size_t datalen, u_int compat);
302 const u_char *data, size_t datalen, u_int compat,
305 const u_char *data, size_t datalen, u_int compat);
308 const u_char *data, size_t datalen, u_int compat);
311 const u_char *data, size_t datalen, u_int compat,
314 const u_char *data, size_t datalen, u_int compat);
[all …]
H A Dssh-keysign.c66 u_char *data, size_t datalen) in valid_request() argument
80 if ((b = sshbuf_from(data, datalen)) == NULL) in valid_request()
172 u_char *signature, *data, rver; in main() local
259 if ((r = sshbuf_get_string(b, &data, &dlen)) != 0) in main()
261 if (valid_request(pw, host, &key, data, dlen) < 0) in main()
281 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, in main()
284 free(data); in main()
H A Dmac.c165 const u_char *data, int datalen, in mac_compute() argument
184 ssh_hmac_update(mac->hmac_ctx, data, datalen) < 0 || in mac_compute()
190 umac_update(mac->umac_ctx, data, datalen); in mac_compute()
195 umac128_update(mac->umac_ctx, data, datalen); in mac_compute()
211 const u_char *data, size_t dlen, in mac_check() argument
219 if ((r = mac_compute(mac, seqno, data, dlen, in mac_check()
H A Dssh-ed25519.c37 const u_char *data, size_t datalen, u_int compat) in ssh_ed25519_sign() argument
59 if ((ret = crypto_sign_ed25519(sig, &smlen, data, datalen, in ssh_ed25519_sign()
95 const u_char *data, size_t datalen, u_int compat) in ssh_ed25519_verify() argument
140 memcpy(sm+len, data, datalen); in ssh_ed25519_verify()
H A Dssh-ecdsa-sk.c57 const u_char *data, size_t datalen, u_int compat, in ssh_ecdsa_sk_verify() argument
77 webauthn_check_prepare_hash(const u_char *data, size_t datalen, in webauthn_check_prepare_hash() argument
86 (chall = sshbuf_from(data, datalen)) == NULL) { in webauthn_check_prepare_hash()
144 const u_char *data, size_t datalen, u_int compat, in ssh_ecdsa_sk_verify() argument
250 if ((ret = webauthn_check_prepare_hash(data, datalen, in ssh_ecdsa_sk_verify()
254 } else if ((ret = ssh_digest_memory(SSH_DIGEST_SHA256, data, datalen, in ssh_ecdsa_sk_verify()
H A Dssh-ecdsa.c51 const u_char *data, size_t datalen, u_int compat) in ssh_ecdsa_sign() argument
73 if ((ret = ssh_digest_memory(hash_alg, data, datalen, in ssh_ecdsa_sign()
116 const u_char *data, size_t datalen, u_int compat) in ssh_ecdsa_verify() argument
173 if ((ret = ssh_digest_memory(hash_alg, data, datalen, in ssh_ecdsa_verify()
H A Dssh-xmss.c40 const u_char *data, size_t datalen, u_int compat) in ssh_xmss_sign() argument
68 data, datalen, sshkey_xmss_params(key))) != 0 || smlen <= datalen) { in ssh_xmss_sign()
115 const u_char *data, size_t datalen, u_int compat) in ssh_xmss_verify() argument
164 memcpy(sm+len, data, datalen); in ssh_xmss_verify()
H A Dssh_api.h103 int ssh_packet_put(struct ssh *ssh, int type, const u_char *data,
115 int ssh_input_append(struct ssh *ssh, const u_char *data, size_t len);
H A Dumac.c622 memcpy(hc->data+j, buf, i); in nh_update()
637 memcpy(hc->data + j, buf, nbytes); in nh_update()
681 zero_pad(hc->data + hc->next_data_empty, in nh_final()
683 nh_transform(hc, hc->data, nh_len); in nh_final()
687 zero_pad(hc->data, L1_PAD_BOUNDARY); in nh_final()
688 nh_transform(hc, hc->data, nh_len); in nh_final()
818 res += data; in poly64()
819 if (res < data) in poly64()
835 UINT64 *data=(UINT64*)data_in; in poly_hash() local
862 t = t + ipkp[0] * (UINT64)(UINT16)(data >> 48); in ip_aux()
[all …]
H A Dssh-dss.c53 const u_char *data, size_t datalen, u_int compat) in ssh_dss_sign() argument
73 if ((ret = ssh_digest_memory(SSH_DIGEST_SHA1, data, datalen, in ssh_dss_sign()
122 const u_char *data, size_t datalen, u_int compat) in ssh_dss_verify() argument
180 if ((ret = ssh_digest_memory(SSH_DIGEST_SHA1, data, datalen, in ssh_dss_verify()
H A Dssh-pkcs11-helper.c186 u_char *blob, *data, *signature = NULL; in process_sign() local
194 (r = sshbuf_get_string(iqueue, &data, &dlen)) != 0 || in process_sign()
208 ret = RSA_private_encrypt(dlen, data, signature, in process_sign()
220 ret = ECDSA_sign(-1, data, dlen, signature, in process_sign()
245 free(data); in process_sign()
H A Dssh_api.c65 const u_char *data, u_int datalen, const char *alg, in mm_sshkey_sign() argument
232 ssh_input_append(struct ssh *ssh, const u_char *data, size_t len) in ssh_input_append() argument
234 return sshbuf_put(ssh_packet_get_input(ssh), data, len); in ssh_input_append()
285 ssh_packet_put(struct ssh *ssh, int type, const u_char *data, size_t len) in ssh_packet_put() argument
290 (r = sshpkt_put(ssh, data, len)) != 0 || in ssh_packet_put()
566 const u_char *data, size_t dlen, const char *alg) in _ssh_host_key_sign() argument
568 return sshkey_sign(privkey, signature, slen, data, dlen, in _ssh_host_key_sign()
H A Dgss-genr.c64 ssh_gssapi_check_oid(Gssctxt *ctx, void *data, size_t len) in ssh_gssapi_check_oid() argument
68 memcmp(ctx->oid->elements, data, len) == 0); in ssh_gssapi_check_oid()
73 ssh_gssapi_set_oid_data(Gssctxt *ctx, void *data, size_t len) in ssh_gssapi_set_oid_data() argument
82 memcpy(ctx->oid->elements, data, len); in ssh_gssapi_set_oid_data()
H A Dttymodes.c347 const u_char *data; in ssh_tty_parse_modes() local
353 if ((r = sshpkt_get_string_direct(ssh, &data, &len)) != 0) in ssh_tty_parse_modes()
357 if ((buf = sshbuf_from(data, len)) == NULL) { in ssh_tty_parse_modes()
/openssh-portable/regress/
H A Dkey-options.sh33 rm -f $OBJ/data
41 r=`cat $OBJ/data`
51 rm -f $OBJ/data
57 r=`cat $OBJ/data`

1234