sshbuf_consume
if ((r = sshbuf_consume(input, len)) != 0)
if ((r = sshbuf_consume(input, len)) != 0)
if ((r = sshbuf_consume(input, nmethods + 2)) != 0)
if ((r = sshbuf_consume(input, sizeof(s5_req))) != 0)
if ((r = sshbuf_consume(input, 1)) != 0)
if ((r = sshbuf_consume(c->output, have)) != 0)
if ((r = sshbuf_consume(c->input, len)) != 0)
if ((r = sshbuf_consume(c->output, len)) != 0)
if ((r = sshbuf_consume(c->extended, len)) != 0)
if ((r = sshbuf_consume(c->output, len)) != 0)
if ((r = sshbuf_consume(c->input, len)) != 0)
if ((r = sshbuf_consume(c->extended, len)) != 0)
if ((r = sshbuf_consume(b, KEX_COOKIE_LEN)) != 0) { /* skip cookie */
if ((r = sshbuf_consume(copy, sizeof(KRL_MAGIC) - 1)) != 0 ||
if ((r = sshbuf_consume(b, session_id2_len)) != 0)
if ((r = sshbuf_consume(state->outgoing_packet, 5)) != 0)
(r = sshbuf_consume(state->input, need)) != 0 ||
if ((r = sshbuf_consume(state->input, block_size)) != 0)
if ((r = sshbuf_consume(state->input, aadlen + need + authlen)) != 0)
if ((r = sshbuf_consume(state->input, mac->mac_len)) != 0)
if ((r = sshbuf_consume(state->incoming_packet, 4 + 1)) != 0 ||
if ((r = sshbuf_consume(state->output, len)) != 0)
ASSERT_INT_EQ(sshbuf_consume(p1, 0), 0);
r = sshbuf_consume(p1, 64);
ASSERT_INT_EQ(sshbuf_consume(p1, 1), 0);
ASSERT_INT_EQ(sshbuf_consume(p1, 2), 0);
r = sshbuf_consume(p1, 2);
ASSERT_INT_EQ(sshbuf_consume(p1, 1), 0);
r = sshbuf_consume(p1, 1);
ASSERT_INT_EQ(sshbuf_consume(p1, 223), 0);
ASSERT_INT_EQ(sshbuf_consume(p1, 0), 0);
ASSERT_INT_EQ(sshbuf_consume(p1, 1), SSH_ERR_MESSAGE_INCOMPLETE);
sshbuf_consume : sshbuf_consume_end)(p1, r);
if ((r = sshbuf_consume(iqueue, 4)) != 0)
(r = sshbuf_consume(iqueue, msg_len - consumed)) != 0)
} else if ((r = sshbuf_consume(oqueue, len)) != 0)
if ((r = sshbuf_consume(sockets[socknum].output, len)) != 0)
(r = sshbuf_consume(b, 6)) != 0 ||
if ((r = sshbuf_consume(b, bytes)) != 0)
if ((r = sshbuf_consume(m, mlen)) != 0)
if ((r = sshbuf_consume(iqueue, 4)) != 0 ||
if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0)
} else if ((r = sshbuf_consume(oqueue, len)) != 0)
return sshbuf_consume(ssh_packet_get_output(ssh), len);
if ((r = sshbuf_consume(input, j)) != 0)
if (sshbuf_consume(buf, len + 4) != 0) {
if ((r = sshbuf_consume(buf, len)) < 0)
if ((r = sshbuf_consume(buf, 8)) < 0)
if ((r = sshbuf_consume(buf, len + 4)) != 0 || /* Shouldn't happen */
if (sshbuf_consume(buf, olen + 4) != 0) {
if ((r = sshbuf_consume(buf, 4)) < 0)
if ((r = sshbuf_consume(buf, 2)) < 0)
if ((r = sshbuf_consume(buf, 1)) < 0)
int sshbuf_consume(struct sshbuf *buf, size_t len);
if ((r = sshbuf_consume(b, skip + 1)) != 0)
if ((r = sshbuf_consume(buf, ret)) != 0)
if ((r = sshbuf_consume(encoded, sizeof(XMSS_MAGIC))) != 0 ||
if ((r = sshbuf_consume(encoded, encrypted_len + authlen)) != 0)
if ((r = sshbuf_consume(decrypted, aadlen)) != 0)
if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 ||
if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0)
if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 ||
if ((r = sshbuf_consume(sbuf, sizeof(BEGIN_SIGNATURE)-1)) != 0) {
if ((r = sshbuf_consume(sbuf, eoffset)) != 0) {
(r = sshbuf_consume(buf, (sizeof(MAGIC_PREAMBLE)-1))) != 0 ||