sshbuf_putb
if ((r = sshbuf_putb(b, ssh->kex->session_id)) != 0)
(r = sshbuf_putb(modified, original)) != 0) {
(r = sshbuf_putb(modified, original)) != 0) {
(r = sshbuf_putb(b, client_kexinit)) != 0 ||
(r = sshbuf_putb(b, server_kexinit)) != 0 ||
(r = sshbuf_putb(b, shared_secret)) != 0) {
(r = sshbuf_putb(b, client_kexinit)) != 0 ||
(r = sshbuf_putb(b, server_kexinit)) != 0 ||
(r = sshbuf_putb(buf, arg)) != 0 ||
(r = sshbuf_putb(state->outgoing_packet,
if ((r = sshbuf_putb(state->incoming_packet,
return sshbuf_putb(ssh->state->outgoing_packet, b);
if ((r = sshbuf_putb(state->output,
ASSERT_INT_EQ(sshbuf_putb(p2, p1), 0);
ASSERT_INT_EQ(sshbuf_putb(b, pk), 0); /* public key serialisation */
if ((r = sshbuf_putb(e->session_ids[i].sid, sid)) != 0)
(r = sshbuf_putb(msg, keys)) != 0)
(ret = sshbuf_putb(original_signed, webauthn_exts)) != 0 ||
(r = sshbuf_putb(req, msg)) != 0) {
if (attest != NULL && (r = sshbuf_putb(attest, abuf)) != 0) {
if ((r = sshbuf_putb(ssh_packet_get_output(ssh), banner)) != 0)
r = sshbuf_putb(b64, b);
int sshbuf_putb(struct sshbuf *buf, const struct sshbuf *v);
if ((r = sshbuf_putb(b, ssh->kex->session_id)) != 0)
if ((r = sshbuf_putb(padded, b)) != 0)
if ((r = sshbuf_putb(encoded, padded)) != 0)
if ((r = sshbuf_putb(to->certblob, from->certblob)) != 0 ||
(r = sshbuf_putb(to->critical, from->critical)) != 0 ||
(r = sshbuf_putb(to->extensions, from->extensions)) != 0)
if ((ret = sshbuf_putb(key->cert->certblob, certbuf)) != 0)
if ((ret = sshbuf_putb(key->cert->critical, crit)) != 0 ||
(ret = sshbuf_putb(key->cert->extensions, exts)) != 0))
r = sshbuf_putb(buf, b);
r = sshbuf_putb(buf, blob);
if ((ret = sshbuf_putb(b, key->cert->certblob)) != 0)