/freebsd-10-stable/crypto/openssh/ |
H A D | cipher-chachapoly.h | 35 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
|
H A D | cipher.c | 389 * Use 'authlen' bytes at offset 'len'+'aadlen' as the authentication tag. 391 * Both 'aadlen' and 'authlen' can be set to 0. 395 const u_char *src, u_int len, u_int aadlen, u_int authlen) 399 len, aadlen, authlen, cc->encrypt); 415 if (authlen) { 418 if (authlen != cipher_authlen(cc->cipher)) 427 authlen, (u_char *)src + aadlen + len)) 431 if (authlen && 441 if (authlen) { 448 authlen, des 394 cipher_crypt(struct sshcipher_ctx *cc, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen) argument [all...] |
H A D | cipher-chachapoly.c | 52 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) 51 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) argument
|
H A D | packet.c | 1184 u_int authlen = 0, aadlen = 0; local 1196 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1200 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1293 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0) 1297 len - aadlen, aadlen, authlen)) != 0) 1713 u_int maclen, aadlen = 0, authlen = 0, block_size; local 1729 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1734 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1795 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1796 " aadlen %d", block_size, need, maclen, authlen, aadle [all...] |
H A D | kex.c | 755 u_int mode, ctos, need, dh_need, authlen; local 814 authlen = cipher_authlen(newkeys->enc.cipher); 816 if (authlen == 0 && 832 authlen == 0 ? newkeys->mac.name : "<implicit>",
|
H A D | sshkey.c | 3029 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; local 3064 authlen = cipher_authlen(cipher); 3123 sshbuf_len(encrypted) + authlen, &cp)) != 0) 3126 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) 3183 size_t i, keylen = 0, ivlen = 0, authlen = 0, slen = 0; local 3293 authlen = cipher_authlen(cipher); 3310 if (sshbuf_len(decoded) < encrypted_len + authlen) { 3321 encrypted_len, 0, authlen)) != 0) { 3327 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0)
|
/freebsd-10-stable/lib/libstand/ |
H A D | rpc.c | 66 u_int32_t authlen; /* auth length */ member in struct:auth_info 146 auth->authlen = 0; 155 auth->authlen = htonl(sizeof(struct auth_unix)); 161 auth->authlen = 0; 204 x = ntohl(auth->authlen);
|
/freebsd-10-stable/contrib/tcpdump/ |
H A D | print-esp.c | 80 int authlen; member in struct:sa_list 119 end = end - sa->authlen; 222 int authlen = 0; local 238 authlen = 12; 250 sa->authlen = 0; 256 sa->authlen = authlen; 300 sa->authlen = 12; 654 ep = ep - sa->authlen;
|
H A D | print-zephyr.c | 47 int authlen; member in struct:z_packet 174 PARSE_FIELD_INT(z.authlen);
|
/freebsd-10-stable/sys/nfs/ |
H A D | krpc_subr.c | 81 u_int32_t authlen; /* auth length */ member in struct:auth_info 293 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); 296 call->rpc_verf.authlen = 0; 415 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
|
/freebsd-10-stable/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 605 int authlen; /* offset of MAC field */ local 777 authlen = LEN_PKT_NOMAC; 778 has_mac = rbufp->recv_length - authlen; 796 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); 800 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]); 804 || (int)len + authlen > rbufp->recv_length) { 817 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; 837 authlen += len; 973 authlen, 982 skeyid, authlen 3941 size_t sendlen, authlen; local [all...] |
H A D | ntp_crypto.c | 438 int authlen; /* offset of MAC field */ local 462 authlen = LEN_PKT_NOMAC; 464 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) { 469 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; 477 peer->crypto, authlen, len, code >> 16, 1066 authlen += (len + 3) / 4 * 4;
|