/freebsd-10.0-release/crypto/openssh/ |
H A D | cipher.c | 334 * Use 'authlen' bytes at offset 'len'+'aadlen' as the authentication tag. 336 * Both 'aadlen' and 'authlen' can be set to 0. 340 u_int len, u_int aadlen, u_int authlen) 342 if (authlen) { 345 if (authlen != cipher_authlen(cc->cipher)) 346 fatal("%s: authlen mismatch %d", __func__, authlen); 354 authlen, (u_char *)src + aadlen + len)) 358 if (authlen && 368 if (authlen) { 339 cipher_crypt(CipherContext *cc, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen) argument [all...] |
H A D | packet.c | 858 u_int i, len, authlen = 0, aadlen = 0; local 870 if ((authlen = cipher_authlen(enc->cipher)) != 0) 874 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 951 cp = buffer_append_space(&active_state->output, len + authlen); 954 len - aadlen, aadlen, authlen); 1264 u_int maclen, authlen = 0, aadlen = 0, block_size; local 1277 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1282 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1336 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1337 " aadlen %d", block_size, need, maclen, authlen, aadle [all...] |
H A D | kex.c | 457 u_int mode, ctos, need, authlen; local 499 authlen = cipher_authlen(newkeys->enc.cipher); 500 if (authlen == 0) 517 authlen == 0 ? newkeys->mac.name : "<implicit>",
|
/freebsd-10.0-release/lib/libstand/ |
H A D | rpc.c | 66 u_int32_t authlen; /* auth length */ member in struct:auth_info 146 auth->authlen = 0; 155 auth->authlen = htonl(sizeof(struct auth_unix)); 161 auth->authlen = 0; 204 x = ntohl(auth->authlen);
|
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | print-esp.c | 80 int authlen; member in struct:sa_list 119 end = end - sa->authlen; 222 int authlen = 0; local 238 authlen = 12; 250 sa->authlen = 0; 256 sa->authlen = authlen; 300 sa->authlen = 12; 654 ep = ep - sa->authlen;
|
H A D | print-zephyr.c | 47 int authlen; member in struct:z_packet 174 PARSE_FIELD_INT(z.authlen);
|
/freebsd-10.0-release/sys/nfs/ |
H A D | krpc_subr.c | 81 u_int32_t authlen; /* auth length */ member in struct:auth_info 293 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); 296 call->rpc_verf.authlen = 0; 415 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
|
/freebsd-10.0-release/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 337 int authlen; /* offset of MAC field */ local 457 authlen = LEN_PKT_NOMAC; 458 has_mac = rbufp->recv_length - authlen; 468 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); 472 temp = ntohl(((u_int32 *)pkt)[authlen / 4]) & 479 authlen += temp; 556 skeyid, authlen, has_mac, is_authentic); 626 if (authlen > LEN_PKT_NOMAC && pkeyid != 0) { 648 if (!authdecrypt(skeyid, (u_int32 *)pkt, authlen, 666 skeyid, authlen, has_ma 2377 int sendlen, authlen; local 2816 int sendlen, authlen; local [all...] |
H A D | ntp_crypto.c | 383 int authlen; /* offset of MAC field */ local 408 authlen = LEN_PKT_NOMAC; 410 while ((has_mac = rbufp->recv_length - authlen) > MAX_MAC_LEN) { 411 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; 421 peer->crypto, authlen, len, code >> 16, 1159 authlen += len;
|