/freebsd-12-stable/crypto/openssh/ |
H A D | cipher-chachapoly.h | 34 int chachapoly_crypt(struct chachapoly_ctx *cpctx, u_int seqnr, 38 u_int *plenp, u_int seqnr, const u_char *cp, u_int len)
|
H A D | cipher-chachapoly.c | 52 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, argument 65 POKE_U64(seqbuf, seqnr); 108 u_int *plenp, u_int seqnr, const u_char *cp, u_int len) 114 POKE_U64(seqbuf, seqnr); 107 chachapoly_get_length(struct chachapoly_ctx *ctx, u_int *plenp, u_int seqnr, const u_char *cp, u_int len) argument
|
H A D | dispatch.c | 92 u_int32_t seqnr; local 96 r = ssh_packet_read_seqnr(ssh, &type, &seqnr); 100 r = ssh_packet_read_poll_seqnr(ssh, &type, &seqnr); 113 r = (*ssh->dispatch[type])(type, seqnr, ssh);
|
H A D | opacket.c | 234 packet_read_seqnr(u_int32_t *seqnr) argument 239 if ((r = ssh_packet_read_seqnr(active_state, &type, seqnr)) != 0) 245 packet_read_poll_seqnr(u_int32_t *seqnr) argument 250 if ((r = ssh_packet_read_poll_seqnr(active_state, &type, seqnr)))
|
H A D | cipher.c | 335 cipher_crypt(struct sshcipher_ctx *cc, u_int seqnr, u_char *dest, argument 339 return chachapoly_crypt(&cc->cp_ctx, seqnr, dest, src, 398 cipher_get_length(struct sshcipher_ctx *cc, u_int *plenp, u_int seqnr, argument 402 return chachapoly_get_length(&cc->cp_ctx, plenp, seqnr,
|
H A D | packet.c | 107 u_int32_t seqnr; member in struct:packet_state 386 state->p_read.seqnr, 868 /* note that both bytes and the seqnr are not reset */ 1133 /* compute MAC over seqnr and packet(length fields, payload, padding) */ 1135 if ((r = mac_compute(mac, state->p_send.seqnr, 1139 DBG(debug("done calc MAC out #%d", state->p_send.seqnr)); 1145 if ((r = cipher_crypt(state->send_context, state->p_send.seqnr, cp, 1153 if ((r = mac_compute(mac, state->p_send.seqnr, 1157 state->p_send.seqnr)); 1167 if (++state->p_send.seqnr 1681 u_int reason, seqnr; local [all...] |
H A D | ssh_api.c | 231 u_int32_t seqnr; local 254 if ((r = ssh_packet_read_poll2(ssh, &type, &seqnr)) != 0) 259 if ((r = (*ssh->dispatch[type])(type, seqnr, ssh)) != 0)
|
H A D | sshconnect2.c | 453 input_userauth_ext_info(int type, u_int32_t seqnr, struct ssh *ssh) argument 455 return kex_input_ext_info(type, seqnr, ssh); 1000 input_userauth_passwd_changereq(int type, u_int32_t seqnr, struct ssh *ssh) argument
|
/freebsd-12-stable/sys/kern/ |
H A D | kern_dump.c | 169 dumpsys_cb_dumpdata(struct dump_pa *mdp, int seqnr, void *arg) argument 188 printf(" chunk %d: %juMB (%ju pages)", seqnr, (uintmax_t)PG2MB(pgs), 228 int error, seqnr; local 230 seqnr = 0; 233 error = (*cb)(mdp, seqnr++, arg); 238 return (seqnr); 245 cb_dumphdr(struct dump_pa *mdp, int seqnr, void *arg) argument 274 cb_size(struct dump_pa *mdp, int seqnr, void *arg) argument
|
/freebsd-12-stable/contrib/gcc/ |
H A D | gensupport.c | 1083 read_md_rtx (int *lineno, int *seqnr) 1107 *seqnr = sequence_num; 1126 /* *seqnr is used here so the name table will match caller's 1128 record_insn_name (*seqnr, XSTR (desc, 0)); 1078 read_md_rtx(int *lineno, int *seqnr) argument
|