/freebsd-9.3-release/crypto/openssh/ |
H A D | cipher-chachapoly.h | 35 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
|
H A D | cipher.c | 357 * Use 'authlen' bytes at offset 'len'+'aadlen' as the authentication tag. 359 * Both 'aadlen' and 'authlen' can be set to 0. 365 u_int len, u_int aadlen, u_int authlen) 369 aadlen, authlen, cc->encrypt); 370 if (authlen) { 373 if (authlen != cipher_authlen(cc->cipher)) 374 fatal("%s: authlen mismatch %d", __func__, authlen); 382 authlen, (u_char *)src + aadlen + len)) 386 if (authlen 364 cipher_crypt(CipherContext *cc, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen) argument [all...] |
H A D | cipher-chachapoly.c | 50 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) 49 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) argument
|
H A D | packet.c | 861 u_int i, len, authlen = 0, aadlen = 0; local 873 if ((authlen = cipher_authlen(enc->cipher)) != 0) 877 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 954 cp = buffer_append_space(&active_state->output, len + authlen); 957 len - aadlen, aadlen, authlen) != 0) 1269 u_int maclen, authlen = 0, aadlen = 0, block_size; local 1282 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1287 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1345 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1346 " aadlen %d", block_size, need, maclen, authlen, aadle [all...] |
H A D | kex.c | 468 u_int mode, ctos, need, dh_need, authlen; local 510 authlen = cipher_authlen(newkeys->enc.cipher); 511 if (authlen == 0) 528 authlen == 0 ? newkeys->mac.name : "<implicit>",
|
H A D | authfile.c | 99 size_t keylen, ivlen, blocksize, authlen; local 123 authlen = cipher_authlen(c); 172 cp = buffer_append_space(&encoded, buffer_len(&b) + authlen); 174 authlen) != 0) 210 size_t authlen; local 324 authlen = cipher_authlen(c); 356 ret = cipher_crypt(&ctx, 0, cp, buffer_ptr(©), len, 0, authlen);
|
/freebsd-9.3-release/lib/libstand/ |
H A D | rpc.c | 66 u_int32_t authlen; /* auth length */ member in struct:auth_info 146 auth->authlen = 0; 155 auth->authlen = htonl(sizeof(struct auth_unix)); 161 auth->authlen = 0; 204 x = ntohl(auth->authlen);
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-esp.c | 80 int authlen; member in struct:sa_list 119 end = end - sa->authlen; 222 int authlen = 0; local 238 authlen = 12; 250 sa->authlen = 0; 256 sa->authlen = authlen; 300 sa->authlen = 12; 654 ep = ep - sa->authlen;
|
H A D | print-zephyr.c | 47 int authlen; member in struct:z_packet 174 PARSE_FIELD_INT(z.authlen);
|
/freebsd-9.3-release/sys/nfs/ |
H A D | krpc_subr.c | 81 u_int32_t authlen; /* auth length */ member in struct:auth_info 293 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); 296 call->rpc_verf.authlen = 0; 415 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
|
/freebsd-9.3-release/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 591 int authlen; /* offset of MAC field */ local 721 authlen = LEN_PKT_NOMAC; 722 has_mac = rbufp->recv_length - authlen; 735 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); 739 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]); 743 || (int)len + authlen > rbufp->recv_length) { 755 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; 773 authlen += len; 892 authlen, 901 skeyid, authlen 3658 size_t sendlen, authlen; local [all...] |
H A D | ntp_crypto.c | 428 int authlen; /* offset of MAC field */ local 452 authlen = LEN_PKT_NOMAC; 454 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) { 459 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; 467 peer->crypto, authlen, len, code >> 16, 1056 authlen += (len + 3) / 4 * 4;
|