/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | generate_seq_number.c | 39 uint32_t *seqno) 41 if (RAND_bytes((void *)seqno, sizeof(*seqno)) <= 0) 44 *seqno &= 0x3fffffff; 45 if (*seqno == 0) 46 *seqno = 1; 37 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, uint32_t *seqno) argument
|
/freebsd-current/sys/opencrypto/ |
H A D | ktls.h | 56 const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, 59 const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno);
|
H A D | ktls_ocf.c | 57 uint64_t seqno); 62 uint64_t seqno, int *trailer_len); 438 const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, 521 ad.seq = htobe64(seqno); 631 const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, 662 *(uint64_t *)(crp.crp_iv + 4) ^= htobe64(seqno); 671 ad.seq = htobe64(seqno); 729 uint64_t seqno) 861 const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, 884 *(uint64_t *)(crp.crp_iv + 4) ^= htobe64(seqno); 437 ktls_ocf_tls_cbc_decrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, int *trailer_len) argument 630 ktls_ocf_tls12_aead_decrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, int *trailer_len) argument 727 ktls_ocf_tls12_aead_recrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno) argument 860 ktls_ocf_tls13_aead_decrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, int *trailer_len) argument 914 ktls_ocf_tls13_aead_recrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno) argument 1171 ktls_ocf_decrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno, int *trailer_len) argument 1178 ktls_ocf_recrypt(struct ktls_session *tls, const struct tls_record_layer *hdr, struct mbuf *m, uint64_t seqno) argument [all...] |
/freebsd-current/crypto/heimdal/kdc/ |
H A D | rx.h | 65 uint32_t seqno; member in struct:rx_header
|
/freebsd-current/sys/contrib/dev/mediatek/mt76/ |
H A D | agg-rx.c | 84 mt76_rx_aggr_release_frames(tid, frames, status->seqno); 126 u16 seqno; local 135 seqno = IEEE80211_SEQ_TO_SN(le16_to_cpu(bar->start_seq_num)); 142 mt76_rx_aggr_release_frames(tid, frames, seqno); 155 u16 seqno, head, size, idx; local 187 seqno = status->seqno; 189 sn_less = ieee80211_sn_less(seqno, head); 204 if (seqno == head) { 217 if (!ieee80211_sn_less(seqno, hea [all...] |
/freebsd-current/tests/sys/kern/ |
H A D | ktls_test.c | 546 int auth_alg, int minor, uint64_t seqno, struct tls_enable *en) 601 be64enc(en->rec_seq, seqno); 602 debug(tc, "seqno: %ju\n", (uintmax_t)seqno); 738 const struct tls_record_layer *hdr, uint64_t seqno, struct tls_mac_data *ad) 740 ad->seq = htobe64(seqno); 749 const struct tls_record_layer *hdr, uint64_t seqno, 752 ad->seq = htobe64(seqno); 761 uint64_t seqno, struct tls_aead_data_13 *ad) 778 tls_13_nonce(struct tls_enable *en, uint64_t seqno, cha argument 545 build_tls_enable(const atf_tc_t *tc, int cipher_alg, size_t cipher_key_len, int auth_alg, int minor, uint64_t seqno, struct tls_enable *en) argument 737 tls_mte_aad(struct tls_enable *en, size_t len, const struct tls_record_layer *hdr, uint64_t seqno, struct tls_mac_data *ad) argument 748 tls_12_aead_aad(struct tls_enable *en, size_t len, const struct tls_record_layer *hdr, uint64_t seqno, struct tls_aead_data *ad) argument 760 tls_13_aad(struct tls_enable *en, const struct tls_record_layer *hdr, uint64_t seqno, struct tls_aead_data_13 *ad) argument 792 decrypt_tls_aes_cbc_mte(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, const void *src, size_t len, void *dst, size_t avail, uint8_t *record_type) argument 859 decrypt_tls_12_aead(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, const void *src, size_t len, void *dst, uint8_t *record_type) argument 894 decrypt_tls_13_aead(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, const void *src, size_t len, void *dst, uint8_t *record_type) argument 944 decrypt_tls_aead(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, const void *src, size_t len, void *dst, size_t avail, uint8_t *record_type) argument 969 decrypt_tls_record(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, const void *src, size_t len, void *dst, size_t avail, uint8_t *record_type) argument 988 encrypt_tls_aes_cbc_mte(const atf_tc_t *tc, struct tls_enable *en, uint8_t record_type, uint64_t seqno, const void *src, size_t len, void *dst, size_t avail, size_t padding) argument 1050 encrypt_tls_12_aead(const atf_tc_t *tc, struct tls_enable *en, uint8_t record_type, uint64_t seqno, const void *src, size_t len, void *dst) argument 1090 encrypt_tls_13_aead(const atf_tc_t *tc, struct tls_enable *en, uint8_t record_type, uint64_t seqno, const void *src, size_t len, void *dst, size_t padding) argument 1138 encrypt_tls_aead(const atf_tc_t *tc, struct tls_enable *en, uint8_t record_type, uint64_t seqno, const void *src, size_t len, void *dst, size_t avail, size_t padding) argument 1161 encrypt_tls_record(const atf_tc_t *tc, struct tls_enable *en, uint8_t record_type, uint64_t seqno, const void *src, size_t len, void *dst, size_t avail, size_t padding) argument 1174 test_ktls_transmit_app_data(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1325 test_ktls_transmit_control(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, uint8_t type, size_t len) argument 1385 test_ktls_transmit_empty_fragment(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno) argument 1494 test_ktls_receive_app_data(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len, size_t padding) argument 1615 test_ktls_receive_corrupted_record(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len, ssize_t offset) argument 1658 test_ktls_receive_corrupted_iv(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1669 test_ktls_receive_corrupted_data(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1680 test_ktls_receive_corrupted_mac(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1694 test_ktls_receive_corrupted_padding(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1704 test_ktls_receive_truncated_record(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1744 test_ktls_receive_bad_major(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1786 test_ktls_receive_bad_minor(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1828 test_ktls_receive_bad_type(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument 1871 test_ktls_receive_bad_size(const atf_tc_t *tc, struct tls_enable *en, uint64_t seqno, size_t len) argument [all...] |
/freebsd-current/lib/libthr/thread/ |
H A D | thr_spec.c | 72 _thread_keytable[i].seqno++; 125 if (curthread->specific[key].seqno == 126 _thread_keytable[key].seqno) { 193 pthread->specific[key].seqno = _thread_keytable[key].seqno; 212 pthread->specific[key].seqno == _thread_keytable[key].seqno) {
|
/freebsd-current/crypto/openssh/ |
H A D | mac.c | 164 mac_compute(struct sshmac *mac, u_int32_t seqno, argument 180 put_u32(b, seqno); 189 POKE_U64(nonce, seqno); 194 put_u64(nonce, seqno); 210 mac_check(struct sshmac *mac, u_int32_t seqno, argument 219 if ((r = mac_compute(mac, seqno, data, dlen,
|
/freebsd-current/contrib/tcpdump/ |
H A D | print-babel.c | 447 u_short seqno, interval, unicast; local 454 seqno = GET_BE_U_2(message + 4); 458 ND_PRINT("seqno %u ", seqno); 537 u_short interval, seqno, metric; local 553 seqno = GET_BE_U_2(message + 8); 555 ND_PRINT("%s%s%s %s metric %u seqno %u interval %s", 560 metric, seqno, format_interval_update(interval)); 596 ND_PRINT(" seqno-request"); 599 u_short seqno; local 648 u_short interval, seqno, metric; local 725 u_short seqno; local [all...] |
H A D | print-dccp.c | 227 uint64_t seqno; local 231 seqno = GET_BE_U_6(dhx->dccph_seq); 233 seqno = GET_BE_U_3(dh->dccph_seq); 236 return seqno;
|
/freebsd-current/usr.sbin/ppp/ |
H A D | deflate.c | 44 u_short seqno; member in struct:deflate_state 60 state->seqno = 0; 98 *wp++ = state->seqno >> 8; 99 *wp++ = state->seqno & 0377; 100 log_Printf(LogDEBUG, "DeflateOutput: Seq %d\n", state->seqno); 101 state->seqno++; 119 state->seqno--; 148 * If the output packet (including seqno and excluding the EMPTY_BLOCK) 192 state->seqno = 0; 215 if (seq != state->seqno) { [all...] |
/freebsd-current/tools/tools/net80211/w00t/libw00t/ |
H A D | w00t.h | 44 unsigned short seqno(struct ieee80211_frame *wh);
|
/freebsd-current/contrib/ofed/librdmacm/examples/ |
H A D | udpong.c | 71 uint8_t seqno; member in struct:message 358 static uint8_t seqno; local 361 msg->seqno = seqno; 368 } while (ret <= 0 || msg->seqno != seqno); 370 seqno++;
|
/freebsd-current/sys/contrib/xen/xsm/ |
H A D | flask_op.h | 64 uint32_t seqno; member in struct:xen_flask_access
|
/freebsd-current/sys/dev/rtwn/rtl8812a/ |
H A D | r12a_tx.c | 334 uint16_t seqno; local 337 seqno = ni->ni_txseqs[tid]; 340 seqno = M_SEQNO_GET(m) % IEEE80211_SEQ_RANGE; 343 txd->txdw9 |= htole32(SM(R12A_TXDW9_SEQ, seqno));
|
/freebsd-current/sys/dev/rtwn/rtl8192c/ |
H A D | r92c_tx.c | 333 uint16_t seqno; local 336 seqno = ni->ni_txseqs[tid] % IEEE80211_SEQ_RANGE; 339 seqno = M_SEQNO_GET(m) % IEEE80211_SEQ_RANGE; 342 txd->txdseq = htole16(seqno);
|
/freebsd-current/sys/net/ |
H A D | debugnet.h | 194 int debugnet_ack_output(struct debugnet_pcb *, uint32_t seqno /*net endian*/);
|
H A D | debugnet.c | 214 debugnet_ack_output(struct debugnet_pcb *pcb, uint32_t seqno /* net endian */) 219 DNETDEBUG("Acking with seqno %u\n", ntohl(seqno)); 230 dn_ack->da_seqno = seqno; 374 * Just introspect the header enough to fire off a seqno ack and validate 383 uint32_t seqno; local 428 seqno = dnh->mh_seqno; /* net endian */ 438 error = debugnet_ack_output(pcb, seqno); 440 DNETDEBUG("Couldn't ACK rx packet %u; %d\n", ntohl(seqno), error);
|
/freebsd-current/sys/powerpc/pseries/ |
H A D | phyp_console.c | 355 uint16_t seqno; local 375 seqno = sc->outseqno++; 378 cbuf.bytes[2] = (seqno >> 8) & 0xff; 379 cbuf.bytes[3] = seqno & 0xff;
|
/freebsd-current/sys/sys/ |
H A D | aio.h | 157 uint64_t seqno; /* (*) job number */ member in struct:kaiocb
|
/freebsd-current/crypto/heimdal/appl/gssmask/ |
H A D | gssmask.c | 567 int32_t hContext, flags, seqno; local 574 ret32(c, seqno); 606 int32_t hContext, flags, seqno; local 619 ret32(c, seqno); 737 int32_t hContext, flags, seqno; local 745 ret32(c, seqno); 778 int32_t hContext, flags, seqno; local 787 ret32(c, seqno);
|
/freebsd-current/sys/dev/cxgbe/tom/ |
H A D | t4_tls.c | 384 struct tls_hdr *tls_hdr, unsigned int plen, uint64_t seqno) 401 cpl->scmd1 = htobe64(seqno); 1083 tls_update_tcb(struct adapter *sc, struct toepcb *toep, uint64_t seqno) argument 1128 * contain seqno and are set when enabling TLS 1145 CTR3(KTR_CXGBE, "%s: tid %d enable TLS seqno %lu", __func__, 1146 toep->tid, seqno); 1148 V_TCB_TLS_SEQ(M_TCB_TLS_SEQ), V_TCB_TLS_SEQ(seqno)); 1177 uint64_t seqno; local 1184 have_header = ktls_pending_rx_info(sb, &seqno, &resid); 1185 CTR5(KTR_CXGBE, "%s: tid %d have_header %d seqno 383 write_tlstx_cpl(struct cpl_tx_tls_sfo *cpl, struct toepcb *toep, struct tls_hdr *tls_hdr, unsigned int plen, uint64_t seqno) argument [all...] |
/freebsd-current/sys/dev/ixl/ |
H A D | i40e_dcb.h | 162 __be32 seqno; member in struct:i40e_cee_ctrl_tlv
|
/freebsd-current/sys/powerpc/powernv/ |
H A D | opal_console.c | 400 uint16_t seqno; local 420 seqno = sc->outseqno++; 423 cbuf[2] = (seqno >> 8) & 0xff; 424 cbuf[3] = seqno & 0xff;
|
/freebsd-current/contrib/bsnmp/snmp_ntp/ |
H A D | snmp_ntp.c | 120 static uint16_t seqno; variable 326 if (++seqno == 0) 327 seqno++; 328 *ptr++ = seqno >> 8; 329 *ptr++ = seqno; 465 /* seqno */ 469 if (n != seqno) { 470 syslog(LOG_ERR, "expecting seqno %u, got %u", seqno, n);
|