/freebsd-current/crypto/openssh/ |
H A D | cipher-chachapoly.h | 33 int chachapoly_crypt(struct chachapoly_ctx *cpctx, u_int seqnr, 37 u_int *plenp, u_int seqnr, const u_char *cp, u_int len)
|
H A D | dispatch.c | 91 u_int32_t seqnr; local 95 r = ssh_packet_read_seqnr(ssh, &type, &seqnr); 99 r = ssh_packet_read_poll_seqnr(ssh, &type, &seqnr); 112 r = (*ssh->dispatch[type])(type, seqnr, ssh);
|
H A D | cipher-chachapoly.c | 69 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, argument 82 POKE_U64(seqbuf, seqnr); 125 u_int *plenp, u_int seqnr, const u_char *cp, u_int len) 131 POKE_U64(seqbuf, seqnr); 124 chachapoly_get_length(struct chachapoly_ctx *ctx, u_int *plenp, u_int seqnr, const u_char *cp, u_int len) argument
|
H A D | cipher-chachapoly-libcrypto.c | 85 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, argument 97 POKE_U64(seqbuf + 8, seqnr); 150 u_int *plenp, u_int seqnr, const u_char *cp, u_int len) 157 POKE_U64(seqbuf + 8, seqnr); 149 chachapoly_get_length(struct chachapoly_ctx *ctx, u_int *plenp, u_int seqnr, const u_char *cp, u_int len) argument
|
H A D | packet.c | 110 u_int32_t seqnr; member in struct:packet_state 397 state->p_read.seqnr, 898 /* note that both bytes and the seqnr are not reset */ 1177 /* compute MAC over seqnr and packet(length fields, payload, padding) */ 1179 if ((r = mac_compute(mac, state->p_send.seqnr, 1183 DBG(debug("done calc MAC out #%d", state->p_send.seqnr)); 1189 if ((r = cipher_crypt(state->send_context, state->p_send.seqnr, cp, 1197 if ((r = mac_compute(mac, state->p_send.seqnr, 1201 state->p_send.seqnr)); 1211 if (++state->p_send.seqnr 1709 u_int reason, seqnr; local [all...] |
H A D | cipher.c | 345 cipher_crypt(struct sshcipher_ctx *cc, u_int seqnr, u_char *dest, argument 349 return chachapoly_crypt(cc->cp_ctx, seqnr, dest, src, 408 cipher_get_length(struct sshcipher_ctx *cc, u_int *plenp, u_int seqnr, argument 412 return chachapoly_get_length(cc->cp_ctx, plenp, seqnr,
|
H A D | ssh_api.c | 251 u_int32_t seqnr; local 274 if ((r = ssh_packet_read_poll2(ssh, &type, &seqnr)) != 0) 279 if ((r = (*ssh->dispatch[type])(type, seqnr, ssh)) != 0)
|
H A D | sshconnect2.c | 1073 input_userauth_passwd_changereq(int type, u_int32_t seqnr, struct ssh *ssh) argument
|
/freebsd-current/sys/kern/ |
H A D | kern_dump.c | 172 dumpsys_cb_dumpdata(struct dump_pa *mdp, int seqnr, void *arg) argument 191 printf(" chunk %d: %juMB (%ju pages)", seqnr, (uintmax_t)PG2MB(pgs), 231 int error, seqnr; local 233 seqnr = 0; 236 error = (*cb)(mdp, seqnr++, arg); 241 return (seqnr); 247 cb_dumphdr(struct dump_pa *mdp, int seqnr, void *arg) argument 276 cb_size(struct dump_pa *mdp, int seqnr, void *arg) argument
|
/freebsd-current/crypto/openssl/test/ |
H A D | bad_dtls_test.c | 274 static int send_record(BIO *rbio, unsigned char type, uint64_t seqnr, argument 293 seq[0] = (seqnr >> 40) & 0xff; 294 seq[1] = (seqnr >> 32) & 0xff; 295 seq[2] = (seqnr >> 24) & 0xff; 296 seq[3] = (seqnr >> 16) & 0xff; 297 seq[4] = (seqnr >> 8) & 0xff; 298 seq[5] = seqnr & 0xff;
|