/dragonfly/contrib/tcpdump/ |
H A D | print-esp.c | 117 int authlen; member 313 end = end - sa->authlen; in esp_decrypt_buffer_by_ikev2_print() 423 int authlen = 0; in espprint_decode_encalgo() local 438 authlen = 12; in espprint_decode_encalgo() 450 sa->authlen = 0; in espprint_decode_encalgo() 456 sa->authlen = authlen; in espprint_decode_encalgo() 502 sa->authlen = 12; in espprint_decode_authalgo() 843 if (ep - ct < sa->authlen) { in esp_print() 847 ep = ep - sa->authlen; in esp_print()
|
H A D | print-zephyr.c | 47 int authlen; member 196 PARSE_FIELD_INT(z.authlen); in zephyr_print()
|
/dragonfly/crypto/openssh/ |
H A D | cipher.c | 346 const u_char *src, u_int len, u_int aadlen, u_int authlen) in cipher_crypt() argument 350 len, aadlen, authlen, cc->encrypt); in cipher_crypt() 366 if (authlen) { in cipher_crypt() 369 if (authlen != cipher_authlen(cc->cipher)) in cipher_crypt() 378 authlen, (u_char *)src + aadlen + len)) in cipher_crypt() 382 if (authlen && in cipher_crypt() 392 if (authlen) { in cipher_crypt() 399 authlen, dest + aadlen + len)) in cipher_crypt()
|
H A D | packet.c | 1075 u_int authlen = 0, aadlen = 0; in ssh_packet_send2_wrapped() local 1087 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_send2_wrapped() 1091 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_send2_wrapped() 1184 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0) in ssh_packet_send2_wrapped() 1188 len - aadlen, aadlen, authlen)) != 0) in ssh_packet_send2_wrapped() 1484 u_int maclen, aadlen = 0, authlen = 0, block_size; in ssh_packet_read_poll2() local 1503 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_read_poll2() 1508 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_read_poll2() 1570 " aadlen %d", block_size, need, maclen, authlen, aadlen)); in ssh_packet_read_poll2() 1595 sshbuf_ptr(state->input) + aadlen + need + authlen, in ssh_packet_read_poll2() [all …]
|
H A D | cipher-chachapoly.h | 34 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
|
H A D | cipher-chachapoly-libcrypto.c | 87 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) in chachapoly_crypt() argument
|
H A D | kex.c | 923 u_int mode, ctos, need, dh_need, authlen; in kex_choose_conf() local 990 authlen = cipher_authlen(newkeys->enc.cipher); in kex_choose_conf() 992 if (authlen == 0 && in kex_choose_conf() 1008 authlen == 0 ? newkeys->mac.name : "<implicit>", in kex_choose_conf()
|
H A D | sshkey.c | 3940 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; in sshkey_private_to_blob2() local 3969 authlen = cipher_authlen(cipher); in sshkey_private_to_blob2() 4029 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2() 4032 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) in sshkey_private_to_blob2() 4143 size_t keylen = 0, ivlen = 0, authlen = 0, slen = 0; in private2_decrypt() local 4208 authlen = cipher_authlen(cipher); in private2_decrypt() 4225 if (sshbuf_len(decoded) < authlen || in private2_decrypt() 4226 sshbuf_len(decoded) - authlen < encrypted_len) { in private2_decrypt() 4237 encrypted_len, 0, authlen)) != 0) { in private2_decrypt() 4243 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0) in private2_decrypt()
|
/dragonfly/stand/lib/ |
H A D | rpc.c | 64 u_int32_t authlen; /* auth length */ member 152 auth->authlen = 0; in rpc_call() 161 auth->authlen = htonl(sizeof(struct auth_unix)); in rpc_call() 167 auth->authlen = 0; in rpc_call() 210 x = ntohl(auth->authlen); in rpc_call()
|
/dragonfly/sys/vfs/nfs/ |
H A D | krpc_subr.c | 74 u_int32_t authlen; /* auth length */ member 292 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); in krpc_call() 295 call->rpc_verf.authlen = 0; in krpc_call() 425 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen); in krpc_call()
|