Home
last modified time | relevance | path

Searched refs:authlen (Results 1 – 10 of 10) sorted by relevance

/dragonfly/contrib/tcpdump/
H A Dprint-esp.c117 int authlen; member
313 end = end - sa->authlen; in esp_decrypt_buffer_by_ikev2_print()
423 int authlen = 0; in espprint_decode_encalgo() local
438 authlen = 12; in espprint_decode_encalgo()
450 sa->authlen = 0; in espprint_decode_encalgo()
456 sa->authlen = authlen; in espprint_decode_encalgo()
502 sa->authlen = 12; in espprint_decode_authalgo()
843 if (ep - ct < sa->authlen) { in esp_print()
847 ep = ep - sa->authlen; in esp_print()
H A Dprint-zephyr.c47 int authlen; member
196 PARSE_FIELD_INT(z.authlen); in zephyr_print()
/dragonfly/crypto/openssh/
H A Dcipher.c346 const u_char *src, u_int len, u_int aadlen, u_int authlen) in cipher_crypt() argument
350 len, aadlen, authlen, cc->encrypt); in cipher_crypt()
366 if (authlen) { in cipher_crypt()
369 if (authlen != cipher_authlen(cc->cipher)) in cipher_crypt()
378 authlen, (u_char *)src + aadlen + len)) in cipher_crypt()
382 if (authlen && in cipher_crypt()
392 if (authlen) { in cipher_crypt()
399 authlen, dest + aadlen + len)) in cipher_crypt()
H A Dpacket.c1075 u_int authlen = 0, aadlen = 0; in ssh_packet_send2_wrapped() local
1087 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_send2_wrapped()
1091 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_send2_wrapped()
1184 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0) in ssh_packet_send2_wrapped()
1188 len - aadlen, aadlen, authlen)) != 0) in ssh_packet_send2_wrapped()
1484 u_int maclen, aadlen = 0, authlen = 0, block_size; in ssh_packet_read_poll2() local
1503 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_read_poll2()
1508 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_read_poll2()
1570 " aadlen %d", block_size, need, maclen, authlen, aadlen)); in ssh_packet_read_poll2()
1595 sshbuf_ptr(state->input) + aadlen + need + authlen, in ssh_packet_read_poll2()
[all …]
H A Dcipher-chachapoly.h34 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
H A Dcipher-chachapoly-libcrypto.c87 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) in chachapoly_crypt() argument
H A Dkex.c923 u_int mode, ctos, need, dh_need, authlen; in kex_choose_conf() local
990 authlen = cipher_authlen(newkeys->enc.cipher); in kex_choose_conf()
992 if (authlen == 0 && in kex_choose_conf()
1008 authlen == 0 ? newkeys->mac.name : "<implicit>", in kex_choose_conf()
H A Dsshkey.c3940 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; in sshkey_private_to_blob2() local
3969 authlen = cipher_authlen(cipher); in sshkey_private_to_blob2()
4029 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2()
4032 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) in sshkey_private_to_blob2()
4143 size_t keylen = 0, ivlen = 0, authlen = 0, slen = 0; in private2_decrypt() local
4208 authlen = cipher_authlen(cipher); in private2_decrypt()
4225 if (sshbuf_len(decoded) < authlen || in private2_decrypt()
4226 sshbuf_len(decoded) - authlen < encrypted_len) { in private2_decrypt()
4237 encrypted_len, 0, authlen)) != 0) { in private2_decrypt()
4243 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0) in private2_decrypt()
/dragonfly/stand/lib/
H A Drpc.c64 u_int32_t authlen; /* auth length */ member
152 auth->authlen = 0; in rpc_call()
161 auth->authlen = htonl(sizeof(struct auth_unix)); in rpc_call()
167 auth->authlen = 0; in rpc_call()
210 x = ntohl(auth->authlen); in rpc_call()
/dragonfly/sys/vfs/nfs/
H A Dkrpc_subr.c74 u_int32_t authlen; /* auth length */ member
292 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); in krpc_call()
295 call->rpc_verf.authlen = 0; in krpc_call()
425 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen); in krpc_call()