/freebsd/contrib/tcpdump/ |
H A D | print-bfd.c | 97 nd_uint8_t auth_len; member 187 uint8_t auth_type, auth_len; in auth_print() local 194 auth_len = GET_U_1(bfd_auth_header->auth_len); in auth_print() 197 auth_type, auth_len); in auth_print() 214 if (auth_len < AUTH_PASSWORD_FIELD_MIN_LEN || in auth_print() 215 auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) { in auth_print() 217 auth_len); in auth_print() 223 (void)nd_printn(ndo, pptr, auth_len - 3, NULL); in auth_print() 242 if (auth_len != AUTH_MD5_FIELD_LEN) { in auth_print() 244 auth_len); in auth_print() [all …]
|
/freebsd/sys/crypto/aesni/ |
H A D | aesni_ccm.c | 91 cbc_mac_start(const unsigned char *auth_data, size_t auth_len, in cbc_mac_start() argument 108 byte_ptr[0] = ((auth_len > 0) ? 1 : 0) * 64 | in cbc_mac_start() 115 if (auth_len != 0) { in cbc_mac_start() 130 KASSERT(auth_len < (1ULL << 32), in cbc_mac_start() 132 __FUNCTION__, auth_len)); in cbc_mac_start() 134 if (auth_len < ((1 << 16) - (1 << 8))) { in cbc_mac_start() 141 be16enc(&staging_block, auth_len); in cbc_mac_start() 143 } else if (auth_len < (1ULL << 32)) { in cbc_mac_start() 150 be32enc((char*)&staging_block + 2, auth_len); in cbc_mac_start() 160 copy_amt = MIN(auth_len, in cbc_mac_start() [all …]
|
/freebsd/sys/rpc/ |
H A D | svc_auth_unix.c | 67 u_int auth_len; in _svcauth_unix() local 72 auth_len = (u_int)msg->rm_call.cb_cred.oa_length; in _svcauth_unix() 73 xdrmem_create(&xdrs, msg->rm_call.cb_cred.oa_base, auth_len, in _svcauth_unix() 75 buf = XDR_INLINE(&xdrs, auth_len); in _svcauth_unix() 107 if ((5 + gid_len) * BYTES_PER_XDR_UNIT + str_len > auth_len) { in _svcauth_unix() 109 (long)gid_len, (long)str_len, auth_len); in _svcauth_unix()
|
/freebsd/lib/libc/rpc/ |
H A D | svc_auth_unix.c | 65 u_int auth_len; in _svcauth_unix() local 76 auth_len = (u_int)msg->rm_call.cb_cred.oa_length; in _svcauth_unix() 77 xdrmem_create(&xdrs, msg->rm_call.cb_cred.oa_base, auth_len,XDR_DECODE); in _svcauth_unix() 78 buf = XDR_INLINE(&xdrs, auth_len); in _svcauth_unix() 105 if ((5 + gid_len) * BYTES_PER_XDR_UNIT + str_len > auth_len) { in _svcauth_unix() 107 (long)gid_len, (long)str_len, auth_len); in _svcauth_unix()
|
/freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | crypto_os.c | 211 size_t auth_len) in freebsd_crypt_uio_debug_log() argument 225 ivbuf, (unsigned int)datalen, (unsigned int)auth_len); in freebsd_crypt_uio_debug_log() 333 size_t auth_len) in freebsd_crypt_uio() argument 341 key, ivbuf, datalen, auth_len); in freebsd_crypt_uio() 365 crp->crp_aad_length = auth_len; in freebsd_crypt_uio() 366 crp->crp_payload_start = auth_len; in freebsd_crypt_uio() 368 crp->crp_digest_start = auth_len + datalen; in freebsd_crypt_uio()
|
H A D | zio_crypt.c | 399 zfs_uio_t *uio, uint_t auth_len) in zio_do_crypt_uio_opencrypto() argument 408 datalen, auth_len); in zio_do_crypt_uio_opencrypto() 1245 zfs_uio_t *out_uio, uint_t *enc_len, uint8_t **authbuf, uint_t *auth_len, in zio_crypt_init_uios_zil() argument 1402 *auth_len = aad_len; in zio_crypt_init_uios_zil() 1416 uint_t *auth_len, boolean_t *no_crypt) in zio_crypt_init_uios_dnode() argument 1552 *auth_len = aad_len; in zio_crypt_init_uios_dnode() 1619 uint8_t **authbuf, uint_t *auth_len, boolean_t *no_crypt) in zio_crypt_init_uios() argument 1630 datalen, byteswap, puio, cuio, enc_len, authbuf, auth_len, in zio_crypt_init_uios() 1636 auth_len, no_crypt); in zio_crypt_init_uios() 1642 *auth_len = 0; in zio_crypt_init_uios() [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 523 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 538 size_t auth_len) in ikev2_process_auth_secret() argument 568 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 569 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 572 auth, auth_len); in ikev2_process_auth_secret() 588 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 597 if (auth_len < 4) { in ikev2_process_auth() 605 auth_len -= 4; in ikev2_process_auth() 608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 613 auth_len); in ikev2_process_auth() [all …]
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 604 size_t auth_len) in ikev2_process_auth_secret() argument 634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 638 auth, auth_len); in ikev2_process_auth_secret() 652 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 661 if (auth_len < 4) { in ikev2_process_auth() 669 auth_len -= 4; in ikev2_process_auth() 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 677 auth_len); in ikev2_process_auth() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 76 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_decrypt() argument 81 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_decrypt() 87 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_decrypt() 480 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_encrypt() argument 484 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_encrypt() 491 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_encrypt() 532 size_t plain_len = 0, auth_len = 0; in wpa_ft_rrb_build() local 540 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) in wpa_ft_rrb_build() 543 *packet_len = sizeof(u16) + auth_len + plain_len; in wpa_ft_rrb_build() 555 tmp = os_realloc(auth, auth_len + pad_len); in wpa_ft_rrb_build() [all …]
|
H A D | ieee802_11.c | 7976 size_t nontx_profile_len, auth_len; in hostapd_eid_mbssid_elem_len() local 7996 auth = wpa_auth_get_wpa_ie(bss->wpa_auth, &auth_len); in hostapd_eid_mbssid_elem_len() 7998 rsn = get_ie(auth, auth_len, WLAN_EID_RSN); in hostapd_eid_mbssid_elem_len() 8002 rsnx = get_ie(auth, auth_len, WLAN_EID_RSNX); in hostapd_eid_mbssid_elem_len() 8106 size_t auth_len = 0; in hostapd_eid_mbssid_elem() local 8150 auth = wpa_auth_get_wpa_ie(bss->wpa_auth, &auth_len); in hostapd_eid_mbssid_elem() 8152 rsn = get_ie(auth, auth_len, WLAN_EID_RSN); in hostapd_eid_mbssid_elem() 8158 rsnx = get_ie(auth, auth_len, WLAN_EID_RSNX); in hostapd_eid_mbssid_elem()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 411 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret() 412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 691 sess->ka, sess->auth_len); in eap_eke_auth() 693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth() 709 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init() 713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
|
H A D | eap_eke_common.h | 75 int auth_len; member
|
H A D | ikev2_common.h | 307 size_t auth_len; member
|
H A D | ikev2_common.c | 313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/freebsd/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zio_crypt.c | 394 zfs_uio_t *puio, zfs_uio_t *cuio, uint8_t *authbuf, uint_t auth_len) in zio_do_crypt_uio() argument 434 ccmp.ulAuthDataSize = auth_len; in zio_do_crypt_uio() 445 gcmp.ulAADLen = auth_len; in zio_do_crypt_uio() 1404 zfs_uio_t *cuio, uint_t *enc_len, uint8_t **authbuf, uint_t *auth_len, in zio_crypt_init_uios_zil() argument 1576 *auth_len = aad_len; in zio_crypt_init_uios_zil() 1601 *auth_len = 0; in zio_crypt_init_uios_zil() 1617 uint_t *auth_len, boolean_t *no_crypt) in zio_crypt_init_uios_dnode() argument 1764 *auth_len = aad_len; in zio_crypt_init_uios_dnode() 1789 *auth_len = 0; in zio_crypt_init_uios_dnode() 1862 uint8_t **authbuf, uint_t *auth_len, boolean_t *no_crypt) in zio_crypt_init_uios() argument [all …]
|
/freebsd/crypto/openssh/ |
H A D | cipher.c | 72 u_int auth_len; member 126 if (auth_only && c->auth_len == 0) in cipher_alg_list() 176 return (c->auth_len); in cipher_authlen()
|
/freebsd/sys/netinet/ |
H A D | sctp_input.c | 1336 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, 1352 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, in sctp_process_cookie_existing() argument 1742 auth_skipped, auth_offset, auth_len, in sctp_process_cookie_existing() 1960 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, in sctp_process_cookie_new() argument 2100 if (auth_len <= SCTP_CHUNK_BUFFER_SIZE) { in sctp_process_cookie_new() 2101 auth = (struct sctp_auth_chunk *)sctp_m_getptr(m, auth_offset, auth_len, auth_chunk_buf); in sctp_process_cookie_new() 2239 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, in sctp_handle_cookie_echo() argument 2534 auth_skipped, auth_offset, auth_len, in sctp_handle_cookie_echo() 2543 ¬ification, auth_skipped, auth_offset, auth_len, in sctp_handle_cookie_echo() 4335 uint32_t auth_offset = 0, auth_len = 0; in sctp_process_control() local [all …]
|
/freebsd/sys/dev/qat_c2xxx/ |
H A D | qat_hw15reg.h | 620 uint32_t auth_len; member
|
H A D | qat_hw15.c | 885 auth_req->auth_len = crp->crp_payload_length; in qat_hw15_crypto_setup_req_params() 955 auth_req->auth_len = in qat_hw15_crypto_setup_req_params()
|
/freebsd/sys/dev/qat/qat_api/firmware/include/ |
H A D | icp_qat_fw_la.h | 1703 uint32_t auth_len; member
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/ |
H A D | lac_sym_qat_hash.c | 878 pHashReqParams->auth_len = authLenInBytes; in LacSymQat_HashRequestParamsPopulate()
|