Home
last modified time | relevance | path

Searched refs:authlen (Results 1 – 14 of 14) sorted by relevance

/freebsd/crypto/openssh/
H A Dcipher.c346 const u_char *src, u_int len, u_int aadlen, u_int authlen) in cipher_crypt() argument
350 len, aadlen, authlen, cc->encrypt); in cipher_crypt()
366 if (authlen) { in cipher_crypt()
369 if (authlen != cipher_authlen(cc->cipher)) in cipher_crypt()
378 authlen, (u_char *)src + aadlen + len)) in cipher_crypt()
382 if (authlen && in cipher_crypt()
392 if (authlen) { in cipher_crypt()
399 authlen, dest + aadlen + len)) in cipher_crypt()
H A Dsshkey-xmss.c897 size_t i, keylen, ivlen, blocksize, authlen, encrypted_len, aadlen; in sshkey_xmss_encrypt_state() local
913 authlen = cipher_authlen(cipher); in sshkey_xmss_encrypt_state()
957 encrypted_len + aadlen + authlen, &cp)) != 0 || in sshkey_xmss_encrypt_state()
961 encrypted_len, aadlen, authlen)) != 0) in sshkey_xmss_encrypt_state()
988 size_t keylen, ivlen, authlen, aadlen; in sshkey_xmss_decrypt_state() local
1005 authlen = cipher_authlen(cipher); in sshkey_xmss_decrypt_state()
1037 if (sshbuf_len(encoded) < authlen || in sshkey_xmss_decrypt_state()
1038 sshbuf_len(encoded) - authlen < encrypted_len) { in sshkey_xmss_decrypt_state()
1054 encrypted_len, aadlen, authlen)) != 0) in sshkey_xmss_decrypt_state()
1058 if ((r = sshbuf_consume(encoded, encrypted_len + authlen)) != 0) in sshkey_xmss_decrypt_state()
H A Dcipher-chachapoly.h34 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
H A Dpacket.c1169 u_int authlen = 0, aadlen = 0; in ssh_packet_send2_wrapped() local
1181 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_send2_wrapped()
1185 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_send2_wrapped()
1278 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0) in ssh_packet_send2_wrapped()
1282 len - aadlen, aadlen, authlen)) != 0) in ssh_packet_send2_wrapped()
1564 u_int maclen, aadlen = 0, authlen = 0, block_size; in ssh_packet_read_poll2() local
1583 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_read_poll2()
1588 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_read_poll2()
1650 " aadlen %d", block_size, need, maclen, authlen, aadlen)); in ssh_packet_read_poll2()
1665 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen) in ssh_packet_read_poll2()
[all …]
H A Dcipher-chachapoly.c70 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) in chachapoly_crypt() argument
H A Dcipher-chachapoly-libcrypto.c86 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) in chachapoly_crypt() argument
H A Dsshkey.c2862 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; in sshkey_private_to_blob2() local
2891 authlen = cipher_authlen(cipher); in sshkey_private_to_blob2()
2951 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2()
2954 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) in sshkey_private_to_blob2()
3063 size_t keylen = 0, ivlen = 0, authlen = 0, slen = 0; in private2_decrypt() local
3128 authlen = cipher_authlen(cipher); in private2_decrypt()
3145 if (sshbuf_len(decoded) < authlen || in private2_decrypt()
3146 sshbuf_len(decoded) - authlen < encrypted_len) { in private2_decrypt()
3157 encrypted_len, 0, authlen)) != 0) { in private2_decrypt()
3163 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0) in private2_decrypt()
H A Dkex.c933 u_int mode, ctos, need, dh_need, authlen; in kex_choose_conf() local
1011 authlen = cipher_authlen(newkeys->enc.cipher); in kex_choose_conf()
1013 if (authlen == 0 && in kex_choose_conf()
1029 authlen == 0 ? newkeys->mac.name : "<implicit>", in kex_choose_conf()
/freebsd/contrib/tcpdump/
H A Dprint-esp.c109 int authlen; member
305 end = end - sa->authlen; in esp_decrypt_buffer_by_ikev2_print()
415 int authlen = 0; in espprint_decode_encalgo() local
431 authlen = 12; in espprint_decode_encalgo()
456 sa->authlen = 0; in espprint_decode_encalgo()
462 sa->authlen = authlen; in espprint_decode_encalgo()
508 sa->authlen = 12; in espprint_decode_authalgo()
848 if (ep - ct < sa->authlen) { in esp_print()
852 ep = ep - sa->authlen; in esp_print()
H A Dprint-zephyr.c45 int authlen; member
197 PARSE_FIELD_INT(z.authlen); in zephyr_print()
/freebsd/stand/libsa/
H A Drpc.c61 uint32_t authlen; /* auth length */ member
141 auth->authlen = 0; in rpc_call()
149 auth->authlen = htonl(sizeof(struct auth_unix)); in rpc_call()
185 x = ntohl(auth->authlen); in rpc_call()
/freebsd/sys/nfs/
H A Dkrpc_subr.c79 u_int32_t authlen; /* auth length */ member
291 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); in krpc_call()
294 call->rpc_verf.authlen = 0; in krpc_call()
413 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen); in krpc_call()
/freebsd/contrib/ntp/ntpd/
H A Dntp_proto.c641 int authlen; /* offset of MAC field */ in receive() local
856 authlen = LEN_PKT_NOMAC; in receive()
857 has_mac = rbufp->recv_length - authlen; in receive()
875 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); in receive()
879 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]); in receive()
883 || (int)len + authlen > rbufp->recv_length) { in receive()
896 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; in receive()
916 authlen += len; in receive()
1055 authlen, in receive()
1064 skeyid, authlen + has_mac, is_authentic, in receive()
[all …]
H A Dntp_crypto.c430 int authlen; /* offset of MAC field */ in crypto_recv()
454 authlen = LEN_PKT_NOMAC; in crypto_recv()
456 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) { in crypto_recv()
461 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; in crypto_recv()
469 peer->crypto, authlen, len, code >> 16, in crypto_recv()
1059 authlen += (len + 3) / 4 * 4; in crypto_recv()
438 int authlen; /* offset of MAC field */ crypto_recv() local