/freebsd/crypto/openssh/ |
H A D | cipher.c | 346 const u_char *src, u_int len, u_int aadlen, u_int authlen) in cipher_crypt() argument 350 len, aadlen, authlen, cc->encrypt); in cipher_crypt() 366 if (authlen) { in cipher_crypt() 369 if (authlen != cipher_authlen(cc->cipher)) in cipher_crypt() 378 authlen, (u_char *)src + aadlen + len)) in cipher_crypt() 382 if (authlen && in cipher_crypt() 392 if (authlen) { in cipher_crypt() 399 authlen, dest + aadlen + len)) in cipher_crypt()
|
H A D | sshkey-xmss.c | 897 size_t i, keylen, ivlen, blocksize, authlen, encrypted_len, aadlen; in sshkey_xmss_encrypt_state() local 913 authlen = cipher_authlen(cipher); in sshkey_xmss_encrypt_state() 957 encrypted_len + aadlen + authlen, &cp)) != 0 || in sshkey_xmss_encrypt_state() 961 encrypted_len, aadlen, authlen)) != 0) in sshkey_xmss_encrypt_state() 988 size_t keylen, ivlen, authlen, aadlen; in sshkey_xmss_decrypt_state() local 1005 authlen = cipher_authlen(cipher); in sshkey_xmss_decrypt_state() 1037 if (sshbuf_len(encoded) < authlen || in sshkey_xmss_decrypt_state() 1038 sshbuf_len(encoded) - authlen < encrypted_len) { in sshkey_xmss_decrypt_state() 1054 encrypted_len, aadlen, authlen)) != 0) in sshkey_xmss_decrypt_state() 1058 if ((r = sshbuf_consume(encoded, encrypted_len + authlen)) != 0) in sshkey_xmss_decrypt_state()
|
H A D | cipher-chachapoly.h | 34 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
|
H A D | packet.c | 1169 u_int authlen = 0, aadlen = 0; in ssh_packet_send2_wrapped() local 1181 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_send2_wrapped() 1185 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_send2_wrapped() 1278 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0) in ssh_packet_send2_wrapped() 1282 len - aadlen, aadlen, authlen)) != 0) in ssh_packet_send2_wrapped() 1564 u_int maclen, aadlen = 0, authlen = 0, block_size; in ssh_packet_read_poll2() local 1583 if ((authlen = cipher_authlen(enc->cipher)) != 0) in ssh_packet_read_poll2() 1588 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; in ssh_packet_read_poll2() 1650 " aadlen %d", block_size, need, maclen, authlen, aadlen)); in ssh_packet_read_poll2() 1665 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen) in ssh_packet_read_poll2() [all …]
|
H A D | cipher-chachapoly.c | 70 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) in chachapoly_crypt() argument
|
H A D | cipher-chachapoly-libcrypto.c | 86 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) in chachapoly_crypt() argument
|
H A D | sshkey.c | 2862 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; in sshkey_private_to_blob2() local 2891 authlen = cipher_authlen(cipher); in sshkey_private_to_blob2() 2951 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2() 2954 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) in sshkey_private_to_blob2() 3063 size_t keylen = 0, ivlen = 0, authlen = 0, slen = 0; in private2_decrypt() local 3128 authlen = cipher_authlen(cipher); in private2_decrypt() 3145 if (sshbuf_len(decoded) < authlen || in private2_decrypt() 3146 sshbuf_len(decoded) - authlen < encrypted_len) { in private2_decrypt() 3157 encrypted_len, 0, authlen)) != 0) { in private2_decrypt() 3163 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0) in private2_decrypt()
|
H A D | kex.c | 933 u_int mode, ctos, need, dh_need, authlen; in kex_choose_conf() local 1011 authlen = cipher_authlen(newkeys->enc.cipher); in kex_choose_conf() 1013 if (authlen == 0 && in kex_choose_conf() 1029 authlen == 0 ? newkeys->mac.name : "<implicit>", in kex_choose_conf()
|
/freebsd/contrib/tcpdump/ |
H A D | print-esp.c | 109 int authlen; member 305 end = end - sa->authlen; in esp_decrypt_buffer_by_ikev2_print() 415 int authlen = 0; in espprint_decode_encalgo() local 431 authlen = 12; in espprint_decode_encalgo() 456 sa->authlen = 0; in espprint_decode_encalgo() 462 sa->authlen = authlen; in espprint_decode_encalgo() 508 sa->authlen = 12; in espprint_decode_authalgo() 848 if (ep - ct < sa->authlen) { in esp_print() 852 ep = ep - sa->authlen; in esp_print()
|
H A D | print-zephyr.c | 45 int authlen; member 197 PARSE_FIELD_INT(z.authlen); in zephyr_print()
|
/freebsd/stand/libsa/ |
H A D | rpc.c | 61 uint32_t authlen; /* auth length */ member 141 auth->authlen = 0; in rpc_call() 149 auth->authlen = htonl(sizeof(struct auth_unix)); in rpc_call() 185 x = ntohl(auth->authlen); in rpc_call()
|
/freebsd/sys/nfs/ |
H A D | krpc_subr.c | 79 u_int32_t authlen; /* auth length */ member 291 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); in krpc_call() 294 call->rpc_verf.authlen = 0; in krpc_call() 413 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen); in krpc_call()
|
/freebsd/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 641 int authlen; /* offset of MAC field */ in receive() local 856 authlen = LEN_PKT_NOMAC; in receive() 857 has_mac = rbufp->recv_length - authlen; in receive() 875 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); in receive() 879 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]); in receive() 883 || (int)len + authlen > rbufp->recv_length) { in receive() 896 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; in receive() 916 authlen += len; in receive() 1055 authlen, in receive() 1064 skeyid, authlen + has_mac, is_authentic, in receive() [all …]
|
H A D | ntp_crypto.c | 430 int authlen; /* offset of MAC field */ in crypto_recv() 454 authlen = LEN_PKT_NOMAC; in crypto_recv() 456 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) { in crypto_recv() 461 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; in crypto_recv() 469 peer->crypto, authlen, len, code >> 16, in crypto_recv() 1059 authlen += (len + 3) / 4 * 4; in crypto_recv() 438 int authlen; /* offset of MAC field */ crypto_recv() local
|