| /freebsd/crypto/openssh/ |
| H A D | dispatch.c | 91 u_int32_t seqnr; in ssh_dispatch_run() local 95 r = ssh_packet_read_seqnr(ssh, &type, &seqnr); in ssh_dispatch_run() 99 r = ssh_packet_read_poll_seqnr(ssh, &type, &seqnr); in ssh_dispatch_run() 112 r = (*ssh->dispatch[type])(type, seqnr, ssh); in ssh_dispatch_run()
|
| H A D | cipher-chachapoly.c | 69 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, in chachapoly_crypt() argument 82 POKE_U64(seqbuf, seqnr); in chachapoly_crypt() 125 u_int *plenp, u_int seqnr, const u_char *cp, u_int len) in chachapoly_get_length() argument 131 POKE_U64(seqbuf, seqnr); in chachapoly_get_length()
|
| H A D | cipher-chachapoly-libcrypto.c | 85 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, in chachapoly_crypt() argument 97 POKE_U64(seqbuf + 8, seqnr); in chachapoly_crypt() 150 u_int *plenp, u_int seqnr, const u_char *cp, u_int len) in chachapoly_get_length() argument 157 POKE_U64(seqbuf + 8, seqnr); in chachapoly_get_length()
|
| H A D | cipher-chachapoly.h | 33 int chachapoly_crypt(struct chachapoly_ctx *cpctx, u_int seqnr, 37 u_int *plenp, u_int seqnr, const u_char *cp, u_int len)
|
| H A D | packet.c | 109 u_int32_t seqnr; 396 state->p_read.seqnr, in ssh_packet_stop_discard() 989 /* note that both bytes and the seqnr are not reset */ in ssh_set_newkeys() 1267 /* compute MAC over seqnr and packet(length fields, payload, padding) */ in ssh_packet_send2_wrapped() 1269 if ((r = mac_compute(mac, state->p_send.seqnr, in ssh_packet_send2_wrapped() 1273 DBG(debug("done calc MAC out #%d", state->p_send.seqnr)); in ssh_packet_send2_wrapped() 1279 if ((r = cipher_crypt(state->send_context, state->p_send.seqnr, cp, in ssh_packet_send2_wrapped() 1287 if ((r = mac_compute(mac, state->p_send.seqnr, in ssh_packet_send2_wrapped() 1291 state->p_send.seqnr)); in ssh_packet_send2_wrapped() 1301 if (++state->p_send.seqnr in ssh_packet_send2_wrapped() 110 u_int32_t seqnr; global() member 1800 u_int reason, seqnr; ssh_packet_read_poll_seqnr() local [all...] |
| H A D | cipher.c | 345 cipher_crypt(struct sshcipher_ctx *cc, u_int seqnr, u_char *dest, in cipher_crypt() argument 349 return chachapoly_crypt(cc->cp_ctx, seqnr, dest, src, in cipher_crypt() 408 cipher_get_length(struct sshcipher_ctx *cc, u_int *plenp, u_int seqnr, in cipher_get_length() argument 412 return chachapoly_get_length(cc->cp_ctx, plenp, seqnr, in cipher_get_length()
|
| H A D | ssh_api.c | 258 u_int32_t seqnr; in ssh_packet_next() local 281 if ((r = ssh_packet_read_poll2(ssh, &type, &seqnr)) != 0) in ssh_packet_next() 286 if ((r = (*ssh->dispatch[type])(type, seqnr, ssh)) != 0) in ssh_packet_next()
|
| H A D | sshconnect2.c | 1075 input_userauth_passwd_changereq(int type, u_int32_t seqnr, struct ssh *ssh) in input_userauth_passwd_changereq() argument
|
| /freebsd/sys/kern/ |
| H A D | kern_dump.c | 172 dumpsys_cb_dumpdata(struct dump_pa *mdp, int seqnr, void *arg) in dumpsys_cb_dumpdata() argument 191 printf(" chunk %d: %juMB (%ju pages)", seqnr, (uintmax_t)PG2MB(pgs), in dumpsys_cb_dumpdata() 231 int error, seqnr; in dumpsys_foreach_chunk() local 233 seqnr = 0; in dumpsys_foreach_chunk() 236 error = (*cb)(mdp, seqnr++, arg); in dumpsys_foreach_chunk() 241 return (seqnr); in dumpsys_foreach_chunk() 247 cb_dumphdr(struct dump_pa *mdp, int seqnr, void *arg) in cb_dumphdr() argument 276 cb_size(struct dump_pa *mdp, int seqnr, void *arg) in cb_size() argument
|
| /freebsd/crypto/openssl/test/ |
| H A D | bad_dtls_test.c | 469 static int send_record(BIO *rbio, unsigned char type, uint64_t seqnr, in test_bad_dtls() 488 seq[0] = (seqnr >> 40) & 0xff; in test_bad_dtls() 489 seq[1] = (seqnr >> 32) & 0xff; in test_bad_dtls() 490 seq[2] = (seqnr >> 24) & 0xff; in test_bad_dtls() 491 seq[3] = (seqnr >> 16) & 0xff; in test_bad_dtls() 492 seq[4] = (seqnr >> 8) & 0xff; in test_bad_dtls() 493 seq[5] = seqnr & 0xff; in test_bad_dtls() 274 send_record(BIO * rbio,unsigned char type,uint64_t seqnr,const void * msg,size_t len) send_record() argument
|