| /src/external/bsd/tcpdump/dist/ |
| print-zephyr.c | 50 int authlen; member in struct:z_packet 158 0, /* authlen */ 202 PARSE_FIELD_INT(z.authlen);
|
| print-esp.c | 114 int authlen; member in struct:sa_list 310 end = end - sa->authlen; 420 int authlen = 0; local 436 authlen = 12; 461 sa->authlen = 0; 467 sa->authlen = authlen; 513 sa->authlen = 12; 853 if (ep - ct < sa->authlen) { 857 ep = ep - sa->authlen; [all...] |
| /src/sys/fs/nfs/common/ |
| krpc_subr.c | 77 u_int32_t authlen; /* auth length */ member in struct:auth_info 291 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); 294 call->rpc_verf.authlen = 0; 411 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
|
| /src/sys/lib/libsa/ |
| rpc.c | 72 u_int32_t authlen; /* auth length */ member in struct:auth_info 151 auth->authlen = 0; 160 auth->authlen = htonl(sizeof(struct auth_unix)); 166 auth->authlen = 0; 209 x = ntohl(auth->authlen);
|
| /src/sys/nfs/ |
| krpc_subr.c | 80 u_int32_t authlen; /* auth length */ member in struct:auth_info 298 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); 301 call->rpc_verf.authlen = 0; 371 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
|
| /src/crypto/external/bsd/openssh/dist/ |
| kex.c | 934 u_int mode, ctos, need, dh_need, authlen; local 1013 authlen = cipher_authlen(newkeys->enc.cipher); 1015 if (authlen == 0 && 1043 authlen == 0 ? newkeys->mac.name : "<implicit>", 1055 authlen == 0 ? newkeys->mac.name : "<implicit>",
|
| packet.c | 1174 u_int authlen = 0, aadlen = 0; local 1186 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1190 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1283 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0) 1287 len - aadlen, aadlen, authlen)) != 0) 1575 u_int maclen, aadlen = 0, authlen = 0, block_size; local 1594 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1599 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1660 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1661 " aadlen %d", block_size, need, maclen, authlen, aadlen)) [all...] |
| sshkey.c | 2786 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; local 2815 authlen = cipher_authlen(cipher); 2874 sshbuf_len(encrypted) + authlen, &cp)) != 0) 2877 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0) 2986 size_t keylen = 0, ivlen = 0, authlen = 0, slen = 0; local 3051 authlen = cipher_authlen(cipher); 3068 if (sshbuf_len(decoded) < authlen || 3069 sshbuf_len(decoded) - authlen < encrypted_len) { 3080 encrypted_len, 0, authlen)) != 0) { 3086 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0 [all...] |
| /src/external/mpl/dhcp/dist/includes/omapip/ |
| omapip_p.h | 82 u_int32_t authlen; /* Length of authenticator. */ member in struct:__anon24447 124 u_int32_t authlen; member in struct:__omapi_message_object
|
| /src/external/bsd/ntp/dist/ntpd/ |
| ntp_crypto.c | 432 int authlen; /* offset of MAC field */ local 456 authlen = LEN_PKT_NOMAC; 458 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) { 463 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; 471 peer->crypto, authlen, len, code >> 16, 1061 authlen += (len + 3) / 4 * 4;
|
| ntp_proto.c | 643 int authlen; /* offset of MAC field */ local 858 authlen = LEN_PKT_NOMAC; 859 has_mac = rbufp->recv_length - authlen; 877 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); 881 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]); 885 || (int)len + authlen > rbufp->recv_length) { 898 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; 918 authlen += len; 1057 authlen, 1066 skeyid, authlen + has_mac, is_authentic 4155 size_t sendlen, authlen; local [all...] |