HomeSort by: relevance | last modified time | path
    Searched defs:authlen (Results 1 - 11 of 11) sorted by relevancy

  /src/external/bsd/tcpdump/dist/
print-zephyr.c 50 int authlen; member in struct:z_packet
158 0, /* authlen */
202 PARSE_FIELD_INT(z.authlen);
print-esp.c 114 int authlen; member in struct:sa_list
310 end = end - sa->authlen;
420 int authlen = 0; local
436 authlen = 12;
461 sa->authlen = 0;
467 sa->authlen = authlen;
513 sa->authlen = 12;
853 if (ep - ct < sa->authlen) {
857 ep = ep - sa->authlen;
    [all...]
  /src/sys/fs/nfs/common/
krpc_subr.c 77 u_int32_t authlen; /* auth length */ member in struct:auth_info
291 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix));
294 call->rpc_verf.authlen = 0;
411 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
  /src/sys/lib/libsa/
rpc.c 72 u_int32_t authlen; /* auth length */ member in struct:auth_info
151 auth->authlen = 0;
160 auth->authlen = htonl(sizeof(struct auth_unix));
166 auth->authlen = 0;
209 x = ntohl(auth->authlen);
  /src/sys/nfs/
krpc_subr.c 80 u_int32_t authlen; /* auth length */ member in struct:auth_info
298 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix));
301 call->rpc_verf.authlen = 0;
371 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
  /src/crypto/external/bsd/openssh/dist/
kex.c 934 u_int mode, ctos, need, dh_need, authlen; local
1013 authlen = cipher_authlen(newkeys->enc.cipher);
1015 if (authlen == 0 &&
1043 authlen == 0 ? newkeys->mac.name : "<implicit>",
1055 authlen == 0 ? newkeys->mac.name : "<implicit>",
packet.c 1174 u_int authlen = 0, aadlen = 0; local
1186 if ((authlen = cipher_authlen(enc->cipher)) != 0)
1190 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0;
1283 sshbuf_len(state->outgoing_packet) + authlen, &cp)) != 0)
1287 len - aadlen, aadlen, authlen)) != 0)
1575 u_int maclen, aadlen = 0, authlen = 0, block_size; local
1594 if ((authlen = cipher_authlen(enc->cipher)) != 0)
1599 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0;
1660 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d,"
1661 " aadlen %d", block_size, need, maclen, authlen, aadlen))
    [all...]
sshkey.c 2786 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; local
2815 authlen = cipher_authlen(cipher);
2874 sshbuf_len(encrypted) + authlen, &cp)) != 0)
2877 sshbuf_ptr(encrypted), sshbuf_len(encrypted), 0, authlen)) != 0)
2986 size_t keylen = 0, ivlen = 0, authlen = 0, slen = 0; local
3051 authlen = cipher_authlen(cipher);
3068 if (sshbuf_len(decoded) < authlen ||
3069 sshbuf_len(decoded) - authlen < encrypted_len) {
3080 encrypted_len, 0, authlen)) != 0) {
3086 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0
    [all...]
  /src/external/mpl/dhcp/dist/includes/omapip/
omapip_p.h 82 u_int32_t authlen; /* Length of authenticator. */ member in struct:__anon24447
124 u_int32_t authlen; member in struct:__omapi_message_object
  /src/external/bsd/ntp/dist/ntpd/
ntp_crypto.c 432 int authlen; /* offset of MAC field */ local
456 authlen = LEN_PKT_NOMAC;
458 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) {
463 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4;
471 peer->crypto, authlen, len, code >> 16,
1061 authlen += (len + 3) / 4 * 4;
ntp_proto.c 643 int authlen; /* offset of MAC field */ local
858 authlen = LEN_PKT_NOMAC;
859 has_mac = rbufp->recv_length - authlen;
877 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]);
881 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]);
885 || (int)len + authlen > rbufp->recv_length) {
898 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4];
918 authlen += len;
1057 authlen,
1066 skeyid, authlen + has_mac, is_authentic
4155 size_t sendlen, authlen; local
    [all...]

Completed in 172 milliseconds