Lines Matching refs:padlen
1058 u_char padlen, pad = 0; in ssh_packet_send2_wrapped() local
1111 padlen = block_size - (len % block_size); in ssh_packet_send2_wrapped()
1112 if (padlen < 4) in ssh_packet_send2_wrapped()
1113 padlen += block_size; in ssh_packet_send2_wrapped()
1119 ((len + padlen) % state->extra_pad); in ssh_packet_send2_wrapped()
1121 __func__, pad, len, padlen, state->extra_pad)); in ssh_packet_send2_wrapped()
1122 padlen += pad; in ssh_packet_send2_wrapped()
1125 if ((r = sshbuf_reserve(state->outgoing_packet, padlen, &cp)) != 0) in ssh_packet_send2_wrapped()
1129 arc4random_buf(cp, padlen); in ssh_packet_send2_wrapped()
1132 explicit_bzero(cp, padlen); in ssh_packet_send2_wrapped()
1143 cp[4] = padlen; in ssh_packet_send2_wrapped()
1145 len, padlen, aadlen)); in ssh_packet_send2_wrapped()
1538 u_int padlen, need; in ssh_packet_read_poll2() local
1693 padlen = sshbuf_ptr(state->incoming_packet)[4]; in ssh_packet_read_poll2()
1694 DBG(debug("input: padlen %d", padlen)); in ssh_packet_read_poll2()
1695 if (padlen < 4) { in ssh_packet_read_poll2()
1697 "Corrupted padlen %d on input.", padlen)) != 0 || in ssh_packet_read_poll2()
1705 ((r = sshbuf_consume_end(state->incoming_packet, padlen)) != 0)) in ssh_packet_read_poll2()