Searched refs:s3 (Results 1 - 25 of 47) sorted by relevance

12

/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dt1_reneg.c121 if((s->s3->previous_client_finished_len+1) > maxlen)
128 *p = s->s3->previous_client_finished_len;
131 memcpy(p, s->s3->previous_client_finished,
132 s->s3->previous_client_finished_len);
135 s->s3->previous_client_finished_len ? "Non-empty" : "Empty");
139 *len=s->s3->previous_client_finished_len + 1;
171 if(ilen != s->s3->previous_client_finished_len)
178 if(memcmp(d, s->s3->previous_client_finished,
179 s->s3->previous_client_finished_len))
190 s->s3
[all...]
H A Ds3_pkt.c127 * The packet will be in the sub-array of s->s3->rbuf.buf specified
139 rb = &(s->s3->rbuf);
230 /* Now we have len+left bytes at the front of s->s3->rbuf.buf
277 * ssl->s3->rrec.type - is the type of record
278 * ssl->s3->rrec.data, - data
279 * ssl->s3->rrec.length, - number of bytes
297 rr= &(s->s3->rrec);
304 if (extra && !s->s3->init_extra)
317 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
353 if (rr->length > s->s3
[all...]
H A Ds3_enc.c191 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE);
192 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE);
231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
232 c=s->s3->tmp.new_sym_enc;
233 m=s->s3->tmp.new_hash;
237 if (s->s3->tmp.new_compression == NULL)
240 comp=s->s3->tmp.new_compression->method;
270 if (s->s3->rrec.comp == NULL)
271 s->s3->rrec.comp=(unsigned char *)
273 if (s->s3
[all...]
H A Dt1_enc.c287 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
289 s->s3->server_random,SSL3_RANDOM_SIZE,
290 s->s3->client_random,SSL3_RANDOM_SIZE,
332 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
333 c=s->s3->tmp.new_sym_enc;
334 m=s->s3->tmp.new_hash;
335 mac_type = s->s3->tmp.new_mac_pkey_type;
337 comp=s->s3->tmp.new_compression;
343 s->s3->tmp.new_cipher->algorithm_mkey,
344 s->s3
[all...]
H A Ds3_both.c163 sender,slen,s->s3->tmp.finish_md);
164 s->s3->tmp.finish_md_len = i;
165 memcpy(p, s->s3->tmp.finish_md, i);
174 memcpy(s->s3->previous_client_finished,
175 s->s3->tmp.finish_md, i);
176 s->s3->previous_client_finished_len=i;
181 memcpy(s->s3->previous_server_finished,
182 s->s3->tmp.finish_md, i);
183 s->s3->previous_server_finished_len=i;
212 * change cipher spec message and is in s->s3
[all...]
H A Ds3_lib.c2117 return (s->s3->rrec.type == SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0;
2122 SSL3_STATE *s3; local
2124 if ((s3=OPENSSL_malloc(sizeof *s3)) == NULL) goto err;
2125 memset(s3,0,sizeof *s3);
2126 memset(s3->rrec.seq_num,0,sizeof(s3->rrec.seq_num));
2127 memset(s3
[all...]
H A Dd1_pkt.c192 if (s->s3->rbuf.buf != NULL)
193 OPENSSL_free(s->s3->rbuf.buf);
197 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
198 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
230 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER));
231 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD));
245 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER));
246 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD));
310 s->s3
[all...]
H A Dd1_srvr.c249 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C;
293 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A;
327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
369 s->s3->tmp.use_rsa_tmp=1;
371 s->s3->tmp.use_rsa_tmp=0;
375 if (s->s3->tmp.use_rsa_tmp
385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3
[all...]
H A Dt1_lib.c280 && !s->s3->send_connection_binding)
430 if (s->s3->client_opaque_prf_input != NULL &&
433 size_t col = s->s3->client_opaque_prf_input_len;
443 memcpy(ret, s->s3->client_opaque_prf_input, col);
510 if (s->version == SSL3_VERSION && !s->s3->send_connection_binding)
524 if(s->s3->send_connection_binding)
589 if (s->s3->server_opaque_prf_input != NULL &&
592 size_t sol = s->s3->server_opaque_prf_input_len;
602 memcpy(ret, s->s3->server_opaque_prf_input, sol);
606 if (((s->s3
[all...]
H A Dd1_enc.c146 rec= &(s->s3->wrec);
172 rec= &(s->s3->rrec);
204 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
255 if ((memcmp(s->s3->read_sequence,
257 s->s3->flags|=TLS1_FLAGS_TLS_PADDING_BUG;
258 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
H A Ds3_srvr.c273 else if (!s->s3->send_connection_binding &&
300 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C;
349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)
351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
391 s->s3->tmp.use_rsa_tmp=1;
393 s->s3->tmp.use_rsa_tmp=0;
407 if (s->s3->tmp.use_rsa_tmp
417 || (SSL_C_IS_EXPORT(s->s3
[all...]
H A Ds3_clnt.c307 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
308 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
361 if (s->s3->tmp.cert_req)
394 if (s->s3->tmp.cert_req == 1)
401 s->s3->change_cipher_spec=0;
403 if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY)
406 s->s3->change_cipher_spec=0;
418 s->s3->change_cipher_spec=0;
429 s->session->cipher=s->s3->tmp.new_cipher;
433 if (s->s3
[all...]
H A Ds23_srvr.c484 s->s3->tmp.reuse_message=1;
485 s->s3->tmp.message_type=SSL3_MT_CLIENT_HELLO;
486 s->s3->tmp.message_size=i;
510 if (s->s3 != NULL) ssl3_free(s);
555 if (s->s3->rbuf.buf == NULL)
559 s->packet= &(s->s3->rbuf.buf[0]);
561 s->s3->rbuf.left=n;
562 s->s3->rbuf.offset=0;
567 s->s3->rbuf.left=0;
568 s->s3
[all...]
H A Dd1_clnt.c224 memset(s->s3->client_random,0,sizeof(s->s3->client_random));
244 s->s3->tmp.next_state=SSL3_ST_CR_SRVR_HELLO_A;
303 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
304 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
357 if (s->s3->tmp.cert_req)
385 if (s->s3->tmp.cert_req == 1)
392 s->s3->change_cipher_spec=0;
405 s->s3->change_cipher_spec=0;
417 s->session->cipher=s->s3
[all...]
H A Ds23_clnt.c326 p=s->s3->client_random;
399 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE);
400 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0)
403 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
427 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE);
578 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
580 if (s->s3 != NULL) ssl3_free(s);
671 if (s->s3->rbuf.buf == NULL)
674 s->packet= &(s->s3->rbuf.buf[0]);
676 s->s3
[all...]
/barrelfish-master/lib/acpica/tests/aslts/bin/bugstate/
H A Dparsebuglist40 # echo "=====================$s0:$s1:$s2:$s3:$s4:$s5:$line"
52 Component="$s3"
54 Component="$s3 $s4"
63 if [ "x$s3" == x ]; then
66 Component="$s2 $s3"
85 read s0 s1 s2 s3 s4 s5 line
H A Dbdemossum42 read s0 s1 s2 s3 s4 s5 line
51 number=`echo "$s3" | awk -F" " '{ print $4}'`
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/
H A Dcamellia.c352 * adjusting n accordingly, e.g. RotLeft128(s1,s2,s3,s0,n-32).
364 register u32 s0,s1,s2,s3; local
369 k[3] = s3 = GETU32(rawKey+12);
378 k[11] = s3 = ~s1;
383 k[11] = s3 = GETU32(rawKey+28);
385 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3];
389 Camellia_Feistel(s0,s1,s2,s3,SIGMA+0);
390 Camellia_Feistel(s2,s3,s0,s1,SIGMA+2);
392 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3];
393 Camellia_Feistel(s0,s1,s2,s3,SIGM
489 register u32 s0,s1,s2,s3; local
538 u32 s0,s1,s2,s3; local
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/asm/
H A Daes-s390x.pl66 $s3="%r11";
218 llgf $s3,12($inp)
227 st $s3,12($out)
240 x $s3,12($key)
285 srlg $ra,$s3,`8-3` # i1
286 sllg $t1,$s3,`0+3` # i0
296 srlg $i3,$s3,`16-3` # i2
298 srl $s3,`24-3`
300 nr $s3,$mask
307 x $s0,1($t1,$tbl) # Te3[s3>>
[all...]
H A Daes-586.pl200 $s3="edx";
211 $__s3=&DWP(16,"esp"); # s3 backing store
247 &mov ($v0,$s[3]); # copy s3
264 &xor ($s[3],&DWP(0,$te,$v0,8)); # s3>>0
267 &xor ($s[2],&DWP(3,$te,$v0,8)); # s3>>8
270 &xor ($s[1],&DWP(2,$te,$v1,8)); # s3>>16
272 &xor ($s[0],&DWP(1,$te,$v0,8)); # s3>>24
308 &rotr ($s3,16); # 13,12,15,14
313 &movz ($v0,&HB($s3)); # 13,12,15*,14
320 &movz ($v0,&LB($s3)); # 1
[all...]
H A Daes-armv4.pl36 $s3="r3";
189 ldrb $s3,[$rounds,#15]
195 orr $s3,$s3,$t1,lsl#8
196 orr $s3,$s3,$t2,lsl#16
197 orr $s3,$s3,$t3,lsl#24
221 mov $t1,$s3,lsr#24
223 mov $t2,$s3,ls
[all...]
H A Daes-ppc.pl74 $s3="r11";
359 lwz $s3,12($inp)
365 stw $s3,12($out)
407 xor $s3,$s3,$t3
414 rlwinm $acc03,$s3,`32-24+3`,21,28
421 rlwinm $acc06,$s3,`32-16+3`,21,28
426 rlwinm $acc09,$s3,`32-8+3`,21,28
433 rlwinm $acc12,$s3,`0+3`,21,28
462 xor $s3,
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/
H A Daes_core.c785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local
800 s3 = GETU32(in + 12) ^ rk[3];
803 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4];
804 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5];
805 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6];
806 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7];
811 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11];
813 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12];
814 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13];
815 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 1
976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local
[all...]
H A Daes_x86core.c656 u32 s0, s1, s2, s3, t[4]; local
669 s3 = GETU32(in + 12) ^ rk[3];
677 Te4[(s3 >> 24) ] << 24;
680 Te4[(s3 >> 16) & 0xff] << 16 ^
683 Te4[(s3 >> 8) & 0xff] << 8 ^
686 t[3] = Te4[(s3 ) & 0xff] ^
715 Te3[(s3 >> 24) ] ^
719 Te2[(s3 >> 16) & 0xff] ^
723 Te1[(s3 >> 8) & 0xff] ^
727 t[3] = Te0[(s3 )
868 u32 s0, s1, s2, s3, t[4]; local
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/asm/
H A Dcmll-x86.pl58 $__s3=&DWP(16,"esp"); # s3 backing store
101 &mov ($t0,&DWP($frame+4*(($j+3)%4),"esp")); # prefetch "s3"
107 &xor ($t3,$t0); # t3^=s3
111 &mov (&DWP($frame+4*(($j+3)%4),"esp"),$t3); # s3=t3
268 &mov ($__s2,@T[2]); # s2^=s3|key[3];
276 &mov ($__s3,@T[3]); # s3^=LeftRotate(s2&key[2],1);
443 &mov ($__s2,@T[2]); # s2^=s3|key[3];
451 &mov ($__s3,@T[3]); # s3^=LeftRotate(s2&key[2],1);
809 # 12(%esp) # s3 16(%esp)
819 my ($s0,$s1,$s2,$s3)
[all...]

Completed in 194 milliseconds

12