/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | t1_reneg.c | 121 if((s->s3->previous_client_finished_len+1) > maxlen) 128 *p = s->s3->previous_client_finished_len; 131 memcpy(p, s->s3->previous_client_finished, 132 s->s3->previous_client_finished_len); 135 s->s3->previous_client_finished_len ? "Non-empty" : "Empty"); 139 *len=s->s3->previous_client_finished_len + 1; 171 if(ilen != s->s3->previous_client_finished_len) 178 if(memcmp(d, s->s3->previous_client_finished, 179 s->s3->previous_client_finished_len)) 190 s->s3 [all...] |
H A D | s3_pkt.c | 127 * The packet will be in the sub-array of s->s3->rbuf.buf specified 139 rb = &(s->s3->rbuf); 230 /* Now we have len+left bytes at the front of s->s3->rbuf.buf 277 * ssl->s3->rrec.type - is the type of record 278 * ssl->s3->rrec.data, - data 279 * ssl->s3->rrec.length, - number of bytes 297 rr= &(s->s3->rrec); 304 if (extra && !s->s3->init_extra) 317 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); 353 if (rr->length > s->s3 [all...] |
H A D | s3_enc.c | 191 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE); 192 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 232 c=s->s3->tmp.new_sym_enc; 233 m=s->s3->tmp.new_hash; 237 if (s->s3->tmp.new_compression == NULL) 240 comp=s->s3->tmp.new_compression->method; 270 if (s->s3->rrec.comp == NULL) 271 s->s3->rrec.comp=(unsigned char *) 273 if (s->s3 [all...] |
H A D | t1_enc.c | 287 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2, 289 s->s3->server_random,SSL3_RANDOM_SIZE, 290 s->s3->client_random,SSL3_RANDOM_SIZE, 332 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 333 c=s->s3->tmp.new_sym_enc; 334 m=s->s3->tmp.new_hash; 335 mac_type = s->s3->tmp.new_mac_pkey_type; 337 comp=s->s3->tmp.new_compression; 343 s->s3->tmp.new_cipher->algorithm_mkey, 344 s->s3 [all...] |
H A D | s3_both.c | 163 sender,slen,s->s3->tmp.finish_md); 164 s->s3->tmp.finish_md_len = i; 165 memcpy(p, s->s3->tmp.finish_md, i); 174 memcpy(s->s3->previous_client_finished, 175 s->s3->tmp.finish_md, i); 176 s->s3->previous_client_finished_len=i; 181 memcpy(s->s3->previous_server_finished, 182 s->s3->tmp.finish_md, i); 183 s->s3->previous_server_finished_len=i; 212 * change cipher spec message and is in s->s3 [all...] |
H A D | s3_lib.c | 2117 return (s->s3->rrec.type == SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0; 2122 SSL3_STATE *s3; local 2124 if ((s3=OPENSSL_malloc(sizeof *s3)) == NULL) goto err; 2125 memset(s3,0,sizeof *s3); 2126 memset(s3->rrec.seq_num,0,sizeof(s3->rrec.seq_num)); 2127 memset(s3 [all...] |
H A D | d1_pkt.c | 192 if (s->s3->rbuf.buf != NULL) 193 OPENSSL_free(s->s3->rbuf.buf); 197 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER)); 198 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD)); 201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 230 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER)); 231 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD)); 245 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER)); 246 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD)); 310 s->s3 [all...] |
H A D | d1_srvr.c | 249 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 293 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A; 327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 369 s->s3->tmp.use_rsa_tmp=1; 371 s->s3->tmp.use_rsa_tmp=0; 375 if (s->s3->tmp.use_rsa_tmp 385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3 [all...] |
H A D | t1_lib.c | 280 && !s->s3->send_connection_binding) 430 if (s->s3->client_opaque_prf_input != NULL && 433 size_t col = s->s3->client_opaque_prf_input_len; 443 memcpy(ret, s->s3->client_opaque_prf_input, col); 510 if (s->version == SSL3_VERSION && !s->s3->send_connection_binding) 524 if(s->s3->send_connection_binding) 589 if (s->s3->server_opaque_prf_input != NULL && 592 size_t sol = s->s3->server_opaque_prf_input_len; 602 memcpy(ret, s->s3->server_opaque_prf_input, sol); 606 if (((s->s3 [all...] |
H A D | d1_enc.c | 146 rec= &(s->s3->wrec); 172 rec= &(s->s3->rrec); 204 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG) 255 if ((memcmp(s->s3->read_sequence, 257 s->s3->flags|=TLS1_FLAGS_TLS_PADDING_BUG; 258 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
|
H A D | s3_srvr.c | 273 else if (!s->s3->send_connection_binding && 300 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK) 351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 391 s->s3->tmp.use_rsa_tmp=1; 393 s->s3->tmp.use_rsa_tmp=0; 407 if (s->s3->tmp.use_rsa_tmp 417 || (SSL_C_IS_EXPORT(s->s3 [all...] |
H A D | s3_clnt.c | 307 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 308 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 361 if (s->s3->tmp.cert_req) 394 if (s->s3->tmp.cert_req == 1) 401 s->s3->change_cipher_spec=0; 403 if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY) 406 s->s3->change_cipher_spec=0; 418 s->s3->change_cipher_spec=0; 429 s->session->cipher=s->s3->tmp.new_cipher; 433 if (s->s3 [all...] |
H A D | s23_srvr.c | 484 s->s3->tmp.reuse_message=1; 485 s->s3->tmp.message_type=SSL3_MT_CLIENT_HELLO; 486 s->s3->tmp.message_size=i; 510 if (s->s3 != NULL) ssl3_free(s); 555 if (s->s3->rbuf.buf == NULL) 559 s->packet= &(s->s3->rbuf.buf[0]); 561 s->s3->rbuf.left=n; 562 s->s3->rbuf.offset=0; 567 s->s3->rbuf.left=0; 568 s->s3 [all...] |
H A D | d1_clnt.c | 224 memset(s->s3->client_random,0,sizeof(s->s3->client_random)); 244 s->s3->tmp.next_state=SSL3_ST_CR_SRVR_HELLO_A; 303 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 304 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 357 if (s->s3->tmp.cert_req) 385 if (s->s3->tmp.cert_req == 1) 392 s->s3->change_cipher_spec=0; 405 s->s3->change_cipher_spec=0; 417 s->session->cipher=s->s3 [all...] |
H A D | s23_clnt.c | 326 p=s->s3->client_random; 399 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); 400 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) 403 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 427 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 578 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 580 if (s->s3 != NULL) ssl3_free(s); 671 if (s->s3->rbuf.buf == NULL) 674 s->packet= &(s->s3->rbuf.buf[0]); 676 s->s3 [all...] |
/barrelfish-master/lib/acpica/tests/aslts/bin/bugstate/ |
H A D | parsebuglist | 40 # echo "=====================$s0:$s1:$s2:$s3:$s4:$s5:$line" 52 Component="$s3" 54 Component="$s3 $s4" 63 if [ "x$s3" == x ]; then 66 Component="$s2 $s3" 85 read s0 s1 s2 s3 s4 s5 line
|
H A D | bdemossum | 42 read s0 s1 s2 s3 s4 s5 line 51 number=`echo "$s3" | awk -F" " '{ print $4}'`
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/ |
H A D | camellia.c | 352 * adjusting n accordingly, e.g. RotLeft128(s1,s2,s3,s0,n-32). 364 register u32 s0,s1,s2,s3; local 369 k[3] = s3 = GETU32(rawKey+12); 378 k[11] = s3 = ~s1; 383 k[11] = s3 = GETU32(rawKey+28); 385 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; 389 Camellia_Feistel(s0,s1,s2,s3,SIGMA+0); 390 Camellia_Feistel(s2,s3,s0,s1,SIGMA+2); 392 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; 393 Camellia_Feistel(s0,s1,s2,s3,SIGM 489 register u32 s0,s1,s2,s3; local 538 u32 s0,s1,s2,s3; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/asm/ |
H A D | aes-s390x.pl | 66 $s3="%r11"; 218 llgf $s3,12($inp) 227 st $s3,12($out) 240 x $s3,12($key) 285 srlg $ra,$s3,`8-3` # i1 286 sllg $t1,$s3,`0+3` # i0 296 srlg $i3,$s3,`16-3` # i2 298 srl $s3,`24-3` 300 nr $s3,$mask 307 x $s0,1($t1,$tbl) # Te3[s3>> [all...] |
H A D | aes-586.pl | 200 $s3="edx"; 211 $__s3=&DWP(16,"esp"); # s3 backing store 247 &mov ($v0,$s[3]); # copy s3 264 &xor ($s[3],&DWP(0,$te,$v0,8)); # s3>>0 267 &xor ($s[2],&DWP(3,$te,$v0,8)); # s3>>8 270 &xor ($s[1],&DWP(2,$te,$v1,8)); # s3>>16 272 &xor ($s[0],&DWP(1,$te,$v0,8)); # s3>>24 308 &rotr ($s3,16); # 13,12,15,14 313 &movz ($v0,&HB($s3)); # 13,12,15*,14 320 &movz ($v0,&LB($s3)); # 1 [all...] |
H A D | aes-armv4.pl | 36 $s3="r3"; 189 ldrb $s3,[$rounds,#15] 195 orr $s3,$s3,$t1,lsl#8 196 orr $s3,$s3,$t2,lsl#16 197 orr $s3,$s3,$t3,lsl#24 221 mov $t1,$s3,lsr#24 223 mov $t2,$s3,ls [all...] |
H A D | aes-ppc.pl | 74 $s3="r11"; 359 lwz $s3,12($inp) 365 stw $s3,12($out) 407 xor $s3,$s3,$t3 414 rlwinm $acc03,$s3,`32-24+3`,21,28 421 rlwinm $acc06,$s3,`32-16+3`,21,28 426 rlwinm $acc09,$s3,`32-8+3`,21,28 433 rlwinm $acc12,$s3,`0+3`,21,28 462 xor $s3, [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_core.c | 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 800 s3 = GETU32(in + 12) ^ rk[3]; 803 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; 804 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; 805 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; 806 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7]; 811 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; 813 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; 814 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; 815 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 1 976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
H A D | aes_x86core.c | 656 u32 s0, s1, s2, s3, t[4]; local 669 s3 = GETU32(in + 12) ^ rk[3]; 677 Te4[(s3 >> 24) ] << 24; 680 Te4[(s3 >> 16) & 0xff] << 16 ^ 683 Te4[(s3 >> 8) & 0xff] << 8 ^ 686 t[3] = Te4[(s3 ) & 0xff] ^ 715 Te3[(s3 >> 24) ] ^ 719 Te2[(s3 >> 16) & 0xff] ^ 723 Te1[(s3 >> 8) & 0xff] ^ 727 t[3] = Te0[(s3 ) 868 u32 s0, s1, s2, s3, t[4]; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/asm/ |
H A D | cmll-x86.pl | 58 $__s3=&DWP(16,"esp"); # s3 backing store 101 &mov ($t0,&DWP($frame+4*(($j+3)%4),"esp")); # prefetch "s3" 107 &xor ($t3,$t0); # t3^=s3 111 &mov (&DWP($frame+4*(($j+3)%4),"esp"),$t3); # s3=t3 268 &mov ($__s2,@T[2]); # s2^=s3|key[3]; 276 &mov ($__s3,@T[3]); # s3^=LeftRotate(s2&key[2],1); 443 &mov ($__s2,@T[2]); # s2^=s3|key[3]; 451 &mov ($__s3,@T[3]); # s3^=LeftRotate(s2&key[2],1); 809 # 12(%esp) # s3 16(%esp) 819 my ($s0,$s1,$s2,$s3) [all...] |