/freebsd-10-stable/crypto/openssl/ssl/ |
H A D | t1_reneg.c | 120 if ((s->s3->previous_client_finished_len + 1) > maxlen) { 127 *p = s->s3->previous_client_finished_len; 130 memcpy(p, s->s3->previous_client_finished, 131 s->s3->previous_client_finished_len); 134 s->s3->previous_client_finished_len ? "Non-empty" : "Empty"); 138 *len = s->s3->previous_client_finished_len + 1; 170 if (ilen != s->s3->previous_client_finished_len) { 177 if (memcmp(d, s->s3->previous_client_finished, 178 s->s3->previous_client_finished_len)) { 189 s->s3 [all...] |
H A D | s3_pkt.c | 130 * s->s3->rbuf.buf specified by s->packet and s->packet_length. (If 142 rb = &(s->s3->rbuf); 233 * Now we have len+left bytes at the front of s->s3->rbuf.buf and 290 * ssl->s3->rrec.type - is the type of record 291 * ssl->s3->rrec.data, - data 292 * ssl->s3->rrec.length, - number of bytes 308 rr = &(s->s3->rrec); 315 if (extra && !s->s3->init_extra) { 328 n = ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); 376 if (rr->length > s->s3 [all...] |
H A D | s3_enc.c | 193 EVP_DigestUpdate(&s1, s->s3->server_random, SSL3_RANDOM_SIZE); 194 EVP_DigestUpdate(&s1, s->s3->client_random, SSL3_RANDOM_SIZE); 231 is_exp = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 232 c = s->s3->tmp.new_sym_enc; 233 m = s->s3->tmp.new_hash; 237 if (s->s3->tmp.new_compression == NULL) 240 comp = s->s3->tmp.new_compression->method; 273 if (s->s3->rrec.comp == NULL) 274 s->s3->rrec.comp = (unsigned char *) 276 if (s->s3 [all...] |
H A D | s3_both.c | 171 s->s3->tmp.finish_md); 174 s->s3->tmp.finish_md_len = i; 175 memcpy(p, s->s3->tmp.finish_md, i); 184 memcpy(s->s3->previous_client_finished, s->s3->tmp.finish_md, i); 185 s->s3->previous_client_finished_len = i; 188 memcpy(s->s3->previous_server_finished, s->s3->tmp.finish_md, i); 189 s->s3->previous_server_finished_len = i; 225 if (s->s3 [all...] |
H A D | t1_enc.c | 302 TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3->server_random, 303 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE, 344 is_export = SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 345 c = s->s3->tmp.new_sym_enc; 346 m = s->s3->tmp.new_hash; 347 mac_type = s->s3->tmp.new_mac_pkey_type; 349 comp = s->s3->tmp.new_compression; 355 s->s3->tmp.new_cipher->algorithm_mkey, 356 s->s3->tmp.new_cipher->algorithm_auth, comp); 361 s->s3 [all...] |
H A D | d1_pkt.c | 206 if (s->s3->rbuf.buf != NULL) 207 OPENSSL_free(s->s3->rbuf.buf); 211 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER)); 212 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD)); 215 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 244 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER)); 245 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD)); 261 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER)); 262 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD)); 334 rr = &s->s3 [all...] |
H A D | d1_srvr.c | 250 s->s3->change_cipher_spec = 0; 270 } else if (!s->s3->send_connection_binding && 303 s->s3->tmp.next_state = SSL3_ST_SR_CLNT_HELLO_A; 336 memcpy(s->s3->write_sequence, s->s3->read_sequence, 337 sizeof(s->s3->write_sequence)); 362 s->s3->tmp.next_state = SSL3_ST_SR_CLNT_HELLO_A; 373 s->s3->in_read_app_data = 2; 391 s->s3->in_read_app_data = 2; 448 if (!(s->s3 [all...] |
H A D | s3_srvr.c | 195 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 296 s->s3->flags &= ~SSL3_FLAGS_SGC_RESTART_DONE; 297 s->s3->flags &= ~SSL3_FLAGS_CCS_OK; 301 s->s3->change_cipher_spec = 0; 317 } else if (!s->s3->send_connection_binding && 347 s->s3->tmp.next_state = SSL3_ST_SW_HELLO_REQ_C; 424 (s->s3->tmp. 427 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { 451 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 457 s->s3 [all...] |
H A D | s3_lib.c | 2985 return (s->s3->rrec.type == 2986 SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0; 2991 SSL3_STATE *s3; local 2993 if ((s3 = OPENSSL_malloc(sizeof *s3)) == NULL) 2995 memset(s3, 0, sizeof *s3); 2996 memset(s3->rrec.seq_num, 0, sizeof(s3->rrec.seq_num)); 2997 memset(s3 [all...] |
H A D | t1_lib.c | 376 if (s->client_version == SSL3_VERSION && !s->s3->send_connection_binding) 559 if (s->s3->client_opaque_prf_input != NULL && s->version != DTLS1_VERSION) { 560 size_t col = s->s3->client_opaque_prf_input_len; 570 memcpy(ret, s->s3->client_opaque_prf_input, col); 637 if (s->ctx->next_proto_select_cb && !s->s3->tmp.finish_md_len) { 717 if (s->version == SSL3_VERSION && !s->s3->send_connection_binding) 733 if (s->s3->send_connection_binding) { 798 if (s->s3->server_opaque_prf_input != NULL && s->version != DTLS1_VERSION) { 799 size_t sol = s->s3->server_opaque_prf_input_len; 809 memcpy(ret, s->s3 [all...] |
/freebsd-10-stable/libexec/rtld-aout/ |
H A D | support.c | 41 concat(const char *s1, const char *s2, const char *s3) argument 49 if (s3) 50 len += strlen(s3); 57 if (s3) 58 strcat(s, s3);
|
/freebsd-10-stable/contrib/sendmail/libsm/ |
H A D | t-strl.c | 29 char *s1, *s2, *s3; local 37 s3 = sm_malloc_x(MAXL); 39 SM_TEST(sm_strlcpy(s3, s1, 4) == 3); 40 SM_TEST(strcmp(s1, s3) == 0); 42 SM_TEST(sm_strlcat(s3, s2, 8) == 6); 44 SM_TEST(strcmp(s3, r) == 0); 46 SM_TEST(sm_strlcpy(s3, s1, 2) == 3); 48 SM_TEST(strcmp(s3, r) == 0); 50 SM_TEST(sm_strlcat(s3, s2, 3) == 4); 52 SM_TEST(strcmp(s3, [all...] |
/freebsd-10-stable/tools/tools/shlib-compat/test/libtest1/ |
H A D | test.c | 22 struct s3 { struct 32 int func6(char a, struct s3 *s); 63 func6(char a, struct s3 *s)
|
/freebsd-10-stable/crypto/openssl/crypto/camellia/ |
H A D | camellia.c | 353 * adjusting n accordingly, e.g. RotLeft128(s1,s2,s3,s0,n-32). 365 register u32 s0, s1, s2, s3; local 370 k[3] = s3 = GETU32(rawKey + 12); 377 k[11] = s3 = ~s1; 380 k[11] = s3 = GETU32(rawKey + 28); 382 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; 386 Camellia_Feistel(s0, s1, s2, s3, SIGMA + 0); 387 Camellia_Feistel(s2, s3, s0, s1, SIGMA + 2); 389 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; 390 Camellia_Feistel(s0, s1, s2, s3, SIGM 484 register u32 s0, s1, s2, s3; local 537 u32 s0, s1, s2, s3; local [all...] |
/freebsd-10-stable/sys/modules/s3/ |
H A D | Makefile | 5 KMOD= s3
|
/freebsd-10-stable/contrib/netbsd-tests/lib/libc/regex/ |
H A D | t_exhaust.c | 93 char *d, *s1, *s2, *s3; local 96 s3 = concat(s1, s2); 99 s1 = concat(s3, ")"); 100 free(s3); 109 char *d, *s1, *s2, *s3; local 112 s3 = concat(s1, s2); 115 d = concat("(.?)", s3); 116 free(s3);
|
/freebsd-10-stable/crypto/openssl/crypto/aes/asm/ |
H A D | aes-s390x.pl | 111 $s3="%r11"; 265 llgf $s3,12($inp) 274 st $s3,12($out) 287 x $s3,12($key) 332 srlg $ra,$s3,`8-3` # i1 333 sllg $t1,$s3,`0+3` # i0 343 srlg $i3,$s3,`16-3` # i2 345 srl $s3,`24-3` 347 nr $s3,$mask 354 x $s0,1($t1,$tbl) # Te3[s3>> [all...] |
H A D | aes-armv4.pl | 41 $s3="r3"; 195 ldrb $s3,[$rounds,#15] 201 orr $s3,$s3,$t1,lsl#8 202 orr $s3,$s3,$t2,lsl#16 203 orr $s3,$s3,$t3,lsl#24 208 ldr $s3,[$rounds,#12] 213 rev $s3, [all...] |
H A D | aes-ppc.pl | 76 $s3="r11"; 371 lwz $s3,12($inp) 377 stw $s3,12($out) 409 lbz $s3,15($inp) 412 insrwi $s3,$acc12,8,0 414 insrwi $s3,$acc13,8,8 416 insrwi $s3,$acc14,8,16 441 extrwi $acc12,$s3,8,0 443 extrwi $acc13,$s3,8,8 445 extrwi $acc14,$s3, [all...] |
H A D | aes-586.pl | 200 $s3="edx"; 211 $__s3=&DWP(16,"esp"); # s3 backing store 247 &mov ($v0,$s[3]); # copy s3 264 &xor ($s[3],&DWP(0,$te,$v0,8)); # s3>>0 267 &xor ($s[2],&DWP(3,$te,$v0,8)); # s3>>8 270 &xor ($s[1],&DWP(2,$te,$v1,8)); # s3>>16 272 &xor ($s[0],&DWP(1,$te,$v0,8)); # s3>>24 308 &rotr ($s3,16); # 13,12,15,14 313 &movz ($v0,&HB($s3)); # 13,12,15*,14 320 &movz ($v0,&LB($s3)); # 1 [all...] |
/freebsd-10-stable/contrib/nvi/catalog/ |
H A D | dump.c | 51 int ch, s1, s2, s3; local 75 TESTD(s3); 80 putchar(s3);
|
/freebsd-10-stable/tools/tools/shlib-compat/test/libtest2/ |
H A D | test.c | 22 struct s3 { struct 33 int func6(char a, struct s3 *s); 71 func6(char a, struct s3 *s)
|
/freebsd-10-stable/tools/tools/shlib-compat/test/libtest3/ |
H A D | test.c | 22 struct s3 { struct 44 int func6__compat(char a, struct s3 *s); 82 func6__compat(char a, struct s3 *s)
|
/freebsd-10-stable/sys/contrib/octeon-sdk/ |
H A D | cvmx-log-arc.S | 82 sd s3, 24(sp) // Save register 83 rdhwr s3, $31 // Read the cycle count 96 dins s3, s0, 53, 11 // Overwrite the upper cycle count bits with the CVMX_LOG_TYPE_PC header 97 sd s3, 0(s2) // Write the log header 104 ld s3, 24(sp) // Restore register 128 // s0, s1, s2, s3 are already saved 161 // s0, s1, s2, s3 will be restored later
|
/freebsd-10-stable/tools/regression/posixsem2/ |
H A D | semtest.c | 101 sem_t *s, *s2, *s3; local 114 s3 = sem_open(SEM_NAME, 0); 115 if (s3 == SEM_FAILED) 117 if (s != s3) 120 if (sem_close(s3))
|