/dragonfly/crypto/libressl/crypto/camellia/ |
H A D | camellia.c | 349 u32 s0, s1, s2, s3; in Camellia_Ekeygen() local 354 k[3] = s3 = GETU32(rawKey + 12); in Camellia_Ekeygen() 361 k[11] = s3 = ~s1; in Camellia_Ekeygen() 399 k[26] = s2, k[27] = s3; in Camellia_Ekeygen() 468 u32 s0, s1, s2, s3; in Camellia_EncryptBlock_Rounds() local 494 s2 ^= s3 | k[3]; in Camellia_EncryptBlock_Rounds() 496 s3 ^= LeftRotate(s2 & k[2], 1); in Camellia_EncryptBlock_Rounds() 503 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds() 520 u32 s0, s1, s2, s3; in Camellia_DecryptBlock_Rounds() local 546 s2 ^= s3 | k[1]; in Camellia_DecryptBlock_Rounds() [all …]
|
/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_pkt.c | 486 tot = s->s3->wnum; in ssl3_write_bytes() 487 s->s3->wnum = 0; in ssl3_write_bytes() 649 if ((s->s3->wpend_tot > (int)len) || ((s->s3->wpend_buf != buf) && in ssl3_write_pending() 703 s->s3->alert_fragment_len < sizeof(s->s3->alert_fragment)) { in ssl3_read_alert() 704 s->s3->alert_fragment[s->s3->alert_fragment_len++] = in ssl3_read_alert() 708 if (s->s3->alert_fragment_len < sizeof(s->s3->alert_fragment)) { in ssl3_read_alert() 717 CBS_init(&cbs, s->s3->alert_fragment, sizeof(s->s3->alert_fragment)); in ssl3_read_alert() 842 s->s3->handshake_fragment[s->s3->handshake_fragment_len++] = in ssl3_read_handshake_unexpected() 889 s->s3->handshake_fragment, s->s3->handshake_fragment_len); in ssl3_read_handshake_unexpected() 1090 rr = &s->s3->rrec; in ssl3_read_bytes() [all …]
|
H A D | ssl_transcript.c | 66 if (s->s3->handshake_hash == NULL) in tls1_transcript_hash_update() 80 if (s->s3->handshake_hash == NULL) in tls1_transcript_hash_value() 112 EVP_MD_CTX_free(s->s3->handshake_hash); in tls1_transcript_hash_free() 113 s->s3->handshake_hash = NULL; in tls1_transcript_hash_free() 119 if (s->s3->handshake_transcript != NULL) in tls1_transcript_init() 133 tls_buffer_free(s->s3->handshake_transcript); in tls1_transcript_free() 134 s->s3->handshake_transcript = NULL; in tls1_transcript_free() 140 tls_buffer_clear(s->s3->handshake_transcript); in tls1_transcript_reset() 148 if (s->s3->handshake_transcript == NULL) in tls1_transcript_append() 162 if (s->s3->handshake_transcript == NULL) in tls1_transcript_data() [all …]
|
H A D | ssl_srvr.c | 197 state = s->s3->hs.state; in ssl3_accept() 199 switch (s->s3->hs.state) { in ssl3_accept() 309 s->s3->hs.state = SSL_ST_OK; in ssl3_accept() 516 s->s3->hs.state = s->s3->hs.tls12.next_state; in ssl3_accept() 523 s->s3->hs.state = s->s3->hs.tls12.next_state; in ssl3_accept() 615 s->s3->hs.state = SSL_ST_OK; in ssl3_accept() 735 new_state = s->s3->hs.state; in ssl3_accept() 736 s->s3->hs.state = state; in ssl3_accept() 738 s->s3->hs.state = new_state; in ssl3_accept() 1045 s->s3->hs.negotiated_tls_version < s->s3->hs.our_max_tls_version) { in ssl3_get_client_hello() [all …]
|
H A D | ssl_clnt.c | 193 state = s->s3->hs.state; in ssl3_connect() 195 switch (s->s3->hs.state) { in ssl3_connect() 552 s->s3->hs.state = SSL_ST_OK; in ssl3_connect() 563 s->s3->hs.state = s->s3->hs.tls12.next_state; in ssl3_connect() 570 s->s3->hs.state = s->s3->hs.tls12.next_state; in ssl3_connect() 627 new_state = s->s3->hs.state; in ssl3_connect() 628 s->s3->hs.state = state; in ssl3_connect() 630 s->s3->hs.state = new_state; in ssl3_connect() 890 s->s3->hs.negotiated_tls_version < s->s3->hs.our_max_tls_version) { in ssl3_get_server_hello() 1024 s->s3->hs.cipher = cipher; in ssl3_get_server_hello() [all …]
|
H A D | ssl_both.c | 178 s->s3->hs.finished, s->s3->hs.finished_len); in ssl3_send_finished() 180 s->s3->hs.finished_len; in ssl3_send_finished() 183 s->s3->hs.finished, s->s3->hs.finished_len); in ssl3_send_finished() 197 s->s3->hs.state = state_b; in ssl3_send_finished() 275 if (s->s3->hs.state == a) { in ssl3_send_change_cipher_spec() 298 s->s3->hs.state = b; in ssl3_send_change_cipher_spec() 485 s->s3->hs.state = stn; in ssl3_get_message() 652 s->s3->rbuf.buf = p; in ssl3_setup_read_buffer() 653 s->s3->rbuf.len = len; in ssl3_setup_read_buffer() 686 s->s3->wbuf.buf = p; in ssl3_setup_write_buffer() [all …]
|
H A D | ssl_tlsext.c | 44 s->s3->hs.finished_len == 0; in tlsext_alpn_client_needs() 153 s->s3->alpn_selected_len)) in tlsext_alpn_server_build() 183 if (!CBS_stow(&proto, &s->s3->alpn_selected, &s->s3->alpn_selected_len)) in tlsext_alpn_client_parse() 249 if (s->s3->hs.tls13.hrr) { in tlsext_supportedgroups_server_parse() 457 s->s3->renegotiate_seen = 1; in tlsext_ri_server_parse() 538 s->s3->renegotiate_seen = 1; in tlsext_ri_client_parse() 581 if (!CBS_stow(&sigalgs, &s->s3->hs.sigalgs, &s->s3->hs.sigalgs_len)) in tlsext_sigalgs_server_parse() 621 if (!CBS_stow(&sigalgs, &s->s3->hs.sigalgs, &s->s3->hs.sigalgs_len)) in tlsext_sigalgs_client_parse() 1508 if (s->s3->hs.tls13.hrr) { in tlsext_keyshare_server_build() 1681 s->s3->hs.tls13.cookie_len > 0 && s->s3->hs.tls13.cookie != NULL); in tlsext_cookie_client_needs() [all …]
|
H A D | tls12_lib.c | 74 s->s3->hs.finished, sizeof(s->s3->hs.finished), in tls12_derive_finished() 75 &s->s3->hs.finished_len); in tls12_derive_finished() 78 s->s3->hs.finished, sizeof(s->s3->hs.finished), in tls12_derive_finished() 79 &s->s3->hs.finished_len); in tls12_derive_finished() 88 s->s3->hs.peer_finished, sizeof(s->s3->hs.peer_finished), in tls12_derive_peer_finished() 89 &s->s3->hs.peer_finished_len); in tls12_derive_peer_finished() 92 s->s3->hs.peer_finished, sizeof(s->s3->hs.peer_finished), in tls12_derive_peer_finished() 93 &s->s3->hs.peer_finished_len); in tls12_derive_peer_finished() 110 s->s3->client_random, SSL3_RANDOM_SIZE, NULL, 0, in tls12_derive_master_secret() 111 s->s3->server_random, SSL3_RANDOM_SIZE, NULL, 0, in tls12_derive_master_secret()
|
H A D | s3_lib.c | 1545 if ((s->s3 = calloc(1, sizeof(*s->s3))) == NULL) in ssl3_new() 1563 freezero(s->s3->hs.sigalgs, s->s3->hs.sigalgs_len); in ssl3_free() 1569 freezero(s->s3->hs.tls13.cookie, s->s3->hs.tls13.cookie_len); in ssl3_free() 1585 freezero(s->s3, sizeof(*s->s3)); in ssl3_free() 1587 s->s3 = NULL; in ssl3_free() 1601 freezero(s->s3->hs.sigalgs, s->s3->hs.sigalgs_len); in ssl3_clear() 1615 freezero(s->s3->hs.tls13.cookie, s->s3->hs.tls13.cookie_len); in ssl3_clear() 1627 rp = s->s3->rbuf.buf; in ssl3_clear() 1628 wp = s->s3->wbuf.buf; in ssl3_clear() 1644 memset(s->s3, 0, sizeof(*s->s3)); in ssl3_clear() [all …]
|
H A D | d1_pkt.c | 194 ssl3_release_buffer(&s->s3->rbuf); in dtls1_copy_record() 611 s->s3->hs.state = SSL_ST_ACCEPT; in dtls1_read_handshake_unexpected() 645 if (s->s3->rbuf.left == 0) { in dtls1_read_handshake_unexpected() 693 if (s->s3->rbuf.buf == NULL) { in dtls1_read_bytes() 738 rr = &s->s3->rrec; in dtls1_read_bytes() 861 s->s3->in_read_app_data = 2; in dtls1_read_bytes() 948 if (s->s3->alert_dispatch) { in do_dtls1_write() 976 s->s3->wpend_tot = len; in do_dtls1_write() 977 s->s3->wpend_buf = buf; in do_dtls1_write() 978 s->s3->wpend_type = type; in do_dtls1_write() [all …]
|
H A D | t1_enc.c | 152 tls12_key_block_free(s->s3->hs.tls12.key_block); in tls1_cleanup_key_block() 153 s->s3->hs.tls12.key_block = NULL; in tls1_cleanup_key_block() 294 s->s3->server_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 295 s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 306 tls12_key_block_client_write(s->s3->hs.tls12.key_block, in tls1_change_cipher_state() 309 tls12_key_block_server_write(s->s3->hs.tls12.key_block, in tls1_change_cipher_state() 357 if (s->s3->hs.tls12.key_block != NULL) in tls1_setup_key_block() 387 s->s3->hs.tls12.key_block = key_block; in tls1_setup_key_block() 396 s->s3->need_empty_fragments = 1; in tls1_setup_key_block() 400 s->s3->need_empty_fragments = 0; in tls1_setup_key_block() [all …]
|
H A D | tls13_legacy.c | 130 if (ssl->s3->fatal_alert != 0) in tls13_legacy_error() 295 sent = ssl->s3->wnum; in tls13_legacy_write_bytes() 303 ssl->s3->wnum = 0; in tls13_legacy_write_bytes() 308 ssl->s3->wnum = sent; in tls13_legacy_write_bytes() 337 if (!CBB_init_fixed(&cbb, s->s3->rbuf.buf, in tls13_use_legacy_stack() 338 s->s3->rbuf.len)) in tls13_use_legacy_stack() 352 s->s3->rbuf.left = CBS_len(&cbs); in tls13_use_legacy_stack() 353 s->s3->rrec.type = SSL3_RT_HANDSHAKE; in tls13_use_legacy_stack() 354 s->s3->rrec.length = CBS_len(&cbs); in tls13_use_legacy_stack() 356 s->internal->packet = s->s3->rbuf.buf; in tls13_use_legacy_stack() [all …]
|
H A D | tls_lib.c | 53 sk_X509_pop_free(s->s3->hs.peer_certs, X509_free); in tls_process_peer_certs() 54 if ((s->s3->hs.peer_certs = X509_chain_up_ref(peer_certs)) == NULL) in tls_process_peer_certs() 60 sk_X509_pop_free(s->s3->hs.peer_certs_no_leaf, X509_free); in tls_process_peer_certs() 61 s->s3->hs.peer_certs_no_leaf = peer_certs_no_leaf; in tls_process_peer_certs()
|
H A D | ssl_sigalgs.c | 232 ssl_sigalgs_for_version(s->s3->hs.negotiated_tls_version, in ssl_sigalg_from_value() 281 if (s->s3->hs.negotiated_tls_version < TLS1_2_VERSION) in ssl_sigalg_for_legacy() 313 if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION) in ssl_sigalg_pkey_ok() 345 if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION && in ssl_sigalg_select() 346 s->s3->hs.sigalgs == NULL) in ssl_sigalg_select() 352 CBS_init(&cbs, s->s3->hs.sigalgs, s->s3->hs.sigalgs_len); in ssl_sigalg_select()
|
H A D | ssl_lib.c | 735 ret = s->s3->hs.finished_len; in SSL_get_finished() 738 memcpy(buf, s->s3->hs.finished, count); in SSL_get_finished() 748 ret = s->s3->hs.peer_finished_len; in SSL_get_peer_finished() 892 return s->s3->hs.peer_certs; in STACK_OF() 894 return s->s3->hs.peer_certs_no_leaf; in STACK_OF() 1314 if (s->s3) in SSL_ctrl() 1862 *data = ssl->s3->alpn_selected; in SSL_get0_alpn_selected() 1863 *len = ssl->s3->alpn_selected_len; in SSL_get0_alpn_selected() 2876 ret->s3->hs.state = s->s3->hs.state; in SSL_dup() 3171 return (ssl->s3->hs.state); in SSL_state() [all …]
|
/dragonfly/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 863 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 875 s3 = GETU32(pt + 12) ^ rk[3]; in rijndaelEncrypt() 957 Te3[(s3 ) & 0xff] ^ in rijndaelEncrypt() 962 Te2[(s3 >> 8) & 0xff] ^ in rijndaelEncrypt() 1001 s3 = in rijndaelEncrypt() 1034 s3 = in rijndaelEncrypt() 1040 PUTU32(ct + 12, s3); in rijndaelEncrypt() 1056 s3 = GETU32(ct + 12) ^ rk[3]; in rijndaelDecrypt() 1182 s3 = in rijndaelDecrypt() 1215 s3 = in rijndaelDecrypt() [all …]
|
/dragonfly/crypto/libressl/crypto/aes/ |
H A D | aes_core.c | 888 Te3[(s3) & 0xff] ^ in AES_encrypt() 893 Te2[(s3 >> 8) & 0xff] ^ in AES_encrypt() 903 Te0[(s3 >> 24)] ^ in AES_encrypt() 932 s3 = in AES_encrypt() 965 s3 = in AES_encrypt() 971 PUTU32(out + 12, s3); in AES_encrypt() 1090 Td3[(s3) & 0xff] ^ in AES_decrypt() 1093 Td0[(s3 >> 24)] ^ in AES_decrypt() 1122 s3 = in AES_decrypt() 1155 s3 = in AES_decrypt() [all …]
|
/dragonfly/tools/regression/bin/sh/parser/ |
H A D | for1.0 | 8 for s3 in "$nl" " "; do 10 eval "for i${s1}in ${list}${s2}do${s3}r=\"\$r \$i\"; done" 17 for s3 in "$nl" " "; do 19 eval "for i${s2}do${s3}r=\"\$r \$i\"; done" 25 for s3 in "$nl" " "; do 26 eval "for i${s1}in${s2}do${s3}exit 1; done"
|
/dragonfly/usr.bin/systat/ |
H A D | symbols.c | 85 char *s3; in read_symbols() local 101 s3 = strtok(NULL, " \t\n"); in read_symbols() 102 if (s1 && s2 && s3) { in read_symbols() 109 sym->symname = strdup(s3); in read_symbols() 110 if (strcmp(s3, "kernbase") == 0) in read_symbols() 112 if (strcmp(s3, "end") == 0) in read_symbols()
|
/dragonfly/contrib/mpfr/src/ |
H A D | yn.c | 324 mpfr_t y, s1, s2, s3; in mpfr_yn() local 330 mpfr_init (s3); in mpfr_yn() 339 mpfr_set_prec (s3, prec); in mpfr_yn() 364 err3 = mpfr_yn_s3 (s3, y, s2, absn); /* (z/2)^n * S3 */ in mpfr_yn() 369 mpfr_add (s1, s1, s3, MPFR_RNDN); in mpfr_yn() 372 err3 += MPFR_EXP(s3); in mpfr_yn() 381 mpfr_const_euler (s3, MPFR_RNDN); in mpfr_yn() 382 err2 = MPFR_EXP(s2) > MPFR_EXP(s3) ? MPFR_EXP(s2) : MPFR_EXP(s3); in mpfr_yn() 383 mpfr_add (s2, s2, s3, MPFR_RNDN); /* log(z/2) + gamma */ in mpfr_yn() 386 mpfr_jn (s3, absn, z, MPFR_RNDN); /* Jn(z) */ in mpfr_yn() [all …]
|
/dragonfly/usr.bin/dsynth/ |
H A D | bulk.c | 158 queuebulk(const char *s1, const char *s2, const char *s3, const char *s4) in queuebulk() argument 167 if (s3) in queuebulk() 168 bulk->s3 = strdup(s3); in queuebulk() 257 if (bulk->s3) { in freebulk() 258 free(bulk->s3); in freebulk() 259 bulk->s3 = NULL; in freebulk()
|
/dragonfly/contrib/nvi2/catalog/ |
H A D | dump.c | 36 int ch, s1, s2, s3; in parse() local 60 TESTD(s3); in parse() 65 putchar(s3); in parse()
|
/dragonfly/lib/libcompat/4.3/ |
H A D | rexec.c | 308 int s, timo = 1, s3; in rexec_af() local 389 s3 = accept(s2, (struct sockaddr *)&from, in rexec_af() 392 if (s3 < 0) { in rexec_af() 398 *fd2p = s3; in rexec_af() 442 int s, timo = 1, s3; in rexec() local 498 s3 = accept(s2, (struct sockaddr *)&from, &len); in rexec() 500 if (s3 < 0) { in rexec() 506 *fd2p = s3; in rexec()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | aes-internal-enc.c | 25 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 37 s3 = GETU32(pt + 12) ^ rk[3]; in rijndaelEncrypt() 93 s3 = TE41(t3) ^ TE42(t0) ^ TE43(t1) ^ TE44(t2) ^ rk[3]; in rijndaelEncrypt() 94 PUTU32(ct + 12, s3); in rijndaelEncrypt()
|
/dragonfly/sys/dev/disk/vpo/ |
H A D | immio.c | 283 char s1, s2, s3; in imm_disconnect() local 291 CPP_S2, (void *)&s2, CPP_S3, (void *)&s3, in imm_disconnect() 296 if ((s1 != (char)0xb8 || s2 != (char)0x18 || s3 != (char)0x38)) { in imm_disconnect() 299 vpo->vpo_unit, s1 & 0xff, s2 & 0xff, s3 & 0xff); in imm_disconnect() 319 char s1, s2, s3; in imm_connect() local 332 CPP_S2, (void *)&s2, CPP_S3, (void *)&s3); in imm_connect() 349 if ((s1 != (char)0xb8 || s2 != (char)0x18 || s3 != (char)0x30)) { in imm_connect() 352 vpo->vpo_unit, s1 & 0xff, s2 & 0xff, s3 & 0xff); in imm_connect()
|