/external/openssl/ssl/ |
t1_reneg.c | 121 if((s->s3->previous_client_finished_len+1) > maxlen) 128 *p = s->s3->previous_client_finished_len; 131 memcpy(p, s->s3->previous_client_finished, 132 s->s3->previous_client_finished_len); 135 s->s3->previous_client_finished_len ? "Non-empty" : "Empty"); 139 *len=s->s3->previous_client_finished_len + 1; 171 if(ilen != s->s3->previous_client_finished_len) 178 if(memcmp(d, s->s3->previous_client_finished, 179 s->s3->previous_client_finished_len)) 190 s->s3->send_connection_binding=1 [all...] |
s3_pkt.c | 127 * The packet will be in the sub-array of s->s3->rbuf.buf specified 139 rb = &(s->s3->rbuf); 230 /* Now we have len+left bytes at the front of s->s3->rbuf.buf 277 * ssl->s3->rrec.type - is the type of record 278 * ssl->s3->rrec.data, - data 279 * ssl->s3->rrec.length, - number of bytes 302 rr= &(s->s3->rrec); 310 extra && !s->s3->init_extra) 323 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); 362 if (rr->length > s->s3->rbuf.len - SSL3_RT_HEADER_LENGTH [all...] |
t1_enc.c | 288 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2, 290 s->s3->server_random,SSL3_RANDOM_SIZE, 291 s->s3->client_random,SSL3_RANDOM_SIZE, 333 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 334 c=s->s3->tmp.new_sym_enc; 335 m=s->s3->tmp.new_hash; 336 mac_type = s->s3->tmp.new_mac_pkey_type; 338 comp=s->s3->tmp.new_compression; 340 key_block=s->s3->tmp.key_block; 345 s->s3->tmp.new_cipher->algorithm_mkey [all...] |
s3_enc.c | 191 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE); 192 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 232 c=s->s3->tmp.new_sym_enc; 233 m=s->s3->tmp.new_hash; 237 if (s->s3->tmp.new_compression == NULL) 240 comp=s->s3->tmp.new_compression->method; 242 key_block=s->s3->tmp.key_block; 271 if (s->s3->rrec.comp == NULL) 272 s->s3->rrec.comp=(unsigned char * [all...] |
s3_both.c | 163 sender,slen,s->s3->tmp.finish_md); 164 s->s3->tmp.finish_md_len = i; 165 memcpy(p, s->s3->tmp.finish_md, i); 174 memcpy(s->s3->previous_client_finished, 175 s->s3->tmp.finish_md, i); 176 s->s3->previous_client_finished_len=i; 181 memcpy(s->s3->previous_server_finished, 182 s->s3->tmp.finish_md, i); 183 s->s3->previous_server_finished_len=i; 212 * change cipher spec message and is in s->s3->tmp.peer_finish_m [all...] |
d1_pkt.c | 192 if (s->s3->rbuf.buf != NULL) 193 OPENSSL_free(s->s3->rbuf.buf); 197 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER)); 198 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD)); 201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 230 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER)); 231 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD)); 245 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER)); 246 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD)); 313 s->s3->rrec.seq_num) [all...] |
s3_lib.c | 2122 SSL3_STATE *s3; local [all...] |
d1_srvr.c | 249 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 293 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A; 327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 369 s->s3->tmp.use_rsa_tmp=1; 371 s->s3->tmp.use_rsa_tmp=0; 375 if (s->s3->tmp.use_rsa_tmp 385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher [all...] |
t1_lib.c | 280 && !s->s3->send_connection_binding) 430 if (s->s3->client_opaque_prf_input != NULL && 433 size_t col = s->s3->client_opaque_prf_input_len; 443 memcpy(ret, s->s3->client_opaque_prf_input, col); 510 if (s->version == SSL3_VERSION && !s->s3->send_connection_binding) 524 if(s->s3->send_connection_binding) 589 if (s->s3->server_opaque_prf_input != NULL && 592 size_t sol = s->s3->server_opaque_prf_input_len; 602 memcpy(ret, s->s3->server_opaque_prf_input, sol); 606 if (((s->s3->tmp.new_cipher->id & 0xFFFF)==0x80 || (s->s3->tmp.new_cipher->id & 0xFFFF)==0x81) [all...] |
d1_enc.c | 146 rec= &(s->s3->wrec); 172 rec= &(s->s3->rrec); 204 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG) 259 if ((memcmp(s->s3->read_sequence, 261 s->s3->flags|=TLS1_FLAGS_TLS_PADDING_BUG; 262 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
|
s3_srvr.c | 273 else if (!s->s3->send_connection_binding && 300 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK) 351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 391 s->s3->tmp.use_rsa_tmp=1; 393 s->s3->tmp.use_rsa_tmp=0; 407 if (s->s3->tmp.use_rsa_tmp 417 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher [all...] |
s3_clnt.c | 211 s->s3->flags |= SSL3_FLAGS_DELAY_CLIENT_FINISHED; 319 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 320 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 373 if (s->s3->tmp.cert_req) 406 if (s->s3->tmp.cert_req == 1) 413 s->s3->change_cipher_spec=0; 415 if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY) 418 s->s3->change_cipher_spec=0; 430 s->s3->change_cipher_spec=0; 441 s->session->cipher=s->s3->tmp.new_cipher [all...] |
/frameworks/base/media/libstagefright/codecs/amrnb/common/src/ |
residu.cpp | 208 Word32 s3; local 222 s3 = 0x0000800L; 234 s3 += ((Word32) * (p_coef) * *(p_input3++)); 238 s3 += ((Word32) * (p_coef) * *(p_input3++)); 244 s3 += (((Word32) * (p_coef)) * *(p_input3)); 249 *(p_residual_ptr--) = (Word16)(s3 >> 12);
|
/frameworks/base/media/libstagefright/codecs/amrnb/enc/src/ |
calc_en.cpp | 279 Word32 s3; /* Intermediate energy accumulator */ local 294 s3 = 0; 311 s3 = amrnb_fxp_mac_16_by_16bb((Word32) tmp2, (Word32) code[i], s3);/* Compute scalar product */ 323 s3 = s3 << 1; 354 /* s3 is not always sum of squares */ 355 exp = norm_l(s3); 356 frac_en[2] = (Word16)(L_shl(s3, exp, pOverflow) >> 16); 609 Word32 s3; /* Intermediate energy accumulator * local [all...] |
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 57 ulong32 s0, s1, s2, s3, t0, t1, t2, t3; local 63 LOAD32H(s3, pelmac->state + 12); 69 Te3(byte(s3, 0)); 73 Te2(byte(s3, 1)) ^ 77 Te1(byte(s3, 2)) ^ 81 Te0(byte(s3, 3)) ^ 85 s0 = t0; s1 = t1; s2 = t2; s3 = t3; 90 STORE32H(s3, pelmac->state + 12);
|
/external/tremolo/Tremolo/ |
mdct.c | 109 REG_TYPE s3 = x[2] - x[3]; local 115 x[0] = s5 + s3; 117 x[2] = s5 - s3; 129 REG_TYPE s0, s1, s2, s3; local 134 s3 = x[ 3] - x[ 2]; x[11] = x[ 3] + x[2]; 136 x[ 1] = MULT31((s2 + s3) , cPI2_8); 138 x[ 3] = MULT31((s3 - s2) , cPI2_8); 142 s3 = x[14] - x[15]; x[14] += x[15]; 146 x[ 6] = s3; x[ 7] = s0; 156 REG_TYPE s0, s1, s2, s3; local 201 REG_TYPE s0, s1, s2, s3; local 279 REG_TYPE s0, s1, s2, s3; local [all...] |
/external/v8/test/mjsunit/regress/ |
regress-crbug-3867.js | 55 assertArrayEquals(["s1", "s2", "s3"], props({s1: 0, s2: 0, s3: 0})); 56 assertArrayEquals(["s3", "s2", "s1"], props({s3: 0, s2: 0, s1: 0})); 57 assertArrayEquals(["s3", "s1", "s2"], props({s3: 0, s1: 0, s2: 0})); 69 var o1 = {s1: 0, s2: 0, s3: 0} 72 assertArrayEquals(["s1", "s2", "s3", "s0", "s4"], props(o1)); 74 var o2 = {s3: 0, s2: 0, s1: 0} 77 assertArrayEquals(["s3", "s2", "s1", "s4", "s0"], props(o2)) [all...] |
/external/openssl/crypto/aes/asm/ |
aes-armv4.pl | 28 $s3="r3"; 183 ldrb $s3,[$rounds,#15] 187 orr $s3,$s3,$t1,lsl#8 188 orr $s3,$s3,$t2,lsl#16 189 orr $s3,$s3,$t3,lsl#24 215 mov $t1,$s3,lsr#24 216 mov $t2,$s3,lsr#1 [all...] |
aes-ppc.pl | 74 $s3="r11"; 359 lwz $s3,12($inp) 365 stw $s3,12($out) 407 xor $s3,$s3,$t3 414 rlwinm $acc03,$s3,`32-24+3`,21,28 421 rlwinm $acc06,$s3,`32-16+3`,21,28 426 rlwinm $acc09,$s3,`32-8+3`,21,28 433 rlwinm $acc12,$s3,`0+3`,21,28 462 xor $s3,$t3,$acc1 [all...] |
aes-586.pl | 200 $s3="edx"; 211 $__s3=&DWP(16,"esp"); # s3 backing store 247 &mov ($v0,$s[3]); # copy s3 264 &xor ($s[3],&DWP(0,$te,$v0,8)); # s3>>0 267 &xor ($s[2],&DWP(3,$te,$v0,8)); # s3>>8 270 &xor ($s[1],&DWP(2,$te,$v1,8)); # s3>>16 272 &xor ($s[0],&DWP(1,$te,$v0,8)); # s3>>24 308 &rotr ($s3,16); # 13,12,15,14 313 &movz ($v0,&HB($s3)); # 13,12,15*,14 320 &movz ($v0,&LB($s3)); # 13,12,15,14 [all...] |
aes-s390x.pl | 66 $s3="%r11"; 218 llgf $s3,12($inp) 227 st $s3,12($out) 240 x $s3,12($key) 285 srlg $ra,$s3,`8-3` # i1 286 sllg $t1,$s3,`0+3` # i0 296 srlg $i3,$s3,`16-3` # i2 298 srl $s3,`24-3` 300 nr $s3,$mask 307 x $s0,1($t1,$tbl) # Te3[s3>>0 [all...] |
/external/openssl/crypto/aes/ |
aes_core.c | 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
/external/qemu/ |
aes.c | 889 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 1080 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
/frameworks/base/media/libstagefright/codecs/aacdec/ |
fft_rx4_long.cpp | 212 Int32 s3; local 320 s3 = (s2 + r4) << 1; 341 *pData4-- = cmplx_mul32_by_16(s3, -r3, exp_jw3); 342 *pData4 = cmplx_mul32_by_16(r3, s3, exp_jw3); 393 s3 = (s2 + t2); 411 *pData4-- = s3; 412 max |= (s3 >> 31) ^ s3;
|
fft_rx4_short.cpp | 214 Int32 s3; local 353 s3 = (s2 + t2) >> exp; 377 *pData4-- = cmplx_mul32_by_16(s3, -r3, exp_jw3) << 1; 378 *pData4 = cmplx_mul32_by_16(r3, s3, exp_jw3) << 1; 431 s3 = (s2 + t2); 449 *pData4-- = s3; 452 max |= (s3 >> 31) ^ s3;
|