HomeSort by relevance Sort by last modified time
    Searched refs:s3 (Results 1 - 25 of 109) sorted by null

1 2 3 4 5

  /external/openssl/ssl/
t1_reneg.c 121 if((s->s3->previous_client_finished_len+1) > maxlen)
128 *p = s->s3->previous_client_finished_len;
131 memcpy(p, s->s3->previous_client_finished,
132 s->s3->previous_client_finished_len);
135 s->s3->previous_client_finished_len ? "Non-empty" : "Empty");
139 *len=s->s3->previous_client_finished_len + 1;
171 if(ilen != s->s3->previous_client_finished_len)
178 if(memcmp(d, s->s3->previous_client_finished,
179 s->s3->previous_client_finished_len))
190 s->s3->send_connection_binding=1
    [all...]
s3_pkt.c 127 * The packet will be in the sub-array of s->s3->rbuf.buf specified
139 rb = &(s->s3->rbuf);
230 /* Now we have len+left bytes at the front of s->s3->rbuf.buf
277 * ssl->s3->rrec.type - is the type of record
278 * ssl->s3->rrec.data, - data
279 * ssl->s3->rrec.length, - number of bytes
302 rr= &(s->s3->rrec);
310 extra && !s->s3->init_extra)
323 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
362 if (rr->length > s->s3->rbuf.len - SSL3_RT_HEADER_LENGTH
    [all...]
t1_enc.c 288 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2,
290 s->s3->server_random,SSL3_RANDOM_SIZE,
291 s->s3->client_random,SSL3_RANDOM_SIZE,
333 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
334 c=s->s3->tmp.new_sym_enc;
335 m=s->s3->tmp.new_hash;
336 mac_type = s->s3->tmp.new_mac_pkey_type;
338 comp=s->s3->tmp.new_compression;
340 key_block=s->s3->tmp.key_block;
345 s->s3->tmp.new_cipher->algorithm_mkey
    [all...]
s3_enc.c 191 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE);
192 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE);
231 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher);
232 c=s->s3->tmp.new_sym_enc;
233 m=s->s3->tmp.new_hash;
237 if (s->s3->tmp.new_compression == NULL)
240 comp=s->s3->tmp.new_compression->method;
242 key_block=s->s3->tmp.key_block;
271 if (s->s3->rrec.comp == NULL)
272 s->s3->rrec.comp=(unsigned char *
    [all...]
s3_both.c 163 sender,slen,s->s3->tmp.finish_md);
164 s->s3->tmp.finish_md_len = i;
165 memcpy(p, s->s3->tmp.finish_md, i);
174 memcpy(s->s3->previous_client_finished,
175 s->s3->tmp.finish_md, i);
176 s->s3->previous_client_finished_len=i;
181 memcpy(s->s3->previous_server_finished,
182 s->s3->tmp.finish_md, i);
183 s->s3->previous_server_finished_len=i;
212 * change cipher spec message and is in s->s3->tmp.peer_finish_m
    [all...]
d1_pkt.c 192 if (s->s3->rbuf.buf != NULL)
193 OPENSSL_free(s->s3->rbuf.buf);
197 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
198 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
230 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER));
231 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD));
245 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER));
246 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD));
313 s->s3->rrec.seq_num)
    [all...]
s3_lib.c 2122 SSL3_STATE *s3; local
    [all...]
d1_srvr.c 249 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C;
293 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A;
327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
369 s->s3->tmp.use_rsa_tmp=1;
371 s->s3->tmp.use_rsa_tmp=0;
375 if (s->s3->tmp.use_rsa_tmp
385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher
    [all...]
t1_lib.c 280 && !s->s3->send_connection_binding)
430 if (s->s3->client_opaque_prf_input != NULL &&
433 size_t col = s->s3->client_opaque_prf_input_len;
443 memcpy(ret, s->s3->client_opaque_prf_input, col);
510 if (s->version == SSL3_VERSION && !s->s3->send_connection_binding)
524 if(s->s3->send_connection_binding)
589 if (s->s3->server_opaque_prf_input != NULL &&
592 size_t sol = s->s3->server_opaque_prf_input_len;
602 memcpy(ret, s->s3->server_opaque_prf_input, sol);
606 if (((s->s3->tmp.new_cipher->id & 0xFFFF)==0x80 || (s->s3->tmp.new_cipher->id & 0xFFFF)==0x81)
    [all...]
d1_enc.c 146 rec= &(s->s3->wrec);
172 rec= &(s->s3->rrec);
204 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
259 if ((memcmp(s->s3->read_sequence,
261 s->s3->flags|=TLS1_FLAGS_TLS_PADDING_BUG;
262 if (s->s3->flags & TLS1_FLAGS_TLS_PADDING_BUG)
s3_srvr.c 273 else if (!s->s3->send_connection_binding &&
300 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C;
349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL)
350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)
351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5))
378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
391 s->s3->tmp.use_rsa_tmp=1;
393 s->s3->tmp.use_rsa_tmp=0;
407 if (s->s3->tmp.use_rsa_tmp
417 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher
    [all...]
s3_clnt.c 211 s->s3->flags |= SSL3_FLAGS_DELAY_CLIENT_FINISHED;
319 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) &&
320 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK))
373 if (s->s3->tmp.cert_req)
406 if (s->s3->tmp.cert_req == 1)
413 s->s3->change_cipher_spec=0;
415 if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY)
418 s->s3->change_cipher_spec=0;
430 s->s3->change_cipher_spec=0;
441 s->session->cipher=s->s3->tmp.new_cipher
    [all...]
  /frameworks/base/media/libstagefright/codecs/amrnb/common/src/
residu.cpp 208 Word32 s3; local
222 s3 = 0x0000800L;
234 s3 += ((Word32) * (p_coef) * *(p_input3++));
238 s3 += ((Word32) * (p_coef) * *(p_input3++));
244 s3 += (((Word32) * (p_coef)) * *(p_input3));
249 *(p_residual_ptr--) = (Word16)(s3 >> 12);
  /frameworks/base/media/libstagefright/codecs/amrnb/enc/src/
calc_en.cpp 279 Word32 s3; /* Intermediate energy accumulator */ local
294 s3 = 0;
311 s3 = amrnb_fxp_mac_16_by_16bb((Word32) tmp2, (Word32) code[i], s3);/* Compute scalar product */
323 s3 = s3 << 1;
354 /* s3 is not always sum of squares */
355 exp = norm_l(s3);
356 frac_en[2] = (Word16)(L_shl(s3, exp, pOverflow) >> 16);
609 Word32 s3; /* Intermediate energy accumulator * local
    [all...]
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican.c 57 ulong32 s0, s1, s2, s3, t0, t1, t2, t3; local
63 LOAD32H(s3, pelmac->state + 12);
69 Te3(byte(s3, 0));
73 Te2(byte(s3, 1)) ^
77 Te1(byte(s3, 2)) ^
81 Te0(byte(s3, 3)) ^
85 s0 = t0; s1 = t1; s2 = t2; s3 = t3;
90 STORE32H(s3, pelmac->state + 12);
  /external/tremolo/Tremolo/
mdct.c 109 REG_TYPE s3 = x[2] - x[3]; local
115 x[0] = s5 + s3;
117 x[2] = s5 - s3;
129 REG_TYPE s0, s1, s2, s3; local
134 s3 = x[ 3] - x[ 2]; x[11] = x[ 3] + x[2];
136 x[ 1] = MULT31((s2 + s3) , cPI2_8);
138 x[ 3] = MULT31((s3 - s2) , cPI2_8);
142 s3 = x[14] - x[15]; x[14] += x[15];
146 x[ 6] = s3; x[ 7] = s0;
156 REG_TYPE s0, s1, s2, s3; local
201 REG_TYPE s0, s1, s2, s3; local
279 REG_TYPE s0, s1, s2, s3; local
    [all...]
  /external/v8/test/mjsunit/regress/
regress-crbug-3867.js 55 assertArrayEquals(["s1", "s2", "s3"], props({s1: 0, s2: 0, s3: 0}));
56 assertArrayEquals(["s3", "s2", "s1"], props({s3: 0, s2: 0, s1: 0}));
57 assertArrayEquals(["s3", "s1", "s2"], props({s3: 0, s1: 0, s2: 0}));
69 var o1 = {s1: 0, s2: 0, s3: 0}
72 assertArrayEquals(["s1", "s2", "s3", "s0", "s4"], props(o1));
74 var o2 = {s3: 0, s2: 0, s1: 0}
77 assertArrayEquals(["s3", "s2", "s1", "s4", "s0"], props(o2))
    [all...]
  /external/openssl/crypto/aes/asm/
aes-armv4.pl 28 $s3="r3";
183 ldrb $s3,[$rounds,#15]
187 orr $s3,$s3,$t1,lsl#8
188 orr $s3,$s3,$t2,lsl#16
189 orr $s3,$s3,$t3,lsl#24
215 mov $t1,$s3,lsr#24
216 mov $t2,$s3,lsr#1
    [all...]
aes-ppc.pl 74 $s3="r11";
359 lwz $s3,12($inp)
365 stw $s3,12($out)
407 xor $s3,$s3,$t3
414 rlwinm $acc03,$s3,`32-24+3`,21,28
421 rlwinm $acc06,$s3,`32-16+3`,21,28
426 rlwinm $acc09,$s3,`32-8+3`,21,28
433 rlwinm $acc12,$s3,`0+3`,21,28
462 xor $s3,$t3,$acc1
    [all...]
aes-586.pl 200 $s3="edx";
211 $__s3=&DWP(16,"esp"); # s3 backing store
247 &mov ($v0,$s[3]); # copy s3
264 &xor ($s[3],&DWP(0,$te,$v0,8)); # s3>>0
267 &xor ($s[2],&DWP(3,$te,$v0,8)); # s3>>8
270 &xor ($s[1],&DWP(2,$te,$v1,8)); # s3>>16
272 &xor ($s[0],&DWP(1,$te,$v0,8)); # s3>>24
308 &rotr ($s3,16); # 13,12,15,14
313 &movz ($v0,&HB($s3)); # 13,12,15*,14
320 &movz ($v0,&LB($s3)); # 13,12,15,14
    [all...]
aes-s390x.pl 66 $s3="%r11";
218 llgf $s3,12($inp)
227 st $s3,12($out)
240 x $s3,12($key)
285 srlg $ra,$s3,`8-3` # i1
286 sllg $t1,$s3,`0+3` # i0
296 srlg $i3,$s3,`16-3` # i2
298 srl $s3,`24-3`
300 nr $s3,$mask
307 x $s0,1($t1,$tbl) # Te3[s3>>0
    [all...]
  /external/openssl/crypto/aes/
aes_core.c 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local
976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local
    [all...]
  /external/qemu/
aes.c 889 u32 s0, s1, s2, s3, t0, t1, t2, t3; local
1080 u32 s0, s1, s2, s3, t0, t1, t2, t3; local
    [all...]
  /frameworks/base/media/libstagefright/codecs/aacdec/
fft_rx4_long.cpp 212 Int32 s3; local
320 s3 = (s2 + r4) << 1;
341 *pData4-- = cmplx_mul32_by_16(s3, -r3, exp_jw3);
342 *pData4 = cmplx_mul32_by_16(r3, s3, exp_jw3);
393 s3 = (s2 + t2);
411 *pData4-- = s3;
412 max |= (s3 >> 31) ^ s3;
fft_rx4_short.cpp 214 Int32 s3; local
353 s3 = (s2 + t2) >> exp;
377 *pData4-- = cmplx_mul32_by_16(s3, -r3, exp_jw3) << 1;
378 *pData4 = cmplx_mul32_by_16(r3, s3, exp_jw3) << 1;
431 s3 = (s2 + t2);
449 *pData4-- = s3;
452 max |= (s3 >> 31) ^ s3;

Completed in 501 milliseconds

1 2 3 4 5