| /openbsd-src/sys/arch/luna88k/stand/boot/ |
| H A D | sc.c | 103 scinit(struct scsi_softc *hs, uint unit) in scinit() argument 121 hs->sc_sd = (struct scsidevice *)reg; in scinit() 123 hs->sc_unit = unit; in scinit() 124 hs->sc_flags = 0; in scinit() 125 hs->sc_phase = BUS_FREE_PHASE; in scinit() 126 hs->sc_target = SCSI_ID; in scinit() 128 hs->sc_cdb = NULL; in scinit() 129 hs->sc_cdblen = 0; in scinit() 130 hs->sc_buf = NULL; in scinit() 131 hs->sc_len = 0; in scinit() [all …]
|
| /openbsd-src/lib/libssl/ |
| H A D | ssl_clnt.c | 205 state = s->s3->hs.state; in ssl3_connect() 207 switch (s->s3->hs.state) { in ssl3_connect() 210 s->s3->hs.state = SSL_ST_CONNECT; in ssl3_connect() 229 &s->s3->hs.our_min_tls_version, in ssl3_connect() 230 &s->s3->hs.our_max_tls_version)) { in ssl3_connect() 237 s->s3->hs.our_min_tls_version)) { in ssl3_connect() 263 s->s3->hs.state = SSL3_ST_CW_CLNT_HELLO_A; in ssl3_connect() 292 s->s3->hs.state = SSL3_ST_CW_FLUSH; in ssl3_connect() 293 s->s3->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A; in ssl3_connect() 295 s->s3->hs in ssl3_connect() [all...] |
| H A D | ssl_srvr.c | 212 state = s->s3->hs.state; in ssl3_accept() 214 switch (s->s3->hs.state) { in ssl3_accept() 217 /* s->s3->hs.state=SSL_ST_ACCEPT; */ in ssl3_accept() 234 &s->s3->hs.our_min_tls_version, in ssl3_accept() 235 &s->s3->hs.our_max_tls_version)) { in ssl3_accept() 242 s->s3->hs.our_min_tls_version)) { in ssl3_accept() 259 if (s->s3->hs.state != SSL_ST_RENEGOTIATE) { in ssl3_accept() 275 s->s3->hs.state = SSL3_ST_SR_CLNT_HELLO_A; in ssl3_accept() 290 * s->s3->hs.state == SSL_ST_RENEGOTIATE, in ssl3_accept() 294 s->s3->hs in ssl3_accept() [all...] |
| H A D | tls13_client.c | 34 if (!ssl_supported_tls_version_range(s, &ctx->hs->our_min_tls_version, in tls13_client_init() 35 &ctx->hs->our_max_tls_version)) { in tls13_client_init() 39 s->version = ctx->hs->our_max_tls_version; in tls13_client_init() 54 if ((ctx->hs->key_share = tls_key_share_new(groups[0])) == NULL) in tls13_client_init() 56 if (!tls_key_share_generate(ctx->hs->key_share)) in tls13_client_init() 68 ctx->hs->our_max_tls_version >= TLS1_3_VERSION) { in tls13_client_init() 69 arc4random_buf(ctx->hs->tls13.legacy_session_id, in tls13_client_init() 70 sizeof(ctx->hs->tls13.legacy_session_id)); in tls13_client_init() 71 ctx->hs->tls13.legacy_session_id_len = in tls13_client_init() 72 sizeof(ctx->hs in tls13_client_init() [all...] |
| H A D | tls13_server.c | 32 if (!ssl_supported_tls_version_range(s, &ctx->hs->our_min_tls_version, in tls13_server_init() 33 &ctx->hs->our_max_tls_version)) { in tls13_server_init() 37 s->version = ctx->hs->our_max_tls_version; in tls13_server_init() 171 ctx->hs->negotiated_tls_version = TLS1_3_VERSION; in tls13_client_hello_process() 172 ctx->hs->peer_legacy_version = legacy_version; in tls13_client_hello_process() 219 if (!ctx->hs->tls13.hrr) { in tls13_client_hello_process() 229 tls13_clienthello_hash_clear(&ctx->hs->tls13); in tls13_client_hello_process() 253 CBS_len(&session_id) != sizeof(ctx->hs->tls13.legacy_session_id)) { in tls13_client_hello_process() 257 if (!CBS_write_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_client_hello_process() 258 sizeof(ctx->hs in tls13_client_hello_process() [all...] |
| H A D | tls12_lib.c | 74 s->s3->hs.finished, sizeof(s->s3->hs.finished), in tls12_derive_finished() 75 &s->s3->hs.finished_len); in tls12_derive_finished() 78 s->s3->hs.finished, sizeof(s->s3->hs.finished), in tls12_derive_finished() 79 &s->s3->hs.finished_len); in tls12_derive_finished() 88 s->s3->hs.peer_finished, sizeof(s->s3->hs.peer_finished), in tls12_derive_peer_finished() 89 &s->s3->hs.peer_finished_len); in tls12_derive_peer_finished() 92 s->s3->hs.peer_finished, sizeof(s->s3->hs.peer_finished), in tls12_derive_peer_finished() 93 &s->s3->hs.peer_finished_len); in tls12_derive_peer_finished()
|
| H A D | tls13_quic.c | 60 if (ctx->hs->tls13.quic_read_buffer == NULL) in tls13_quic_handshake_read_cb() 63 return tls_buffer_read(ctx->hs->tls13.quic_read_buffer, buf, n); in tls13_quic_handshake_read_cb() 73 ctx->hs->tls13.quic_write_level, buf, n)) { in tls13_quic_handshake_write_cb() 88 ctx->hs->tls13.quic_read_level = read_level; in tls13_quic_set_read_traffic_key() 94 ctx->hs->tls13.quic_read_level, ctx->hs->cipher, in tls13_quic_set_read_traffic_key() 99 ctx->hs->tls13.quic_read_level, read_key->data, NULL, in tls13_quic_set_read_traffic_key() 112 ctx->hs->tls13.quic_write_level = write_level; in tls13_quic_set_write_traffic_key() 118 ctx->hs->tls13.quic_write_level, ctx->hs in tls13_quic_set_write_traffic_key() [all...] |
| H A D | tls13_lib.c | 261 struct tls13_secrets *secrets = ctx->hs->tls13.secrets; in tls13_phh_update_read_traffic_secret() 281 struct tls13_secrets *secrets = ctx->hs->tls13.secrets; in tls13_phh_update_write_traffic_secret() 376 struct tls13_secrets *secrets = ctx->hs->tls13.secrets; in tls13_new_session_ticket_recv() 544 ctx->hs = &ssl->s3->hs; in tls13_ctx_new() 664 if (ctx->hs->tls13.clienthello_md_ctx != NULL) in tls13_clienthello_hash_init() 666 if ((ctx->hs->tls13.clienthello_md_ctx = EVP_MD_CTX_new()) == NULL) in tls13_clienthello_hash_init() 668 if (!EVP_DigestInit_ex(ctx->hs->tls13.clienthello_md_ctx, in tls13_clienthello_hash_init() 672 if ((ctx->hs->tls13.clienthello_hash == NULL) && in tls13_clienthello_hash_init() 673 (ctx->hs->tls13.clienthello_hash = calloc(1, EVP_MAX_MD_SIZE)) == in tls13_clienthello_hash_init() 681 tls13_clienthello_hash_clear(struct ssl_handshake_tls13_st *hs) /* XXX */ in tls13_clienthello_hash_clear() argument [all …]
|
| H A D | ssl_tlsext.c | 47 s->s3->hs.finished_len == 0; in tlsext_alpn_client_needs() 197 (s->s3->hs.our_max_tls_version >= TLS1_3_VERSION); in tlsext_supportedgroups_client_needs() 254 if (s->s3->hs.tls13.hrr) { in tlsext_supportedgroups_server_process() 490 return (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION && in tlsext_ri_server_needs() 574 return (s->s3->hs.our_max_tls_version >= TLS1_2_VERSION); in tlsext_sigalgs_client_needs() 580 uint16_t tls_version = s->s3->hs.negotiated_tls_version; in tlsext_sigalgs_client_build() 584 tls_version = s->s3->hs.our_min_tls_version; in tlsext_sigalgs_client_build() 605 if (!CBS_stow(&sigalgs, &s->s3->hs.sigalgs, &s->s3->hs.sigalgs_len)) in tlsext_sigalgs_server_process() 614 return (s->s3->hs.negotiated_tls_version >= TLS1_3_VERSION); in tlsext_sigalgs_server_needs() 624 if (!ssl_sigalgs_build(s->s3->hs.negotiated_tls_version, &sigalgs, in tlsext_sigalgs_server_build() [all …]
|
| H A D | s3_lib.c | 1282 freezero(s->s3->hs.sigalgs, s->s3->hs.sigalgs_len); 1284 sk_SSL_CIPHER_free(s->s3->hs.client_ciphers); 1285 sk_X509_pop_free(s->s3->hs.peer_certs, X509_free); 1286 sk_X509_pop_free(s->s3->hs.peer_certs_no_leaf, X509_free); 1287 sk_X509_pop_free(s->s3->hs.verified_chain, X509_free); 1288 tls_key_share_free(s->s3->hs.key_share); 1290 tls13_secrets_destroy(s->s3->hs.tls13.secrets); 1291 freezero(s->s3->hs.tls13.cookie, s->s3->hs [all...] |
| H A D | tls_lib.c | 53 sk_X509_pop_free(s->s3->hs.peer_certs, X509_free); in tls_process_peer_certs() 54 if ((s->s3->hs.peer_certs = X509_chain_up_ref(peer_certs)) == NULL) in tls_process_peer_certs() 60 sk_X509_pop_free(s->s3->hs.peer_certs_no_leaf, X509_free); in tls_process_peer_certs() 61 s->s3->hs.peer_certs_no_leaf = peer_certs_no_leaf; in tls_process_peer_certs()
|
| H A D | tls13_handshake.c | 302 struct tls13_handshake_stage hs = ctx->handshake_stage; in tls13_handshake_active_state() local 304 if (hs.hs_type >= handshake_count) in tls13_handshake_active_state() 306 if (hs.message_number >= TLS13_NUM_MESSAGE_TYPES) in tls13_handshake_active_state() 309 return handshakes[hs.hs_type][hs.message_number]; in tls13_handshake_active_state() 478 ctx->hs->tls13.transcript_hash, in tls13_handshake_send_action() 479 sizeof(ctx->hs->tls13.transcript_hash), in tls13_handshake_send_action() 480 &ctx->hs->tls13.transcript_hash_len)) in tls13_handshake_send_action() 522 ctx->hs->tls13.transcript_hash, in tls13_handshake_recv_action() 523 sizeof(ctx->hs->tls13.transcript_hash), in tls13_handshake_recv_action() 524 &ctx->hs->tls13.transcript_hash_len)) in tls13_handshake_recv_action() [all …]
|
| H A D | ssl_both.c | 265 if (s->s3->hs.tls12.reuse_message) { in ssl3_get_message() 266 s->s3->hs.tls12.reuse_message = 0; in ssl3_get_message() 267 if ((mt >= 0) && (s->s3->hs.tls12.message_type != mt)) { in ssl3_get_message() 274 s->init_num = (int)s->s3->hs.tls12.message_size; in ssl3_get_message() 280 if (s->s3->hs.state == st1) { in ssl3_get_message() 326 s->s3->hs.tls12.message_type = u8; in ssl3_get_message() 338 s->s3->hs.tls12.message_size = l; in ssl3_get_message() 339 s->s3->hs.state = stn; in ssl3_get_message() 348 n = s->s3->hs.tls12.message_size - s->init_num; in ssl3_get_message()
|
| H A D | ssl_sigalgs.c | 210 ssl_sigalgs_for_version(s->s3->hs.negotiated_tls_version, in ssl_sigalg_from_value() 259 if (s->s3->hs.negotiated_tls_version < TLS1_2_VERSION) in ssl_sigalg_for_legacy() 287 if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION) in ssl_sigalg_pkey_ok() 319 if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION && in ssl_sigalg_select() 320 s->s3->hs.sigalgs == NULL) in ssl_sigalg_select() 326 CBS_init(&cbs, s->s3->hs.sigalgs, s->s3->hs.sigalgs_len); in ssl_sigalg_select()
|
| H A D | t1_enc.c | 152 tls12_key_block_free(s->s3->hs.tls12.key_block); in tls1_cleanup_key_block() 153 s->s3->hs.tls12.key_block = NULL; in tls1_cleanup_key_block() 306 tls12_key_block_client_write(s->s3->hs.tls12.key_block, in tls1_change_cipher_state() 309 tls12_key_block_server_write(s->s3->hs.tls12.key_block, in tls1_change_cipher_state() 357 if (s->s3->hs.tls12.key_block != NULL) in tls1_setup_key_block() 360 if (s->s3->hs.cipher == NULL) in tls1_setup_key_block() 363 if ((s->s3->hs.cipher->algorithm_mac & SSL_AEAD) != 0) { in tls1_setup_key_block() 389 s->s3->hs.tls12.key_block = key_block; in tls1_setup_key_block() 400 if (s->s3->hs.cipher != NULL) { in tls1_setup_key_block() 401 if (s->s3->hs in tls1_setup_key_block() [all...] |
| /openbsd-src/sys/net/ |
| H A D | wg_noise.c | 214 struct noise_handshake *hs = &r->r_handshake; in noise_create_initiation() local 223 noise_param_init(hs->hs_ck, hs->hs_hash, r->r_public); in noise_create_initiation() 226 curve25519_generate_secret(hs->hs_e); in noise_create_initiation() 227 if (curve25519_generate_public(ue, hs->hs_e) == 0) in noise_create_initiation() 229 noise_msg_ephemeral(hs->hs_ck, hs->hs_hash, ue); in noise_create_initiation() 232 if (noise_mix_dh(hs->hs_ck, key, hs->hs_e, r->r_public) != 0) in noise_create_initiation() 237 NOISE_PUBLIC_KEY_LEN, key, hs->hs_hash); in noise_create_initiation() 240 if (noise_mix_ss(hs->hs_ck, key, r->r_ss) != 0) in noise_create_initiation() 246 NOISE_TIMESTAMP_LEN, key, hs->hs_hash); in noise_create_initiation() 249 hs->hs_state = CREATED_INITIATION; in noise_create_initiation() [all …]
|
| /openbsd-src/regress/lib/libssl/tlsext/ |
| H A D | tlsexttest.c | 1154 if ((ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xcca9)) == NULL) { in test_tlsext_ecpf_server() 1644 ssl->s3->hs.our_max_tls_version = TLS1_1_VERSION; in test_tlsext_sigalgs_client() 1651 ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION; in test_tlsext_sigalgs_client() 2085 ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; in test_tlsext_quic_transport_parameters_client() 2086 ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION; in test_tlsext_quic_transport_parameters_client() 3240 ssl->s3->hs.our_min_tls_version = TLS1_VERSION; in test_tlsext_clienthello_build() 3241 ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION; in test_tlsext_clienthello_build() 3274 ssl->s3->hs.our_max_tls_version = TLS1_1_VERSION; in test_tlsext_clienthello_build() 3361 ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; in test_tlsext_serverhello_build() 3362 ssl->s3->hs in test_tlsext_serverhello_build() [all...] |
| /openbsd-src/gnu/usr.bin/gcc/gcc/testsuite/gcc.c-torture/execute/ |
| H A D | 20001124-1.c | 32 int hs; in do_isofs_readdir() local 39 hs = inode->i_sb->s_hs; in do_isofs_readdir() 45 hs += block << bufbits; in do_isofs_readdir() 47 if (hs == 0) in do_isofs_readdir()
|
| /openbsd-src/games/tetris/ |
| H A D | scores.c | 256 checkscores(struct highscore *hs, int num) in checkscores() argument 273 qsort((void *)hs, nscores, sizeof(*hs), cmpscores); in checkscores() 277 for (i = 0, sp = hs; i < num;) { in checkscores() 309 hs[k] = hs[k + 1]; in checkscores() 382 printem(int level, int offset, struct highscore *hs, int n, const char *me) in printem() argument 395 sp = &hs[row]; in printem()
|
| /openbsd-src/usr.sbin/dvmrpd/ |
| H A D | neighbor.c | 172 u_int32_t hs, i; in nbr_init() local 174 for (hs = 1; hs < hashsize; hs <<= 1) in nbr_init() 176 nbrtable.hashtbl = calloc(hs, sizeof(struct nbr_head)); in nbr_init() 180 for (i = 0; i < hs; i++) in nbr_init() 183 nbrtable.hashmask = hs - 1; in nbr_init()
|
| /openbsd-src/usr.sbin/ripd/ |
| H A D | neighbor.c | 156 u_int32_t hs, i; in nbr_init() local 158 for (hs = 1; hs < hashsize; hs <<= 1) in nbr_init() 160 nbrtable.hashtbl = calloc(hs, sizeof(struct nbr_head)); in nbr_init() 164 for (i = 0; i < hs; i++) in nbr_init() 167 nbrtable.hashmask = hs - 1; in nbr_init()
|
| /openbsd-src/usr.sbin/smtpd/ |
| H A D | mta.c | 182 struct hoststat *hs; in mta_imsg() local 392 (void **)&hs)) { in mta_imsg() 395 hostname, (unsigned long long) hs->tm, in mta_imsg() 396 hs->error); in mta_imsg() 1376 struct hoststat *hs = arg; in mta_on_timeout() local 1398 hs->name); in mta_on_timeout() 1399 mta_hoststat_remove_entry(hs); in mta_on_timeout() 1400 free(hs); in mta_on_timeout() 2629 struct hoststat *hs = NULL; in mta_hoststat_update() local 2635 hs = dict_get(&hoststat, buf); in mta_hoststat_update() [all …]
|
| /openbsd-src/gnu/llvm/clang/include/clang/AST/ |
| H A D | FormatString.h | 347 : start(amountStart), length(amountLength), hs(howSpecified), amt(amount), in OptionalAmount() 351 : start(nullptr),length(0), hs(valid ? NotSpecified : Invalid), amt(0), in start() 355 : start(nullptr), length(0), hs(Constant), amt(Amount), in OptionalAmount() 359 return hs == Invalid; in isInvalid() 362 HowSpecified getHowSpecified() const { return hs; } in getHowSpecified() 363 void setHowSpecified(HowSpecified h) { hs = h; } in setHowSpecified() 365 bool hasDataArgument() const { return hs == Arg; } in hasDataArgument() 373 assert(hs == Constant); in getConstantAmount() 383 assert(hs == Constant); in getConstantLength() 403 HowSpecified hs; variable
|
| /openbsd-src/gnu/usr.sbin/mkhybrid/src/libfile/ |
| H A D | softmagic.c | 145 p->h = (short)((p->hs[0]<<8)|(p->hs[1])); 153 p->h = (short)((p->hs[1]<<8)|(p->hs[0]));
|
| /openbsd-src/sys/dev/usb/ |
| H A D | uhub.c | 124 usb_hub_descriptor_t hs; in uhub_attach() member 168 err = usbd_get_hub_descriptor(dev, &hd.hs, 1); in uhub_attach() 169 nports = hd.hs.bNbrPorts; in uhub_attach() 170 powerdelay = (hd.hs.bPwrOn2PwrGood * UHD_PWRON_FACTOR); in uhub_attach() 171 ttthink = UGETW(hd.hs.wHubCharacteristics) & UHD_TT_THINK; in uhub_attach() 173 usbd_get_hub_descriptor(dev, &hd.hs, nports); in uhub_attach() 188 if (!UHD_NOT_REMOV(&hd.hs, port)) in uhub_attach()
|