| /src/sys/net/ |
| if_mpls.c | 217 union mpls_shim mh, *pms; local 242 pms = &((struct sockaddr_mpls*)rt_gettag(rt))->smpls_addr; 245 pms++; 250 mh.s_addr = ntohl(pms->s_addr);
|
| /src/sbin/route/ |
| rtutil.c | 768 const union mpls_shim *pms; local 772 pms = &((const struct sockaddr_mpls*)sa)->smpls_addr; 773 ms.s_addr = ntohl(pms->s_addr); 778 pms++; 779 ms.s_addr = ntohl(pms->s_addr);
|
| route.c | 1746 const union mpls_shim *pms; local 1753 pms = &su->smpls.smpls_addr; 1755 pms++; 1756 ms.s_addr = ntohl(pms->s_addr);
|
| /src/crypto/external/apache2/openssl/dist/providers/fips/ |
| self_test_kats.c | 223 const ST_KAT_PARAM *pms; local 234 while ((pms = va_arg(ap, const ST_KAT_PARAM *)) != NULL) 235 if (!add_params(bld, pms, bnc)) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| s3_lib.c | 3859 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen); 3891 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen); 5205 int ssl_generate_master_secret(SSL_CONNECTION *s, unsigned char *pms, 5233 memcpy(t, pms, pmslen); 5255 s->session->master_key, pms, pmslen, 5264 if (pms) { 5266 OPENSSL_clear_free(pms, pmslen); 5268 OPENSSL_cleanse(pms, pmslen); 5271 s->s3.tmp.pms = NULL; 5374 /* Generate secrets from pms */ 5404 unsigned char *pms = NULL; local 5463 unsigned char *pms = NULL; local 5514 unsigned char *pms = NULL, *ct = NULL; local [all...] |
| ssl_local.h | 1386 unsigned char *pms; member in struct:ssl_connection_st::__anon626::__anon627 2627 __owur int ssl_generate_master_secret(SSL_CONNECTION *s, unsigned char *pms, 2630 __owur int ssl_gensecret(SSL_CONNECTION *s, unsigned char *pms, size_t pmslen);
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| s3_lib.c | 3361 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); 3384 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); 4600 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, 4627 memcpy(t, pms, pmslen); 4649 s->session->master_key, pms, pmslen, 4658 if (pms) { 4660 OPENSSL_clear_free(pms, pmslen); 4662 OPENSSL_cleanse(pms, pmslen); 4665 s->s3.tmp.pms = NULL; 4765 /* Generate secrets from pms */ 4795 unsigned char *pms = NULL; local 4850 unsigned char *pms = NULL; local 4900 unsigned char *pms = NULL, *ct = NULL; local [all...] |
| ssl_local.h | 1340 unsigned char *pms; member in struct:ssl_st::__anon1657::__anon1658 2460 __owur int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, 2463 __owur int ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| s3_lib.c | 3330 OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen); 3350 OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen); 4610 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, 4637 memcpy(t, pms, pmslen); 4659 s->session->master_key, pms, pmslen, 4668 if (pms) { 4670 OPENSSL_clear_free(pms, pmslen); 4672 OPENSSL_cleanse(pms, pmslen); 4675 s->s3->tmp.pms = NULL; 4792 unsigned char *pms = NULL local [all...] |
| ssl_local.h | 1606 unsigned char *pms; member in struct:ssl3_state_st::__anon2197 2329 __owur int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 3109 unsigned char *pms = NULL; local 3132 pms = OPENSSL_malloc(pmslen); 3133 if (pms == NULL) { 3138 pms[0] = s->client_version >> 8; 3139 pms[1] = s->client_version & 0xff; 3140 if (RAND_bytes_ex(sctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { 3153 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { 3158 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { 3172 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { 3177 s->s3.tmp.pms = pms 3306 unsigned char *pms = NULL; local 3454 unsigned char *pms = NULL; local 3625 unsigned char *pms = NULL; local [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_clnt.c | 2831 unsigned char *pms = NULL; local 2849 pms = OPENSSL_malloc(pmslen); 2850 if (pms == NULL) { 2855 pms[0] = s->client_version >> 8; 2856 pms[1] = s->client_version & 0xff; 2857 if (RAND_bytes_ex(s->ctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { 2870 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { 2875 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { 2889 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { 2894 s->s3.tmp.pms = pms 3023 unsigned char *pms = NULL; local 3166 unsigned char *pms = NULL; local 3334 unsigned char *pms = NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_clnt.c | 2977 unsigned char *pms = NULL; local 2997 pms = OPENSSL_malloc(pmslen); 2998 if (pms == NULL) { 3004 pms[0] = s->client_version >> 8; 3005 pms[1] = s->client_version & 0xff; 3007 if (RAND_bytes(pms + 2, (int)(pmslen - 2)) <= 0) { 3021 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { 3027 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { 3043 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { 3048 s->s3->tmp.pms = pms 3187 unsigned char *pms = NULL; local 3373 unsigned char *pms = NULL; local [all...] |
| /src/sbin/fsck_udf/ |
| main.c | 2205 struct part_map_spare *pms = &mapping->pms; local 2209 for (spar = 0; spar < pms->n_st; spar++) { 2210 lb_num = pms->st_loc[spar]; 2489 layout.spareable_blockingnr = udf_rw16(mapping->pms.packet_len);
|
| /src/sys/fs/udf/ |
| ecma167-udf.h | 482 struct part_map_spare pms; member in union:udf_pmap
|
| udf_subr.c | 3153 struct part_map_spare *pms = &mapping->pms; local 3164 ump->sparable_packet_size = udf_rw16(pms->packet_len); 3167 for (spar = 0; spar < pms->n_st; spar++) { 3168 lb_num = pms->st_loc[spar];
|