HomeSort by: relevance | last modified time | path
    Searched refs:sending (Results 1 - 25 of 35) sorted by relevancy

1 2

  /src/share/doc/psd/20.ipctut/
udgramsend.c 63 perror("sending datagram message");
dgramsend.c 76 perror("sending datagram message");
  /src/crypto/external/bsd/openssl/dist/ssl/record/
ssl3_record_tls13.c 23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending,
43 if (sending) {
54 * If we're sending an alert and ctx != NULL then we must be forcing
100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen,
114 if (!sending) {
146 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0
147 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG,
182 if (sending) {
ssl3_record.c 848 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending,
863 if (sending) {
888 if ((bs != 1) && sending && !provided) {
906 if (!sending) {
922 if (!sending && mac != NULL) {
947 if (!sending)
972 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending,
983 int tlstree_enc = sending ? (s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_TLSTREE)
991 if (sending) {
1072 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer
    [all...]
record.h 228 __owur int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending,
  /src/crypto/external/bsd/openssl.old/dist/ssl/record/
ssl3_record_tls13.c 22 * -1: if the record's AEAD-authenticator is invalid or, if sending,
25 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending)
45 if (sending) {
56 * If we're sending an alert and ctx != NULL then we must be forcing
100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen,
116 if (!sending) {
150 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0
151 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG,
184 if (sending) {
ssl3_record.c 843 * -1: if the record's padding is invalid or, if sending, an internal error
846 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending)
861 if (sending) {
885 if ((bs != 1) && sending) {
899 if (!sending) {
919 if ((bs != 1) && !sending)
934 * -1: if the record's padding/AEAD-authenticator is invalid or, if sending,
937 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending)
954 if (sending) {
1037 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/record/methods/
ssl3_meth.c 96 size_t n_recs, int sending, SSL_MAC_BUF *mac,
127 if ((bs != 1) && sending && !provided) {
145 if (!sending) {
161 if (!sending && mac != NULL) {
186 if (!sending)
219 int sending)
237 if (!sending
tls1_meth.c 174 size_t n_recs, int sending, SSL_MAC_BUF *macs,
207 if (sending) {
292 if (sending) {
296 } else if ((bs != 1) && sending && !provided) {
317 if (!sending) {
354 * When sending, seq is incremented after MAC calculation.
358 if (sending && !rl->use_etm)
389 if (!sending) {
436 if (!sending) {
480 int sending)
    [all...]
tls13_meth.c 88 size_t n_recs, int sending, SSL_MAC_BUF *mac,
121 * If we're sending an alert and ctx != NULL then we must be forcing
146 if (!sending) {
197 if (sending) {
218 if (EVP_CipherInit_ex(enc_ctx, NULL, NULL, NULL, nonce, sending) <= 0
219 || (!sending && EVP_CIPHER_CTX_ctrl(enc_ctx, EVP_CTRL_AEAD_SET_TAG, rl->taglen, rec->data + rec->length) <= 0)) {
242 if (sending) {
tlsany_meth.c 38 size_t n_recs, int sending, SSL_MAC_BUF *macs,
recmethod_local.h 116 int sending, SSL_MAC_BUF *macs, size_t macsize);
119 int sending);
  /src/external/gpl3/gdb.old/dist/gdb/
remote.h 89 /* The SENDING callback is called once send_remote_packet has performed
95 virtual void sending (gdb::array_view<const char> &buf) = 0;
111 Calls CALLBACKS->sending() just before the packet is sent to the remote
  /src/external/gpl3/gdb/dist/gdb/
remote.h 89 /* The SENDING callback is called once send_remote_packet has performed
95 virtual void sending (gdb::array_view<const char> &buf) = 0;
111 Calls CALLBACKS->sending() just before the packet is sent to the remote
  /src/external/ibm-public/postfix/dist/mantools/
make_soho_readme 28 find. The text describes the mail sending side only. If your machine
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem.c 32 * The Message flow state machine controls the reading and sending of messages
241 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are
245 int ossl_statem_check_finish_init(SSL_CONNECTION *s, int sending)
247 if (sending == -1) {
260 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END || s->statem.hand_state == TLS_ST_EARLY_DATA)
262 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) {
268 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY)
411 * failed to even initialise properly. Sending an alert is probably
794 * sending of the message. This could result in an NBIO event occurring in
799 * sending
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem.c 29 * The Message flow state machine controls the reading and sending of messages
211 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are
215 void ossl_statem_check_finish_init(SSL *s, int sending)
217 if (sending == -1) {
230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END
233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) {
239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY)
367 * failed to even initialise properly. Sending an alert is probably
753 * sending of the message. This could result in an NBIO event occurring in
758 * sending
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem.c 24 * The Message flow state machine controls the reading and sending of messages
196 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are
200 void ossl_statem_check_finish_init(SSL *s, int sending)
202 if (sending == -1) {
215 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END
218 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) {
224 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY)
352 * failed to even initialise properly. Sending an alert is probably
743 * sending of the message. This could result in an NBIO event occurring in
748 * sending
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/
tls13_enc.c 333 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md,
391 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0
746 int tls13_update_key(SSL *s, int sending)
768 if (s->server == sending)
773 if (sending) {
784 if (!derive_secret_key_and_iv(s, sending, md,
796 log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL;
  /src/crypto/external/bsd/openssl.old/dist/ssl/
tls13_enc.c 361 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md,
422 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0
724 int tls13_update_key(SSL *s, int sending)
738 if (s->server == sending)
743 if (sending) {
754 if (!derive_secret_key_and_iv(s, sending, ssl_handshake_md(s),
  /src/usr.bin/msgs/
msgs.c 130 bool sending = NO; variable
235 case 's': /* sending TO msgs */
360 sending = YES;
683 if (sending) {
  /src/crypto/external/apache2/openssl/dist/ssl/
tls13_enc.c 771 int tls13_update_key(SSL_CONNECTION *s, int sending)
783 int direction = sending ? OSSL_RECORD_DIRECTION_WRITE
794 if (s->server == sending)
823 log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL;
  /src/external/gpl3/gdb.old/dist/gdb/python/
py-connection.c 304 and read the result before sending a packet and processing the
313 void sending (gdb::array_view<const char> &buf) override
335 call this before sending a packet to the remote and processing the
342 It is important that the result is inspected immediately after sending
  /src/external/gpl3/gdb/dist/gdb/python/
py-connection.c 303 and read the result before sending a packet and processing the
312 void sending (gdb::array_view<const char> &buf) override
334 call this before sending a packet to the remote and processing the
341 It is important that the result is inspected immediately after sending
  /src/external/bsd/ipf/dist/iplang/
iplang_y.y 70 send_t sending;
1284 ifp = sending.snd_if;
1286 fprintf(stderr, "no interface defined for sending!\n");
1291 gwip = sending.snd_gw;
1295 "no destination address defined for sending\n");
1455 sending.snd_if = iflist;
1456 sending.snd_gw = defrouter;
1468 sending.snd_if = ifp;
1479 sending.snd_gw = getipv4addr(*arg);

Completed in 91 milliseconds

1 2