| /src/share/doc/psd/20.ipctut/ |
| udgramsend.c | 63 perror("sending datagram message");
|
| dgramsend.c | 76 perror("sending datagram message");
|
| /src/crypto/external/bsd/openssl/dist/ssl/record/ |
| ssl3_record_tls13.c | 23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, 43 if (sending) { 54 * If we're sending an alert and ctx != NULL then we must be forcing 100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, 114 if (!sending) { 146 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 147 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, 182 if (sending) {
|
| ssl3_record.c | 848 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending, 863 if (sending) { 888 if ((bs != 1) && sending && !provided) { 906 if (!sending) { 922 if (!sending && mac != NULL) { 947 if (!sending) 972 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, 983 int tlstree_enc = sending ? (s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_TLSTREE) 991 if (sending) { 1072 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer [all...] |
| record.h | 228 __owur int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending,
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
| ssl3_record_tls13.c | 22 * -1: if the record's AEAD-authenticator is invalid or, if sending, 25 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending) 45 if (sending) { 56 * If we're sending an alert and ctx != NULL then we must be forcing 100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, 116 if (!sending) { 150 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 151 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, 184 if (sending) {
|
| ssl3_record.c | 843 * -1: if the record's padding is invalid or, if sending, an internal error 846 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending) 861 if (sending) { 885 if ((bs != 1) && sending) { 899 if (!sending) { 919 if ((bs != 1) && !sending) 934 * -1: if the record's padding/AEAD-authenticator is invalid or, if sending, 937 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending) 954 if (sending) { 1037 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| ssl3_meth.c | 96 size_t n_recs, int sending, SSL_MAC_BUF *mac, 127 if ((bs != 1) && sending && !provided) { 145 if (!sending) { 161 if (!sending && mac != NULL) { 186 if (!sending) 219 int sending) 237 if (!sending
|
| tls1_meth.c | 174 size_t n_recs, int sending, SSL_MAC_BUF *macs, 207 if (sending) { 292 if (sending) { 296 } else if ((bs != 1) && sending && !provided) { 317 if (!sending) { 354 * When sending, seq is incremented after MAC calculation. 358 if (sending && !rl->use_etm) 389 if (!sending) { 436 if (!sending) { 480 int sending) [all...] |
| tls13_meth.c | 88 size_t n_recs, int sending, SSL_MAC_BUF *mac, 121 * If we're sending an alert and ctx != NULL then we must be forcing 146 if (!sending) { 197 if (sending) { 218 if (EVP_CipherInit_ex(enc_ctx, NULL, NULL, NULL, nonce, sending) <= 0 219 || (!sending && EVP_CIPHER_CTX_ctrl(enc_ctx, EVP_CTRL_AEAD_SET_TAG, rl->taglen, rec->data + rec->length) <= 0)) { 242 if (sending) {
|
| tlsany_meth.c | 38 size_t n_recs, int sending, SSL_MAC_BUF *macs,
|
| recmethod_local.h | 116 int sending, SSL_MAC_BUF *macs, size_t macsize); 119 int sending);
|
| /src/external/gpl3/gdb.old/dist/gdb/ |
| remote.h | 89 /* The SENDING callback is called once send_remote_packet has performed 95 virtual void sending (gdb::array_view<const char> &buf) = 0; 111 Calls CALLBACKS->sending() just before the packet is sent to the remote
|
| /src/external/gpl3/gdb/dist/gdb/ |
| remote.h | 89 /* The SENDING callback is called once send_remote_packet has performed 95 virtual void sending (gdb::array_view<const char> &buf) = 0; 111 Calls CALLBACKS->sending() just before the packet is sent to the remote
|
| /src/external/ibm-public/postfix/dist/mantools/ |
| make_soho_readme | 28 find. The text describes the mail sending side only. If your machine
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem.c | 32 * The Message flow state machine controls the reading and sending of messages 241 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are 245 int ossl_statem_check_finish_init(SSL_CONNECTION *s, int sending) 247 if (sending == -1) { 260 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END || s->statem.hand_state == TLS_ST_EARLY_DATA) 262 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { 268 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) 411 * failed to even initialise properly. Sending an alert is probably 794 * sending of the message. This could result in an NBIO event occurring in 799 * sending [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem.c | 29 * The Message flow state machine controls the reading and sending of messages 211 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are 215 void ossl_statem_check_finish_init(SSL *s, int sending) 217 if (sending == -1) { 230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END 233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { 239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) 367 * failed to even initialise properly. Sending an alert is probably 753 * sending of the message. This could result in an NBIO event occurring in 758 * sending [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem.c | 24 * The Message flow state machine controls the reading and sending of messages 196 * |sending| is 1 if we are attempting to send data (SSL_write*()), 0 if we are 200 void ossl_statem_check_finish_init(SSL *s, int sending) 202 if (sending == -1) { 215 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END 218 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { 224 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) 352 * failed to even initialise properly. Sending an alert is probably 743 * sending of the message. This could result in an NBIO event occurring in 748 * sending [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| tls13_enc.c | 333 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, 391 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 746 int tls13_update_key(SSL *s, int sending) 768 if (s->server == sending) 773 if (sending) { 784 if (!derive_secret_key_and_iv(s, sending, md, 796 log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL;
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| tls13_enc.c | 361 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, 422 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 724 int tls13_update_key(SSL *s, int sending) 738 if (s->server == sending) 743 if (sending) { 754 if (!derive_secret_key_and_iv(s, sending, ssl_handshake_md(s),
|
| /src/usr.bin/msgs/ |
| msgs.c | 130 bool sending = NO; variable 235 case 's': /* sending TO msgs */ 360 sending = YES; 683 if (sending) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| tls13_enc.c | 771 int tls13_update_key(SSL_CONNECTION *s, int sending) 783 int direction = sending ? OSSL_RECORD_DIRECTION_WRITE 794 if (s->server == sending) 823 log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL;
|
| /src/external/gpl3/gdb.old/dist/gdb/python/ |
| py-connection.c | 304 and read the result before sending a packet and processing the 313 void sending (gdb::array_view<const char> &buf) override 335 call this before sending a packet to the remote and processing the 342 It is important that the result is inspected immediately after sending
|
| /src/external/gpl3/gdb/dist/gdb/python/ |
| py-connection.c | 303 and read the result before sending a packet and processing the 312 void sending (gdb::array_view<const char> &buf) override 334 call this before sending a packet to the remote and processing the 341 It is important that the result is inspected immediately after sending
|
| /src/external/bsd/ipf/dist/iplang/ |
| iplang_y.y | 70 send_t sending; 1284 ifp = sending.snd_if; 1286 fprintf(stderr, "no interface defined for sending!\n"); 1291 gwip = sending.snd_gw; 1295 "no destination address defined for sending\n"); 1455 sending.snd_if = iflist; 1456 sending.snd_gw = defrouter; 1468 sending.snd_if = ifp; 1479 sending.snd_gw = getipv4addr(*arg);
|