Searched refs:buffer (Results 276 - 300 of 425) sorted by relevance

<<11121314151617

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rand/
H A Drandfile.c70 #include <openssl/buffer.h>
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/stack/
H A DMakefile78 stack.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/store/
H A Dstr_meth.c60 #include <openssl/buffer.h>
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/
H A Dts_rsp_verify.c590 unsigned char buffer[4096]; local
618 while ((length = BIO_read(data, buffer, sizeof(buffer))) > 0)
620 EVP_DigestUpdate(&md_ctx, buffer, length);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/
H A Dx509_obj.c64 #include <openssl/buffer.h>
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/
H A Db64.c63 #include <openssl/buffer.h>
140 BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ccgost/
H A Dgost_lcl.h152 unsigned char buffer[8]; member in struct:ossl_gost_imit_ctx
204 /* Read bignum, which can have few MSB all-zeros from buffer*/
H A Dgost_sign.c21 void dump_signature(const char *message,const unsigned char *buffer,size_t len) argument
28 fprintf (stderr," %02x",buffer[i]);
293 /* Convert byte buffer to bignum, skipping leading zeros*/
312 /* Pack bignum into byte buffer of given size, filling all leading bytes
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/
H A Dssl_txt.c86 #include <openssl/buffer.h>
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/
H A Denginetest.c70 #include <openssl/buffer.h>
H A DMakefile465 asn1test.o: ../include/openssl/bio.h ../include/openssl/buffer.h
479 bntest.o: ../include/openssl/bn.h ../include/openssl/buffer.h
525 ecdsatest.o: ../include/openssl/bn.h ../include/openssl/buffer.h
539 ectest.o: ../include/openssl/bn.h ../include/openssl/buffer.h
552 enginetest.o: ../include/openssl/buffer.h ../include/openssl/crypto.h
565 evp_test.o: ../include/openssl/buffer.h ../include/openssl/conf.h
597 jpaketest.o: ../include/openssl/buffer.h ../include/openssl/crypto.h
602 md2test.o: ../include/openssl/buffer.h ../include/openssl/crypto.h
638 rc5test.o: ../include/openssl/buffer.h ../include/openssl/crypto.h
673 ssltest.o: ../include/openssl/bn.h ../include/openssl/buffer
[all...]
/barrelfish-2018-10-04/lib/vfs/
H A Dfopen.c220 newfile->buffer = NULL;
H A Dcache.c3 * \brief VFS buffer cache.
459 static errval_t read(void *st, vfs_handle_t handle, void *buffer, size_t bytes, argument
529 // Copy data to user's buffer
530 memcpy(buffer + offset, blockptr + block_offset, didread);
548 static errval_t write(void *st, vfs_handle_t handle, const void *buffer, argument
597 memcpy(blockptr + block_offset, buffer + offset, towrite);
620 err = bst->orig_ops->write(bst->orig_st, handle, buffer,
820 * \brief Initialize buffer cache.
/barrelfish-2018-10-04/lib/lwip2/src/core/ipv6/
H A Dnd6.c92 /* Static buffer to parse RA packet options (size of a prefix option, biggest option) */
294 /* Check if there is a link-layer address provided. Only point to it if in this buffer. */
394 u8_t *buffer; /* Used to copy options. */ local
461 buffer = &((u8_t*)p->payload)[offset];
463 buffer = nd6_ra_buffer;
464 if (pbuf_copy_partial(p, buffer, sizeof(struct prefix_option), offset) != sizeof(struct prefix_option)) {
471 if (buffer[1] == 0) {
478 switch (buffer[0]) {
482 lladdr_opt = (struct lladdr_option *)buffer;
494 mtu_opt = (struct mtu_option *)buffer;
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/aes/
H A DMakefile114 aes_ige.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h
126 aes_wrap.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/objects/
H A DMakefile100 obj_dat.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h
116 obj_lib.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
/barrelfish-2018-10-04/usr/bench/mem_latency/
H A Dmemlatency.c231 static cycles_t run_benchmark(void *buffer, volatile void **ret_elem) argument
233 volatile struct elem *e = buffer;
/barrelfish-2018-10-04/lib/bulk_transfer/backends/net/
H A Dbulk_net_transfer.c133 rb->buffer = NULL;
207 if (rb->buffer == NULL) {
208 // Temporary initialization buffer -> do not reenqueue after
/barrelfish-2018-10-04/usr/acpi/
H A Dintel_vtd.c39 char *buffer = malloc(size); local
40 assert(buffer != NULL);
41 vtd_iotlb_pr(buffer, size, unit->iotlb_regs);
42 vtd_pr(buffer, size, unit->regset);
43 puts(buffer);
44 free(buffer);
/barrelfish-2018-10-04/usr/fish/
H A Dfish_common.c610 /* Open input files, read buffer and write to output file */
823 uint8_t * buffer = malloc(blocksize); local
834 if (buffer == NULL)
837 printf("failed to allocate buffer of size %zd\n", blocksize);
846 err = vfs_read(source_vh, buffer, blocksize, &rsize);
859 printf("was unable to write the whole chunk of size %zd. Now at pos: %zd of buffer\n", rsize, wpos);
861 err = vfs_write(target_vh, &buffer[wpos], rsize - wpos, &wsize);
884 if (buffer != NULL)
885 free(buffer);
/barrelfish-2018-10-04/usr/eclipseclp/documents/embedding/
H A Ddbi.tex149 involves parsing the SQL statement and setting up a buffer for the tuples.
151 A data template is used as an example buffer. For the insert command above it
242 \subsection{Specifying buffer sizes in templates}
277 The size information is used to define the minimum size of the buffer used
280 intermediate buffer may not be used; in such cases, the buffer size will be
281 ignored. Otherwise, if the data is too big to fit into the buffer, an error
284 The data in the buffer is passed to/from the database, which may have its own
289 database, and the data is too large for the buffer, an error will be raised.
615 a buffer ful
[all...]
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/polarssl/
H A Dsha1.c243 * SHA-1 process buffer
264 MEMCPY( (void *) (ctx->buffer + left),
266 sha1_process( ctx, ctx->buffer );
281 MEMCPY( (void *) (ctx->buffer + left),
324 * output = SHA-1( input buffer )
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509v3/
H A Dv3_utl.c358 /* Given a buffer of length 'len' return a OPENSSL_malloc'ed string with its
360 * @@@ (Contents of buffer are always kept in ASCII, also on EBCDIC machines)
363 char *hex_to_string(const unsigned char *buffer, long len) argument
369 if(!buffer || !len) return NULL;
375 for(i = 0, p = buffer; i < len; i++,p++) {
389 * a buffer
/barrelfish-2018-10-04/lib/term/server/
H A Dserver.c328 /* free previous send buffer */
343 * Flip the buffer
344 * Flounder uses the back buffer to send the data. New data is filled
345 * into the front buffer. The back buffer is freed once the send
381 const char *buffer, size_t length)
389 server->chars_cb(server->st, (CONST_CAST)buffer, length);
411 const char *buffer, size_t length)
380 in_characters_handler(struct terminal_binding *b, const char *buffer, size_t length) argument
410 out_characters_handler(struct terminal_binding *b, const char *buffer, size_t length) argument
/barrelfish-2018-10-04/include/lwip2/netif/ppp/polarssl/
H A Dsha1.c243 * SHA-1 process buffer
264 MEMCPY( (void *) (ctx->buffer + left),
266 sha1_process( ctx, ctx->buffer );
281 MEMCPY( (void *) (ctx->buffer + left),
324 * output = SHA-1( input buffer )

Completed in 362 milliseconds

<<11121314151617