/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rand/ |
H A D | randfile.c | 70 #include <openssl/buffer.h>
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/stack/ |
H A D | Makefile | 78 stack.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/store/ |
H A D | str_meth.c | 60 #include <openssl/buffer.h>
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_rsp_verify.c | 590 unsigned char buffer[4096]; local 618 while ((length = BIO_read(data, buffer, sizeof(buffer))) > 0) 620 EVP_DigestUpdate(&md_ctx, buffer, length);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_obj.c | 64 #include <openssl/buffer.h>
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/ |
H A D | b64.c | 63 #include <openssl/buffer.h> 140 BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_lcl.h | 152 unsigned char buffer[8]; member in struct:ossl_gost_imit_ctx 204 /* Read bignum, which can have few MSB all-zeros from buffer*/
|
H A D | gost_sign.c | 21 void dump_signature(const char *message,const unsigned char *buffer,size_t len) argument 28 fprintf (stderr," %02x",buffer[i]); 293 /* Convert byte buffer to bignum, skipping leading zeros*/ 312 /* Pack bignum into byte buffer of given size, filling all leading bytes
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | ssl_txt.c | 86 #include <openssl/buffer.h>
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | enginetest.c | 70 #include <openssl/buffer.h>
|
H A D | Makefile | 465 asn1test.o: ../include/openssl/bio.h ../include/openssl/buffer.h 479 bntest.o: ../include/openssl/bn.h ../include/openssl/buffer.h 525 ecdsatest.o: ../include/openssl/bn.h ../include/openssl/buffer.h 539 ectest.o: ../include/openssl/bn.h ../include/openssl/buffer.h 552 enginetest.o: ../include/openssl/buffer.h ../include/openssl/crypto.h 565 evp_test.o: ../include/openssl/buffer.h ../include/openssl/conf.h 597 jpaketest.o: ../include/openssl/buffer.h ../include/openssl/crypto.h 602 md2test.o: ../include/openssl/buffer.h ../include/openssl/crypto.h 638 rc5test.o: ../include/openssl/buffer.h ../include/openssl/crypto.h 673 ssltest.o: ../include/openssl/bn.h ../include/openssl/buffer [all...] |
/barrelfish-2018-10-04/lib/vfs/ |
H A D | fopen.c | 220 newfile->buffer = NULL;
|
H A D | cache.c | 3 * \brief VFS buffer cache. 459 static errval_t read(void *st, vfs_handle_t handle, void *buffer, size_t bytes, argument 529 // Copy data to user's buffer 530 memcpy(buffer + offset, blockptr + block_offset, didread); 548 static errval_t write(void *st, vfs_handle_t handle, const void *buffer, argument 597 memcpy(blockptr + block_offset, buffer + offset, towrite); 620 err = bst->orig_ops->write(bst->orig_st, handle, buffer, 820 * \brief Initialize buffer cache.
|
/barrelfish-2018-10-04/lib/lwip2/src/core/ipv6/ |
H A D | nd6.c | 92 /* Static buffer to parse RA packet options (size of a prefix option, biggest option) */ 294 /* Check if there is a link-layer address provided. Only point to it if in this buffer. */ 394 u8_t *buffer; /* Used to copy options. */ local 461 buffer = &((u8_t*)p->payload)[offset]; 463 buffer = nd6_ra_buffer; 464 if (pbuf_copy_partial(p, buffer, sizeof(struct prefix_option), offset) != sizeof(struct prefix_option)) { 471 if (buffer[1] == 0) { 478 switch (buffer[0]) { 482 lladdr_opt = (struct lladdr_option *)buffer; 494 mtu_opt = (struct mtu_option *)buffer; [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/aes/ |
H A D | Makefile | 114 aes_ige.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h 126 aes_wrap.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/objects/ |
H A D | Makefile | 100 obj_dat.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h 116 obj_lib.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
|
/barrelfish-2018-10-04/usr/bench/mem_latency/ |
H A D | memlatency.c | 231 static cycles_t run_benchmark(void *buffer, volatile void **ret_elem) argument 233 volatile struct elem *e = buffer;
|
/barrelfish-2018-10-04/lib/bulk_transfer/backends/net/ |
H A D | bulk_net_transfer.c | 133 rb->buffer = NULL; 207 if (rb->buffer == NULL) { 208 // Temporary initialization buffer -> do not reenqueue after
|
/barrelfish-2018-10-04/usr/acpi/ |
H A D | intel_vtd.c | 39 char *buffer = malloc(size); local 40 assert(buffer != NULL); 41 vtd_iotlb_pr(buffer, size, unit->iotlb_regs); 42 vtd_pr(buffer, size, unit->regset); 43 puts(buffer); 44 free(buffer);
|
/barrelfish-2018-10-04/usr/fish/ |
H A D | fish_common.c | 610 /* Open input files, read buffer and write to output file */ 823 uint8_t * buffer = malloc(blocksize); local 834 if (buffer == NULL) 837 printf("failed to allocate buffer of size %zd\n", blocksize); 846 err = vfs_read(source_vh, buffer, blocksize, &rsize); 859 printf("was unable to write the whole chunk of size %zd. Now at pos: %zd of buffer\n", rsize, wpos); 861 err = vfs_write(target_vh, &buffer[wpos], rsize - wpos, &wsize); 884 if (buffer != NULL) 885 free(buffer);
|
/barrelfish-2018-10-04/usr/eclipseclp/documents/embedding/ |
H A D | dbi.tex | 149 involves parsing the SQL statement and setting up a buffer for the tuples. 151 A data template is used as an example buffer. For the insert command above it 242 \subsection{Specifying buffer sizes in templates} 277 The size information is used to define the minimum size of the buffer used 280 intermediate buffer may not be used; in such cases, the buffer size will be 281 ignored. Otherwise, if the data is too big to fit into the buffer, an error 284 The data in the buffer is passed to/from the database, which may have its own 289 database, and the data is too large for the buffer, an error will be raised. 615 a buffer ful [all...] |
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/polarssl/ |
H A D | sha1.c | 243 * SHA-1 process buffer 264 MEMCPY( (void *) (ctx->buffer + left), 266 sha1_process( ctx, ctx->buffer ); 281 MEMCPY( (void *) (ctx->buffer + left), 324 * output = SHA-1( input buffer )
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_utl.c | 358 /* Given a buffer of length 'len' return a OPENSSL_malloc'ed string with its 360 * @@@ (Contents of buffer are always kept in ASCII, also on EBCDIC machines) 363 char *hex_to_string(const unsigned char *buffer, long len) argument 369 if(!buffer || !len) return NULL; 375 for(i = 0, p = buffer; i < len; i++,p++) { 389 * a buffer
|
/barrelfish-2018-10-04/lib/term/server/ |
H A D | server.c | 328 /* free previous send buffer */ 343 * Flip the buffer 344 * Flounder uses the back buffer to send the data. New data is filled 345 * into the front buffer. The back buffer is freed once the send 381 const char *buffer, size_t length) 389 server->chars_cb(server->st, (CONST_CAST)buffer, length); 411 const char *buffer, size_t length) 380 in_characters_handler(struct terminal_binding *b, const char *buffer, size_t length) argument 410 out_characters_handler(struct terminal_binding *b, const char *buffer, size_t length) argument
|
/barrelfish-2018-10-04/include/lwip2/netif/ppp/polarssl/ |
H A D | sha1.c | 243 * SHA-1 process buffer 264 MEMCPY( (void *) (ctx->buffer + left), 266 sha1_process( ctx, ctx->buffer ); 281 MEMCPY( (void *) (ctx->buffer + left), 324 * output = SHA-1( input buffer )
|