Searched refs:callback (Results 76 - 94 of 94) sorted by relevance

1234

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/
H A Drsa.h122 /* If this callback is NULL, the builtin software RSA key-gen will be used. This
265 (*callback)(int,int,void *),void *cb_arg);
/barrelfish-2018-10-04/include/openssl/
H A Drsa.h122 /* If this callback is NULL, the builtin software RSA key-gen will be used. This
265 (*callback)(int,int,void *),void *cb_arg);
H A Dbio.h125 /* callback is int cb(BIO *bio,state,ret); */
126 #define BIO_CTRL_SET_CALLBACK 14 /* opt - set callback function */
127 #define BIO_CTRL_GET_CALLBACK 15 /* opt - set callback function */
243 /* These are passed by the BIO callback */
251 /* The callback is called before and after the underling operation,
260 long (*callback)(struct bio_st *,int,const char *,int, long,long));
287 long (*callback)(struct bio_st *,int,const char *,int, long,long); member in struct:bio_st
288 char *cb_arg; /* first argument for the callback */
322 /* Prefix and suffix callback in ASN1 BIO */
H A Dssl.h655 /* This callback type is used inside SSL_CTX, SSL, and in the functions that set
663 * In SSLv2 this is 16 bytes, whereas SSLv3/TLSv1 it is 32 bytes. The callback
665 * supposed to be fixed at 16 bytes so the id will be padded after the callback
666 * returns in this case. It is also an error for the callback to set the size to
713 /* If this callback is not null, it will be called each
715 * returns 1, it means that the callback will do a
717 * on 0, it means the callback has finished with it.
740 * passed back via the callback. This
754 /* Default password callback. */
757 /* Default password callback use
[all...]
/barrelfish-2018-10-04/doc/011-idc/
H A DIDC.tex410 It takes a state pointer, export callback, connection callback, waitset
414 When the export either succeeds or fails, the export callback will be invoked.
425 occurs, the connection callback will be invoked. This function takes the state
430 the client. When accepting a binding request, the connection callback also has
548 the binding is initialised, either in the connection callback on the
549 server side, or in the bind callback on the client side. This is typically
910 the connection callback for the given service. Assuming this succeeds, it
918 binding object and run the bind callback. The binding has now completed.
967 and invokes a callback o
[all...]
/barrelfish-2018-10-04/lib/lwip2/src/api/
H A Dapi_msg.c93 * Receive callback function for RAW netconns.
148 /* Register event with callback */
160 * Receive callback function for UDP netconns.
223 /* Register event with callback */
231 * Receive callback function for TCP netconns.
282 /* Register event with callback */
290 * Poll callback function for TCP netconns.
335 * Sent callback function for TCP netconns.
369 * Error callback function for TCP netconns.
444 * Setup a tcp_pcb with the correct callback functio
642 netconn_alloc(enum netconn_type t, netconn_callback callback) argument
[all...]
H A Dsockets.c510 LWIP_ASSERT("newconn->callback == event_callback", newconn->callback == event_callback);
1884 * same argument as lwip_getsockopt, either called directly or through callback
2285 * same argument as lwip_setsockopt, either called directly or through callback
/barrelfish-2018-10-04/usr/webserver/
H A Dhttp_server.c407 /* callback function to fetch file
540 conn->callback = send_response;
543 /* for callback execution */
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bio/
H A Dbio.h125 /* callback is int cb(BIO *bio,state,ret); */
126 #define BIO_CTRL_SET_CALLBACK 14 /* opt - set callback function */
127 #define BIO_CTRL_GET_CALLBACK 15 /* opt - set callback function */
243 /* These are passed by the BIO callback */
251 /* The callback is called before and after the underling operation,
260 long (*callback)(struct bio_st *,int,const char *,int, long,long));
287 long (*callback)(struct bio_st *,int,const char *,int, long,long); member in struct:bio_st
288 char *cb_arg; /* first argument for the callback */
322 /* Prefix and suffix callback in ASN1 BIO */
/barrelfish-2018-10-04/doc/006-routing/
H A DRouting.tex215 \item As soon as the service's dispatcher receives the bind request, it runs the user provided connection callback. Based on the return value of this callback, it either accepts the connection or rejects it. In any case, the bind reply is sent back to the monitor.
219 \item If the client dispatcher receives the bind reply, it will run the user provided bind callback.
246 The monitor running on the receiver's core reconstructs the capability from its serialised representation and forwards it to the destination dispatcher. This dispatcher identifies the binding to which the capability belongs and invokes a callback on that binding.
340 The flounder-generated stubs register a callback function with the multi-hop interconnect driver at channel set-up time in order to be notified when a message arrives. As we send a user-defined message within a single multi-hop message, we therefore also receive a user-defined message in one multi-hop message.
484 When the join has finished, the node gets the join callback from the library.
489 When the leave is done, the application will get a leave callback.
510 a callback which will be called when the next send should not fail.
511 While the sender waits for the callback, it has to handle the unsent message.
/barrelfish-2018-10-04/doc/015-disk-driver-arch/
H A Dflounder-ahci.tex148 \lstinline+completed_rx_st+, and the \lstinline+completed_fn+ callback function
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/
H A Dssl_lib.c452 * callback is calling us to check the uniqueness of a shorter ID, it
454 * converted to when the callback has finished choosing it. */
778 int (*callback)(int ok,X509_STORE_CTX *ctx))
781 if (callback != NULL)
782 s->verify_callback=callback;
1364 /* with PSK there must be client callback set */
2852 * \brief Set the callback for generating temporary RSA keys.
2854 * \param cb the callback
2875 * \brief The RSA temporary key callback function.
2889 * \brief Set the callback fo
[all...]
H A Dssl.h655 /* This callback type is used inside SSL_CTX, SSL, and in the functions that set
663 * In SSLv2 this is 16 bytes, whereas SSLv3/TLSv1 it is 32 bytes. The callback
665 * supposed to be fixed at 16 bytes so the id will be padded after the callback
666 * returns in this case. It is also an error for the callback to set the size to
713 /* If this callback is not null, it will be called each
715 * returns 1, it means that the callback will do a
717 * on 0, it means the callback has finished with it.
740 * passed back via the callback. This
754 /* Default password callback. */
757 /* Default password callback use
[all...]
/barrelfish-2018-10-04/lib/lwip/src/api/
H A Dsockets.c333 newconn->callback = event_callback;
/barrelfish-2018-10-04/lib/arranet/
H A Darranet.c2466 void arranet_register_tx_done_callback(arranet_tx_done_fn callback) argument
2468 arranet_tx_done_callback = callback;
/barrelfish-2018-10-04/lib/tommath/
H A Dbn.tex1666 copied from the original input. It can be used to pass RNG context data to the callback. The function
1682 (see fig. \ref{fig:primeopts}) which can be OR'ed together. The callback parameters are used as in
/barrelfish-2018-10-04/doc/019-device-drivers/
H A DDeviceDriver.tex416 provides a callback function (\fnname{init\_func}) that gets called by the
/barrelfish-2018-10-04/doc/026-device-queues/
H A Ddevif.tex740 The event callback in the signature is called when the queue receives an interrupt. The different
/barrelfish-2018-10-04/doc/014-bulk-transfer/
H A Dbulk-transfer.tex639 arrived. This callback is not triggered for every arrival of data,

Completed in 199 milliseconds

1234