/barrelfish-2018-10-04/lib/posixcompat/ |
H A D | read.c | 21 ssize_t read(int fd, void *buf, size_t len) argument 29 ret = lwip_read(e->fd, buf, len); 34 ret = recv(fd, buf, len, 0); 38 ret = ptm_read(fd, buf, len); 42 ret = pts_read(fd, buf, len); 46 ret = vfsfd_read(fd, buf, len);
|
H A D | write.c | 21 ssize_t write(int fd, const void *buf, size_t len) argument 29 ret = lwip_write(e->fd, buf, len); 34 ret = send(fd, buf, len, 0); 38 ret = ptm_write(fd, buf, len); 42 ret = pts_write(fd, buf, len); 46 ret = vfsfd_write(fd, buf, len);
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/include/linux/ |
H A D | socket.h | 36 memcpy_toiovec(struct iovec *v, unsigned char *kdata, int len) argument 44 uio.uio_resid = len; 47 error = -uiomove(kdata, len, &uio); 52 memcpy_fromiovec(unsigned char *kdata, struct iovec *iov, int len) argument 60 uio.uio_resid = len; 63 error = -uiomove(kdata, len, &uio);
|
H A D | string.h | 43 kmemdup(const void *src, size_t len, gfp_t gfp) argument 47 dst = kmalloc(len, gfp); 49 memcpy(dst, src, len);
|
/barrelfish-2018-10-04/usr/skb/testapps/ |
H A D | cryptotest.c | 48 * Encrypt *len bytes of data 51 static unsigned char *aes_encrypt(EVP_CIPHER_CTX *e, unsigned char *plaintext, int *len) argument 53 /* max ciphertext len for a n bytes of plaintext is n + AES_BLOCK_SIZE -1 bytes */ 54 int c_len = *len + AES_BLOCK_SIZE, f_len = 0; 61 *len is the size of plaintext in bytes */ 62 EVP_EncryptUpdate(e, ciphertext, &c_len, plaintext, *len); 67 *len = c_len + f_len; 71 static unsigned char *aes_encrypt_in_place(EVP_CIPHER_CTX *e, unsigned char *plain, int *len, bool final) argument 74 assert((*len % AES_BLOCK_SIZE) == 0); 76 int c_len = *len; 90 aes_decrypt(EVP_CIPHER_CTX *e, unsigned char *ciphertext, int *len) argument 104 aes_decrypt_in_place(EVP_CIPHER_CTX *e, unsigned char *cipher, unsigned char *plain, int *len, bool first, bool final) argument 153 int olen, len; local [all...] |
/barrelfish-2018-10-04/lib/libc/db/hash/ |
H A D | hash_func.c | 67 hash1(const void *key, size_t len) argument 75 while (len--) 87 hash2(const void *key, size_t len) argument 93 e = k + len; 113 hash3(const void *key, size_t len) argument 122 if (len > 0) { 123 loop = (len + 8 - 1) >> 3; 125 switch (len & (8 - 1)) { 153 hash4(const void *key, size_t len) argument 164 if (len > [all...] |
/barrelfish-2018-10-04/lib/libc/gen/ |
H A D | fdevname.c | 37 fdevname_r(int fd, char *buf, int len) argument 42 fgn.len = len;
|
H A D | __getosreldate.c | 49 size_t len; local 63 len = sizeof(osrel); 64 error = sysctl(oid, 2, &osrel, &len, NULL, 0); 65 if (error == 0 && osrel > 0 && len == sizeof(osrel))
|
H A D | setproctitle.c | 75 size_t len; local 101 len = 0; 105 len = strlen(buf); 109 (void) vsnprintf(buf + len, SPT_BUFSIZE - len, fmt, ap); 133 len = sizeof(ul_ps_strings); 134 if (sysctlbyname("kern.ps_strings", &ul_ps_strings, &len, NULL, 152 for (i = len = 0; i < oargc; i++) { 163 snprintf(obuf + len, SPT_BUFSIZE - len, " [all...] |
/barrelfish-2018-10-04/lib/libc/string/ |
H A D | wcsstr.c | 50 size_t len; local 53 len = wcslen(find); 59 } while (wcsncmp(s, find, len) != 0);
|
/barrelfish-2018-10-04/lib/lwip/src/core/snmp/ |
H A D | asn1_dec.c | 59 plen += p->len; 91 plen += p->len; 121 plen += p->len; 171 plen += p->len; 205 * @param len length of the coded integer field 213 err_t snmp_asn1_dec_u32t(struct pbuf * p, u16_t ofs, u16_t len, u32_t * value) argument 221 plen += p->len; 225 if ((len > 0) && (len < 6)) { 233 if ((len > 293 snmp_asn1_dec_s32t(struct pbuf * p, u16_t ofs, u16_t len, s32_t * value) argument 374 snmp_asn1_dec_oid(struct pbuf * p, u16_t ofs, u16_t len, struct snmp_obj_id * oid) argument 516 snmp_asn1_dec_raw(struct pbuf * p, u16_t ofs, u16_t len, u16_t raw_len, u8_t * raw) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ |
H A D | mem_clr.c | 64 void OPENSSL_cleanse(void *ptr, size_t len) argument 67 size_t loop = len, ctr = cleanse_ctr; 73 p=memchr(ptr, (unsigned char)ctr, len);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/seed/ |
H A D | seed_cbc.c | 56 size_t len, const SEED_KEY_SCHEDULE *ks, 60 CRYPTO_cbc128_encrypt(in,out,len,ks,ivec,(block128_f)SEED_encrypt); 62 CRYPTO_cbc128_decrypt(in,out,len,ks,ivec,(block128_f)SEED_decrypt); 55 SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int enc) argument
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/util/ |
H A D | clean-depend.pl | 33 my $len=0; 48 $len=0 if $len+length($dep)+1 >= 80; 49 if($len == 0) { 51 $len=length($file)+1; 54 $len+=length($dep)+1;
|
/barrelfish-2018-10-04/tools/fastmodels/ |
H A D | util.h | 23 ntstring(char *dest, const char *src, size_t len) { argument 24 memcpy(dest, src, len); 25 dest[len]= '\0';
|
/barrelfish-2018-10-04/lib/phoenix/ |
H A D | struct.h | 41 int len; member in struct:__anon1384
|
/barrelfish-2018-10-04/lib/tommath/ |
H A D | bn_mp_fwrite.c | 21 int err, len, x; local 23 if ((err = mp_radix_size(a, radix, &len)) != MP_OKAY) { 27 buf = OPT_CAST(char) XMALLOC (len); 37 for (x = 0; x < len; x++) {
|
/barrelfish-2018-10-04/include/arch/aarch64/barrelfish_kpi/ |
H A D | unknown_arch.h | 32 static inline void cache_flush_range(void *base, size_t len) argument
|
/barrelfish-2018-10-04/include/flounder/ |
H A D | flounder_support_lmp.h | 28 size_t *pos, size_t *len); 30 size_t *pos, size_t *len, size_t maxsize); 34 size_t len, size_t *pos); 36 size_t *len, size_t *pos, size_t maxsize);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/modes/ |
H A D | cbc128.c | 71 size_t len, const void *key, 82 while (len>=16) { 87 len -= 16; 92 while (len>=16) { 98 len -= 16; 104 while (len) { 105 for(n=0; n<16 && n<len; ++n) 111 if (len<=16) break; 112 len -= 16; 120 size_t len, cons 70 CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument 119 CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out, size_t len, const void *key, unsigned char ivec[16], block128_f block) argument [all...] |
/barrelfish-2018-10-04/lib/multiboot/ |
H A D | grubmenu.c | 78 int len= skip_whitespace(infile, 0); local 79 if(len < 0) return len; 102 size_t len= reader(f, buf); local 103 if(len < 0) return len; 105 *bufptr= malloc(len); 111 memcpy(*bufptr, buf, len); 112 return len; 117 int len; local [all...] |
/barrelfish-2018-10-04/lib/libc/tests/locale/ |
H A D | wctomb_test.c | 50 size_t len; local 62 len = wctomb(buf, L'\0'); 63 ATF_REQUIRE(len == 1); 68 len = wctomb(buf, L'A'); 69 ATF_REQUIRE(len == 1); 88 len = wctomb(buf, L'\0'); 89 ATF_REQUIRE(len == 1); 94 len = wctomb(buf, L'A'); 95 ATF_REQUIRE(len == 1); 100 len [all...] |
/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/ |
H A D | getwd.c | 65 unsigned len, pathlen; local 128 len = 0; 129 while ((len < DIRSIZ) && (*pname++ != '\0')) 130 len++; 132 pathlen += len + 1; 133 for (pname = &(dir.d_name[len]); len; len--) 148 for (len = 0; len < [all...] |
/barrelfish-2018-10-04/lib/libc/stdio/ |
H A D | open_memstream.c | 50 ssize_t len; member in struct:memstream 64 if (newsize > ms->len) { 69 ms, ms->len, newsize); 71 memset(buf + ms->len + 1, 0, newsize - ms->len); 73 ms->len = newsize; 85 assert(ms->len >= 0 && ms->offset >= 0); 86 *ms->sizep = ms->len < ms->offset ? ms->len : ms->offset; 90 memstream_write(void *cookie, const char *buf, int len) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | a_d2i_fp.c | 91 int len; local 93 len = asn1_d2i_read_bio(in, &b); 94 if(len < 0) goto err; 97 ret=d2i(x,&p,len); 110 int len; local 112 len = asn1_d2i_read_bio(in, &b); 113 if(len < 0) goto err; 116 ret=ASN1_item_d2i(x,&p,len, it); 156 int len=0; local 168 if (want >= (len [all...] |