/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pqueue/ |
H A D | pqueue.c | 126 * with memcmp:-) */ 127 int cmp = memcmp(next->priority, item->priority,8); 178 if ( memcmp(next->priority, prio64be,8) == 0) 186 if ( memcmp(next->priority, prio64be,8) ==0)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | t1_reneg.c | 178 if(memcmp(d, s->s3->previous_client_finished, 269 if(memcmp(d, s->s3->previous_client_finished, 278 if(memcmp(d, s->s3->previous_server_finished,
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/sha/ |
H A D | sha512t.c | 94 if (memcmp(md,app_c1,sizeof(app_c1))) 106 if (memcmp(md,app_c2,sizeof(app_c2))) 130 if (memcmp(md,app_c3,sizeof(app_c3))) 143 if (memcmp(md,app_d1,sizeof(app_d1))) 155 if (memcmp(md,app_d2,sizeof(app_d2))) 172 if (memcmp(md,app_d3,sizeof(app_d3)))
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | sha512t.c | 94 if (memcmp(md,app_c1,sizeof(app_c1))) 106 if (memcmp(md,app_c2,sizeof(app_c2))) 130 if (memcmp(md,app_c3,sizeof(app_c3))) 143 if (memcmp(md,app_d1,sizeof(app_d1))) 155 if (memcmp(md,app_d2,sizeof(app_d2))) 172 if (memcmp(md,app_d3,sizeof(app_d3)))
|
H A D | casttest.c | 148 if (memcmp(out,&(c[z][0]),8) != 0) 163 if (memcmp(out,in,8) != 0) 207 if ( (memcmp(out_a,c_a,sizeof(c_a)) != 0) || 208 (memcmp(out_b,c_b,sizeof(c_b)) != 0))
|
H A D | rc4test.c | 128 if (memcmp(obuf,output[i],data_len[i]+1) != 0) 151 if ((memcmp(obuf,output[3],i) != 0) || (obuf[i] != 0)) 179 if (memcmp(obuf,output[3],data_len[3]+1) != 0) 216 if (memcmp(md,expected,sizeof(md))) {
|
H A D | destest.c | 383 /* if (memcmp(cbc_out,cbc3_ok, 393 if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0) 418 if (memcmp(out,cipher_data[i],8) != 0) 425 if (memcmp(in,outin,8) != 0) 446 if (memcmp(out,cipher_ecb2[i],8) != 0) 453 if (memcmp(in,outin,8) != 0) 473 if (memcmp(cbc_out,cbc_ok,32) != 0) 482 if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)) != 0) 500 if (memcmp(cbc_out,xcbc_ok,32) != 0) 508 if (memcmp(cbc_i [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/modes/ |
H A D | cts128.c | 216 if (memcmp(ciphertext,vector,len)) 218 if (memcmp(iv,vector+len-tail,sizeof(iv))) 224 if (memcmp(cleartext,test_input,len)) 226 if (memcmp(iv,vector+len-tail,sizeof(iv))) 232 if (memcmp(ciphertext,vector,len)) 234 if (memcmp(iv,vector+len-tail,sizeof(iv))) 240 if (memcmp(cleartext,test_input,len)) 242 if (memcmp(iv,vector+len-tail,sizeof(iv)))
|
/barrelfish-2018-10-04/usr/tests/dma_test/ |
H A D | dma_test.c | 39 assert(memcmp(buffers[0], buffers[1], (DMA_BUFFER_SIZE << 20)) == 0); 110 assert(memcmp(buffers[0], buffers[1], (DMA_BUFFER_SIZE << 20)) != 0);
|
/barrelfish-2018-10-04/lib/libc/db/test/hash.tests/ |
H A D | tverify.c | 99 if ( memcmp ( res.data, wp2, res.size ) ) {
|
/barrelfish-2018-10-04/lib/libc/locale/ |
H A D | wctype.c | 104 if (len1 == len2 && memcmp(property, p, len1) == 0)
|
/barrelfish-2018-10-04/lib/libc/tests/gen/ |
H A D | arc4random_test.c | 79 ATF_CHECK_MSG(memcmp(page->parentbuf, page->childbuf, BUFSIZE) != 0,
|
/barrelfish-2018-10-04/lib/libc/tests/net/ |
H A D | eui64_aton_test.c | 49 rc = memcmp(&e, eui, sizeof(e)); 53 "eui64_aton(\"%s\", ..) failed; memcmp returned %d. "
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cast/ |
H A D | casttest.c | 148 if (memcmp(out,&(c[z][0]),8) != 0) 163 if (memcmp(out,in,8) != 0) 207 if ( (memcmp(out_a,c_a,sizeof(c_a)) != 0) || 208 (memcmp(out_b,c_b,sizeof(c_b)) != 0))
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc4/ |
H A D | rc4test.c | 128 if (memcmp(obuf,output[i],data_len[i]+1) != 0) 151 if ((memcmp(obuf,output[3],i) != 0) || (obuf[i] != 0)) 179 if (memcmp(obuf,output[3],data_len[3]+1) != 0) 216 if (memcmp(md,expected,sizeof(md))) {
|
/barrelfish-2018-10-04/lib/acpica/source/include/ |
H A D | acclib.h | 211 memcmp (
|
/barrelfish-2018-10-04/include/lwip2/lwip/prot/ |
H A D | ethernet.h | 164 #define eth_addr_cmp(addr1, addr2) (memcmp((addr1)->addr, (addr2)->addr, ETH_HWADDR_LEN) == 0)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | destest.c | 383 /* if (memcmp(cbc_out,cbc3_ok, 393 if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0) 418 if (memcmp(out,cipher_data[i],8) != 0) 425 if (memcmp(in,outin,8) != 0) 446 if (memcmp(out,cipher_ecb2[i],8) != 0) 453 if (memcmp(in,outin,8) != 0) 473 if (memcmp(cbc_out,cbc_ok,32) != 0) 482 if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)) != 0) 500 if (memcmp(cbc_out,xcbc_ok,32) != 0) 508 if (memcmp(cbc_i [all...] |
/barrelfish-2018-10-04/lib/libc/arm/string/ |
H A D | memcmp.S | 1 /* $NetBSD: memcmp.S,v 1.3 2003/10/14 07:51:45 scw Exp $ */ 71 ENTRY(memcmp) 154 * faster than a byte-wise memcmp. 183 END(memcmp)
|
/barrelfish-2018-10-04/lib/libc/tests/string/ |
H A D | stpncpy_test.c | 73 assert(memcmp(src, dst, len) == 0);
|
/barrelfish-2018-10-04/lib/lua/src/ |
H A D | lundump.c | 197 if (memcmp(h,s,N0)==0) return; 198 if (memcmp(h,s,N1)!=0) error(S,"not a"); 199 if (memcmp(h,s,N2)!=0) error(S,"version mismatch in"); 200 if (memcmp(h,s,N3)!=0) error(S,"incompatible"); else error(S,"corrupted");
|
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/ |
H A D | chap-md5.c | 85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) {
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_dd.c | 130 if (memcmp(md, dd->digest->data, mdlen))
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/objects/ |
H A D | obj_lib.c | 128 return(memcmp(a->data,b->data,a->length));
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_saos.c | 135 (memcmp(m,sig->data,m_len) != 0))
|