/barrelfish-2018-10-04/usr/drivers/usb/usb_manager/ |
H A D | usb_request.c | 34 struct usb_device_request *req, struct usb_request_state *req_state, 41 uint16_t length = req->wLength; 44 USB_DEBUG_REQ("bmRequestType = %x\n", *((uint8_t *)(&req->bType)));USB_DEBUG_REQ("bRequest = %x\n", *((uint8_t *)(&req->bRequest)));USB_DEBUG_REQ("wValue = %x\n", *((uint16_t *)(&req->wValue)));USB_DEBUG_REQ("wIndex = %x\n", *((uint16_t *)(&req->wIndex)));USB_DEBUG_REQ("wLength= %x\n", *((uint16_t *)(&req->wLength))); 77 if ((req->bType.direction != USB_REQUEST_READ) && (length != 0)) { 92 err = device->controller->hcdi_bus_fn->roothub_exec(device, req, 149 (req 33 usb_handle_request(struct usb_device *device, uint16_t flags, struct usb_device_request *req, struct usb_request_state *req_state, void *data, uint16_t *ret_length) argument 413 struct usb_device_request *req = (struct usb_device_request *) request; local 457 struct usb_device_request *req = (struct usb_device_request *) request; local 570 struct usb_device_request *req = (struct usb_device_request *) request; local 588 struct usb_device_request req; local 620 struct usb_device_request req; local 834 struct usb_device_request req; local [all...] |
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | addr.c | 204 static void queue_req(struct addr_req *req) argument 210 if (time_after_eq(req->timeout, temp_req->timeout)) 214 list_add(&req->list, &temp_req->list); 216 if (req_list.next == &req->list) 217 set_timeout(req->timeout); 494 struct addr_req *req, *temp_req; local 501 list_for_each_entry_safe(req, temp_req, &req_list, list) { 502 if (req->status == -ENODATA) { 503 src_in = (struct sockaddr *) &req->src_addr; 504 dst_in = (struct sockaddr *) &req 537 struct addr_req *req; local 589 struct addr_req *req, *temp_req; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/util/ |
H A D | mkcerts.sh | 20 $SSLEAY req $CONF \ 23 -out pca-req.pem -nodes >/dev/null <<EOF 44 -req -signkey pca-key.pem \ 46 -in pca-req.pem -out pca-cert.pem 56 $SSLEAY req $CONF \ 59 -out ca-req.pem -nodes >/dev/null <<EOF 80 -req \ 83 -in ca-req.pem -out ca-cert.pem 93 $SSLEAY req $CONF \ 96 -out s512-req [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 51 $OPENSSL_CMD req $OPENSSL_CNF -nodes -subj "$TEST_SERVER_DN" \ 54 -out $CERTS_DIR/$TEST_SERVER_FILE.req.pem 56 $OPENSSL_CMD x509 -req -days $DAYS \ 57 -in $CERTS_DIR/$TEST_SERVER_FILE.req.pem \ 71 $RM $CERTS_DIR/$TEST_SERVER_FILE.req.pem 77 $OPENSSL_CMD req $OPENSSL_CNF -nodes -subj "$TEST_CLIENT_DN" \ 80 -out $CERTS_DIR/$TEST_CLIENT_FILE.req.pem 82 $OPENSSL_CMD x509 -req -days $DAYS \ 83 -in $CERTS_DIR/$TEST_CLIENT_FILE.req.pem \ 97 $RM $CERTS_DIR/$TEST_CLIENT_FILE.req [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_cl.c | 82 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid) argument 89 if (req && 90 !sk_OCSP_ONEREQ_push(req->tbsRequest->requestList, one)) 100 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm) argument 112 if (req->tbsRequest->requestorName) 113 GENERAL_NAME_free(req->tbsRequest->requestorName); 114 req->tbsRequest->requestorName = gen; 121 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) argument 124 if (!req->optionalSignature) 125 req 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | testgen | 32 ../util/shlib_wrap.sh ../apps/openssl req -config test.cnf $req_new -out testreq.pem 38 ../util/shlib_wrap.sh ../apps/openssl req -config test.cnf -verify -in testreq.pem -noout 40 echo signature on req is wrong
|
/barrelfish-2018-10-04/include/dma/client/ |
H A D | dma_client_request.h | 22 static inline struct dma_client_request *dma_request_to_ioat(struct dma_request *req) argument 24 return (struct dma_client_request *)req;
|
/barrelfish-2018-10-04/include/dma/ioat/ |
H A D | ioat_dma_request.h | 22 static inline struct ioat_dma_request *dma_request_to_ioat(struct dma_request *req) argument 24 return (struct ioat_dma_request *)req;
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/hw/mlx4/ |
H A D | mcg.c | 535 struct mcast_req *req = NULL; local 542 req = list_first_entry(&group->pending_list, struct mcast_req, group_list); 543 list_del(&req->group_list); 544 list_del(&req->func_list); 545 --group->func[req->func].num_pend_reqs; 547 kfree(req); 577 struct mcast_req *req) 581 if (req->clean) 582 leave_mask = group->func[req->func].join_state; 584 status = check_leave(group, req 576 handle_leave_req(struct mcast_group *group, u8 leave_mask, struct mcast_req *req) argument 597 handle_join_req(struct mcast_group *group, u8 join_mask, struct mcast_req *req) argument 637 struct mcast_req *req = NULL; local 743 struct mcast_req *req; local 865 queue_req(struct mcast_req *req) argument 934 struct mcast_req *req; local 990 struct mcast_req *req = NULL; local 1057 struct mcast_req *req, *tmp local 1150 build_leave_mad(struct mcast_req *req) argument 1160 struct mcast_req *req, *tmp, *group_first = NULL; local 1193 struct mcast_req *req; local [all...] |
/barrelfish-2018-10-04/lib/dma/client/ |
H A D | dma_client_channel.c | 42 struct dma_request *req; member in union:svc_msg_st::__anon912 116 struct dma_request *req = dma_channel_deq_request_by_id(&chan->common, id); local 121 if (req == NULL) { 134 if (req->setup.done_cb) { 135 req->setup.done_cb(msgerr, id, req->setup.cb_arg); 138 dma_client_request_free((struct dma_client_request *) req); 227 struct dma_req_setup *setup = &st->args.req->setup; 340 * \param req DMA client request 346 struct dma_request *req) 345 dma_client_channel_submit_request(struct dma_channel *chan, struct dma_request *req) argument [all...] |
/barrelfish-2018-10-04/lib/dma/include/client/ |
H A D | dma_client_channel_internal.h | 37 * \param req DMA client request 43 struct dma_request *req);
|
/barrelfish-2018-10-04/lib/dma/include/ |
H A D | dma_descriptor_internal.h | 69 struct dma_request *req);
|
/barrelfish-2018-10-04/lib/dma/include/ioat/ |
H A D | ioat_dma_channel_internal.h | 39 * \param req IOAT DMA request to be submitted 45 struct ioat_dma_request *req);
|
/barrelfish-2018-10-04/usr/drivers/usb/usb_manager/controller/ehci/ |
H A D | usb_ehci_root_hub.h | 25 struct usb_device_request *req, const void **ret_data,
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/x509/ |
H A D | mkreq.c | 21 X509_REQ *req=NULL; variable 28 mkreq(&req,&pkey,512,0,365); 31 X509_REQ_print_fp(stdout,req); 33 PEM_write_X509_REQ(stdout,req); 35 X509_REQ_free(req); variable 59 int mkreq(X509_REQ **req, EVP_PKEY **pkeyp, int bits, int serial, int days) argument 140 *req=x;
|
/barrelfish-2018-10-04/usr/drivers/usb/usb_manager/controller/ohci/ |
H A D | usb_ohci_root_hub.c | 148 * \param req the USB request to execute 153 struct usb_device_request *req, const void **ret_data, 161 uint16_t req_value = req->wValue; 162 uint16_t req_index = req->wIndex; 169 switch (req->bRequest) { 178 if (req->bType.recipient == USB_REQUEST_RECIPIENT_OTHER) { 242 if ((req->bType.recipient == USB_REQUEST_RECIPIENT_DEVICE) 243 && req->bType.direction == USB_REQUEST_READ) { 258 if ((req->bType.recipient == USB_REQUEST_RECIPIENT_DEVICE) 259 && req 152 usb_ohci_roothub_exec(struct usb_device *device, struct usb_device_request *req, const void **ret_data, uint16_t *ret_length) argument [all...] |
/barrelfish-2018-10-04/include/dma/ |
H A D | dma_request.h | 109 * \param req DMA request 113 dma_req_st_t dma_request_get_state(struct dma_request *req); 118 * \param req DMA request 122 dma_req_id_t dma_request_get_id(struct dma_request *req); 128 * \param req DMA request 133 struct dma_request *dma_request_get_next(struct dma_request *req); 234 * \param req request counter value 239 uint64_t req) 243 id |= (0x0000FFFFFFFFFFFFULL & req); 238 dma_request_id_build(struct dma_channel *chan, uint64_t req) argument
|
/barrelfish-2018-10-04/include/usb/ |
H A D | usb_request.h | 74 #define USB_REQUEST_GET_EP(req) \ 75 (req->wIndex & USB_REQUEST_INDEX_EP_NUM) 76 #define USB_REQUEST_GET_IF(req) \ 77 (req->wIndex & USB_REQUEST_INDEX_IF_NUM) 78 #define USB_REQUEST_GET_DIR(req) \ 79 ((req->wIndex & USB_REQUEST_INDEX_DIRECTION) >> 8) 164 usb_error_t usb_do_request(struct usb_device_request *req); 166 usb_error_t usb_do_request_write(struct usb_device_request *req, 169 usb_error_t usb_do_request_read(struct usb_device_request *req,
|
/barrelfish-2018-10-04/usr/block_server_user/ |
H A D | bs_connector.c | 66 uint32_t req) 68 BS_CONN_DEBUG("status message: error=%s, seqn=%u, req=%u", 69 err_getstring(err), seqn, req); 70 bench_signal(err, seqn, req); 245 struct bs_read_request *req = (struct bs_read_request*)a; local 247 struct event_closure txcont = MKCONT(bs_service_read_sent_cb, req); 248 err = block_service_read__tx(req->conn->service, txcont, req->block_id, req->block_count, seq_number); 253 // txcont = MKCONT(bs_service_read_send, req); 63 bs_service_status_cb(struct block_service_binding *b, errval_t err, uint32_t seqn, uint32_t req) argument 272 struct bs_read_request *req = malloc(sizeof(struct bs_read_request)); local [all...] |
H A D | benchmark.h | 41 uint32_t req);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | ocsp.c | 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, 100 static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, const EVP_MD * cert_id_md, X509 *issuer, 102 static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req, 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, 118 OCSP_REQUEST *req, int req_timeout); 137 OCSP_REQUEST *req = NULL; local 446 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) 459 if(!add_ocsp_serial(&req, *args, cert_id_md, issuer, ids)) 569 if (!req && !reqin && !respin && !(port && ridx_filename)) badarg = 1; 633 if (!req 933 add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer, STACK_OF(OCSP_CERTID) *ids) argument 954 add_ocsp_serial(OCSP_REQUEST **req, char *serial,const EVP_MD *cert_id_md, X509 *issuer, STACK_OF(OCSP_CERTID) *ids) argument 987 print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req, STACK_OF(OPENSSL_STRING) *names, STACK_OF(OCSP_CERTID) *ids, long nsec, long maxage) argument 1053 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument 1213 OCSP_REQUEST *req = NULL; local 1276 query_responder(BIO *err, BIO *cbio, char *path, STACK_OF(CONF_VALUE) *headers, OCSP_REQUEST *req, int req_timeout) argument 1373 process_responder(BIO *err, OCSP_REQUEST *req, char *host, char *path, char *port, int use_ssl, STACK_OF(CONF_VALUE) *headers, int req_timeout) argument [all...] |
/barrelfish-2018-10-04/usr/drivers/solarflair/sfxge/common/ |
H A D | efx_mcdi.c | 484 efx_mcdi_req_t req; local 495 req.emr_cmd = MC_CMD_GET_VERSION; 496 req.emr_in_buf = NULL; 497 req.emr_in_length = 0; 498 req.emr_out_buf = outbuf; 499 req.emr_out_length = MC_CMD_GET_VERSION_OUT_LEN; 501 efx_mcdi_execute(enp, &req); 503 if (req.emr_rc != 0) { 504 rc = req.emr_rc; 509 if (req 637 efx_mcdi_req_t req; local [all...] |
/barrelfish-2018-10-04/include/virtio/ |
H A D | virtio_guest.h | 34 errval_t (*req)(uint64_t size, struct capref *cap); member in struct:virtio_guest_chan_fn 85 return vguest_chan_fn->req(size, cap);
|
/barrelfish-2018-10-04/lib/dma/include/xeon_phi/ |
H A D | xeon_phi_dma_channel_internal.h | 50 * \param req IOAT DMA request to be submitted 56 struct xeon_phi_dma_request *req);
|
/barrelfish-2018-10-04/lib/posixcompat/ |
H A D | sleep.c | 19 int nanosleep(const struct timespec *req, struct timespec *rem) argument
|