Searched refs:req (Results 51 - 75 of 141) sorted by relevance

123456

/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/
H A Deg_cc_mip.cc44 double req[NROWS][NCOLS] = { variable
101 leq( VarList * list(NCOLS,req[0]), 8.0);
102 leq( VarList * list(NCOLS,req[1]), 10.0);
H A Deg_c_mip.c43 double req[NROWS][NCOLS] = { variable
120 leq( times(varlist, ec_listofdouble(NCOLS,req[0])), ec_double(8.0));
121 leq( times(varlist, ec_listofdouble(NCOLS,req[1])), ec_double(10.0));
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/
H A Dts_verify_ctx.c109 TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) argument
118 OPENSSL_assert(req != NULL);
128 if ((policy = TS_REQ_get_policy_id(req)) != NULL)
136 imprint = TS_REQ_get_msg_imprint(req);
145 if ((nonce = TS_REQ_get_nonce(req)) != NULL)
/barrelfish-2018-10-04/usr/block_server/
H A Dlocal_server.c237 enum block_net_msg_type req; member in struct:bs_status_reply
252 struct bs_status_reply *req = (struct bs_status_reply*) a; local
254 struct event_closure txcont = MKCONT(status_reply_sent_cb, req);
255 err = block_service_status__tx(req->binding, txcont, req->err, req->seqn,
256 req->req);
260 txcont = MKCONT(status_reply_do_send, req);
261 err = req
276 struct bs_status_reply *req = malloc(sizeof(struct bs_status_reply)); local
573 block_local_send_status(enum block_net_msg_type req, uint32_t reqid, enum block_net_err stats) argument
[all...]
H A Dlocal_server.h65 errval_t block_local_send_status(enum block_net_msg_type req,
/barrelfish-2018-10-04/usr/drivers/solarflair/sfxge/common/
H A Dsiena_mon.c211 efx_mcdi_req_t req; local
216 req.emr_cmd = MC_CMD_READ_SENSORS;
217 req.emr_in_buf = payload;
218 req.emr_in_length = sizeof (payload);
220 req.emr_out_buf = NULL;
221 req.emr_out_length = 0;
223 MCDI_IN_SET_DWORD(req, READ_SENSORS_IN_DMA_ADDR_LO,
225 MCDI_IN_SET_DWORD(req, READ_SENSORS_IN_DMA_ADDR_HI,
228 efx_mcdi_execute(enp, &req);
230 if (req
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/
H A Dreq.c1 /* apps/req.c */
90 #define SECTION "req"
128 static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,char *dn,int mutlirdn,
130 static int build_subject(X509_REQ *req, char *subj, unsigned long chtype,
132 static int prompt_info(X509_REQ *req,
136 static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *sk,
139 static int add_attribute_object(X509_REQ *req, char *text, const char *def,
164 X509_REQ *req=NULL; local
430 BIO_printf(bio_err," -x509 output a x509 structure instead of a cert. req.\n");
776 req
1103 make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *subj, int multirdn, int attribs, unsigned long chtype) argument
1171 build_subject(X509_REQ *req, char *subject, unsigned long chtype, int multirdn) argument
1188 prompt_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect, STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs, unsigned long chtype) argument
1367 auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk, STACK_OF(CONF_VALUE) *attr_sk, int attribs, unsigned long chtype) argument
1488 add_attribute_object(X509_REQ *req, char *text, const char *def, char *value, int nid, int n_min, int n_max, unsigned long chtype) argument
[all...]
/barrelfish-2018-10-04/lib/dma/
H A Ddma_descriptor.c59 struct dma_request *req; ///< pointer to the DMA request member in struct:dma_descriptor
143 dma_desc[i].req = NULL;
232 struct dma_request *req)
234 desc->req = req;
259 return desc->req;
231 dma_desc_set_request(struct dma_descriptor *desc, struct dma_request *req) argument
/barrelfish-2018-10-04/lib/dma/include/
H A Ddma_channel_internal.h101 * \param req DMA request to be inserted
104 struct dma_request *req);
110 * \param req DMA request to be inserted
113 struct dma_request *req);
126 * \brief returns the next DMA request counter value to generate the req id.
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/
H A Docsp_ht.c121 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req) argument
126 if (BIO_printf(rctx->mem, req_hdr, i2d_OCSP_REQUEST(req, NULL)) <= 0)
128 if (i2d_OCSP_REQUEST_bio(rctx->mem, req) <= 0)
154 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, argument
178 if (req && !OCSP_REQ_CTX_set1_req(rctx, req))
485 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req) argument
491 ctx = OCSP_sendreq_new(b, path, req, -1);
H A Docsp_vfy.c70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs,
359 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument
366 if (!req->optionalSignature)
371 gen = req->tbsRequest->requestorName;
378 ret = ocsp_req_find_signer(&signer, req, nm, certs, store, flags);
390 ret = OCSP_REQUEST_verify(req, skey);
405 req->optionalSignature->certs);
428 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, argument
434 signer = X509_find_by_subject(req->optionalSignature->certs, nm);
H A Docsp_srv.c72 int OCSP_request_onereq_count(OCSP_REQUEST *req) argument
74 return sk_OCSP_ONEREQ_num(req->tbsRequest->requestList);
77 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i) argument
79 return sk_OCSP_ONEREQ_value(req->tbsRequest->requestList, i);
99 int OCSP_request_is_signed(OCSP_REQUEST *req) argument
101 if(req->optionalSignature) return 1;
H A Docsp.h404 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req);
405 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req,
409 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req);
420 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid);
422 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len);
424 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs);
425 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req);
427 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm);
428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
430 int OCSP_request_sign(OCSP_REQUEST *req,
[all...]
/barrelfish-2018-10-04/include/dma/xeon_phi/
H A Dxeon_phi_dma_request.h18 static inline struct xeon_phi_dma_request *dma_request_to_xphi(struct dma_request *req) argument
20 return (struct xeon_phi_dma_request *) req;
H A Dxeon_phi_dma_channel.h193 struct dma_request *req);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ms/
H A Dtestss.bat6 set reqcmd=%ssleay% req
22 echo make a certificate request using 'req'
27 %x509cmd% -CAcreateserial -in %CAreq% -days 30 -req -out %CAcert% -signkey %CAkey% >err.ss
45 echo make another certificate request using 'req'
51 %x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial%
74 echo error using 'req' to generate a certificate request
92 echo error using 'req' to generate a certificate request
H A Dtestssce.bat4 set reqcmd=%ssleay% req
22 echo make a certificate request using 'req'
27 cerun CE:\OpenSSL\%x509cmd% -CAcreateserial -in %CAreq% -days 30 -req -out %CAcert% -signkey %CAkey% "> \OpenSSL\err.ss"
45 echo make another certificate request using 'req'
51 cerun CE:\OpenSSL\%x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial%
80 echo error using 'req' to generate a certificate request
98 echo error using 'req' to generate a certificate request
/barrelfish-2018-10-04/lib/usb/class/
H A Dusb_hid.c854 struct usb_device_request req; local
855 req.bType.direction = USB_REQUEST_READ;
856 req.bType.recipient = USB_REQUEST_RECIPIENT_INTERFACE;
857 req.bType.type = USB_REQUEST_TYPE_STANDARD;
858 req.bRequest = USB_HID_REQUEST_GET_DESCRIPTOR;
859 req.wValue = USB_DESCRIPTOR_TYPE_REPORT << 8;
860 req.wIndex = iface;
861 req.wLength = size;
865 usb_error_t err = usb_do_request_read(&req, &ret_data_length, (void **) d);
891 struct usb_device_request req; local
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/
H A Dtestgen.com42 $ mcr 'exe_dir'openssl req -config test.cnf 'req_new' -out testreq.pem
49 $ mcr 'exe_dir'openssl req -config test.cnf -verify -in testreq.pem -noout
52 $ write sys$output "signature on req is wrong"
H A Dtestss4 reqcmd="../util/shlib_wrap.sh ../apps/openssl req"
33 echo "make a certificate request using 'req'"
45 echo "error using 'req' to generate a certificate request"
50 $x509cmd -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey -extfile $CAconf -extensions v3_ca >err.ss
83 echo "make a user certificate request using 'req'"
86 echo "error using 'req' to generate a user certificate request"
92 $x509cmd -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -extfile $Uconf -extensions v3_ee >err.ss
104 echo "make a proxy certificate request using 'req'"
107 echo "error using 'req' to generate a proxy certificate request"
113 $x509cmd -CAcreateserial -in $P1req -days 30 -req
[all...]
H A Dtestss.com10 $ reqcmd := mcr 'exe_dir'openssl req
27 $ write sys$output "make a certificate request using 'req'"
44 $ write sys$output "error using 'req' to generate a certificate request"
50 $ 'x509cmd' "-CAcreateserial" -in 'CAreq' -days 30 -req -out 'CAcert' -signkey 'CAkey'
89 $ write sys$output "make another certificate request using 'req'"
94 $ write sys$output "error using 'req' to generate a certificate request"
101 $ 'x509cmd' "-CAcreateserial" -in 'Ureq' -days 30 -req -out 'Ucert' "-CA" 'CAcert' "-CAkey" 'CAkey'
/barrelfish-2018-10-04/usr/drivers/virtio/block/
H A Ddevice.h50 void (*op)(struct vblock_req *req);
/barrelfish-2018-10-04/lib/dma/ioat/
H A Dioat_dma_channel.c115 struct dma_request *req; local
128 req = dma_desc_get_request(desc);
129 if (req) {
131 assert(req_head == req);
132 err = ioat_dma_request_process((struct ioat_dma_request *) req);
454 * \param req IOAT DMA request to be submitted
460 struct ioat_dma_request *req)
463 dma_request_get_id((struct dma_request * )req));
465 dma_channel_enq_request_tail(&chan->common, (struct dma_request *) req);
459 ioat_dma_channel_submit_request(struct ioat_dma_channel *chan, struct ioat_dma_request *req) argument
/barrelfish-2018-10-04/usr/drivers/usb/usb_manager/include/
H A Dusb_request.h23 struct usb_device_request *req; member in struct:usb_request_state
43 struct usb_device_request *req, struct usb_request_state *req_state,
/barrelfish-2018-10-04/include/openssl/
H A Docsp.h404 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req);
405 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req,
409 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req);
420 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid);
422 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len);
424 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs);
425 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req);
427 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm);
428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
430 int OCSP_request_sign(OCSP_REQUEST *req,
[all...]

Completed in 216 milliseconds

123456