/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/ |
H A D | eg_cc_mip.cc | 44 double req[NROWS][NCOLS] = { variable 101 leq( VarList * list(NCOLS,req[0]), 8.0); 102 leq( VarList * list(NCOLS,req[1]), 10.0);
|
H A D | eg_c_mip.c | 43 double req[NROWS][NCOLS] = { variable 120 leq( times(varlist, ec_listofdouble(NCOLS,req[0])), ec_double(8.0)); 121 leq( times(varlist, ec_listofdouble(NCOLS,req[1])), ec_double(10.0));
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_verify_ctx.c | 109 TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) argument 118 OPENSSL_assert(req != NULL); 128 if ((policy = TS_REQ_get_policy_id(req)) != NULL) 136 imprint = TS_REQ_get_msg_imprint(req); 145 if ((nonce = TS_REQ_get_nonce(req)) != NULL)
|
/barrelfish-2018-10-04/usr/block_server/ |
H A D | local_server.c | 237 enum block_net_msg_type req; member in struct:bs_status_reply 252 struct bs_status_reply *req = (struct bs_status_reply*) a; local 254 struct event_closure txcont = MKCONT(status_reply_sent_cb, req); 255 err = block_service_status__tx(req->binding, txcont, req->err, req->seqn, 256 req->req); 260 txcont = MKCONT(status_reply_do_send, req); 261 err = req 276 struct bs_status_reply *req = malloc(sizeof(struct bs_status_reply)); local 573 block_local_send_status(enum block_net_msg_type req, uint32_t reqid, enum block_net_err stats) argument [all...] |
H A D | local_server.h | 65 errval_t block_local_send_status(enum block_net_msg_type req,
|
/barrelfish-2018-10-04/usr/drivers/solarflair/sfxge/common/ |
H A D | siena_mon.c | 211 efx_mcdi_req_t req; local 216 req.emr_cmd = MC_CMD_READ_SENSORS; 217 req.emr_in_buf = payload; 218 req.emr_in_length = sizeof (payload); 220 req.emr_out_buf = NULL; 221 req.emr_out_length = 0; 223 MCDI_IN_SET_DWORD(req, READ_SENSORS_IN_DMA_ADDR_LO, 225 MCDI_IN_SET_DWORD(req, READ_SENSORS_IN_DMA_ADDR_HI, 228 efx_mcdi_execute(enp, &req); 230 if (req [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | req.c | 1 /* apps/req.c */ 90 #define SECTION "req" 128 static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,char *dn,int mutlirdn, 130 static int build_subject(X509_REQ *req, char *subj, unsigned long chtype, 132 static int prompt_info(X509_REQ *req, 136 static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *sk, 139 static int add_attribute_object(X509_REQ *req, char *text, const char *def, 164 X509_REQ *req=NULL; local 430 BIO_printf(bio_err," -x509 output a x509 structure instead of a cert. req.\n"); 776 req 1103 make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *subj, int multirdn, int attribs, unsigned long chtype) argument 1171 build_subject(X509_REQ *req, char *subject, unsigned long chtype, int multirdn) argument 1188 prompt_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect, STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs, unsigned long chtype) argument 1367 auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk, STACK_OF(CONF_VALUE) *attr_sk, int attribs, unsigned long chtype) argument 1488 add_attribute_object(X509_REQ *req, char *text, const char *def, char *value, int nid, int n_min, int n_max, unsigned long chtype) argument [all...] |
/barrelfish-2018-10-04/lib/dma/ |
H A D | dma_descriptor.c | 59 struct dma_request *req; ///< pointer to the DMA request member in struct:dma_descriptor 143 dma_desc[i].req = NULL; 232 struct dma_request *req) 234 desc->req = req; 259 return desc->req; 231 dma_desc_set_request(struct dma_descriptor *desc, struct dma_request *req) argument
|
/barrelfish-2018-10-04/lib/dma/include/ |
H A D | dma_channel_internal.h | 101 * \param req DMA request to be inserted 104 struct dma_request *req); 110 * \param req DMA request to be inserted 113 struct dma_request *req); 126 * \brief returns the next DMA request counter value to generate the req id.
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_ht.c | 121 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req) argument 126 if (BIO_printf(rctx->mem, req_hdr, i2d_OCSP_REQUEST(req, NULL)) <= 0) 128 if (i2d_OCSP_REQUEST_bio(rctx->mem, req) <= 0) 154 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, argument 178 if (req && !OCSP_REQ_CTX_set1_req(rctx, req)) 485 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req) argument 491 ctx = OCSP_sendreq_new(b, path, req, -1);
|
H A D | ocsp_vfy.c | 70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, 359 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument 366 if (!req->optionalSignature) 371 gen = req->tbsRequest->requestorName; 378 ret = ocsp_req_find_signer(&signer, req, nm, certs, store, flags); 390 ret = OCSP_REQUEST_verify(req, skey); 405 req->optionalSignature->certs); 428 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, argument 434 signer = X509_find_by_subject(req->optionalSignature->certs, nm);
|
H A D | ocsp_srv.c | 72 int OCSP_request_onereq_count(OCSP_REQUEST *req) argument 74 return sk_OCSP_ONEREQ_num(req->tbsRequest->requestList); 77 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i) argument 79 return sk_OCSP_ONEREQ_value(req->tbsRequest->requestList, i); 99 int OCSP_request_is_signed(OCSP_REQUEST *req) argument 101 if(req->optionalSignature) return 1;
|
H A D | ocsp.h | 404 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req); 405 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, 409 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); 420 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid); 422 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); 424 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs); 425 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 427 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm); 428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 430 int OCSP_request_sign(OCSP_REQUEST *req, [all...] |
/barrelfish-2018-10-04/include/dma/xeon_phi/ |
H A D | xeon_phi_dma_request.h | 18 static inline struct xeon_phi_dma_request *dma_request_to_xphi(struct dma_request *req) argument 20 return (struct xeon_phi_dma_request *) req;
|
H A D | xeon_phi_dma_channel.h | 193 struct dma_request *req);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ms/ |
H A D | testss.bat | 6 set reqcmd=%ssleay% req 22 echo make a certificate request using 'req' 27 %x509cmd% -CAcreateserial -in %CAreq% -days 30 -req -out %CAcert% -signkey %CAkey% >err.ss 45 echo make another certificate request using 'req' 51 %x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial% 74 echo error using 'req' to generate a certificate request 92 echo error using 'req' to generate a certificate request
|
H A D | testssce.bat | 4 set reqcmd=%ssleay% req 22 echo make a certificate request using 'req' 27 cerun CE:\OpenSSL\%x509cmd% -CAcreateserial -in %CAreq% -days 30 -req -out %CAcert% -signkey %CAkey% "> \OpenSSL\err.ss" 45 echo make another certificate request using 'req' 51 cerun CE:\OpenSSL\%x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial% 80 echo error using 'req' to generate a certificate request 98 echo error using 'req' to generate a certificate request
|
/barrelfish-2018-10-04/lib/usb/class/ |
H A D | usb_hid.c | 854 struct usb_device_request req; local 855 req.bType.direction = USB_REQUEST_READ; 856 req.bType.recipient = USB_REQUEST_RECIPIENT_INTERFACE; 857 req.bType.type = USB_REQUEST_TYPE_STANDARD; 858 req.bRequest = USB_HID_REQUEST_GET_DESCRIPTOR; 859 req.wValue = USB_DESCRIPTOR_TYPE_REPORT << 8; 860 req.wIndex = iface; 861 req.wLength = size; 865 usb_error_t err = usb_do_request_read(&req, &ret_data_length, (void **) d); 891 struct usb_device_request req; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | testgen.com | 42 $ mcr 'exe_dir'openssl req -config test.cnf 'req_new' -out testreq.pem 49 $ mcr 'exe_dir'openssl req -config test.cnf -verify -in testreq.pem -noout 52 $ write sys$output "signature on req is wrong"
|
H A D | testss | 4 reqcmd="../util/shlib_wrap.sh ../apps/openssl req" 33 echo "make a certificate request using 'req'" 45 echo "error using 'req' to generate a certificate request" 50 $x509cmd -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey -extfile $CAconf -extensions v3_ca >err.ss 83 echo "make a user certificate request using 'req'" 86 echo "error using 'req' to generate a user certificate request" 92 $x509cmd -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -extfile $Uconf -extensions v3_ee >err.ss 104 echo "make a proxy certificate request using 'req'" 107 echo "error using 'req' to generate a proxy certificate request" 113 $x509cmd -CAcreateserial -in $P1req -days 30 -req [all...] |
H A D | testss.com | 10 $ reqcmd := mcr 'exe_dir'openssl req 27 $ write sys$output "make a certificate request using 'req'" 44 $ write sys$output "error using 'req' to generate a certificate request" 50 $ 'x509cmd' "-CAcreateserial" -in 'CAreq' -days 30 -req -out 'CAcert' -signkey 'CAkey' 89 $ write sys$output "make another certificate request using 'req'" 94 $ write sys$output "error using 'req' to generate a certificate request" 101 $ 'x509cmd' "-CAcreateserial" -in 'Ureq' -days 30 -req -out 'Ucert' "-CA" 'CAcert' "-CAkey" 'CAkey'
|
/barrelfish-2018-10-04/usr/drivers/virtio/block/ |
H A D | device.h | 50 void (*op)(struct vblock_req *req);
|
/barrelfish-2018-10-04/lib/dma/ioat/ |
H A D | ioat_dma_channel.c | 115 struct dma_request *req; local 128 req = dma_desc_get_request(desc); 129 if (req) { 131 assert(req_head == req); 132 err = ioat_dma_request_process((struct ioat_dma_request *) req); 454 * \param req IOAT DMA request to be submitted 460 struct ioat_dma_request *req) 463 dma_request_get_id((struct dma_request * )req)); 465 dma_channel_enq_request_tail(&chan->common, (struct dma_request *) req); 459 ioat_dma_channel_submit_request(struct ioat_dma_channel *chan, struct ioat_dma_request *req) argument
|
/barrelfish-2018-10-04/usr/drivers/usb/usb_manager/include/ |
H A D | usb_request.h | 23 struct usb_device_request *req; member in struct:usb_request_state 43 struct usb_device_request *req, struct usb_request_state *req_state,
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | ocsp.h | 404 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req); 405 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, 409 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); 420 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid); 422 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); 424 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs); 425 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 427 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm); 428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 430 int OCSP_request_sign(OCSP_REQUEST *req, [all...] |