/barrelfish-2018-10-04/include/vm/ |
H A D | vm_meter.c | 78 if (req->flags & SCTL_MASK32) { 83 return SYSCTL_OUT(req, la, sizeof(la)); 86 return SYSCTL_OUT(req, &averunnable, sizeof(averunnable)); 215 return (sysctl_handle_opaque(oidp, &total, sizeof(total), req)); 228 * (sysctl_oid *oidp, void *arg1, int arg2, struct sysctl_req *req) 241 return (SYSCTL_OUT(req, &count, sizeof(int)));
|
H A D | vm_page.c | 365 error = sysctl_wire_old_buffer(req, 0); 368 sbuf_new_for_sysctl(&sbuf, NULL, 128, req); 1614 vm_page_alloc(vm_object_t object, vm_pindex_t pindex, int req) argument 1622 KASSERT((object != NULL) == ((req & VM_ALLOC_NOOBJ) == 0) && 1623 (object != NULL || (req & VM_ALLOC_SBUSY) == 0) && 1624 ((req & (VM_ALLOC_NOBUSY | VM_ALLOC_SBUSY)) != 1626 ("vm_page_alloc: inconsistent object(%p)/req(%x)", (void *)object, 1627 req)); 1631 req_class = req & VM_ALLOC_CLASS_MASK; 1662 if ((req 1861 vm_page_alloc_contig(vm_object_t object, vm_pindex_t pindex, int req, u_long npages, vm_paddr_t low, vm_paddr_t high, u_long alignment, vm_paddr_t boundary, vm_memattr_t memattr) argument 2067 vm_page_alloc_freelist(int flind, int req) argument 2395 int error, order, req; local 2633 vm_page_reclaim_contig(int req, u_long npages, vm_paddr_t low, vm_paddr_t high, u_long alignment, vm_paddr_t boundary) argument [all...] |
/barrelfish-2018-10-04/lib/dma/xeon_phi/ |
H A D | xeon_phi_dma_channel.c | 253 struct dma_request *req = dma_desc_get_request(desc); local 254 if (req) { 255 err = xeon_phi_dma_request_process((struct xeon_phi_dma_request *)req); 503 * \param req IOAT DMA request to be submitted 509 struct xeon_phi_dma_request *req) 512 dma_request_get_id((struct dma_request * )req)); 514 dma_channel_enq_request_tail(&chan->common, (struct dma_request *) req); 508 xeon_phi_dma_channel_submit_request(struct xeon_phi_dma_channel *chan, struct xeon_phi_dma_request *req) argument
|
/barrelfish-2018-10-04/lib/net/ |
H A D | arp.c | 61 struct arp_request* req = (struct arp_request*) collections_list_get_ith_item(st->outstanding_arp, i); local 62 sprintf(query, "net.arp.%d {mac: _ , ip: %d }", req->ip, req->ip); 80 struct arp_request* req = (struct arp_request*) collections_list_get_ith_item(st->outstanding_arp, i); local 81 NETDEBUG("Starting ARP for ip %u \n", req->ip); 82 err = etharp_request(&st->netif, (ip4_addr_t*) &req->ip);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_ext.c | 352 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len) argument 354 return ocsp_add1_nonce(&req->tbsRequest->requestExtensions, val, len); 377 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs) argument 389 req_idx = OCSP_REQUEST_get_ext_by_NID(req, NID_id_pkix_OCSP_Nonce, -1); 401 req_ext = OCSP_REQUEST_get_ext(req, req_idx); 412 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req) argument 417 req_idx = OCSP_REQUEST_get_ext_by_NID(req, NID_id_pkix_OCSP_Nonce, -1); 420 req_ext = OCSP_REQUEST_get_ext(req, req_idx);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ms/ |
H A D | testpem.bat | 12 call tpem.bat req ..\test\testreq2.pem
|
H A D | testpemce.bat | 17 call tpemce.bat req testreq2.pem
|
/barrelfish-2018-10-04/lib/virtio/guest/ |
H A D | channel_flounder.c | 142 err = virtio_binding->rpc_tx_vtbl.req(virtio_binding, size, &msg_err, cap); 155 .req = request_mem,
|
/barrelfish-2018-10-04/lib/barrelfish/ |
H A D | domain.c | 151 uint64_t stacksize, genvaddr_t req) 166 req); 176 errval_t err, genvaddr_t thread, genvaddr_t req) 180 struct create_thread_req *r = (struct create_thread_req*)(lvaddr_t)req; 200 genvaddr_t taddr, genvaddr_t req) 206 err = b->tx_vtbl.join_thread_reply(b, NOP_CONT, err, retval, req); 217 errval_t err, uint64_t retval, genvaddr_t req) 219 struct join_thread_req *r = (struct join_thread_req *)(lvaddr_t)req; 974 struct create_thread_req *req = malloc(sizeof(*req)); local 149 create_thread_request(struct interdisp_binding *b, genvaddr_t funcaddr, genvaddr_t argaddr, uint64_t stacksize, genvaddr_t req) argument 175 create_thread_reply(struct interdisp_binding *b, errval_t err, genvaddr_t thread, genvaddr_t req) argument 199 join_thread_request(struct interdisp_binding *b, genvaddr_t taddr, genvaddr_t req) argument 216 join_thread_reply(struct interdisp_binding *b, errval_t err, uint64_t retval, genvaddr_t req) argument 1024 struct join_thread_req *req = malloc(sizeof(*req)); local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | ca.c | 222 int verbose, X509_REQ *req, char *ext_sect, CONF *conf, 253 int req=0; local 426 req=1; 469 req=1; 476 req=1; 482 req=1; 834 if ((outdir == NULL) && (req)) 1002 if (req || gencrl) 1048 if (req) 1562 X509_REQ *req local 1630 X509 *req=NULL; local 1677 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, int verbose, X509_REQ *req, char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 2250 X509_REQ *req=NULL; local [all...] |
H A D | x509.c | 135 " -req - input is a certificate request, sign and output.\n", 172 X509_REQ *req=NULL; local 259 else if (strcmp(*argv,"-req") == 0) 584 req=PEM_read_bio_X509_REQ(in,NULL,NULL,NULL); 587 if (req == NULL) 593 if ( (req->req_info == NULL) || 594 (req->req_info->pubkey == NULL) || 595 (req->req_info->pubkey->public_key == NULL) || 596 (req->req_info->pubkey->public_key->data == NULL)) 602 if ((pkey=X509_REQ_get_pubkey(req)) [all...] |
/barrelfish-2018-10-04/include/openssl/ |
H A D | x509.h | 684 X509_REQ *d2i_X509_REQ_fp(FILE *fp,X509_REQ **req); 685 int i2d_X509_REQ_fp(FILE *fp,X509_REQ *req); 723 X509_REQ *d2i_X509_REQ_bio(BIO *bp,X509_REQ **req); 724 int i2d_X509_REQ_bio(BIO *bp,X509_REQ *req); 761 X509_REQ *X509_REQ_dup(X509_REQ *req); 916 int X509_REQ_set_subject_name(X509_REQ *req,X509_NAME *name); 918 EVP_PKEY * X509_REQ_get_pubkey(X509_REQ *req); 922 STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); variable 923 int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, 925 int X509_REQ_add_extensions(X509_REQ *req, STACK_O [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509.h | 684 X509_REQ *d2i_X509_REQ_fp(FILE *fp,X509_REQ **req); 685 int i2d_X509_REQ_fp(FILE *fp,X509_REQ *req); 723 X509_REQ *d2i_X509_REQ_bio(BIO *bp,X509_REQ **req); 724 int i2d_X509_REQ_bio(BIO *bp,X509_REQ *req); 761 X509_REQ *X509_REQ_dup(X509_REQ *req); 916 int X509_REQ_set_subject_name(X509_REQ *req,X509_NAME *name); 918 EVP_PKEY * X509_REQ_get_pubkey(X509_REQ *req); 922 STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); variable 923 int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, 925 int X509_REQ_add_extensions(X509_REQ *req, STACK_O [all...] |
H A D | x_all.c | 184 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) argument 186 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 189 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) argument 191 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 195 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) argument 197 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 200 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) argument 202 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
|
/barrelfish-2018-10-04/include/virtio/ |
H A D | virtio_host.h | 26 errval_t (*req)(struct virtio_device *vdev, struct capref *cap); member in struct:virtio_host_cb
|
/barrelfish-2018-10-04/usr/block_server/ |
H A D | network_common.h | 85 enum block_net_msg_type req; member in struct:block_net_msg::__anon1469::__anon1473
|
H A D | block_server.h | 172 errval_t testrun_handle_status(enum block_net_msg_type req,
|
H A D | network_client.c | 131 enum block_net_msg_type req; local 136 req = msg->msg.status.req; 143 switch (msg->msg.status.req) { 152 block_local_send_status(req, reqid, status); 156 testrun_handle_status(req, reqid, status); 158 block_local_send_status(req, reqid, status);
|
/barrelfish-2018-10-04/include/dma/ioat/ |
H A D | ioat_dma_channel.h | 198 struct ioat_dma_request *req);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_conf.c | 369 X509_REQ *req) 373 if (req) 378 i = X509_REQ_add_extensions(req, extlist); 446 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, argument 452 ctx->subject_req = req; 520 char *section, X509_REQ *req) 524 return X509V3_EXT_REQ_add_nconf(&ctmp, ctx, section, req); 368 X509V3_EXT_REQ_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_REQ *req) argument
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | local_sa.c | 980 struct sa_path_request *req; local 982 req = container_of(work, struct sa_path_request, work); 983 req->callback(0, &req->path_rec, req->context); 984 ib_sa_client_put(req->client); 985 kfree(req); 1024 struct sa_path_request *req; local 1036 req = kmalloc(sizeof *req, gfp_mas [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | testtsa | 48 ../../util/shlib_wrap.sh ../../apps/openssl req -new -x509 -nodes \ 61 ../../util/shlib_wrap.sh ../../apps/openssl req -new \ 65 ../../util/shlib_wrap.sh ../../apps/openssl x509 -req \ 172 echo "Creating req1.req time stamp request for file testtsa..." 175 echo "Printing req1.req..." 178 echo "Generating valid response for req1.req..." 193 # echo "Generating _invalid_ response for req1.req..." 202 echo "Creating req2.req time stamp request for file testtsa..." 205 echo "Printing req2.req..." 208 echo "Generating valid response for req2.req [all...] |
H A D | treq | 3 cmd='../util/shlib_wrap.sh ../apps/openssl req -config ../apps/openssl.cnf' 12 echo "skipping req conversion test for $t" 16 echo testing req conversions
|
H A D | treq.com | 1 $! TREQ.COM -- Tests req keys 9 $ cmd := mcr 'exe_dir'openssl req -config [-.apps]openssl-vms.cnf 14 $ write sys$output "testing req conversions"
|
/barrelfish-2018-10-04/lib/lwip2/src/apps/smtp/ |
H A D | smtp.c | 690 struct smtp_send_request *req = (struct smtp_send_request*)arg; local 695 if (req->static_data) { 696 err = smtp_send_mail_static(req->from, req->to, req->subject, req->body, 697 req->callback_fn, req->callback_arg); 699 err = smtp_send_mail(req->from, req [all...] |