/barrelfish-2018-10-04/lib/lwip2/src/core/ipv6/ |
H A D | ip6_frag.c | 113 struct ip6_reassdata *r, *tmp; local 129 tmp = r; 133 ip6_reass_free_complete_datagram(tmp);
|
/barrelfish-2018-10-04/kernel/arch/x86/ |
H A D | startup_x86.c | 228 struct multiboot_mmap tmp; local 229 tmp = *curmmap; 231 *nextmmap = tmp;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_purp.c | 161 X509_PURPOSE tmp; local 165 tmp.purpose = purpose; 167 idx = sk_X509_PURPOSE_find(xptable, &tmp);
|
/barrelfish-2018-10-04/lib/procon/ |
H A D | procon.c | 780 struct slot_data tmp; local 786 sp_copy_slot_data(&tmp, &spp->sp->slot_list[ri].d); 788 sp_copy_slot_data(new_slot, &tmp);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | t1_lib.c | 606 if (((s->s3->tmp.new_cipher->id & 0xFFFF)==0x80 || (s->s3->tmp.new_cipher->id & 0xFFFF)==0x81) 1307 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1308 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; 1465 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1466 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
|
H A D | ssl_lib.c | 723 ret = s->s3->tmp.finish_md_len; 726 memcpy(buf, s->s3->tmp.finish_md, count); 738 ret = s->s3->tmp.peer_finish_md_len; 741 memcpy(buf, s->s3->tmp.peer_finish_md, count); 847 CERT *tmp; local 861 tmp=t->cert; 869 if (tmp != NULL) ssl_cert_free(tmp); 2118 ssl_set_cert_masks(c, s->s3->tmp.new_cipher); 2120 alg_k = s->s3->tmp [all...] |
H A D | d1_pkt.c | 1053 char tmp[16]; local 1058 BIO_snprintf(tmp,sizeof tmp,"%d",alert_descr); 1059 ERR_add_error_data(2,"SSL alert number ",tmp);
|
H A D | ssl3.h | 507 } tmp; member in struct:ssl3_state_st
|
/barrelfish-2018-10-04/usr/drivers/xeon_phi/ |
H A D | sysmem_caps.c | 171 uint32_t tmp = elem_id[i]; local 173 elem_id[idx] = tmp;
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | fmr_pool.c | 361 struct ib_pool_fmr *tmp; local 369 list_for_each_entry_safe(fmr, tmp, &pool->free_list, list) {
|
/barrelfish-2018-10-04/usr/eclipseclp/lib_tcl/widget/ |
H A D | util-dump.tcl | 193 if {[info default $cmd $a tmp]} { 194 lappend pargs [list $a $tmp]
|
/barrelfish-2018-10-04/lib/libc/rpc/ |
H A D | svc_dg.c | 203 char tmp[CMSG_LEN(sizeof(*lin))]; local 214 msg.msg_control = (caddr_t)tmp; 306 char tmp[CMSG_SPACE(sizeof(*lin))]; local 319 msg.msg_control = (caddr_t)tmp;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/perlasm/ |
H A D | x86gas.pl | 153 my $tmp=".comm\t${nmdecor}OPENSSL_ia32cap_P,4"; 154 if ($::elf) { push (@out,"$tmp,4\n"); } 155 else { push (@out,"$tmp\n"); }
|
/barrelfish-2018-10-04/usr/bench/bomp_benchmark/ |
H A D | ft.c | 283 static double tmp[NX*2*MAXDIM+1]; local 299 vranlc(2*NX*dims[0][1], &x0, A, tmp); 304 u0[k][j][i].real = tmp[t++]; 305 u0[k][j][i].imag = tmp[t++];
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | ca.c | 2789 char *tmp = NULL; local 2832 if (tmp) OPENSSL_free(tmp); 2882 char *tmp = NULL; local 2889 tmp = BUF_strdup(str); 2891 p = strchr(tmp, ','); 2893 rtime_str = tmp; 2980 if (tmp) OPENSSL_free(tmp);
|
/barrelfish-2018-10-04/usr/eclipseclp/documents/userman/ |
H A D | umsparallel.tex | 330 that there is no space in your /tmp filesystem. In this case set 337 setenv ECLIPSETMP ~/tmp/`hostname` 362 The name server puts some data files into the \$ECLIPSETMP (or /tmp) 370 (if ECLIPSETMP is not set, this defaults to /tmp):
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ |
H A D | install.com | 118 $ tmp = EXHEADER_'D' 121 $ COPY 'tmp' WRK_SSLINCLUDE: /LOG 123 $ COPY [.'D']'tmp' WRK_SSLINCLUDE: /LOG 125 $ SET FILE/PROT=WORLD:RE WRK_SSLINCLUDE:'tmp'
|
/barrelfish-2018-10-04/kernel/arch/k1om/ |
H A D | startup_arch.c | 168 struct multiboot_mmap tmp = mbi_mmaps[i-1]; local 170 mbi_mmaps[i] = tmp;
|
/barrelfish-2018-10-04/lib/acpica/tests/aslts/bin/ |
H A D | asltsrun | 137 path="$ASLTSDIR/tmp/aml/$EXECVERSION/opt/$BITMODE/$1.aml" 306 make_dir "./tmp" tmp tmp 308 cd "./tmp" 884 MULTIPATH="$ASLTSDIR/tmp/RESULTS/$MULTINAME"
|
/barrelfish-2018-10-04/usr/proc_mgmt/ |
H A D | service.c | 159 struct domain_waiter *tmp = waiter; local 161 free(tmp);
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | ssl3.h | 507 } tmp; member in struct:ssl3_state_st
|
/barrelfish-2018-10-04/lib/barrelfish/arch/arm/ |
H A D | pmap.c | 359 struct vnode *tmp = NULL; // Tmp variable for passing to alloc_vnode local 362 idx, &tmp); 367 assert(tmp != NULL); 368 *ptable = tmp; // Set argument to received value
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/hw/mlx4/ |
H A D | mcg.c | 1057 struct mcast_req *req, *tmp local 1059 list_for_each_entry_safe(req, tmp, &group->pending_list, group_list) { 1160 struct mcast_req *req, *tmp, *group_first = NULL; local 1167 list_for_each_entry_safe(req, tmp, &group->func[vf].pending, func_list) {
|
/barrelfish-2018-10-04/lib/libc/resolv/ |
H A D | res_send.c | 632 void *tmp; local 711 DE_CONST(buf, tmp); 712 iov[1] = evConsIovec(tmp, buflen);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_nist.c | 405 * 'tmp=result-modulus; if (!carry || !borrow) result=tmp;' 783 val,tmp,*res; local 820 tmp = val>>BN_NIST_521_RSHIFT; 822 t_d[i] = (tmp | val<<BN_NIST_521_LSHIFT) & BN_MASK2;
|