/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | cms.c | 1196 BIO *tmp; local 1199 tmp = BIO_new_file(signerfile, "w"); 1200 if (!tmp) return 0; 1202 PEM_write_bio_X509(tmp, sk_X509_value(signers, i)); 1203 BIO_free(tmp);
|
H A D | ca.c | 2789 char *tmp = NULL; local 2832 if (tmp) OPENSSL_free(tmp); 2882 char *tmp = NULL; local 2889 tmp = BUF_strdup(str); 2891 p = strchr(tmp, ','); 2893 rtime_str = tmp; 2980 if (tmp) OPENSSL_free(tmp);
|
/barrelfish-master/lib/barrelfish/ |
H A D | capabilities.c | 910 struct capref tmp; local 911 err = slot_alloc(&tmp); 915 err = create_mappable_cap(tmp, ObjType_EndPointUMP, bytes, NULL); 919 err = cap_mint(dest, tmp, iftype, 0); 923 return cap_destroy(tmp);
|
/barrelfish-master/lib/libc/gen/ |
H A D | getcap.c | 1043 char *cp, tmp; local 1049 tmp = *(cp + 1); 1052 *(cp + 1) = tmp;
|
/barrelfish-master/lib/libc/resolv/ |
H A D | res_findzonecut.c | 652 char *tmp; local 658 DE_CONST(nsrr->name, tmp); 659 free(tmp);
|
/barrelfish-master/lib/lwip2/src/apps/lwiperf/ |
H A D | lwiperf.c | 408 u8_t tmp; local 474 tmp = pbuf_header(p, -24); 475 LWIP_ASSERT("pbuf_header failed", tmp == 0);
|
/barrelfish-master/lib/lwip2/src/apps/snmp/ |
H A D | snmp_mib2_ip.c | 332 ip4_addr_t tmp; local 333 ip4_addr_get_network(&tmp, netif_ip4_addr(netif), netif_ip4_netmask(netif)); 334 value->u32 = tmp.addr;
|
/barrelfish-master/lib/lwip2/src/core/ipv6/ |
H A D | ip6_frag.c | 113 struct ip6_reassdata *r, *tmp; local 129 tmp = r; 133 ip6_reass_free_complete_datagram(tmp);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_purp.c | 161 X509_PURPOSE tmp; local 165 tmp.purpose = purpose; 167 idx = sk_X509_PURPOSE_find(xptable, &tmp);
|
/barrelfish-master/kernel/arch/x86/ |
H A D | startup_x86.c | 228 struct multiboot_mmap tmp; local 229 tmp = *curmmap; 231 *nextmmap = tmp;
|
/barrelfish-master/lib/procon/ |
H A D | procon.c | 780 struct slot_data tmp; local 786 sp_copy_slot_data(&tmp, &spp->sp->slot_list[ri].d); 788 sp_copy_slot_data(new_slot, &tmp);
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | t1_lib.c | 606 if (((s->s3->tmp.new_cipher->id & 0xFFFF)==0x80 || (s->s3->tmp.new_cipher->id & 0xFFFF)==0x81) 1307 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1308 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; 1465 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 1466 unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth;
|
H A D | ssl_lib.c | 723 ret = s->s3->tmp.finish_md_len; 726 memcpy(buf, s->s3->tmp.finish_md, count); 738 ret = s->s3->tmp.peer_finish_md_len; 741 memcpy(buf, s->s3->tmp.peer_finish_md, count); 847 CERT *tmp; local 861 tmp=t->cert; 869 if (tmp != NULL) ssl_cert_free(tmp); 2118 ssl_set_cert_masks(c, s->s3->tmp.new_cipher); 2120 alg_k = s->s3->tmp [all...] |
H A D | d1_pkt.c | 1053 char tmp[16]; local 1058 BIO_snprintf(tmp,sizeof tmp,"%d",alert_descr); 1059 ERR_add_error_data(2,"SSL alert number ",tmp);
|
/barrelfish-master/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | fmr_pool.c | 361 struct ib_pool_fmr *tmp; local 369 list_for_each_entry_safe(fmr, tmp, &pool->free_list, list) {
|
/barrelfish-master/usr/eclipseclp/lib_tcl/widget/ |
H A D | util-dump.tcl | 193 if {[info default $cmd $a tmp]} { 194 lappend pargs [list $a $tmp]
|
/barrelfish-master/usr/drivers/xeon_phi/ |
H A D | sysmem_caps.c | 171 uint32_t tmp = elem_id[i]; local 173 elem_id[idx] = tmp;
|
/barrelfish-master/lib/libc/rpc/ |
H A D | svc_dg.c | 203 char tmp[CMSG_LEN(sizeof(*lin))]; local 214 msg.msg_control = (caddr_t)tmp; 306 char tmp[CMSG_SPACE(sizeof(*lin))]; local 319 msg.msg_control = (caddr_t)tmp;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/perlasm/ |
H A D | x86gas.pl | 153 my $tmp=".comm\t${nmdecor}OPENSSL_ia32cap_P,4"; 154 if ($::elf) { push (@out,"$tmp,4\n"); } 155 else { push (@out,"$tmp\n"); }
|
/barrelfish-master/usr/bench/bomp_benchmark/ |
H A D | ft.c | 283 static double tmp[NX*2*MAXDIM+1]; local 299 vranlc(2*NX*dims[0][1], &x0, A, tmp); 304 u0[k][j][i].real = tmp[t++]; 305 u0[k][j][i].imag = tmp[t++];
|
/barrelfish-master/tools/ |
H A D | qemu-wrapper.sh | 280 PIDFILE=/tmp/qemu_debugsim_${USER}_${PORT}.pid
|
/barrelfish-master/usr/eclipseclp/documents/userman/ |
H A D | umsparallel.tex | 330 that there is no space in your /tmp filesystem. In this case set 337 setenv ECLIPSETMP ~/tmp/`hostname` 362 The name server puts some data files into the \$ECLIPSETMP (or /tmp) 370 (if ECLIPSETMP is not set, this defaults to /tmp):
|
/barrelfish-master/lib/acpica/tests/aslts/bin/ |
H A D | asltsrun | 137 path="$ASLTSDIR/tmp/aml/$EXECVERSION/opt/$BITMODE/$1.aml" 306 make_dir "./tmp" tmp tmp 308 cd "./tmp" 884 MULTIPATH="$ASLTSDIR/tmp/RESULTS/$MULTINAME"
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ |
H A D | install.com | 118 $ tmp = EXHEADER_'D' 121 $ COPY 'tmp' WRK_SSLINCLUDE: /LOG 123 $ COPY [.'D']'tmp' WRK_SSLINCLUDE: /LOG 125 $ SET FILE/PROT=WORLD:RE WRK_SSLINCLUDE:'tmp'
|
/barrelfish-master/kernel/arch/k1om/ |
H A D | startup_arch.c | 168 struct multiboot_mmap tmp = mbi_mmaps[i-1]; local 170 mbi_mmaps[i] = tmp;
|