/barrelfish-master/lib/devif/backends/net/mlx4/drivers/infiniband/hw/mthca/ |
H A D | mthca_catas.c | 90 const char *type; local 102 type = "internal error"; 105 type = "uplink bus error"; 108 type = "DDR data error"; 111 type = "internal parity error"; 114 type = "unknown error"; 118 mthca_err(dev, "Catastrophic error detected: %s\n", type);
|
/barrelfish-master/include/target/arm/barrelfish_kpi/ |
H A D | paging_arm_v7.h | 61 /* Page type independent page options */ 73 uint32_t type :2; // == 0 member in struct:arm_l1_entry::__anon53 78 uint32_t type :2; // == 1 member in struct:arm_l1_entry::__anon54 89 uint32_t type :2; // == 2 member in struct:arm_l1_entry::__anon55 96 uint32_t tex :3; // type extension 107 uint32_t type :2; // == 3 member in struct:arm_l1_entry::__anon56 114 uint32_t tex :3; // type extension 137 uint32_t type :2; // == 0 member in struct:arm_l2_entry::__anon57 142 uint32_t type :2; // == 1 member in struct:arm_l2_entry::__anon58 150 uint32_t tex :3; // type extensio 157 uint32_t type :2; // == 2 or 3 member in struct:arm_l2_entry::__anon59 [all...] |
/barrelfish-master/usr/drivers/iommu/modules/generic/ |
H A D | common.h | 44 hw_pci_iommu_t type; member in struct:iommu 56 errval_t iommu_get_by_idx(hw_pci_iommu_t type, uint32_t idx, struct iommu **iommu); 57 errval_t iommu_set_by_idx(hw_pci_iommu_t type, uint32_t idx, struct iommu *iommu); 62 return i->type; 137 * @brief retypes the provided capability into a new type, and sets it read only 140 * @param type the target type 145 static inline errval_t iommu_retype_read_only(struct capref src, enum objtype type, argument 162 idc_endpoint_t type); 166 errval_t iommu_request_endpoint(uint8_t type, struc [all...] |
/barrelfish-master/usr/skb/octopus/ |
H A D | code_generator.c | 40 switch (p->type) { 78 assert(p->type == nodeType_Constraint); 123 assert(p->type == nodeType_Object); 130 if (name->type == nodeType_Ident) { 133 } else if (name->type == nodeType_Variable) { 135 } else if (name->type == nodeType_Constraint) { 150 assert(iter->type == nodeType_Attribute);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_vfy.h | 126 int type; member in struct:x509_object_st 150 int (*get_by_subject)(X509_LOOKUP *ctx,int type,X509_NAME *name, 152 int (*get_by_issuer_serial)(X509_LOOKUP *ctx,int type,X509_NAME *name, 154 int (*get_by_fingerprint)(X509_LOOKUP *ctx,int type, 157 int (*get_by_alias)(X509_LOOKUP *ctx,int type,char *str,int len, 290 #define X509_LOOKUP_load_file(x,name,type) \ 291 X509_LOOKUP_ctrl((x),X509_L_FILE_LOAD,(name),(long)(type),NULL) 293 #define X509_LOOKUP_add_dir(x,name,type) \ 294 X509_LOOKUP_ctrl((x),X509_L_ADD_DIR,(name),(long)(type),NULL) 406 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type, variable 408 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,int type,X509_NAME *name); variable [all...] |
H A D | x509_req.c | 136 if (k->type == EVP_PKEY_EC) 143 if (k->type == EVP_PKEY_DH) 206 if(!ext || (ext->type != V_ASN1_SEQUENCE)) 226 at->type = V_ASN1_SEQUENCE; 292 const ASN1_OBJECT *obj, int type, 296 type, bytes, len)) return 1; 301 int nid, int type, 305 type, bytes, len)) return 1; 310 const char *attrname, int type, 314 type, byte 291 X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, const unsigned char *bytes, int len) argument 300 X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, const unsigned char *bytes, int len) argument 309 X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, const unsigned char *bytes, int len) argument [all...] |
/barrelfish-master/include/openssl/ |
H A D | x509_vfy.h | 126 int type; member in struct:x509_object_st 150 int (*get_by_subject)(X509_LOOKUP *ctx,int type,X509_NAME *name, 152 int (*get_by_issuer_serial)(X509_LOOKUP *ctx,int type,X509_NAME *name, 154 int (*get_by_fingerprint)(X509_LOOKUP *ctx,int type, 157 int (*get_by_alias)(X509_LOOKUP *ctx,int type,char *str,int len, 290 #define X509_LOOKUP_load_file(x,name,type) \ 291 X509_LOOKUP_ctrl((x),X509_L_FILE_LOAD,(name),(long)(type),NULL) 293 #define X509_LOOKUP_add_dir(x,name,type) \ 294 X509_LOOKUP_ctrl((x),X509_L_ADD_DIR,(name),(long)(type),NULL) 406 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type, variable 408 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,int type,X509_NAME *name); variable [all...] |
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | openssl.c | 135 * type of "FUNCTION*"). This removes the necessity for macro-generated wrapper 152 static void lock_dbg_cb(int mode, int type, const char *file, int line) argument 165 if (type < 0 || type >= CRYPTO_NUM_LOCKS) 167 errstr = "type out of bounds"; 173 if (modes[type]) 181 modes[type] = rw; 185 if (!modes[type]) 191 if (modes[type] != rw) 198 modes[type] [all...] |
H A D | s_socket.c | 105 static int init_client_ip(int *sock,unsigned char ip[4], int port, int type); 106 static int init_server(int *sock, int port, int type); 107 static int init_server_long(int *sock, int port,char *ip, int type); 237 int init_client(int *sock, char *host, int port, int type) argument 245 return(init_client_ip(sock,ip,port,type)); 248 static int init_client_ip(int *sock, unsigned char ip[4], int port, int type) argument 266 if (type == SOCK_STREAM) 268 else /* ( type == SOCK_DGRAM) */ 274 if (type == SOCK_STREAM) 288 int do_server(int port, int type, in argument 326 init_server_long(int *sock, int port, char *ip, int type) argument 379 init_server(int *sock, int port, int type) argument [all...] |
/barrelfish-master/usr/eclipseclp/Kernel/src/ |
H A D | bip_bag.c | 160 p_bag_create(value vbag, type tbag) 178 p_bag_enter(value vbag, type tbag, value vterm, type tterm) 200 p_bag_retrieve(value vbag, type tbag, value vl, type tl) 225 p_bag_erase(value vbag, type tbag) 234 p_bag_count(value vbag, type tbag, value vc, type tc) 243 p_bag_dissolve(value vbag, type tbag, value vl, type t [all...] |
H A D | bip_store.c | 193 p_is_store(value vhandle, type thandle, value vmod, type tmod) 206 p_store_create(value vhtable, type thtable) 217 p_store_create_named(value vhtable, type thtable, value vmod, type tmod) 303 _htable_find(t_heap_htable *obj, uword hash, value vkey, type tkey, t_htable_elem ***ppslot) 332 p_store_set(value vhandle, type thandle, value vkey, type tkey, value vval, type tval, value vmod, type tmo [all...] |
/barrelfish-master/usr/eclipseclp/Eplex/ |
H A D | eplex.c | 407 int old_ptype; /* old problem type */ 521 coerce_to_double(value vval, type tval) 523 /* tval MUST be a number type */ 532 p_cpx_cleanup(value vlp, type tlp) 675 p_cpx_init(value vlicloc, type tlicloc, 676 value vserialnum, type tserialnum, 677 value vsubdir, type tsubdir) 919 p_cpx_challenge(value v, type t) 954 p_cpx_prob_init(value vpre, type tpre, 955 value vcpy, type tcp [all...] |
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | d1_pkt.c | 169 static int have_handshake_fragment(SSL *s, int type, unsigned char *buf, 496 * ssl->s3->rrec.type is the type of record 519 * ssl->s3->rrec.type - is the type of record 566 rr->type= *(p++); 647 if (!(s->d1->listen && rr->type == SSL3_RT_HANDSHAKE && 685 /* Return up to 'len' payload bytes received in 'type' records. 686 * 'type' is one of the following: 712 int dtls1_read_bytes(SSL *s, int type, unsigne argument 1259 dtls1_write_app_data_bytes(SSL *s, int type, const void *buf_, int len) argument 1288 have_handshake_fragment(SSL *s, int type, unsigned char *buf, int len, int peek) argument 1322 dtls1_write_bytes(SSL *s, int type, const void *buf, int len) argument 1332 do_dtls1_write(SSL *s, int type, const unsigned char *buf, unsigned int len, int create_empty_fragment) argument [all...] |
H A D | ssl_rsa.c | 85 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) argument 104 if (type == SSL_FILETYPE_ASN1) 109 else if (type == SSL_FILETYPE_PEM) 204 if ((pkey->type == EVP_PKEY_RSA) && 229 int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) argument 247 if (type == SSL_FILETYPE_ASN1) 252 else if (type == SSL_FILETYPE_PEM) 314 int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) argument 332 if (type == SSL_FILETYPE_PEM) 338 else if (type 361 SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len) argument 454 SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type) argument 551 SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type) argument 633 SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type) argument 680 SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx, const unsigned char *d, long len) argument [all...] |
/barrelfish-master/lib/lwip/src/core/ |
H A D | memp.c | 344 * Carves out memp_memory into linked lists for each pool-type. 551 printf("memp_malloc: failed type: inUse_13: %"PRId64 611 * @param type the pool to get an element from 622 memp_malloc(memp_t type) argument 624 memp_malloc_fn(memp_t type, const char *file, const int line) 631 LWIP_ERROR("memp_malloc: type < MEMP_MAX", (type < MEMP_MAX), return NULL; 639 memp = memp_tab[type]; 642 memp_tab[type] = memp->next; 644 if (type 697 memp_free(memp_t type, void *mem) argument [all...] |
/barrelfish-master/usr/eclipseclp/icparc_solvers/ |
H A D | bitmap.c | 318 p_create_bitmap(value vmin, type tmin, value vmax, type tmax, value vbm, type tbm) 403 p_set_bitmap_lwb(value vbm, type tbm, value vmin, type tmin, 404 value vresult, type tresult, value vnew_bm, type tnew_bm) 516 p_set_bitmap_upb(value vbm, type tbm, value vmax, type tmax, 517 value vresult, type tresul [all...] |
/barrelfish-master/lib/lwip2/src/core/ |
H A D | pbuf.c | 217 * Allocates a pbuf of the given type (possibly a chain for PBUF_POOL type). 225 * @param type this parameter decides how and where the pbuf 248 pbuf_alloc(pbuf_layer layer, u16_t length, pbuf_type type) argument 282 switch (type) { 291 p->type = type; 326 q->type = type; 372 p->type 425 pbuf_alloced_custom(pbuf_layer l, u16_t length, pbuf_type type, struct pbuf_custom *p, void *payload_mem, u16_t payload_mem_len) argument 571 u16_t type; local 717 u16_t type; local [all...] |
/barrelfish-master/kernel/arch/armv7/ |
H A D | paging.c | 93 l1.section.type = L1_TYPE_SECTION_ENTRY; 156 e_l2->small_page.type= L2_TYPE_SMALL_PAGE; 176 e_l1->page_table.type= L1_TYPE_PAGE_TABLE_ENTRY; 342 if (src->type != ObjType_VNode_ARM_l2) { 354 if (src->type != ObjType_Frame && src->type != ObjType_DevFrame && 355 src->type != ObjType_EndPointUMP) { 356 panic("oops: src->type != ObjType_Frame && " 357 "src->type != ObjType_DevFrame &&" 358 "src->type ! 651 paging_is_region_valid(lvaddr_t buffer, size_t size, uint8_t type) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ |
H A D | cryptlib.c | 175 /* This is for applications to allocate new type names in the non-dynamic 185 static void (MS_FAR *locking_callback)(int mode,int type, 188 int type,const char *file,int line)=0; 397 void (*CRYPTO_get_locking_callback(void))(int mode,int type,const char *file, 403 int (*CRYPTO_get_add_lock_callback(void))(int *num,int mount,int type, 409 void CRYPTO_set_locking_callback(void (*func)(int mode,int type, argument 415 void CRYPTO_set_add_lock_callback(int (*func)(int *num,int mount,int type, argument 557 void CRYPTO_lock(int mode, int type, const char *file, int line) argument 581 CRYPTO_get_lock_name(type), file, line); 584 if (type < 603 CRYPTO_add_lock(int *pointer, int amount, int type, const char *file, int line) argument 648 CRYPTO_get_lock_name(int type) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/hmac/ |
H A D | hm_pmeth.c | 85 hctx->ktmp.type = V_ASN1_OCTET_STRING; 173 static int pkey_hmac_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) argument 177 switch (type) 205 const char *type, const char *value) 211 if (!strcmp(type, "key")) 217 if (!strcmp(type, "hexkey")) 204 pkey_hmac_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, const char *value) argument
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_lib.c | 70 nid=OBJ_obj2nid(p7->type); 115 int PKCS7_content_new(PKCS7 *p7, int type) argument 120 if (!PKCS7_set_type(ret,type)) goto err; 133 i=OBJ_obj2nid(p7->type); 159 int PKCS7_set_type(PKCS7 *p7, int type) argument 164 obj=OBJ_nid2obj(type); /* will not fail */ 166 switch (type) 169 p7->type=obj; 180 p7->type=obj; 185 p7->type 229 PKCS7_set0_type_other(PKCS7 *p7, int type, ASN1_TYPE *other) argument [all...] |
/barrelfish-master/include/sys/ |
H A D | elf64.h | 66 Elf64_Half e_type; /* File type. */ 100 Elf64_Word sh_type; /* Section type. */ 106 Elf64_Word sh_info; /* Depends on section type. */ 116 Elf64_Word p_type; /* Entry type. */ 131 Elf64_Sxword d_tag; /* Entry type. */ 145 Elf64_Xword r_info; /* Relocation type and symbol index. */ 151 Elf64_Xword r_info; /* Relocation type and symbol index. */ 160 #define ELF64_R_INFO(sym, type) (((sym) << 32) + ((type) & 0xffffffffL)) 164 #define ELF64_R_TYPE_INFO(data, type) \ [all...] |
/barrelfish-master/lib/dma/client/ |
H A D | dma_client_request.c | 75 assert(chan->device->type == DMA_DEV_TYPE_CLIENT); 86 req->common.type = DMA_REQ_TYPE_MEM_REGISTER; 124 assert(chan->device->type == DMA_DEV_TYPE_CLIENT); 135 req->common.type = DMA_REQ_TYPE_MEM_REMOVE; 175 assert(chan->device->type == DMA_DEV_TYPE_CLIENT); 191 req->common.type = DMA_REQ_TYPE_MEMCPY;
|
/barrelfish-master/lib/vfs/ |
H A D | vfs_fd.c | 77 .type = FDTAB_TYPE_FILE, 96 switch(e->type) { 128 switch(e->type) { 163 if (e->type == FDTAB_TYPE_AVAILABLE) { 170 switch(e->type) { 198 switch(e->type) {
|
/barrelfish-master/usr/kaluga/ |
H A D | start_iommu.c | 52 uint64_t type, flags, segment, address, idx; local 54 &key, &idx, &type, &flags, &segment, &address); 66 switch(type) { 189 uint64_t type, flags, segment, address, idx; local 197 &key, &idx, &type, &flags, &segment, &address); 202 if (type == HW_PCI_IOMMU_DMAR_FAIL) {
|