/openbsd-current/sys/dev/pci/drm/amd/display/dc/inc/hw/ |
H A D | abm.h | 57 unsigned int bytes,
|
/openbsd-current/lib/libcrypto/rand/ |
H A D | rand.h | 77 int (*bytes)(unsigned char *buf, int num); member in struct:rand_meth_st
|
/openbsd-current/gnu/usr.bin/perl/cpan/IO-Compress/lib/IO/Compress/Zlib/ |
H A D | Constants.pm | 6 use bytes;
|
/openbsd-current/gnu/usr.bin/cvs/src/ |
H A D | subr.c | 29 xmalloc (bytes) 30 size_t bytes; 34 /* Parts of CVS try to xmalloc zero bytes and then free it. Some 37 if (bytes == 0) 38 bytes = 1; 40 cp = malloc (bytes); 44 snprintf (buf, sizeof buf, "out of memory; can not allocate %lu bytes", 45 (unsigned long) bytes); 57 xrealloc (ptr, bytes) 59 size_t bytes; [all...] |
/openbsd-current/lib/libcrypto/chacha/ |
H A D | chacha-merged.c | 32 u8 *c, u32 bytes) 119 chacha_encrypt_bytes(chacha_ctx *x, const u8 *m, u8 *c, u32 bytes) argument 129 if (!bytes) 150 if (bytes < 64) { 151 for (i = 0; i < bytes; ++i) 200 if (bytes < 64) { 240 * Stopping at 2^70 bytes per nonce is the user's 262 if (bytes <= 64) { 263 if (bytes < 64) { 264 for (i = 0; i < bytes; [all...] |
/openbsd-current/gnu/gcc/gcc/config/mips/ |
H A D | crti.asm | 2 Return spill offset of 40 and 20. Aligned to 16 bytes for n32. */
|
H A D | crtn.asm | 2 Return spill offset of 40 and 20. Aligned to 16 bytes for n32. */
|
/openbsd-current/gnu/usr.bin/binutils/gdb/ |
H A D | expression.h | 369 /* Macros for converting between number of expression elements and bytes 374 #define BYTES_TO_EXP_ELEM(bytes) \ 375 (((bytes) + sizeof (union exp_element) - 1) / sizeof (union exp_element))
|
/openbsd-current/gnu/usr.bin/gcc/gcc/config/mips/ |
H A D | crti.asm | 2 Return spill offset of 40 and 20. Aligned to 16 bytes for n32. */
|
H A D | crtn.asm | 2 Return spill offset of 40 and 20. Aligned to 16 bytes for n32. */
|
/openbsd-current/gnu/usr.bin/perl/cpan/Encode/lib/Encode/ |
H A D | Encoder.pm | 61 sub bytes { subroutine 96 q(0+) => sub { use bytes(); bytes::length( $_[0]->{data} ) }, 118 encoder($base64)->bytes('base64')->latin1; 122 encoder("\x{abcd}\x{ef}g")->utf8 == 6; # true. bytes::length($data) 195 =item $e-E<gt>bytes([$encoding]) 201 The name I<bytes> was deliberately picked to avoid namespace tainting 236 encoder($base64)->bytes('base64')->latin1; 244 Numify returns the number of bytes in the instance data.
|
/openbsd-current/sys/lib/libkern/arch/i386/ |
H A D | memmove.S | 52 * Copy len bytes, coping with overlapping space. 81 andl $3,%ecx # any bytes left? 93 andl $3,%ecx # any fractional bytes?
|
/openbsd-current/libexec/ld.so/ |
H A D | chacha_private.h | 89 chacha_encrypt_bytes(chacha_ctx *x,const u8 *m,u8 *c,u32 bytes) argument 97 if (!bytes) return; 117 if (bytes < 64) { 118 for (i = 0;i < bytes;++i) tmp[i] = m[i]; 188 /* stopping at 2^70 bytes per nonce is user's responsibility */ 208 if (bytes <= 64) { 209 if (bytes < 64) { 210 for (i = 0;i < bytes;++i) ctarget[i] = c[i]; 216 bytes -= 64;
|
/openbsd-current/regress/sys/net/pf_fragment/ |
H A D | frag6_ext.py | 25 frag0=IPv6ExtHdrFragment(nh=58, id=fid, m=1)/bytes(packet)[40:56] 26 frag1=IPv6ExtHdrFragment(nh=58, id=fid, offset=2)/bytes(packet)[56:64]
|
H A D | frag6.py | 25 frag0=IPv6ExtHdrFragment(nh=58, id=fid, m=1)/bytes(packet)[40:56] 26 frag1=IPv6ExtHdrFragment(nh=58, id=fid, offset=2)/bytes(packet)[56:64]
|
H A D | frag.py | 25 frag0=bytes(packet)[20:36] 26 frag1=bytes(packet)[36:44]
|
H A D | frag6_cutold.py | 31 frag0=IPv6ExtHdrFragment(nh=58, id=fid, m=1)/bytes(packet)[40:56] 32 frag1=IPv6ExtHdrFragment(nh=58, id=fid, offset=1)/(dummy+bytes(packet)[56:64])
|
H A D | frag6_cutnew.py | 31 frag0=IPv6ExtHdrFragment(nh=58, id=fid, m=1)/bytes(packet)[40:56] 32 frag1=IPv6ExtHdrFragment(nh=58, id=fid, offset=1)/(dummy+bytes(packet)[56:64])
|
H A D | frag_cutold.py | 35 frag0=bytes(packet)[20:36] 36 frag1=dummy+bytes(packet)[36:44]
|
H A D | frag_cutnew.py | 33 frag0=bytes(packet)[20:36] 34 frag1=dummy+bytes(packet)[36:44]
|
/openbsd-current/regress/sys/net/pf_forward/ |
H A D | ping6_mtu.py | 29 payload="a" * (size - len(bytes(hdr))) 31 iplen=IPv6(bytes(ip)).plen
|
/openbsd-current/regress/sys/netinet/frag/ |
H A D | frag_zerosecond.py | 21 flags='MF')/bytes(packet)[20:36]) 25 frag=2)/bytes(packet)[36:44])
|
H A D | frag_mf0long.py | 22 frag=1)/bytes(packet)[28:44]) 26 flags='MF')/bytes(packet)[20:28])
|
H A D | frag_overtail1.py | 22 frag=1)/bytes(packet)[28:44]) 26 flags='MF')/bytes(packet)[20:28])
|
H A D | frag_zerofirst.py | 23 flags='MF')/bytes(packet)[20:36]) 25 frag=2)/bytes(packet)[36:44])
|