/barrelfish-2018-10-04/tools/fastmodels/ |
H A D | config.c | 94 size_t *cstart, size_t *clen, size_t *astart, size_t *alen) { 106 *alen= *cursor - *astart; 107 assert(*alen <= size - *astart); /* Arguments end here. */ 142 size_t astart, alen; local 152 alen= cursor - astart; 153 assert(alen <= size - cursor); 155 if(alen > 9) { 160 memcpy(arg, buf+astart, alen); 161 arg[alen]= '\0'; 93 get_cmdline(const char *buf, size_t size, size_t *cursor, size_t *cstart, size_t *clen, size_t *astart, size_t *alen) argument
|
/barrelfish-2018-10-04/lib/libc/net/ |
H A D | getifaddrs.c | 99 size_t len, alen; local 169 alen = 0; 177 alen = len; 189 dcnt += alen; 267 alen = 0; 275 alen = len; 298 memset(data, 0, alen); 299 data += alen;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 166 alen=DH_size(a); 167 abuf=(unsigned char *)OPENSSL_malloc(alen);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 166 alen=DH_size(a); 167 abuf=(unsigned char *)OPENSSL_malloc(alen);
|
H A D | ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 205 alen=KDF1_SHA1_len; 206 abuf=(unsigned char *)OPENSSL_malloc(alen); 207 aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ecdh/ |
H A D | ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 205 alen=KDF1_SHA1_len; 206 abuf=(unsigned char *)OPENSSL_malloc(alen); 207 aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1);
|
/barrelfish-2018-10-04/lib/libc/rpc/ |
H A D | svc_dg.c | 255 socklen_t alen; local 260 alen = sizeof (struct sockaddr_storage); 262 (struct sockaddr *)(void *)&ss, &alen, 268 if (xprt->xp_rtaddr.len < alen) { 271 xprt->xp_rtaddr.buf = mem_alloc(alen); 272 xprt->xp_rtaddr.len = alen; 274 memcpy(xprt->xp_rtaddr.buf, &ss, alen); 290 (struct sockaddr *)(void *)&ss, alen);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_doit.c | 858 int alen; local 877 alen = ASN1_item_i2d((ASN1_VALUE *)si->auth_attr,&abuf, 881 if (EVP_DigestSignUpdate(&mctx,abuf,alen) <= 0) 1025 int alen; local 1055 alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf, 1057 if (alen <= 0) 1063 EVP_VerifyUpdate(&mdc_tmp, abuf, alen);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_sd.c | 706 int alen; local 732 alen = ASN1_item_i2d((ASN1_VALUE *)si->signedAttrs,&abuf, 736 if (EVP_DigestSignUpdate(&mctx, abuf, alen) <= 0) 773 int alen, r = -1; local 789 alen = ASN1_item_i2d((ASN1_VALUE *)si->signedAttrs,&abuf, 793 r = EVP_DigestVerifyUpdate(&mctx, abuf, alen);
|
/barrelfish-2018-10-04/lib/libc/resolv/ |
H A D | res_send.c | 1098 const struct sockaddr *address, int alen) 1105 if (getnameinfo(address, alen, hbuf, sizeof(hbuf), 1097 Aerror(const res_state statp, FILE *file, const char *string, int error, const struct sockaddr *address, int alen) argument
|