/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/net/mlx4/ |
H A D | icm.h | 95 struct mlx4_icm_iter *iter) { 96 iter->icm = icm; 97 iter->chunk = 102 iter->page_idx = 0; 105 static inline int mlx4_icm_last(struct mlx4_icm_iter *iter) { argument 106 return !iter->chunk; 109 static inline void mlx4_icm_next(struct mlx4_icm_iter *iter) { argument 110 if (++iter->page_idx >= iter->chunk->nsg) { 111 if (iter 94 mlx4_icm_first(struct mlx4_icm *icm, struct mlx4_icm_iter *iter) argument 122 mlx4_icm_addr(struct mlx4_icm_iter *iter) argument 126 mlx4_icm_size(struct mlx4_icm_iter *iter) argument [all...] |
H A D | fw.c | 1001 struct mlx4_icm_iter iter; local 1014 for (mlx4_icm_first(icm, &iter); !mlx4_icm_last(&iter); 1015 mlx4_icm_next(&iter)) { 1023 lg = ffs(mlx4_icm_addr(&iter) | mlx4_icm_size(&iter)) - 1; 1027 (unsigned long long ) mlx4_icm_addr(&iter), 1028 mlx4_icm_size(&iter)); 1033 for (i = 0; i < mlx4_icm_size(&iter) >> lg; ++i) { 1035 mlx4_icm_addr(&iter), (lon [all...] |
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/hw/mthca/ |
H A D | mthca_memfree.h | 100 struct mthca_icm_iter *iter) 102 iter->icm = icm; 103 iter->chunk = list_empty(&icm->chunk_list) ? 106 iter->page_idx = 0; 109 static inline int mthca_icm_last(struct mthca_icm_iter *iter) argument 111 return !iter->chunk; 114 static inline void mthca_icm_next(struct mthca_icm_iter *iter) argument 116 if (++iter->page_idx >= iter->chunk->nsg) { 117 if (iter 99 mthca_icm_first(struct mthca_icm *icm, struct mthca_icm_iter *iter) argument 128 mthca_icm_addr(struct mthca_icm_iter *iter) argument 133 mthca_icm_size(struct mthca_icm_iter *iter) argument [all...] |
/barrelfish-2018-10-04/usr/kaluga/ |
H A D | device_caps.c | 47 struct allocated_range* iter = allocation_head; local 48 while (iter != NULL) { 49 if (address >= iter->id.base && 50 (address + size <= (iter->id.base + iter->id.bytes))) { 52 *devframe = iter->cr; 55 iter = iter->next; 69 struct allocated_range** iter = &allocation_head; local 70 while(*iter ! [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_crpt.c | 73 int saltlen, iter, ret; local 91 if (!pbe->iter) iter = 1; 92 else iter = ASN1_INTEGER_get (pbe->iter); 96 iter, EVP_CIPHER_key_length(cipher), key, md)) { 102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
|
H A D | p12_mutl.c | 73 int saltlen, iter; local 84 if (!p12->mac->iter) iter = 1; 85 else iter = ASN1_INTEGER_get (p12->mac->iter); 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 129 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 135 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 152 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 156 if (iter > 128 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_crt.c | 80 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, 96 if (!iter) 97 iter = PKCS12_DEFAULT_ITER; 130 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 228 int key_usage, int iter, 242 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 266 int nid_safe, int iter, char *pass) 288 iter, bags); 79 PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) argument
|
H A D | pkcs12.h | 102 ASN1_INTEGER *iter; /* defaults to 1 */ member in struct:__anon1271 183 unsigned char *salt, int saltlen, int iter, 187 int saltlen, int iter, 192 unsigned char *salt, int saltlen, int iter, 219 int saltlen, int id, int iter, int n, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 248 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, 253 int key_usage, int iter, variable 256 int safe_nid, int iter, char *pass); variable [all...] |
/barrelfish-2018-10-04/usr/tests/bomptest/ |
H A D | progress.c | 52 for(int iter = 0;; iter = (iter + 1) % ITERATIONS) { 97 if(exittime[iter] == 0) { 98 exittime[iter] = i + 3; 99 exittime[(iter + ITERATIONS - 2) % ITERATIONS] = 0; 103 if(exittime[iter] != 0 && exittime[iter] == i) { 120 printf("exittime = %lu\n", exittime[iter]); 121 assert(exittime[iter] < [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | p5_pbe.c | 69 ASN1_SIMPLE(PBEPARAM, iter, ASN1_INTEGER) 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 90 if(iter <= 0) 91 iter = PKCS5_DEFAULT_ITER; 92 if (!ASN1_INTEGER_set(pbe->iter, iter)) 132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
H A D | p5_pbev2.c | 76 ASN1_SIMPLE(PBKDF2PARAM, iter, ASN1_INTEGER), 89 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 157 if(iter <= 0) iter = PKCS5_DEFAULT_ITER; 158 if(!ASN1_INTEGER_set(kdf->iter, iter)) goto merr; 231 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 234 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
|
/barrelfish-2018-10-04/usr/bench/bomp_progress/ |
H A D | sync.c | 67 for(int iter = 0;; iter = (iter + 1) % ITERATIONS) { 97 if(exittime[iter].cnt == 0) { 98 exittime[iter].cnt = i + 3; 99 exittime[(iter + ITERATIONS - 2) % ITERATIONS].cnt = 0; 103 if(exittime[iter].cnt != 0 && exittime[iter].cnt == i) {
|
/barrelfish-2018-10-04/include/tenaciousd/ |
H A D | log.h | 53 struct tenaciousd_log_iter iter); 67 static inline bool tenaciousd_log_end(struct tenaciousd_log_iter iter) argument 69 return iter.entry == NULL ? true : false; 72 static inline void *tenaciousd_log_iter_data(struct tenaciousd_log_iter iter) argument 74 return (void *)iter.entry->data;
|
H A D | queue.h | 59 struct tenaciousd_queue_iter iter); 61 static inline bool tenaciousd_queue_end(struct tenaciousd_queue_iter iter) argument 63 return iter.element == NULL ? true : false; 66 static inline void *tenaciousd_queue_iter_data(struct tenaciousd_queue_iter iter) argument 68 return (void *)iter.element->data;
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | local_sa.c | 143 struct ib_sa_iterator *iter; member in struct:ib_sa_attr_iter 148 struct ib_sa_iterator iter; member in struct:ib_sa_attr_list 156 struct ib_sa_iterator iter; /* keep first */ member in struct:ib_path_rec_info 198 for (cur = attr_list->iter.next; cur; cur = attr_list->iter.next) { 199 attr_list->iter.next = cur->next; 202 attr_list->tail = &attr_list->iter; 286 struct ib_sa_iterator *iter) 299 attr_list->iter.next = NULL; 300 attr_list->tail = &attr_list->iter; 285 insert_attr(struct rb_root *root, unsigned long update_id, void *key, struct ib_sa_iterator *iter) argument 325 struct ib_sa_mad_iter *iter; local 346 ib_sa_iter_free(struct ib_sa_mad_iter *iter) argument 351 ib_sa_iter_next(struct ib_sa_mad_iter *iter) argument 400 struct ib_sa_mad_iter *iter; local 838 ib_free_path_iter(struct ib_sa_attr_iter *iter) argument 843 ib_create_path_iter(struct ib_device *device, u8 port_num, union ib_gid *dgid, struct ib_sa_attr_iter *iter) argument 867 ib_get_next_path(struct ib_sa_attr_iter *iter) argument 931 get_random_path(struct ib_sa_attr_iter *iter, struct ib_sa_path_rec *req_path, ib_sa_comp_mask comp_mask) argument 950 get_next_path(struct ib_sa_attr_iter *iter, struct ib_sa_path_rec *req_path, ib_sa_comp_mask comp_mask) argument 1025 struct ib_sa_attr_iter iter; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p5_crpt.c | 81 int saltlen, iter; local 99 if (!pbe->iter) iter = 1; 100 else iter = ASN1_INTEGER_get (pbe->iter); 116 for (i = 1; i < iter; i++) {
|
H A D | p5_crpt2.c | 80 const unsigned char *salt, int saltlen, int iter, 118 for(j = 1; j < iter; j++) 135 fprintf(stderr, "Iteration count %d\n", iter); 143 const unsigned char *salt, int saltlen, int iter, 146 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 173 int saltlen, iter, plen; local 277 iter = ASN1_INTEGER_get(kdf->iter); 278 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, 79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 142 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
|
/barrelfish-2018-10-04/lib/libc/net/ |
H A D | gethostnamadr.c | 267 char *p, **iter; local 291 for (iter = ht->h_aliases; *iter; ++iter) { 292 desired_size += strlen(*iter) + 1; 302 for (iter = ht->h_addr_list; *iter; ++iter) 336 for (iter = new_ht.h_aliases; *iter; 372 char **iter; local [all...] |
/barrelfish-2018-10-04/usr/skb/octopus/ |
H A D | code_generator.c | 148 struct ast_object* iter = p->u.on.attrs; local 149 for (; iter != NULL; iter = iter->u.an.next) { 150 assert(iter->type == nodeType_Attribute); 151 struct ast_object* left = iter->u.an.attr->u.pn.left; 152 struct ast_object* right = iter->u.an.attr->u.pn.right;
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | pkcs12.h | 102 ASN1_INTEGER *iter; /* defaults to 1 */ member in struct:__anon239 183 unsigned char *salt, int saltlen, int iter, 187 int saltlen, int iter, 192 unsigned char *salt, int saltlen, int iter, 219 int saltlen, int id, int iter, int n, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, 248 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, 253 int key_usage, int iter, variable 256 int safe_nid, int iter, char *pass); variable [all...] |
H A D | pqueue.h | 89 pitem *pqueue_next(piterator *iter);
|
/barrelfish-2018-10-04/lib/tenaciousd/ |
H A D | log.c | 224 struct tenaciousd_log_iter iter) 226 if(iter.next != NULL) { 228 iter = *iter.next; 231 iter.offset += STORAGE_VSIC_ROUND(log->vsic, iter.entry->size); 232 iter.entry = read_entry(log, iter.offset); 237 return iter; 223 tenaciousd_log_next(struct tenaciousd_log *log, struct tenaciousd_log_iter iter) argument
|
H A D | queue.c | 282 struct tenaciousd_queue_iter iter) 284 if(iter.next != NULL) { 286 iter = *iter.next; 289 if (iter.element != NULL) { 290 uint64_t offset = (iter.element)->next; 291 iter.element = tenaciousd_queue_read_element(queue, offset); 297 return iter; 281 tenaciousd_queue_next(struct tenaciousd_queue *queue, struct tenaciousd_queue_iter iter) argument
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pqueue/ |
H A D | pqueue.h | 89 pitem *pqueue_next(piterator *iter);
|