/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | eap.c | 252 u_char *outp; local 262 outp = (u_char*)p->payload; 264 MAKEHEADER(outp, PPP_EAP); 266 PUTCHAR(EAP_FAILURE, outp); 268 PUTCHAR(pcb->eap.es_server.ea_id, outp); 269 PUTSHORT(EAP_HEADERLEN, outp); 283 u_char *outp; local 293 outp = (u_char*)p->payload; 295 MAKEHEADER(outp, PPP_EAP); 297 PUTCHAR(EAP_SUCCESS, outp); 640 u_char *outp; local 1017 u_char *outp; local 1050 u_char *outp; local 1096 u_char *outp; local 1137 u_char *outp; local 1169 u_char *outp; local [all...] |
H A D | upap.c | 531 u_char *outp; local 544 outp = (u_char*)p->payload; 545 MAKEHEADER(outp, PPP_PAP); 547 PUTCHAR(UPAP_AUTHREQ, outp); 548 PUTCHAR(++pcb->upap.us_id, outp); 549 PUTSHORT(outlen, outp); 550 PUTCHAR(pcb->upap.us_userlen, outp); 551 MEMCPY(outp, pcb->upap.us_user, pcb->upap.us_userlen); 552 INCPTR(pcb->upap.us_userlen, outp); 553 PUTCHAR(pcb->upap.us_passwdlen, outp); 569 u_char *outp; local [all...] |
H A D | chap-new.c | 286 unsigned char *outp; local 356 outp = (unsigned char *)p->payload; 357 MAKEHEADER(outp, PPP_CHAP); 359 outp[0] = (pcb->chap_server.flags & AUTH_FAILED)? CHAP_FAILURE: CHAP_SUCCESS; 360 outp[1] = id; 361 outp[2] = len >> 8; 362 outp[3] = len; 364 memcpy(outp + CHAP_HDRLEN, message, mlen); 440 u_char *outp; local 474 outp [all...] |
H A D | fsm.c | 709 u_char *outp; local 747 outp = (u_char*)p->payload; 748 MAKEHEADER(outp, f->protocol); 749 PUTCHAR(CONFREQ, outp); 750 PUTCHAR(f->reqid, outp); 751 PUTSHORT(cilen + HEADERLEN, outp); 753 (*f->callbacks->addci)(f, outp, &cilen); 773 u_char *outp; local 789 outp = (u_char*)p->payload; 790 if (datalen) /* && data != outp [all...] |
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | eap.c | 252 u_char *outp; local 262 outp = (u_char*)p->payload; 264 MAKEHEADER(outp, PPP_EAP); 266 PUTCHAR(EAP_FAILURE, outp); 268 PUTCHAR(pcb->eap.es_server.ea_id, outp); 269 PUTSHORT(EAP_HEADERLEN, outp); 283 u_char *outp; local 293 outp = (u_char*)p->payload; 295 MAKEHEADER(outp, PPP_EAP); 297 PUTCHAR(EAP_SUCCESS, outp); 640 u_char *outp; local 1017 u_char *outp; local 1050 u_char *outp; local 1096 u_char *outp; local 1137 u_char *outp; local 1169 u_char *outp; local [all...] |
H A D | upap.c | 531 u_char *outp; local 544 outp = (u_char*)p->payload; 545 MAKEHEADER(outp, PPP_PAP); 547 PUTCHAR(UPAP_AUTHREQ, outp); 548 PUTCHAR(++pcb->upap.us_id, outp); 549 PUTSHORT(outlen, outp); 550 PUTCHAR(pcb->upap.us_userlen, outp); 551 MEMCPY(outp, pcb->upap.us_user, pcb->upap.us_userlen); 552 INCPTR(pcb->upap.us_userlen, outp); 553 PUTCHAR(pcb->upap.us_passwdlen, outp); 569 u_char *outp; local [all...] |
H A D | chap-new.c | 286 unsigned char *outp; local 356 outp = (unsigned char *)p->payload; 357 MAKEHEADER(outp, PPP_CHAP); 359 outp[0] = (pcb->chap_server.flags & AUTH_FAILED)? CHAP_FAILURE: CHAP_SUCCESS; 360 outp[1] = id; 361 outp[2] = len >> 8; 362 outp[3] = len; 364 memcpy(outp + CHAP_HDRLEN, message, mlen); 440 u_char *outp; local 474 outp [all...] |
H A D | fsm.c | 709 u_char *outp; local 747 outp = (u_char*)p->payload; 748 MAKEHEADER(outp, f->protocol); 749 PUTCHAR(CONFREQ, outp); 750 PUTCHAR(f->reqid, outp); 751 PUTSHORT(cilen + HEADERLEN, outp); 753 (*f->callbacks->addci)(f, outp, &cilen); 773 u_char *outp; local 789 outp = (u_char*)p->payload; 790 if (datalen) /* && data != outp [all...] |
/barrelfish-master/usr/tests/e10ktest/ |
H A D | e10ktest_latencies.c | 183 struct packet *outp = get_tx_packet(); local 184 struct eth_hdr *myeth = (struct eth_hdr *)outp->payload; 185 struct etharp_hdr *myarp = (struct etharp_hdr *)(outp->payload + SIZEOF_ETH_HDR); 203 outp->len = p->len; 204 packet_output(outp); 229 struct packet *outp = get_tx_packet(); local 230 struct eth_hdr *myeth = (struct eth_hdr *)outp->payload; 231 struct ip_hdr *myip = (struct ip_hdr *)(outp->payload + SIZEOF_ETH_HDR); 232 struct udp_hdr *myudp = (struct udp_hdr *)(outp->payload + SIZEOF_ETH_HDR + (IPH_HL(iphdr) * 4)); 233 uint8_t *mypayload = outp [all...] |
H A D | e10ktest.c | 386 struct packet outp; local 410 outp.payload = payload; 411 outp.len = SIZEOF_ETHARP_PACKET; 412 /* outp.len = p->len; */ 413 outp.next = NULL; 414 outp.flags = 0; 415 outp.opaque = NULL; 417 packet_output(&outp); 459 struct packet *outp = get_tx_packet(); local 460 struct eth_hdr *myeth = (struct eth_hdr *)outp [all...] |
H A D | subways.c | 443 struct packet outp; local 467 outp.payload = payload; 468 outp.len = SIZEOF_ETHARP_PACKET; 469 /* outp.len = p->len; */ 470 outp.next = NULL; 471 outp.flags = 0; 472 outp.opaque = NULL; 474 packet_output(&outp); 714 struct packet *outp = get_tx_packet(); local 722 outp [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_ige.c | 103 aes_block_t *outp = (aes_block_t *)out; local 106 outp->data[n] = inp->data[n] ^ ivp->data[n]; 107 AES_encrypt((unsigned char *)outp->data, (unsigned char *)outp->data, key); 109 outp->data[n] ^= iv2p->data[n]; 110 ivp = outp; 159 aes_block_t *outp = (aes_block_t *)out; local 163 AES_decrypt((unsigned char *)tmp.data, (unsigned char *)outp->data, key); 165 outp->data[n] ^= ivp->data[n]; 167 iv2p = outp; [all...] |
/barrelfish-master/usr/eclipseclp/Kernel/src/ |
H A D | os_support.c | 439 char *outp = out; local 443 #define Emit(c) { if (outp<out_last) *outp++ = (c); else goto _terminate_; } 460 case '/': Emit('.'); Emit('.'); Emit('/'); top=outp; goto _sep_; 470 default: top=outp; goto _name_; 475 case '.': top=outp; goto _dot_; 478 default: top=outp; goto _name_; 482 case '.': top=outp; goto _dot_; /* treat //. like /. */ 490 case '/': Emit(c); top=outp; goto _sep_; 512 if (outp>to [all...] |
/barrelfish-master/lib/libc/net/ |
H A D | getnameinfo.c | 488 char *outp = host; local 490 *outp = '\0'; 492 n = snprintf(outp, hostlen, "%s%02x", 498 outp += n;
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_padlock.c | 518 void *outp, const void *inp) \ 522 _asm mov edi,outp \ 533 padlock_xstore(void *outp,unsigned int code) argument
|
/barrelfish-master/lib/arranet/ |
H A D | arranet.c | 2122 struct packet outp; local 2146 outp.payload = payload; 2147 outp.len = SIZEOF_ETHARP_PACKET; 2148 /* outp.len = p->len; */ 2149 outp.next = NULL; 2150 outp.flags = 0; 2151 outp.opaque = NULL; 2153 packet_output(&outp);
|