/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 84 if (ptype != V_ASN1_UNDEF) 97 if (ptype == 0) 99 if (ptype == V_ASN1_UNDEF) 108 ASN1_TYPE_set(alg->parameter, ptype, pval);
|
H A D | p8_pkey.c | 89 int ptype, void *pval, 114 if (!X509_ALGOR_set0(priv->pkeyalg, aobj, ptype, pval))
|
H A D | x_pubkey.c | 340 int ptype, void *pval, 343 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval))
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dh_ameth.c | 75 int ptype; local 85 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 87 if (ptype != V_ASN1_SEQUENCE) 133 int ptype; local 149 ptype = V_ASN1_SEQUENCE; 166 ptype, pval, penc, penclen)) 188 int ptype; local 199 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 201 if (ptype != V_ASN1_SEQUENCE) 317 ASN1_PCTX *ctx, int ptype) 316 do_dh_print(BIO *bp, const DH *x, int indent, ASN1_PCTX *ctx, int ptype) argument [all...] |
/barrelfish-master/lib/libc/gen/ |
H A D | disklabel.c | 71 pfsize[3], poffset[3], ptype[3]; local 125 strcpy(ptype, "tx"); 130 psize[1] = pbsize[1] = pfsize[1] = poffset[1] = ptype[1] = p; 146 getnumdflt(pp->p_fstype, ptype, 0); 148 if (cgetstr(buf, ptype, &cq) >= 0) {
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsa_ameth.c | 73 int ptype; local 83 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 86 if (ptype == V_ASN1_SEQUENCE) 99 else if ((ptype == V_ASN1_NULL) || (ptype == V_ASN1_UNDEF)) 142 int ptype; local 158 ptype = V_ASN1_SEQUENCE; 161 ptype = V_ASN1_UNDEF; 174 ptype, pval, penc, penclen)) 194 int ptype; local 430 do_dsa_print(BIO *bp, const DSA *x, int off, int ptype) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ec/ |
H A D | ec_ameth.c | 107 int ptype; local 111 if (!eckey_param2type(&ptype, &pval, ec_key)) 127 ptype, pval, penc, penclen)) 130 if (ptype == V_ASN1_OBJECT) 139 static EC_KEY *eckey_type2param(int ptype, void *pval) argument 142 if (ptype == V_ASN1_SEQUENCE) 155 else if (ptype == V_ASN1_OBJECT) 194 int ptype, pklen; local 200 X509_ALGOR_get0(NULL, &ptype, &pval, palg); 202 eckey = eckey_type2param(ptype, pva 244 int ptype, pklen; local 316 int eplen, ptype; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pem/ |
H A D | pem_info.c | 101 unsigned int i,raw,ptype; local 119 ptype = 0; 181 ptype=EVP_PKEY_RSA; 203 ptype = EVP_PKEY_DSA; 225 ptype = EVP_PKEY_EC; 248 if (ptype) 250 if (!d2i_PrivateKey(ptype, pp, &p, len))
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_genn.c | 196 void *GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) 198 if (ptype) 199 *ptype = a->type;
|
H A D | x509v3.h | 550 void *GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype);
|
/barrelfish-master/lib/pcre/ |
H A D | pcre_printint.c | 236 get_ucpname(unsigned int ptype, unsigned int pvalue) argument 242 if (ptype == PRIV(utt)[i].type && pvalue == PRIV(utt)[i].value) break; 247 ptype = ptype * pvalue; 248 return (ptype == pvalue)? "??" : "??"; 724 unsigned int ptype = *ccode++; local 727 switch(ptype) 743 get_ucpname(ptype, pvalue));
|
H A D | pcre_compile.c | 2822 ptype the property type 2830 check_char_prop(pcre_uint32 c, unsigned int ptype, unsigned int pdata, argument 2836 switch(ptype) 5055 unsigned int ptype = 0; local 5074 ptype = PT_PXGRAPH; 5077 if (ptype == 0) ptype = PT_PXPRINT; 5080 if (ptype == 0) ptype = PT_PXPUNCT; 5082 *class_uchardata++ = ptype; 5278 unsigned int ptype = 0, pdata = 0; local 8047 unsigned int ptype = 0, pdata = 0; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_ameth.c | 92 int ptype = V_ASN1_UNDEF; local 99 X509_ALGOR_get0(&palg_obj, &ptype, &_pval, palg); 101 if (ptype != V_ASN1_SEQUENCE) 610 int ptype = V_ASN1_UNDEF; local 617 ptype = V_ASN1_SEQUENCE; 633 return X509_PUBKEY_set0_param(pub,algobj,ptype,pval,buf,ret); 706 int ptype = V_ASN1_UNDEF; local 713 ptype = V_ASN1_SEQUENCE; 749 return X509_PUBKEY_set0_param(pub,algobj,ptype,pval,buf,ret);
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_capi.c | 1091 static int capi_get_provname(CAPI_CTX *ctx, LPSTR *pname, DWORD *ptype, DWORD idx) argument 1096 if (!CryptEnumProvidersA(idx, NULL, 0, ptype, NULL, &len)) 1106 if (!CryptEnumProvidersA(idx, NULL, 0, ptype, name, &len)) 1116 CAPI_trace(ctx, "capi_get_provname, returned name=%s, type=%d\n", name, *ptype); 1123 DWORD idx, ptype; local 1130 ret = capi_get_provname(ctx, &provname, &ptype, idx); 1135 BIO_printf(out, "%d. %s, type %d\n", idx, provname, ptype); 1422 static CAPI_KEY *capi_get_key(CAPI_CTX *ctx, const char *contname, char *provname, DWORD ptype, DWORD keyspec) argument 1427 contname, provname, ptype); 1428 if (!CryptAcquireContextA(&key->hprov, contname, provname, ptype, [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509.h | 763 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); 1174 int version, int ptype, void *pval, 1182 int ptype, void *pval,
|
/barrelfish-master/include/openssl/ |
H A D | x509.h | 763 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); 1174 int version, int ptype, void *pval, 1182 int ptype, void *pval,
|
H A D | x509v3.h | 550 void *GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype);
|
/barrelfish-master/usr/eclipseclp/Kernel/lib/ |
H A D | io.pl | 1019 :- local struct(peer_queue(ptype,pname,qtype,dir)). 1206 get_queueinfo_item(peer_type, peer_queue{ptype:PeerType}, PeerType). 1210 get_queueinfo_item(peer, peer_queue{ptype:PeerType,pname:Peer}, 1233 recorda(Key, peer_queue{ptype:remote, pname:Control, qtype:Type, dir:Direction}). 1242 recorda(Key, peer_queue{ptype:embed, pname:Peer, qtype:sync(Nr), dir:Direction}).
|
/barrelfish-master/usr/eclipseclp/Eplex/ |
H A D | eplex.c | 4050 int ptype = (lpd->prob_type == PROBLEM_QP ? CPXPROB_QP : CPXPROB_MIQP); local 4052 int ptype = CPXPROB_QP; local 4054 if (CPXgetprobtype(cpx_env, lpd->lp) != ptype) 4056 Call(err, CPXchgprobtype(cpx_env, lpd->lp, ptype));
|