/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | nseq.c | 76 NETSCAPE_CERT_SEQUENCE *seq = NULL; local 132 seq = NETSCAPE_CERT_SEQUENCE_new(); 133 seq->certs = sk_X509_new_null(); 135 sk_X509_push(seq->certs,x509); 137 if(!sk_X509_num(seq->certs)) 143 PEM_write_bio_NETSCAPE_CERT_SEQUENCE(out, seq); 148 if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL, NULL))) { 154 for(i = 0; i < sk_X509_num(seq->certs); i++) { 155 x509 = sk_X509_value(seq->certs, i); 163 NETSCAPE_CERT_SEQUENCE_free(seq); [all...] |
/barrelfish-master/include/vm/ |
H A D | vm_domain.c | 51 #include <sys/seq.h> 119 seq_write_begin(&vp->seq); 122 seq_write_end(&vp->seq); 136 seq_t seq; local 139 seq = seq_read(&src->seq); 141 if (seq_consistent(&src->seq, seq)) 158 seq_t seq; local 162 seq 323 seq_t seq; local [all...] |
/barrelfish-master/usr/bench/udp_echo/ |
H A D | run_multiloop.sh | 14 for n in `seq $1`; do
|
/barrelfish-master/lib/net/test/ |
H A D | udp_ping.c | 88 uint16_t seq = lwip_ntohs(iecho->seqno); local 91 if (results[seq & (PING_RESULT_MAX - 1)].t_end != 0) { 94 results[seq & (PING_RESULT_MAX - 1)].t_end = rdtsc(); 95 results[seq & (PING_RESULT_MAX - 1)].received = 1; 102 ping_data_size, ip_str, seq, 103 42, cycles_to_us(&results[seq & (PING_RESULT_MAX - 1)]), 104 results[seq & (PING_RESULT_MAX - 1)].t_end - results[seq & (PING_RESULT_MAX - 1)].t_start);
|
H A D | ping.c | 82 uint16_t seq = lwip_ntohs(iecho->seqno); local 85 if (results[seq & (PING_RESULT_MAX - 1)].t_end != 0) { 88 results[seq & (PING_RESULT_MAX - 1)].t_end = rdtsc(); 89 results[seq & (PING_RESULT_MAX - 1)].received = 1; 96 ping_data_size, ip_str, seq, 97 42, cycles_to_us(&results[seq & (PING_RESULT_MAX - 1)]), 98 results[seq & (PING_RESULT_MAX - 1)].t_end - results[seq & (PING_RESULT_MAX - 1)].t_start);
|
/barrelfish-master/include/sys/ |
H A D | ipc.h | 81 unsigned short seq; /* sequence # (to generate unique ipcid) */ member in struct:ipc_perm_old 92 unsigned short seq; /* sequence # (to generate unique ipcid) */ member in struct:ipc_perm 124 #define IXSEQ_TO_IPCID(ix,perm) (((perm.seq) << 16) | (ix & 0xffff))
|
/barrelfish-master/tools/harness/tests/ |
H A D | compiler-rt_builtins.py | 31 def chunker(seq, size): 32 '''Helper function: this takes a sequence `seq` and splits it up into 35 return (seq[pos:pos+size] for pos in xrange(0, len(seq), size))
|
/barrelfish-master/lib/linenoise/ |
H A D | linenoise.c | 303 char seq[32]; local 304 snprintf(seq,32,"\x1b[%dD",cols-start); 305 if (write(ofd,seq,strlen(seq)) == -1) { 468 char seq[64]; local 487 snprintf(seq,64,"\r"); 488 abAppend(&ab,seq,strlen(seq)); 493 snprintf(seq,64,"\x1b[0K"); 494 abAppend(&ab,seq,strle 507 char seq[64]; local 758 char seq[3]; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_attr.c | 71 ASN1_STRING *seq; local 72 if(!(seq = ASN1_STRING_new())) { 76 seq->length = ASN1_item_i2d((ASN1_VALUE *)cap,&seq->data, 79 V_ASN1_SEQUENCE, seq);
|
H A D | example.c | 81 ASN1_STRING *seq; local 103 seq=ASN1_STRING_new(); 104 ASN1_STRING_set(seq,data,total); 110 V_ASN1_SEQUENCE,(char *)seq); 244 ASN1_STRING *seq; local 267 seq=ASN1_STRING_new(); 268 ASN1_STRING_set(seq,data,total); 274 V_ASN1_SEQUENCE,(char *)seq);
|
/barrelfish-master/lib/libc/db/test/hash.tests/ |
H A D | tseq.c | 73 for ( stat = (dbp->seq) (dbp, &res, &item, 1 ); 75 stat = (dbp->seq) (dbp, &res, &item, 0 ) ) {
|
/barrelfish-master/usr/bench/bomp_benchmark/ |
H A D | run-benchmark.sh | 14 for i in `seq 1 $MAXCORES`; do
|
/barrelfish-master/include/thc/ |
H A D | thcsync.h | 175 void thc_seq_init(thc_seq_t *seq); 176 uint64_t thc_seq_read(thc_seq_t *seq); 177 uint64_t thc_seq_ticket(thc_seq_t *seq); // n++
|
/barrelfish-master/lib/libc/db/recno/ |
H A D | rec_close.c | 150 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 155 status = (dbp->seq)(dbp, &key, &data, R_NEXT); 161 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 167 status = (dbp->seq)(dbp, &key, &data, R_NEXT);
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | s2_enc.c | 155 unsigned long seq; local 160 seq=s->s2->write_sequence; 167 seq=s->s2->read_sequence; 174 l2n(seq,p);
|
H A D | dtls1.h | 135 unsigned short seq; member in struct:hm_header_st 145 unsigned short seq; member in struct:ccs_header_st
|
H A D | d1_both.c | 369 s2n (msg_hdr->seq,p); 451 s2n (msg_hdr->seq,p); 527 s->d1->r_msg_hdr.seq = msg_hdr->seq; 564 if ( s->d1->handshake_read_seq == frag->msg_header.seq) 622 seq64be[6] = (unsigned char) (msg_hdr->seq>>8); 623 seq64be[7] = (unsigned char) msg_hdr->seq; 677 seq64be[6] = (unsigned char)(msg_hdr->seq>>8); 678 seq64be[7] = (unsigned char)(msg_hdr->seq); 714 seq64be[6] = (unsigned char) (msg_hdr->seq>> 1112 dtls1_get_queue_priority(unsigned short seq, int is_ccs) argument 1215 dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, int *found) argument [all...] |
H A D | d1_pkt.c | 1030 unsigned short seq; 1034 n2s(p, seq); 1038 dtls1_get_queue_priority(frag->msg_header.seq, 0), 1421 /* field where we are to write out packet epoch, seq num and len */ 1546 const unsigned char *seq = s->s3->read_sequence; local 1548 cmp = satsub64be(seq,bitmap->max_seq_num); 1551 memcpy (s->s3->rrec.seq_num,seq,8); 1560 memcpy (s->s3->rrec.seq_num,seq,8); 1569 const unsigned char *seq = s->s3->read_sequence; local 1571 cmp = satsub64be(seq,bitma 1744 unsigned char *seq; local [all...] |
/barrelfish-master/include/openssl/ |
H A D | dtls1.h | 135 unsigned short seq; member in struct:hm_header_st 145 unsigned short seq; member in struct:ccs_header_st
|
/barrelfish-master/lib/libc/db/db/ |
H A D | db.c | 96 dbp->seq = (int (*)(const struct __db *, DBT *, DBT *, u_int))__dberr;
|
/barrelfish-master/lib/thc/ |
H A D | thcsync.c | 510 void thc_seq_init(thc_seq_t *seq) { argument 511 seq->n = 0; 514 uint64_t thc_seq_read(thc_seq_t *seq) { argument 515 return seq->n; 518 uint64_t thc_seq_ticket(thc_seq_t *seq) { argument 520 C_ASSERT(sizeof(LONGLONG) == sizeof(seq->n)); 521 return InterlockedIncrement64(reinterpret_cast<volatile LONGLONG*>(&seq->n)) - 1; 525 result = seq->n; 526 if (__sync_bool_compare_and_swap(&seq->n, result, result+1)) {
|
/barrelfish-master/lib/libc/db/hash/ |
H A D | ndbm.c | 122 status = (db->seq)(db, &dbtretkey, &dbtretdata, R_FIRST); 142 status = (db->seq)(db, &dbtretkey, &dbtretdata, R_NEXT);
|
/barrelfish-master/include/netinet/ |
H A D | tcp_lro.h | 82 uint64_t seq; member in struct:lro_mbuf_sort
|
/barrelfish-master/lib/libc/db/test/btree.tests/ |
H A D | main.c | 313 status = (*db->seq)(db, &key, &data, R_CURSOR); 316 perror("cursor/seq"); 383 status = (*db->seq)(db, &key, &data, R_FIRST); 387 perror("first/seq"); 566 status = (*db->seq)(db, &key, &data, R_LAST); 570 perror("last/seq"); 594 status = (*db->seq)(db, &key, &data, R_FIRST); 597 status = (*db->seq)(db, &key, &data, R_NEXT); 600 perror("list/seq"); 667 status = (*db->seq)(d [all...] |
/barrelfish-master/lib/libc/db/test/ |
H A D | dbtest.c | 69 void seq(DB *, DBT *); 224 case 's': /* seq */ 231 seq(dbp, &key); 303 seq(dbp, &key); 459 seq(dbp, kp) function 465 switch (dbp->seq(dbp, kp, &data, flags)) { 472 err("line %lu: seq: %s", lineno, strerror(errno)); 475 #define NOSUCHKEY "seq failed, no such key\n" 483 "%d: seq (%s) failed\n", lineno, sflags(flags)); 505 switch (dbp->seq(db [all...] |