Searched refs:tmp_buf (Results 1 - 7 of 7) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/
H A Dx509_obj.c77 char tmp_buf[80]; local
109 i2t_ASN1_OBJECT(tmp_buf,sizeof(tmp_buf),ne->object);
110 s=tmp_buf;
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/
H A Ddigest.c271 unsigned char *tmp_buf; local
288 tmp_buf = out->md_data;
291 else tmp_buf = NULL;
297 if (tmp_buf)
298 out->md_data = tmp_buf;
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dd1_clnt.c807 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local
825 tmp_buf[0]=s->client_version>>8;
826 tmp_buf[1]=s->client_version&0xff;
827 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0)
830 s->session->master_key_length=sizeof tmp_buf;
836 n=RSA_public_encrypt(sizeof tmp_buf,
837 tmp_buf,p,rsa,RSA_PKCS1_PADDING);
840 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70;
858 tmp_buf,sizeo
873 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local
[all...]
H A Ds3_clnt.c2026 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local
2044 tmp_buf[0]=s->client_version>>8;
2045 tmp_buf[1]=s->client_version&0xff;
2046 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0)
2049 s->session->master_key_length=sizeof tmp_buf;
2055 n=RSA_public_encrypt(sizeof tmp_buf,
2056 tmp_buf,p,rsa,RSA_PKCS1_PADDING);
2059 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70;
2077 tmp_buf,sizeo
2092 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local
[all...]
/barrelfish-master/lib/libc/db/hash/
H A Dhash_bigkey.c436 memmove(hashp->tmp_buf, (save_p->page) + off, len);
437 val->data = (u_char *)hashp->tmp_buf;
460 if (hashp->tmp_buf)
461 free(hashp->tmp_buf);
462 if ((hashp->tmp_buf = (char *)malloc(totlen)) == NULL)
490 memmove(&hashp->tmp_buf[len], (bufp->page) + bp[1], mylen);
H A Dhash.h98 char *tmp_buf; /* Temporary Buffer for BIG data */ member in struct:htab
H A Dhash.c421 if (hashp->tmp_buf)
422 free(hashp->tmp_buf);

Completed in 34 milliseconds