Searched refs:tmp_buf (Results 1 - 7 of 7) sorted by relevance
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_obj.c | 77 char tmp_buf[80]; local 109 i2t_ASN1_OBJECT(tmp_buf,sizeof(tmp_buf),ne->object); 110 s=tmp_buf;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | digest.c | 271 unsigned char *tmp_buf; local 288 tmp_buf = out->md_data; 291 else tmp_buf = NULL; 297 if (tmp_buf) 298 out->md_data = tmp_buf;
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | d1_clnt.c | 807 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 825 tmp_buf[0]=s->client_version>>8; 826 tmp_buf[1]=s->client_version&0xff; 827 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) 830 s->session->master_key_length=sizeof tmp_buf; 836 n=RSA_public_encrypt(sizeof tmp_buf, 837 tmp_buf,p,rsa,RSA_PKCS1_PADDING); 840 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; 858 tmp_buf,sizeo 873 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local [all...] |
H A D | s3_clnt.c | 2026 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 2044 tmp_buf[0]=s->client_version>>8; 2045 tmp_buf[1]=s->client_version&0xff; 2046 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) 2049 s->session->master_key_length=sizeof tmp_buf; 2055 n=RSA_public_encrypt(sizeof tmp_buf, 2056 tmp_buf,p,rsa,RSA_PKCS1_PADDING); 2059 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; 2077 tmp_buf,sizeo 2092 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local [all...] |
/barrelfish-master/lib/libc/db/hash/ |
H A D | hash_bigkey.c | 436 memmove(hashp->tmp_buf, (save_p->page) + off, len); 437 val->data = (u_char *)hashp->tmp_buf; 460 if (hashp->tmp_buf) 461 free(hashp->tmp_buf); 462 if ((hashp->tmp_buf = (char *)malloc(totlen)) == NULL) 490 memmove(&hashp->tmp_buf[len], (bufp->page) + bp[1], mylen);
|
H A D | hash.h | 98 char *tmp_buf; /* Temporary Buffer for BIG data */ member in struct:htab
|
H A D | hash.c | 421 if (hashp->tmp_buf) 422 free(hashp->tmp_buf);
|
Completed in 34 milliseconds