/barrelfish-2018-10-04/doc/000-overview/ |
H A D | Overview.tex | 480 key-value store which can also retain capabilities. Aside from the
|
/barrelfish-2018-10-04/doc/012-services/ |
H A D | Services.tex | 380 services that provide key Barrelfish functionality, and services that
|
/barrelfish-2018-10-04/doc/014-bulk-transfer/ |
H A D | bulk-transfer.tex | 110 which they belong. The key difference here is that the these pbufs 432 slots within shared-pool. Following are the key elements of
|
/barrelfish-2018-10-04/include/arpa/ |
H A D | nameser.h | 271 struct dst_key *key; member in struct:ns_tcp_tsig_state 315 ns_t_key = 25, /*%< Security key. */ 344 ns_t_tkey = 249, /*%< Transaction key */ 385 ns_kt_rsa = 1, /*%< key type RSA/MD5 */ 388 ns_kt_private = 254 /*%< Private key type starts with OID */ 404 #define NS_KEY_TYPE_NO_KEY 0xC000 /*%< No key usable for either; no key */ 413 #define NS_KEY_NAME_USER 0x0000 /*%< key is assoc. with user */ 414 #define NS_KEY_NAME_ENTITY 0x0200 /*%< key is assoc. with entity eg host */ 415 #define NS_KEY_NAME_ZONE 0x0100 /*%< key i [all...] |
/barrelfish-2018-10-04/include/collections/ |
H A D | hash_table.h | 48 uint64_t key; member in struct:_collections_hash_elem 66 void collections_hash_insert(collections_hash_table *t, uint64_t key, void *data); 67 void* collections_hash_find(collections_hash_table *t, uint64_t key); 68 void collections_hash_delete(collections_hash_table *t, uint64_t key); 71 void* collections_hash_traverse_next(collections_hash_table* t, uint64_t *key); 77 typedef int (*collections_hash_visitor_func)(uint64_t key, void *data, void *arg);
|
H A D | list.h | 101 collections_list_predicate p, void *key); 104 void *key);
|
/barrelfish-2018-10-04/include/concurrent/ |
H A D | linked_list.h | 23 void* key; member in struct:ll_element 41 bool ll_delete(struct ll_element *head, struct ll_element *tail, void* key); 46 bool ll_contains(struct ll_element *head, struct ll_element *tail, void* key);
|
/barrelfish-2018-10-04/include/dma/ |
H A D | dma_request.h | 94 } key; member in union:dma_req_setup::__anon66
|
/barrelfish-2018-10-04/include/hashtable/ |
H A D | hashtable.h | 27 const void* key; member in struct:_ht_entry
|
/barrelfish-2018-10-04/include/lwip2/lwip/apps/ |
H A D | snmpv3.h | 79 u8_t *key); /* OUT - pointer to caller 16-octet buffer */ 86 u8_t *key); /* OUT - pointer to caller 20-octet buffer */
|
/barrelfish-2018-10-04/include/lwip2/netif/ppp/ |
H A D | mppe.c | 97 * Set key, used by MSCHAP before mppe_init() is actually called by CCP so we 100 void mppe_set_key(ppp_pcb *pcb, ppp_mppe_state *state, u8_t *key) { argument 102 MEMCPY(state->master_key, key, MPPE_MAX_KEY_LEN); 126 PPPDEBUG(LOG_DEBUG, ("%s[%d]: unknown key length\n", debugstr, 134 /* Generate the initial session key. */ 166 * Note that even though we have initialized the key table, we don't
|
H A D | mppe.h | 45 #define MPPE_MAX_KEY_LEN 16 /* largest key length (128-bit) */ 154 u8_t keylen; /* key length in bytes */ 165 void mppe_set_key(ppp_pcb *pcb, ppp_mppe_state *state, u8_t *key);
|
H A D | multilink.c | 60 char *blinks_id; /* key for the list of links */ 72 static int parse_num (char *str, const char *key, int *valp); 127 TDB_DATA key, pid, rec; local 187 /* Make the key for the list of links belonging to the bundle */ 191 novm("bundle links key"); 211 key.dptr = bundle_id; 212 key.dsize = p - bundle_id; 213 pid = tdb_fetch(pppdb, key); 277 TDB_DATA key; local 293 key 306 TDB_DATA key, rec; local 346 TDB_DATA key, rec; local 376 TDB_DATA key, rec, pp; local [all...] |
H A D | pppcrypt.c | 52 /* IN 56 bit DES key missing parity bits 53 * OUT 64 bit DES key with parity bits added 55 void pppcrypt_56_to_64_bit_key(u_char *key, u_char * des_key) { argument 56 des_key[0] = pppcrypt_get_7bits(key, 0); 57 des_key[1] = pppcrypt_get_7bits(key, 7); 58 des_key[2] = pppcrypt_get_7bits(key, 14); 59 des_key[3] = pppcrypt_get_7bits(key, 21); 60 des_key[4] = pppcrypt_get_7bits(key, 28); 61 des_key[5] = pppcrypt_get_7bits(key, 35); 62 des_key[6] = pppcrypt_get_7bits(key, 4 [all...] |
H A D | pppcrypt.h | 132 void pppcrypt_56_to_64_bit_key(u_char *key, u_char *des_key);
|
/barrelfish-2018-10-04/include/lwip2/netif/ppp/polarssl/ |
H A D | arc4.c | 46 * ARC4 key schedule 48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen ) argument 67 j = ( j + a + key[k] ) & 0xFF;
|
H A D | arc4.h | 58 * \brief ARC4 key schedule 61 * \param key the secret key 62 * \param keylen length of the key 64 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen );
|
H A D | des.c | 300 static void des_setkey( unsigned long SK[32], unsigned char key[8] ) 305 GET_ULONG_BE( X, key, 0 ); 306 GET_ULONG_BE( Y, key, 4 ); 370 * DES key schedule (56-bit, encryption) 372 void des_setkey_enc( des_context *ctx, unsigned char key[8] ) 374 des_setkey( ctx->sk, key ); 378 * DES key schedule (56-bit, decryption) 380 void des_setkey_dec( des_context *ctx, unsigned char key[8] ) 384 des_setkey( ctx->sk, key );
|
H A D | des.h | 60 * \brief DES key schedule (56-bit, encryption) 63 * \param key 8-byte secret key 65 void des_setkey_enc( des_context *ctx, unsigned char key[8] ); 68 * \brief DES key schedule (56-bit, decryption) 71 * \param key 8-byte secret key 73 void des_setkey_dec( des_context *ctx, unsigned char key[8] );
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | aes.h | 89 AES_KEY *key); 91 AES_KEY *key); 94 const AES_KEY *key); 96 const AES_KEY *key); 99 const AES_KEY *key, const int enc); 101 size_t length, const AES_KEY *key, 104 size_t length, const AES_KEY *key, 107 size_t length, const AES_KEY *key, 110 size_t length, const AES_KEY *key, 113 size_t length, const AES_KEY *key, [all...] |
H A D | blowfish.h | 108 void BF_set_key(BF_KEY *key, int len, const unsigned char *data); 110 void BF_encrypt(BF_LONG *data,const BF_KEY *key); 111 void BF_decrypt(BF_LONG *data,const BF_KEY *key); 114 const BF_KEY *key, int enc);
|
H A D | camellia.h | 92 CAMELLIA_KEY *key); 95 const CAMELLIA_KEY *key); 97 const CAMELLIA_KEY *key); 100 const CAMELLIA_KEY *key, const int enc); 102 size_t length, const CAMELLIA_KEY *key, 105 size_t length, const CAMELLIA_KEY *key, 108 size_t length, const CAMELLIA_KEY *key, 111 size_t length, const CAMELLIA_KEY *key, 114 size_t length, const CAMELLIA_KEY *key, 117 size_t length, const CAMELLIA_KEY *key, [all...] |
H A D | cast.h | 83 int short_key; /* Use reduced rounds for short key */ 87 void CAST_set_key(CAST_KEY *key, int len, const unsigned char *data); 88 void CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *key, 90 void CAST_encrypt(CAST_LONG *data, const CAST_KEY *key); 91 void CAST_decrypt(CAST_LONG *data, const CAST_KEY *key);
|
H A D | cms.h | 157 const unsigned char *key, size_t keylen, 161 const unsigned char *key, size_t keylen, 165 const unsigned char *key, size_t keylen); 185 unsigned char *key, size_t keylen, 203 unsigned char *key, size_t keylen, 217 unsigned char *key, size_t keylen);
|
H A D | des.h | 217 void DES_set_odd_parity(DES_cblock *key); 218 int DES_check_key_parity(const_DES_cblock *key); 219 int DES_is_weak_key(const_DES_cblock *key); 223 int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule); 224 int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule); 225 int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule); 226 void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule); 227 void DES_string_to_key(const char *str,DES_cblock *key); 235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);
|