/barrelfish-master/usr/monitor/ |
H A D | ump_support.c | 22 uintptr_t conn_id, 33 if (conn_id != 0) { 34 err2 = remote_conn_free(conn_id); 61 iref_t iref, uintptr_t conn_id, 78 bind_ump_request(intermon_binding, NOP_CONT, iref, conn_id, channel_length_in, 87 me->args.mon_id = conn_id; 104 monitor_bind_ump_client_request_error(mb, frame, conn_id, domain_id, err); 127 uintptr_t conn_id = 0; local 135 monitor_bind_ump_client_request_error(mb, frame, conn_id, domain_id, err); 148 monitor_bind_ump_client_request_error(mb, frame, conn_id, domain_i 20 monitor_bind_ump_client_request_error(struct monitor_binding *b, struct capref frame, uintptr_t conn_id, uintptr_t domain_id, errval_t err) argument 60 bind_ump_request_cont(struct intermon_binding *intermon_binding, iref_t iref, uintptr_t conn_id, uint32_t channel_length_in, uint32_t channel_length_out, struct frame_identity frameid, struct capability capability, struct monitor_binding *mb, struct capref frame, uintptr_t domain_id) argument [all...] |
H A D | monitor_server.c | 262 me->args.conn_id = domain_id; 293 bind_lmp_client_request_error(b, st->args.err, st->args.conn_id, 472 me->args.conn_id = client_conn_id; 497 bind_lmp_reply_client_cont(b, st->args.err, st->args.mon_id, st->args.conn_id,
|
H A D | inter.c | 193 me->args.conn_id = domain_id; 253 cap_receive_request_cont(b, st->args.conn_id, st->args.err, st->args.cap,
|
H A D | monitor_rpc_server.c | 652 uintptr_t conn_id = 0; local 694 err = remote_conn_alloc(&conn, &conn_id, REMOTE_CONN_UMP);
|
/barrelfish-master/lib/barrelfish/ |
H A D | lmp_chan.c | 43 uintptr_t conn_id, 46 struct lmp_chan *lc = (void *)conn_id; 227 st->args.mon_id, st->args.conn_id, 279 st->args.conn_id = (uintptr_t)lc; 282 st->args.conn_id = 0; 41 bind_lmp_reply_handler(struct monitor_binding *b, errval_t success, uintptr_t mon_id, uintptr_t conn_id, struct capref endpoint) argument
|
H A D | ump_chan.c | 80 uintptr_t conn_id, errval_t success, 83 struct ump_chan *uc = (void *)conn_id; 116 st->args.conn_id, st->args.err, 182 st->args.conn_id = err_is_ok(err) ? (uintptr_t)uc : 0; 79 bind_ump_reply_handler(struct monitor_binding *b, uintptr_t mon_id, uintptr_t conn_id, errval_t success, struct capref notify) argument
|
H A D | monitor_client.c | 38 uintptr_t conn_id, errval_t success, 43 struct monitor_cap_handlers *h = (void *)conn_id; 37 cap_receive_request_handler(struct monitor_binding *b, uintptr_t conn_id, errval_t success, struct capref cap, uint32_t capid) argument
|
/barrelfish-master/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | cma.c | 1171 struct rdma_id_private *listen_id, *conn_id; local 1183 conn_id = cma_new_udp_id(&listen_id->id, ib_event); 1188 conn_id = cma_new_conn_id(&listen_id->id, ib_event); 1192 if (!conn_id) { 1197 mutex_lock_nested(&conn_id->handler_mutex, SINGLE_DEPTH_NESTING); 1199 ret = cma_acquire_dev(conn_id); 1204 conn_id->cm_id.ib = cm_id; 1205 cm_id->context = conn_id; 1208 ret = conn_id->id.event_handler(&conn_id 1359 struct rdma_id_private *listen_id, *conn_id; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssl2.h | 200 unsigned char conn_id[SSL2_MAX_CONNECTION_ID_LENGTH]; member in struct:ssl2_state_st
|
H A D | s2_clnt.c | 533 if (s->s2->conn_id_length > sizeof s->s2->conn_id) 539 memcpy(s->s2->conn_id,p,s->s2->tmp.conn_id_length); 731 if (s->s2->conn_id_length > sizeof s->s2->conn_id) 736 memcpy(p,s->s2->conn_id,(unsigned int)s->s2->conn_id_length);
|
H A D | s2_lib.c | 494 EVP_DigestUpdate(&ctx,s->s2->conn_id,s->s2->conn_id_length);
|
H A D | s2_srvr.c | 786 /* make and send conn_id */ 787 s2n(SSL2_CONNECTION_ID_LENGTH,p); /* add conn_id length */ 789 if (RAND_pseudo_bytes(s->s2->conn_id,(int)s->s2->conn_id_length) <= 0) 791 memcpy(d,s->s2->conn_id,SSL2_CONNECTION_ID_LENGTH); 845 if (s->s2->conn_id_length > sizeof s->s2->conn_id) 861 if (memcmp(p,s->s2->conn_id,s->s2->conn_id_length) != 0)
|
/barrelfish-master/include/openssl/ |
H A D | ssl2.h | 200 unsigned char conn_id[SSL2_MAX_CONNECTION_ID_LENGTH]; member in struct:ssl2_state_st
|