| /src/external/gpl3/binutils/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN); 128 tcontext_size = pss.threadcnt * sizeof (core_st_t); 142 pss.ssize, 143 pss.slimit, 150 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/binutils.old/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN); 128 tcontext_size = pss.threadcnt * sizeof (core_st_t); 142 pss.ssize, 143 pss.slimit, 150 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/gdb/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN); 128 tcontext_size = pss.threadcnt * sizeof (core_st_t); 142 pss.ssize, 143 pss.slimit, 150 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/gdb.old/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN + 1); 127 tcontext_size = pss.threadcnt * sizeof (core_st_t); 141 pss.ssize, 142 pss.slimit, 149 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/binutils/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/binutils.old/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gcc/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gcc.old/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gdb/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gdb.old/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/sys/dev/raidframe/ |
| rf_netbsd.h | 75 struct pool pss; /* Parity Stripe Status */ member in struct:RF_Pools_s 101 char pss[RF_MAX_POOLNAMELEN]; /* Parity Stripe Status */ member in struct:RF_PoolNames_s
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_local.h | 72 * If a PSS only key this contains the parameter restrictions. 84 RSA_PSS_PARAMS *pss; member in struct:rsa_st 150 /* Macros to test if a pkey or ctx is for a PSS key */ 160 int ossl_rsa_pss_get_param(const RSA_PSS_PARAMS *pss, const EVP_MD **pmd,
|
| rsa_backend.c | 306 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 309 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { 310 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); 311 int maskgenalg_nid = ossl_rsa_pss_params_30_maskgenalg(pss); 312 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 313 int saltlen = ossl_rsa_pss_params_30_saltlen(pss); 333 * we make sure that at least one PSS-related parameter is passed, even 508 /* we always copy the PSS parameters regardless of selection */ 539 if (rsa->pss != NULL) { 540 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss) 563 RSA_PSS_PARAMS *pss; local 585 RSA_PSS_PARAMS_30 *pss = NULL; local 652 RSA_PSS_PARAMS *pss; local [all...] |
| rsa_ameth.c | 40 /* If no PSS parameters we omit parameters entirely */ 41 if (rsa->pss == NULL) { 45 /* Encode PSS parameters */ 46 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 205 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, 214 if (pss == NULL) { 215 if (BIO_puts(bp, "No PSS parameter restrictions\n") <= 0) 219 if (BIO_puts(bp, "PSS parameter restrictions:") <= 0) 222 } else if (pss == NULL) { 223 if (BIO_puts(bp, "(INVALID PSS PARAMETERS)\n") <= 0 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); local 497 RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); local 524 RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); local 547 RSA_PSS_PARAMS *pss; local 729 RSA_PSS_PARAMS *pss; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_local.h | 72 * If a PSS only key this contains the parameter restrictions. 84 RSA_PSS_PARAMS *pss; member in struct:rsa_st 150 /* Macros to test if a pkey or ctx is for a PSS key */ 156 int ossl_rsa_pss_get_param(const RSA_PSS_PARAMS *pss, const EVP_MD **pmd,
|
| rsa_backend.c | 171 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 174 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { 175 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); 176 int maskgenalg_nid = ossl_rsa_pss_params_30_maskgenalg(pss); 177 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 178 int saltlen = ossl_rsa_pss_params_30_saltlen(pss); 199 * we make sure that at least one PSS-related parameter is passed, even 378 /* we always copy the PSS parameters regardless of selection */ 411 if (rsa->pss != NULL) { 412 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss) 435 RSA_PSS_PARAMS *pss; local 457 RSA_PSS_PARAMS_30 *pss = NULL; local 524 RSA_PSS_PARAMS *pss; local [all...] |
| rsa_ameth.c | 40 /* If no PSS parameters we omit parameters entirely */ 41 if (rsa->pss == NULL) { 45 /* Encode PSS parameters */ 46 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 205 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, 214 if (pss == NULL) { 215 if (BIO_puts(bp, "No PSS parameter restrictions\n") <= 0) 219 if (BIO_puts(bp, "PSS parameter restrictions:") <= 0) 222 } else if (pss == NULL) { 223 if (BIO_puts(bp,"(INVALID PSS PARAMETERS)\n") <= 0 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); local 479 RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); local 506 RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); local 529 RSA_PSS_PARAMS *pss; local 711 RSA_PSS_PARAMS *pss; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_local.h | 48 /* If a PSS only key this contains the parameter restrictions */ 49 RSA_PSS_PARAMS *pss; member in struct:rsa_st 119 /* Macros to test if a pkey or ctx is for a PSS key */ 125 int rsa_pss_get_param(const RSA_PSS_PARAMS *pss, const EVP_MD **pmd,
|
| rsa_ameth.c | 41 /* If no PSS parameters we omit parameters entirely */ 42 if (rsa->pss == NULL) { 46 /* Encode PSS parameters */ 47 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 69 rsa->pss = rsa_pss_decode(alg); 70 if (rsa->pss == NULL) 232 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, 241 if (pss == NULL) { 242 if (BIO_puts(bp, "No PSS parameter restrictions\n") <= 0) 246 if (BIO_puts(bp, "PSS parameter restrictions:") <= 0 430 RSA_PSS_PARAMS *pss; local 454 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg); local 623 RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); local 650 RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); local 673 RSA_PSS_PARAMS *pss; local 867 RSA_PSS_PARAMS *pss; local [all...] |
| /src/sys/kern/ |
| sys_ptrace_common.c | 1518 struct ps_strings pss; local 1522 if ((error = copyin_psstrings(p, &pss)) != 0) 1525 if (pss.ps_envstr == NULL) 1530 uio->uio_offset += (off_t)((vaddr_t)pss.ps_envstr + 1531 sizeof(uint32_t) * (pss.ps_nenvstr + 1)); 1534 uio->uio_offset += (off_t)(vaddr_t)(pss.ps_envstr + 1535 pss.ps_nenvstr + 1);
|
| /src/sys/dev/ic/ |
| siisata.c | 514 uint32_t pss, pis, tfd = 0; local 518 pss = PRREAD(sc, PRX(chp->ch_channel, PRO_PSS)); 520 SIISATA_DEBUG_PRINT(("%s: %s port %d, pss 0x%x ", 521 SIISATANAME(sc), __func__, chp->ch_channel, pss), 524 if (__predict_true((pss & PR_PSS_ATTENTION) == 0)) { 531 SIISATA_DEBUG_PRINT(("pis 0x%x\n", pss), DEBUG_INTR); 571 pss = 0; 609 (pss & PR_PXSS(slot)) == 0) { 672 uint32_t pss, pis; local 702 pss = PRREAD(sc, PRX(chp->ch_channel, PRO_PSS)) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x_all.c | 500 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(&cert->sig_alg); local 504 if (pss == NULL 505 || !ossl_rsa_pss_get_param_unverified(pss, &mmd, &mgf1md, 509 RSA_PSS_PARAMS_free(pss); 513 RSA_PSS_PARAMS_free(pss);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| rsa_sig.c | 102 /* PSS salt length */ 104 /* Minimum salt length or -1 if no PSS parameter restriction */ 112 /* True if PSS parameters are restricted */ 423 const RSA_PSS_PARAMS_30 *pss = local 426 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { 427 int md_nid = ossl_rsa_pss_params_30_hashalg(pss); 428 int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 429 int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss); 438 "PSS restrictions lack hash algorithm"); 443 "PSS restrictions lack MGF1 hash algorithm") [all...] |
| /src/external/gpl3/gcc/dist/libgcc/ |
| generic-morestack.c | 391 struct stack_segment *pss; local 436 pss = (struct stack_segment *) space; 438 pss->prev = NULL; 439 pss->next = NULL; 440 pss->size = allocate - overhead; 441 pss->dynamic_allocation = NULL; 442 pss->free_dynamic_allocation = NULL; 443 pss->extra = NULL; 445 return pss; 489 struct stack_segment *pss; local 816 struct stack_segment *pss; local [all...] |
| /src/external/gpl3/gcc.old/dist/libgcc/ |
| generic-morestack.c | 391 struct stack_segment *pss; local 436 pss = (struct stack_segment *) space; 438 pss->prev = NULL; 439 pss->next = NULL; 440 pss->size = allocate - overhead; 441 pss->dynamic_allocation = NULL; 442 pss->free_dynamic_allocation = NULL; 443 pss->extra = NULL; 445 return pss; 489 struct stack_segment *pss; local 816 struct stack_segment *pss; local [all...] |