/minix/crypto/external/bsd/openssl/dist/ |
H A D | CHANGES | 1386 SSL_set_tlsext_opaque_prf_input(ssl, src, len) is used to set the 1388 an interal copy of the length-'len' string at 'src', and will 1399 int (*cb)(SSL *, void *peerinput, size_t len, void *arg); 1412 Arguments 'peerinput' and 'len' given to the callback function 4482 const void *buf, size_t len, SSL *ssl, void *arg) 4491 'buf' and 'len' point to the actual message, 'ssl' to the 4770 EVP_DigestUpdate(&md, in, len); 7534 *) New function ERR_error_string_n(e, buf, len) which is like 7535 ERR_error_string(e, buf), but writes at most 'len' bytes
|
/minix/external/bsd/llvm/dist/llvm/lib/Target/X86/ |
H A D | X86InstrInfo.td | 938 def ENTER : Ii16<0xC8, RawFrmImm8, (outs), (ins i16imm:$len, i8imm:$lvl), 939 "enter\t$len, $lvl", [], IIC_ENTER>, Sched<[WriteMicrocoded]>;
|
/minix/external/bsd/llvm/dist/llvm/lib/Target/AArch64/ |
H A D | AArch64InstrFormats.td | 5934 class BaseSIMDTableLookup<bit Q, bits<2> len, bit op, RegisterOperand vectype, 5947 let Inst{14-13} = len; 5955 class BaseSIMDTableLookupTied<bit Q, bits<2> len, bit op, RegisterOperand vectype, 5968 let Inst{14-13} = len;
|
/minix/external/bsd/llvm/dist/clang/lib/Sema/ |
H A D | SemaExpr.cpp | 5194 static bool breakDownVectorType(QualType type, uint64_t &len, in breakDownVectorType() argument 5198 len = vecType->getNumElements(); in breakDownVectorType() 5208 len = 1; in breakDownVectorType()
|
/minix/external/bsd/libc++/dist/libcxx/include/ |
H A D | regex | 148 basic_regex(const charT* p, size_t len, flag_type f); 172 basic_regex& assign(const charT* p, size_t len, flag_type f);
|
H A D | memory | 3351 // Decrease len to the nearest multiple of 64, and operate on 64-byte chunks.
|
/minix/crypto/external/bsd/heimdal/dist/ |
H A D | ChangeLog.1999 | 467 ret over the length-len
|
H A D | ChangeLog.2005 | 865 variable len
|
/minix/external/bsd/flex/dist/doc/ |
H A D | flex.info-1 | 1796 len ) 1797 scans `len' bytes (including possibly `NUL's) starting at location 3406 int len = yyget_leng( scanner ); 3407 yyget_text( scanner )[len - 1] = '\0';
|
H A D | flex.texi | 2217 @deftypefun YY_BUFFER_STATE yy_scan_bytes ( const char *bytes, int len ) 2218 scans @code{len} bytes (including possibly @code{NUL}s) starting at location 4309 int len = yyget_leng( scanner ); 4310 yyget_text( scanner )[len - 1] = '\0';
|
/minix/crypto/external/bsd/netpgp/dist/ref/ |
H A D | rfc2440.txt | 2309 crc24 crc_octets(unsigned char *octets, size_t len) 2314 while (len--) {
|
H A D | draft-ietf-openpgp-rfc2440bis-12.txt | 2680 crc24 crc_octets(unsigned char *octets, size_t len) 2691 while (len--) {
|
H A D | draft-ietf-openpgp-rfc2440bis-13.txt | 2701 crc24 crc_octets(unsigned char *octets, size_t len) 2706 while (len--) {
|
H A D | draft-ietf-openpgp-rfc2440bis-15.txt | 2701 crc24 crc_octets(unsigned char *octets, size_t len) 2706 while (len--) {
|
H A D | draft-ietf-openpgp-rfc2440bis-12-ben.txt | 2664 crc24 crc_octets(unsigned char *octets, size_t len) 2675 while (len--) {
|
H A D | draft-ietf-openpgp-rfc2440bis-14.txt | 2701 crc24 crc_octets(unsigned char *octets, size_t len) 2706 while (len--) {
|
H A D | draft-ietf-openpgp-rfc2440bis-22.txt | 2848 crc24 crc_octets(unsigned char *octets, size_t len) 2859 while (len--) {
|
H A D | rfc4880.txt | 2981 crc24 crc_octets(unsigned char *octets, size_t len) 2985 while (len--) {
|
/minix/external/bsd/libevent/dist/ |
H A D | ChangeLog | 39 o Fix evbuffer_peek() with len==-1 and start_at non-NULL. (fb7e76a)
|
/minix/tests/usr.bin/netpgpverify/ |
H A D | t_netpgpverify.sh | 83 2. len 8466 2. len
|
/minix/external/bsd/llvm/dist/clang/test/Analysis/ |
H A D | retain-release.m | 56 static __inline__ __attribute__((always_inline)) CFRange CFRangeMake(CFIndex loc, CFIndex len) { 59 range.length = len; 152 …yEnumeratingWithState:(NSFastEnumerationState *)state objects:(id *)stackbuf count:(NSUInteger)len;
|
/minix/external/public-domain/xz/dist/ |
H A D | ChangeLog | 1017 assumes that the initial "len" may be greater than "limit".
|
/minix/external/bsd/bind/dist/ |
H A D | CHANGES | 1443 3601. [bug] Added to PKCS#11 openssl patches a value len
|