| /third_party/mesa3d/src/gallium/drivers/r300/ |
| H A D | r300_context.c | 487 r300->dummy_vb.buffer.resource = screen->resource_create(screen, &vb);
|
| /third_party/node/deps/openssl/openssl/include/openssl/ |
| H A D | ts.h | 23 # include <openssl/buffer.h>
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | t_x509.c | 12 #include <openssl/buffer.h>
|
| H A D | x509_vpm.c | 14 #include <openssl/buffer.h>
|
| /third_party/node/deps/openssl/openssl/include/internal/ |
| H A D | packet.h | 16 # include <openssl/buffer.h> 104 * Data is not copied: the |subpkt| packet will share its underlying buffer with 118 * copied: the |subpkt| packet will share its underlying buffer with the 358 * |*data|. This just points at the underlying buffer that |pkt| is using. The 360 * underlying buffer gets freed 376 * just points at the underlying buffer that |pkt| is using. The caller should 377 * not free this data directly (it will be freed when the underlying buffer gets 441 * Copy |pkt| bytes to a newly allocated buffer and store a pointer to the 473 * buffer. Store a pointer to the result in |*data|. 510 * Data is not copied: the |subpkt| packet will share its underlying buffer wit [all...] |
| /third_party/node/deps/openssl/openssl/crypto/pem/ |
| H A D | pem_pkey.c | 14 #include <openssl/buffer.h>
|
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | srp.c | 26 #include <openssl/buffer.h>
|
| /third_party/node/deps/openssl/openssl/crypto/encode_decode/ |
| H A D | encoder_lib.c | 13 #include <openssl/buffer.h> 108 ret = 1; /* Hope for the best. A too small buffer will clear this */ in OSSL_ENCODER_to_data() 121 /* The buffer with the right size is already allocated for us */ in OSSL_ENCODER_to_data()
|
| /third_party/node/deps/openssl/openssl/crypto/evp/ |
| H A D | bio_ok.c | 42 several Kbytes of memory to buffer single block before verifying 75 #include <openssl/buffer.h> 187 /* copy clean bytes to output buffer */ in ok_read() 216 /* output buffer full -- cancel */ in ok_read() 220 /* no clean bytes in buffer -- fill it */ in ok_read() 351 case BIO_CTRL_PENDING: /* More to read in buffer */ in ok_ctrl() 352 case BIO_CTRL_WPENDING: /* More to read in buffer */ in ok_ctrl()
|
| H A D | bio_b64.c | 13 #include <openssl/buffer.h> 152 * At this point, we have room of outl bytes and an empty buffer, so we in b64_read() 170 /* If buffer empty break */ in b64_read() 177 /* else we retry and add more data to buffer */ in b64_read() 236 /* Check buffer full */ in b64_read() 254 * If buffer isn't full and we can retry then restart to read in in b64_read() 395 * Since we're now done using the temporary buffer, the in b64_write() 471 case BIO_CTRL_WPENDING: /* More to write in buffer */ in b64_ctrl() 480 case BIO_CTRL_PENDING: /* More to read in buffer */ in b64_ctrl()
|
| H A D | bio_enc.c | 15 #include <openssl/buffer.h> 141 * At this point, we have room of outl bytes and an empty buffer, so we in enc_read() 174 * one extra block and then back off, i.e. output buffer in enc_read() 329 case BIO_CTRL_PENDING: /* More to read in buffer */ in enc_ctrl()
|
| /third_party/node/deps/openssl/openssl/crypto/asn1/ |
| H A D | tasn_prn.c | 15 #include <openssl/buffer.h>
|
| /third_party/node/deps/uv/include/uv/ |
| H A D | win.h | 653 char* buffer;
|
| /third_party/python/Tools/i18n/ |
| H A D | pygettext.py | 648 fp = sys.stdin.buffer
|
| /third_party/openssl/test/ |
| H A D | wpackettest.c | 11 #include <openssl/buffer.h> 89 /* Test initialising from a fixed size buffer */ in test_WPACKET_init() 394 * with a NULL buffer, just to calculate lengths, and a second pass with a in test_WPACKET_init_der() 395 * real buffer to actually generate a packet in test_WPACKET_init_der()
|
| /third_party/protobuf/csharp/src/Google.Protobuf/Collections/ |
| H A D | RepeatedField.cs | 134 // Check that the supplied length doesn't exceed the underlying buffer.
in AddEntriesFrom() 166 } while (ParsingPrimitives.MaybeConsumeTag(ref ctx.buffer, ref ctx.state, tag));
in AddEntriesFrom()
|
| /third_party/pulseaudio/src/modules/bluetooth/ |
| H A D | a2dp-codec-ldac-gst.c | 82 if (can_accept_capabilities(a2dp_capabilities->buffer, a2dp_capabilities->size, for_encoding)) in choose_remote_endpoint() 108 pa_log_error("Invalid size of config buffer"); in is_configuration_valid() 188 pa_log_error("Invalid size of capabilities buffer"); in fill_preferred_configuration()
|
| /third_party/python/Include/ |
| H A D | unicodeobject.h | 132 Py_ssize_t size /* size of buffer */ 149 /* Copy the string into a UCS4 buffer including the null character if copy_null 151 the buffer is smaller than the string. Return buffer on success. 153 buflen is the length of the buffer in (Py_UCS4) characters. */ 156 Py_UCS4* buffer, 160 /* Copy the string into a UCS4 buffer. A new buffer is allocated using 276 /* Create a Unicode Object from the wchar_t buffer w of the given 279 The buffer i [all...] |
| /third_party/openssl/crypto/evp/ |
| H A D | bio_ok.c | 42 several Kbytes of memory to buffer single block before verifying 75 #include <openssl/buffer.h> 187 /* copy clean bytes to output buffer */ in ok_read() 216 /* output buffer full -- cancel */ in ok_read() 220 /* no clean bytes in buffer -- fill it */ in ok_read() 351 case BIO_CTRL_PENDING: /* More to read in buffer */ in ok_ctrl() 352 case BIO_CTRL_WPENDING: /* More to read in buffer */ in ok_ctrl()
|
| H A D | bio_b64.c | 13 #include <openssl/buffer.h> 152 * At this point, we have room of outl bytes and an empty buffer, so we in b64_read() 170 /* If buffer empty break */ in b64_read() 177 /* else we retry and add more data to buffer */ in b64_read() 236 /* Check buffer full */ in b64_read() 254 * If buffer isn't full and we can retry then restart to read in in b64_read() 395 * Since we're now done using the temporary buffer, the in b64_write() 471 case BIO_CTRL_WPENDING: /* More to write in buffer */ in b64_ctrl() 480 case BIO_CTRL_PENDING: /* More to read in buffer */ in b64_ctrl()
|
| H A D | bio_enc.c | 15 #include <openssl/buffer.h> 141 * At this point, we have room of outl bytes and an empty buffer, so we in enc_read() 174 * one extra block and then back off, i.e. output buffer in enc_read() 329 case BIO_CTRL_PENDING: /* More to read in buffer */ in enc_ctrl()
|
| /third_party/openssl/apps/ |
| H A D | srp.c | 26 #include <openssl/buffer.h>
|
| /third_party/openssl/crypto/encode_decode/ |
| H A D | encoder_lib.c | 13 #include <openssl/buffer.h> 108 ret = 1; /* Hope for the best. A too small buffer will clear this */ in OSSL_ENCODER_to_data() 121 /* The buffer with the right size is already allocated for us */ in OSSL_ENCODER_to_data()
|
| /third_party/openssl/crypto/pem/ |
| H A D | pem_pkey.c | 14 #include <openssl/buffer.h>
|
| /third_party/vk-gl-cts/external/vulkancts/framework/vulkan/ |
| H A D | vkQueryUtil.hpp | 66 VkMemoryRequirements getBufferMemoryRequirements (const DeviceInterface& vk, VkDevice device, VkBuffer buffer);
|