Home
last modified time | relevance | path

Searched refs:buffer (Results 5251 - 5275 of 6014) sorted by relevance

1...<<211212213214215216217218219220>>...241

/third_party/mesa3d/src/gallium/drivers/r300/
H A Dr300_context.c487 r300->dummy_vb.buffer.resource = screen->resource_create(screen, &vb);
/third_party/node/deps/openssl/openssl/include/openssl/
H A Dts.h23 # include <openssl/buffer.h>
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dt_x509.c12 #include <openssl/buffer.h>
H A Dx509_vpm.c14 #include <openssl/buffer.h>
/third_party/node/deps/openssl/openssl/include/internal/
H A Dpacket.h16 # include <openssl/buffer.h>
104 * Data is not copied: the |subpkt| packet will share its underlying buffer with
118 * copied: the |subpkt| packet will share its underlying buffer with the
358 * |*data|. This just points at the underlying buffer that |pkt| is using. The
360 * underlying buffer gets freed
376 * just points at the underlying buffer that |pkt| is using. The caller should
377 * not free this data directly (it will be freed when the underlying buffer gets
441 * Copy |pkt| bytes to a newly allocated buffer and store a pointer to the
473 * buffer. Store a pointer to the result in |*data|.
510 * Data is not copied: the |subpkt| packet will share its underlying buffer wit
[all...]
/third_party/node/deps/openssl/openssl/crypto/pem/
H A Dpem_pkey.c14 #include <openssl/buffer.h>
/third_party/node/deps/openssl/openssl/apps/
H A Dsrp.c26 #include <openssl/buffer.h>
/third_party/node/deps/openssl/openssl/crypto/encode_decode/
H A Dencoder_lib.c13 #include <openssl/buffer.h>
108 ret = 1; /* Hope for the best. A too small buffer will clear this */ in OSSL_ENCODER_to_data()
121 /* The buffer with the right size is already allocated for us */ in OSSL_ENCODER_to_data()
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dbio_ok.c42 several Kbytes of memory to buffer single block before verifying
75 #include <openssl/buffer.h>
187 /* copy clean bytes to output buffer */ in ok_read()
216 /* output buffer full -- cancel */ in ok_read()
220 /* no clean bytes in buffer -- fill it */ in ok_read()
351 case BIO_CTRL_PENDING: /* More to read in buffer */ in ok_ctrl()
352 case BIO_CTRL_WPENDING: /* More to read in buffer */ in ok_ctrl()
H A Dbio_b64.c13 #include <openssl/buffer.h>
152 * At this point, we have room of outl bytes and an empty buffer, so we in b64_read()
170 /* If buffer empty break */ in b64_read()
177 /* else we retry and add more data to buffer */ in b64_read()
236 /* Check buffer full */ in b64_read()
254 * If buffer isn't full and we can retry then restart to read in in b64_read()
395 * Since we're now done using the temporary buffer, the in b64_write()
471 case BIO_CTRL_WPENDING: /* More to write in buffer */ in b64_ctrl()
480 case BIO_CTRL_PENDING: /* More to read in buffer */ in b64_ctrl()
H A Dbio_enc.c15 #include <openssl/buffer.h>
141 * At this point, we have room of outl bytes and an empty buffer, so we in enc_read()
174 * one extra block and then back off, i.e. output buffer in enc_read()
329 case BIO_CTRL_PENDING: /* More to read in buffer */ in enc_ctrl()
/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dtasn_prn.c15 #include <openssl/buffer.h>
/third_party/node/deps/uv/include/uv/
H A Dwin.h653 char* buffer;
/third_party/python/Tools/i18n/
H A Dpygettext.py648 fp = sys.stdin.buffer
/third_party/openssl/test/
H A Dwpackettest.c11 #include <openssl/buffer.h>
89 /* Test initialising from a fixed size buffer */ in test_WPACKET_init()
394 * with a NULL buffer, just to calculate lengths, and a second pass with a in test_WPACKET_init_der()
395 * real buffer to actually generate a packet in test_WPACKET_init_der()
/third_party/protobuf/csharp/src/Google.Protobuf/Collections/
H A DRepeatedField.cs134 // Check that the supplied length doesn't exceed the underlying buffer. in AddEntriesFrom()
166 } while (ParsingPrimitives.MaybeConsumeTag(ref ctx.buffer, ref ctx.state, tag)); in AddEntriesFrom()
/third_party/pulseaudio/src/modules/bluetooth/
H A Da2dp-codec-ldac-gst.c82 if (can_accept_capabilities(a2dp_capabilities->buffer, a2dp_capabilities->size, for_encoding)) in choose_remote_endpoint()
108 pa_log_error("Invalid size of config buffer"); in is_configuration_valid()
188 pa_log_error("Invalid size of capabilities buffer"); in fill_preferred_configuration()
/third_party/python/Include/
H A Dunicodeobject.h132 Py_ssize_t size /* size of buffer */
149 /* Copy the string into a UCS4 buffer including the null character if copy_null
151 the buffer is smaller than the string. Return buffer on success.
153 buflen is the length of the buffer in (Py_UCS4) characters. */
156 Py_UCS4* buffer,
160 /* Copy the string into a UCS4 buffer. A new buffer is allocated using
276 /* Create a Unicode Object from the wchar_t buffer w of the given
279 The buffer i
[all...]
/third_party/openssl/crypto/evp/
H A Dbio_ok.c42 several Kbytes of memory to buffer single block before verifying
75 #include <openssl/buffer.h>
187 /* copy clean bytes to output buffer */ in ok_read()
216 /* output buffer full -- cancel */ in ok_read()
220 /* no clean bytes in buffer -- fill it */ in ok_read()
351 case BIO_CTRL_PENDING: /* More to read in buffer */ in ok_ctrl()
352 case BIO_CTRL_WPENDING: /* More to read in buffer */ in ok_ctrl()
H A Dbio_b64.c13 #include <openssl/buffer.h>
152 * At this point, we have room of outl bytes and an empty buffer, so we in b64_read()
170 /* If buffer empty break */ in b64_read()
177 /* else we retry and add more data to buffer */ in b64_read()
236 /* Check buffer full */ in b64_read()
254 * If buffer isn't full and we can retry then restart to read in in b64_read()
395 * Since we're now done using the temporary buffer, the in b64_write()
471 case BIO_CTRL_WPENDING: /* More to write in buffer */ in b64_ctrl()
480 case BIO_CTRL_PENDING: /* More to read in buffer */ in b64_ctrl()
H A Dbio_enc.c15 #include <openssl/buffer.h>
141 * At this point, we have room of outl bytes and an empty buffer, so we in enc_read()
174 * one extra block and then back off, i.e. output buffer in enc_read()
329 case BIO_CTRL_PENDING: /* More to read in buffer */ in enc_ctrl()
/third_party/openssl/apps/
H A Dsrp.c26 #include <openssl/buffer.h>
/third_party/openssl/crypto/encode_decode/
H A Dencoder_lib.c13 #include <openssl/buffer.h>
108 ret = 1; /* Hope for the best. A too small buffer will clear this */ in OSSL_ENCODER_to_data()
121 /* The buffer with the right size is already allocated for us */ in OSSL_ENCODER_to_data()
/third_party/openssl/crypto/pem/
H A Dpem_pkey.c14 #include <openssl/buffer.h>
/third_party/vk-gl-cts/external/vulkancts/framework/vulkan/
H A DvkQueryUtil.hpp66 VkMemoryRequirements getBufferMemoryRequirements (const DeviceInterface& vk, VkDevice device, VkBuffer buffer);

Completed in 22 milliseconds

1...<<211212213214215216217218219220>>...241