Home
last modified time | relevance | path

Searched refs:buffer (Results 1 – 8 of 8) sorted by relevance

/hypervisor/debug/
A Dlogmsg.c43 char *buffer; in do_logmsg() local
62 buffer = per_cpu(logbuf, pcpu_id); in do_logmsg()
65 (void)memset(buffer, 0U, LOG_MESSAGE_MAX_SIZE); in do_logmsg()
67 snprintf(buffer, LOG_MESSAGE_MAX_SIZE, "[%luus][cpu=%hu][%s][sev=%u][seq=%u]:", in do_logmsg()
72 vsnprintf(buffer + strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE), in do_logmsg()
74 - strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE), fmt, args); in do_logmsg()
79 npk_log_write(buffer, strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE)); in do_logmsg()
87 printf("%s\n\r", buffer); in do_logmsg()
99 msg_len = strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE); in do_logmsg()
100 (void)sbuf_put_many(sbuf, LOG_ENTRY_SIZE, (uint8_t *)buffer, in do_logmsg()
/hypervisor/lib/crypto/mbedtls/
A Dsha256.c274 (void)memcpy_s((void *)&ctx->buffer[left], fill, data, fill); in mbedtls_sha256_update_ret()
276 ret = mbedtls_internal_sha256_process(ctx, ctx->buffer); in mbedtls_sha256_update_ret()
296 (void)memcpy_s((void *)&ctx->buffer[left], len, data, len); in mbedtls_sha256_update_ret()
319 ctx->buffer[used] = 0x80U; in mbedtls_sha256_finish_ret()
325 (void)memset((void *)&ctx->buffer[used], 0U, 56U - used); in mbedtls_sha256_finish_ret()
328 (void)memset((void *)&ctx->buffer[used], 0U, 64U - used); in mbedtls_sha256_finish_ret()
330 ret = mbedtls_internal_sha256_process(ctx, ctx->buffer); in mbedtls_sha256_finish_ret()
332 (void)memset(ctx->buffer, 0U, 56U); in mbedtls_sha256_finish_ret()
344 put_unint32_be(high, ctx->buffer, 56); in mbedtls_sha256_finish_ret()
345 put_unint32_be(low, ctx->buffer, 60); in mbedtls_sha256_finish_ret()
[all …]
A Dsha256.h44 uint8_t buffer[64]; /*!< The data block being processed. */ member
A DChangeLog29 targetting an internal MD/SHA buffer. With TLS or if
53 buffer, which can save some RAM. If buffer lengths are kept equal, there
234 buffer.
897 * Fix potential integer overflow to buffer overflow in
1413 * NULL pointer dereference in the buffer-based allocator when the buffer is
1569 * Enforce alignment in the buffer allocator even if buffer is not aligned
1679 error if the output buffer was just 1 byte too small.
1719 * Fixed possible buffer overflow with overlong PSK
1839 * TLS compression only allocates working buffer once
2233 * Added preliminary ASN.1 buffer writing support
[all …]
/hypervisor/common/
A Dptdev.c287 uint32_t ptirq_get_intr_data(const struct acrn_vm *target_vm, uint64_t *buffer, uint32_t buffer_cnt) in ptirq_get_intr_data() argument
299 buffer[index] = entry->allocated_pirq; in ptirq_get_intr_data()
300 buffer[index + 1U] = entry->intr_count; in ptirq_get_intr_data()
A Dhypercall.c1212 intr_hdr->buffer, intr_hdr->buf_cnt); in hcall_vm_intr_monitor()
1218 intr_hdr->buffer[0] * TICKS_PER_MS; in hcall_vm_intr_monitor()
/hypervisor/include/common/
A Dptdev.h289 uint32_t ptirq_get_intr_data(const struct acrn_vm *target_vm, uint64_t *buffer, uint32_t buffer_cnt…
/hypervisor/include/public/
A Dacrn_common.h606 uint64_t buffer[MAX_PTDEV_NUM * 2]; member

Completed in 20 milliseconds