Searched refs:buffer (Results 1 – 8 of 8) sorted by relevance
| /hypervisor/debug/ |
| A D | logmsg.c | 43 char *buffer; in do_logmsg() local 62 buffer = per_cpu(logbuf, pcpu_id); in do_logmsg() 65 (void)memset(buffer, 0U, LOG_MESSAGE_MAX_SIZE); in do_logmsg() 67 snprintf(buffer, LOG_MESSAGE_MAX_SIZE, "[%luus][cpu=%hu][%s][sev=%u][seq=%u]:", in do_logmsg() 72 vsnprintf(buffer + strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE), in do_logmsg() 74 - strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE), fmt, args); in do_logmsg() 79 npk_log_write(buffer, strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE)); in do_logmsg() 87 printf("%s\n\r", buffer); in do_logmsg() 99 msg_len = strnlen_s(buffer, LOG_MESSAGE_MAX_SIZE); in do_logmsg() 100 (void)sbuf_put_many(sbuf, LOG_ENTRY_SIZE, (uint8_t *)buffer, in do_logmsg()
|
| /hypervisor/lib/crypto/mbedtls/ |
| A D | sha256.c | 274 (void)memcpy_s((void *)&ctx->buffer[left], fill, data, fill); in mbedtls_sha256_update_ret() 276 ret = mbedtls_internal_sha256_process(ctx, ctx->buffer); in mbedtls_sha256_update_ret() 296 (void)memcpy_s((void *)&ctx->buffer[left], len, data, len); in mbedtls_sha256_update_ret() 319 ctx->buffer[used] = 0x80U; in mbedtls_sha256_finish_ret() 325 (void)memset((void *)&ctx->buffer[used], 0U, 56U - used); in mbedtls_sha256_finish_ret() 328 (void)memset((void *)&ctx->buffer[used], 0U, 64U - used); in mbedtls_sha256_finish_ret() 330 ret = mbedtls_internal_sha256_process(ctx, ctx->buffer); in mbedtls_sha256_finish_ret() 332 (void)memset(ctx->buffer, 0U, 56U); in mbedtls_sha256_finish_ret() 344 put_unint32_be(high, ctx->buffer, 56); in mbedtls_sha256_finish_ret() 345 put_unint32_be(low, ctx->buffer, 60); in mbedtls_sha256_finish_ret() [all …]
|
| A D | sha256.h | 44 uint8_t buffer[64]; /*!< The data block being processed. */ member
|
| A D | ChangeLog | 29 targetting an internal MD/SHA buffer. With TLS or if 53 buffer, which can save some RAM. If buffer lengths are kept equal, there 234 buffer. 897 * Fix potential integer overflow to buffer overflow in 1413 * NULL pointer dereference in the buffer-based allocator when the buffer is 1569 * Enforce alignment in the buffer allocator even if buffer is not aligned 1679 error if the output buffer was just 1 byte too small. 1719 * Fixed possible buffer overflow with overlong PSK 1839 * TLS compression only allocates working buffer once 2233 * Added preliminary ASN.1 buffer writing support [all …]
|
| /hypervisor/common/ |
| A D | ptdev.c | 287 uint32_t ptirq_get_intr_data(const struct acrn_vm *target_vm, uint64_t *buffer, uint32_t buffer_cnt) in ptirq_get_intr_data() argument 299 buffer[index] = entry->allocated_pirq; in ptirq_get_intr_data() 300 buffer[index + 1U] = entry->intr_count; in ptirq_get_intr_data()
|
| A D | hypercall.c | 1212 intr_hdr->buffer, intr_hdr->buf_cnt); in hcall_vm_intr_monitor() 1218 intr_hdr->buffer[0] * TICKS_PER_MS; in hcall_vm_intr_monitor()
|
| /hypervisor/include/common/ |
| A D | ptdev.h | 289 uint32_t ptirq_get_intr_data(const struct acrn_vm *target_vm, uint64_t *buffer, uint32_t buffer_cnt…
|
| /hypervisor/include/public/ |
| A D | acrn_common.h | 606 uint64_t buffer[MAX_PTDEV_NUM * 2]; member
|
Completed in 20 milliseconds