| /lib/lwip/lwip/src/netif/ppp/ |
| A D | magic.c | 185 u32_t magic(void) { in magic() function 255 u32_t magic(void) { in magic() function 270 new_rand = magic(); in magic_random_bytes() 283 return magic() & ~(~0UL<<pow); in magic_pow()
|
| A D | pppol2tp.c | 323 l2tp->remote_tunnel_id = magic(); in pppol2tp_connect() 704 l2tp->remote_session_id = magic(); in pppol2tp_dispatch_control_packet() 1011 serialnumber = magic(); in pppol2tp_send_icrq()
|
| /lib/ |
| A D | lz4_wrapper.c | 28 u32 magic; in ulz4fn() local 35 magic = get_unaligned_le32(in); in ulz4fn() 48 if (magic != LZ4F_MAGIC || version != 1) in ulz4fn()
|
| A D | image-sparse.c | 146 debug("magic: 0x%x\n", sparse_header->magic); in write_sparse_image()
|
| /lib/lwip/lwip/src/include/netif/ppp/ |
| A D | eui64.h | 68 (e).e32[0] = magic(); \ 69 (e).e32[1] = magic(); \
|
| A D | magic.h | 105 u32_t magic(void); /* Returns the next magic number */
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | psa_its_file.c | 57 uint8_t magic[PSA_ITS_MAGIC_LENGTH]; member 96 if (memcmp(header.magic, PSA_ITS_MAGIC_STRING, in psa_its_read_file() 190 memcpy(header.magic, PSA_ITS_MAGIC_STRING, PSA_ITS_MAGIC_LENGTH); in psa_its_set()
|
| A D | psa_crypto_storage.c | 226 uint8_t magic[PSA_KEY_STORAGE_MAGIC_HEADER_LENGTH]; member 244 memcpy(storage_format->magic, PSA_KEY_STORAGE_MAGIC_HEADER, in psa_format_key_data_for_storage()
|
| /lib/optee/ |
| A D | optee.c | 30 if (hdr->magic != OPTEE_MAGIC || in optee_verify_image() 57 printf(optee_hdr_err_msg, hdr, image_addr, hdr->magic, in optee_verify_bootm_image()
|
| /lib/libavb/ |
| A D | avb_footer.h | 36 uint8_t magic[AVB_FOOTER_MAGIC_LEN]; member
|
| A D | avb_footer.c | 20 if (avb_safe_memcmp(dest->magic, AVB_FOOTER_MAGIC, AVB_FOOTER_MAGIC_LEN) != in avb_footer_validate_and_byteswap()
|
| A D | avb_vbmeta_image.h | 108 uint8_t magic[AVB_MAGIC_LEN]; member
|
| /lib/zstd/decompress/ |
| A D | zstd_ddict.c | 95 { U32 const magic = MEM_readLE32(ddict->dictContent); in ZSTD_loadEntropy_intoDDict() local 96 if (magic != ZSTD_MAGIC_DICTIONARY) { in ZSTD_loadEntropy_intoDDict()
|
| A D | zstd_decompress.c | 362 { U32 const magic = MEM_readLE32(buffer); in ZSTD_isFrame() local 363 if (magic == ZSTD_MAGICNUMBER) return 1; in ZSTD_isFrame() 364 if ((magic & ZSTD_MAGIC_SKIPPABLE_MASK) == ZSTD_MAGIC_SKIPPABLE_START) return 1; in ZSTD_isFrame() 376 { U32 const magic = MEM_readLE32(buffer); in ZSTD_isSkippableFrame() local 377 if ((magic & ZSTD_MAGIC_SKIPPABLE_MASK) == ZSTD_MAGIC_SKIPPABLE_START) return 1; in ZSTD_isSkippableFrame() 1340 { U32 const magic = MEM_readLE32(dict); in ZSTD_decompress_insertDictionary() local 1341 if (magic != ZSTD_MAGIC_DICTIONARY) { in ZSTD_decompress_insertDictionary()
|
| /lib/mbedtls/external/mbedtls/programs/psa/ |
| A D | key_ladder_demo.c | 138 char magic[WRAPPED_DATA_MAGIC_LENGTH]; member 395 memcpy(&header.magic, WRAPPED_DATA_MAGIC, WRAPPED_DATA_MAGIC_LENGTH); in wrap_data() 454 if (memcmp(&header.magic, WRAPPED_DATA_MAGIC, in unwrap_data()
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_psa_crypto_persistent_key.data | 24 Parse storage: bad magic 27 Parse storage: truncated magic
|
| A D | test_suite_psa_its.data | 70 Overwrite ITS header magic
|
| /lib/efi_loader/ |
| A D | efi_var_mem.c | 234 efi_var_buf->magic = EFI_VAR_FILE_MAGIC; in efi_var_mem_init() 260 .magic = EFI_VAR_FILE_MAGIC, in efi_var_collect_mem()
|
| A D | efi_var_file.c | 105 if (buf->reserved || buf->magic != EFI_VAR_FILE_MAGIC || in efi_var_restore()
|
| A D | boothart.c | 140 if (f2h(header->magic) != FDT_MAGIC) { in get_property()
|
| A D | dtbdump.c | 515 if (f2h(dtb->magic) != FDT_MAGIC) { in do_save() 701 if (f2h(header->magic) != FDT_MAGIC) { in do_dump()
|
| /lib/efi_selftest/ |
| A D | efi_selftest_fdt.c | 71 if (f2h(header->magic) != FDT_MAGIC) { in get_property()
|
| A D | efi_selftest_variables_runtime.c | 270 if (hdr->magic != EFI_VAR_FILE_MAGIC || in execute()
|
| /lib/mbedtls/external/mbedtls/docs/architecture/ |
| A D | mbed-crypto-storage-specification.md | 55 * magic (8 bytes): `"PSA\0KEY\0"` 205 * magic (8 bytes): `"PSA\0KEY\0"` 264 * magic (8 bytes): `"PSA\0KEY\0"`. 323 * magic (8 bytes): `"PSA\0KEY\0"`. 414 * magic (8 bytes): `"PSA\0KEY\0"`.
|
| /lib/lwip/lwip/src/ |
| A D | Filelists.mk | 111 $(LWIPDIR)/netif/ppp/magic.c \
|