| /lib/acpi/ |
| A D | acpi_dp.c | 204 if (!new) in acpi_dp_new() 207 memset(new, '\0', sizeof(*new)); in acpi_dp_new() 218 return new; in acpi_dp_new() 234 if (new) in acpi_dp_add_integer() 237 return new; in acpi_dp_add_integer() 247 if (new) in acpi_dp_add_string() 250 return new; in acpi_dp_add_string() 260 if (new) in acpi_dp_add_reference() 263 return new; in acpi_dp_add_reference() 276 if (new) { in acpi_dp_add_child() [all …]
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/ |
| A D | IANAifType-MIB | 99 DESCRIPTION "Registration of new IANAifType 103 DESCRIPTION "Registration of new IANAifTypes 107 DESCRIPTION "Registration of new IANAifType 111 DESCRIPTION "Registration of new IANAifType 115 DESCRIPTION "Registration of new IANAifType 127 DESCRIPTION "Registration of new IANAifType 144 DESCRIPTION "Registration of new IANAifType 149 DESCRIPTION "Registration of new IANAifType 159 DESCRIPTION "Registration of new IANAifType 163 DESCRIPTION "Registration of new IANAifType [all …]
|
| A D | IANA-MAU-MIB | 33 It is intended that each new MAU type, Media Availability 52 This reference should be updated as appropriate when new 78 Requests for new values should be made to IANA via email 132 -- new since RFC 3636 299 Requests for new values should be made to IANA via email 338 Requests for new values should be made to IANA via email 412 -- new since RFC 3636 492 ------ new since RFC 1515: 560 ------ new since RFC 2239: 629 ------ new since RFC 2668: [all …]
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | memory_buffer_alloc.c | 300 new->alloc = 0; in buffer_alloc_calloc() 301 new->prev = cur; in buffer_alloc_calloc() 302 new->next = cur->next; in buffer_alloc_calloc() 304 new->trace = NULL; in buffer_alloc_calloc() 305 new->trace_count = 0; in buffer_alloc_calloc() 307 new->magic1 = MAGIC1; in buffer_alloc_calloc() 308 new->magic2 = MAGIC2; in buffer_alloc_calloc() 311 new->next->prev = new; in buffer_alloc_calloc() 319 new->prev_free->next_free = new; in buffer_alloc_calloc() 325 new->next_free->prev_free = new; in buffer_alloc_calloc() [all …]
|
| /lib/ |
| A D | rbtree.c | 53 __rb_rotate_set_parents(struct rb_node *old, struct rb_node *new, in __rb_rotate_set_parents() argument 57 new->__rb_parent_color = old->__rb_parent_color; in __rb_rotate_set_parents() 58 rb_set_parent_color(old, new, color); in __rb_rotate_set_parents() 59 __rb_change_child(old, new, parent, root); in __rb_rotate_set_parents() 193 void (*augment_rotate)(struct rb_node *old, struct rb_node *new)) in ____rb_erase_color() argument 355 void (*augment_rotate)(struct rb_node *old, struct rb_node *new)) in __rb_erase_color() argument 495 void rb_replace_node(struct rb_node *victim, struct rb_node *new, in rb_replace_node() argument 501 __rb_change_child(victim, new, parent, root); in rb_replace_node() 503 rb_set_parent(victim->rb_left, new); in rb_replace_node() 505 rb_set_parent(victim->rb_right, new); in rb_replace_node() [all …]
|
| A D | net_utils.c | 204 uint add_ip_checksums(uint offset, uint sum, uint new) in add_ip_checksums() argument 209 new = ~new & 0xffff; in add_ip_checksums() 215 new = ((new >> 8) & 0xff) | ((new << 8) & 0xff00); in add_ip_checksums() 217 checksum = sum + new; in add_ip_checksums()
|
| A D | string.c | 349 char *new; in strdup() local 352 ((new = malloc (strlen(s) + 1)) == NULL) ) { in strdup() 356 strcpy (new, s); in strdup() 357 return new; in strdup() 363 char *new; in strndup() local 373 new = malloc(len + 1); in strndup() 374 if (new == NULL) in strndup() 377 strncpy(new, s, len); in strndup() 378 new[len] = '\0'; in strndup() 380 return new; in strndup()
|
| A D | charset.c | 430 u16 *new; in u16_strdup() local 436 new = malloc(len); in u16_strdup() 437 if (!new) in u16_strdup() 439 memcpy(new, src, len); in u16_strdup() 441 return new; in u16_strdup()
|
| /lib/mbedtls/external/mbedtls/docs/architecture/psa-migration/ |
| A D | outcome-analysis.sh | 100 new="outcome-$2.csv" 107 sed -n "$sed_cmd" "$new" > skipped-new 109 nb_new=$(wc -l <skipped-new) 114 if diff skipped-ref skipped-new | grep '^> '; then 119 rm skipped-ref skipped-new
|
| A D | testing.md | 40 - unit testing of the new API and directly-related APIs - for example: 41 - in `test_suite_pk` we have a new test function `pk_psa_utils` that exercises 47 - in `test_suite_pkwrite` we should have a new test function checking that 50 - integration testing of the new API with each existing API which should 52 - in `programs/ssl/ssl_client2` a new option `key_opaque` that causes the 53 new API to be used, and one or more tests in `ssl-opt.sh` using that. 55 - in `test_suite_x509write` we have a new test function 56 `x509_csr_check_opaque()` checking integration of the new API with the 73 - unit testing of the new API and directly-related APIs - for example: 75 `test_vec_crypt` gained a new parameter `use_psa` and corresponding test [all …]
|
| A D | strategy.md | 17 needs to be changed to use new APIs. For a more detailed account of what's 18 implemented, see `docs/use-psa-crypto.md`, where new APIs are about (G2), and 37 (G1 above), as well as the availability of some new APIs (G2 above). 83 It will then require follow-up work to make use of the new PSA APIs in 138 - Provide a new definition (conditionally on `USE_PSA_CRYPTO`) of wrapper 180 - Provide a new way to set up a context that causes operations on that context 193 There are two variants of this strategy: one where using the new setup 221 - PK (for G2): opt-in use of PSA (new key type) 330 As much as possible, we're trying to create for each algorithm a single new 402 introducing new context types) would provide to users. [all …]
|
| /lib/lwip/lwip/ |
| A D | UPGRADING | 9 * [Enter new changes just after this line - do not remove this line] 96 +++ new files: 97 * MANY new and moved files! 117 +++ new options: 120 +++ new pools: 173 err_t, not a pointer to new data/netconn. 187 +++ new files: 189 * Added 4 new files: def.c, timers.c, timers.h, tcp_impl.h: 208 +++ new options: 227 +++ new pools: [all …]
|
| /lib/mbedtls/external/mbedtls/tests/data_files/dir-maxpath/ |
| A D | long.sh | 15 $OPENSSL req -new -x509 -subj "/C=UK/O=mbed TLS/CN=CA00" $OPT \ 28 $OPENSSL req -new -subj "/C=UK/O=mbed TLS/CN=CA${ME}" \
|
| /lib/mbedtls/external/mbedtls/docs/architecture/ |
| A D | psa-crypto-implementation-structure.md | 75 ## How to implement a new cryptographic mechanism 77 Summary of files to modify when adding a new algorithm or key type: 80 …to_values.h` or `include/psa/crypto_extra.h` — [New functions and macros](#new-functions-and-macro… 86 * [ ] `tests/suites/test_suite_psa_crypto_metadata.data` — [New functions and macros](#new-function… 87 …tes/test_suite_psa_crypto_metadata.function` — [New functions and macros](#new-functions-and-macro… 92 Summary of files to modify when adding new API functions: 94 …to_sizes.h`, or `include/psa/crypto_extra.h` — [New functions and macros](#new-functions-and-macro… 111 If a mechanism requires new functions, they should follow the design guidelines in the PSA Cryptogr… 146 When implementing a new algorithm or key type, there are typically things to change in `library/cry… 162 When adding a new key type or algorithm: [all …]
|
| /lib/mbedtls/external/mbedtls/programs/ssl/ |
| A D | ssl_server2.c | 791 sni_entry *cur = NULL, *new = NULL; in sni_parse() local 810 GET_ITEM(new->name); in sni_parse() 825 mbedtls_pk_init(new->key); in sni_parse() 866 new->next = cur; in sni_parse() 867 cur = new; in sni_parse() 873 sni_free(new); in sni_parse() 990 psk_entry *cur = NULL, *new = NULL; in psk_parse() local 1007 GET_ITEM(new->name); in psk_parse() 1015 new->next = cur; in psk_parse() 1016 cur = new; in psk_parse() [all …]
|
| /lib/mbedtls/external/mbedtls/.github/ |
| A D | pull_request_template.md | 9 Please tick as appropriate and edit the reasons (e.g.: "backport: not needed because this is a new … 26 - please do not force-push to update your PR - just add new commit(s)
|
| /lib/mbedtls/external/mbedtls/ |
| A D | CONTRIBUTING.md | 35 …main development branch where new features are added, need to be justifiable by either being a sig… 37 …different prototype, or different documented behavior), create a new function with a new name with… 48 … to that LTS branch. If a bug fix introduces a change to the API such as a new function, the fix s… 49 1. If a contribution is a new feature or enhancement, no backporting is required. Exceptions to thi… 91 All new files should include the standard SPDX license identifier where possible, i.e. "SPDX-Licens… 93 …utions is retained by the original authors of the code. Where possible for new files, this should …
|
| A D | BRANCHES.md | 11 as well as all the new features and bug fixes and security fixes. 48 Note that new releases of Mbed TLS may extend the API. Here are some 56 when a new error condition arises. 61 addition of a new feature.
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | use-psa-crypto.md | 7 - enables new APIs for using keys handled by PSA Crypto, such as 64 reasons, we can't extend its scope. However, new modules in the library, such 87 using the new API in order to get the benefits; it can then pass the 107 the new APIs to get the benefits. 120 the new APIs to get the benefits. 124 There is a new API function `mbedtls_cipher_setup_psa()` to set up a context
|
| /lib/mbedtls/external/mbedtls/ChangeLog.d/ |
| A D | 00README.md | 13 * New features in the library, new sample programs, or new platform support. 81 consequences of the bug, not how the bug was fixed. For a new feature, explain
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/ |
| A D | IANA-CHARSET-MIB | 35 Note: Best practice is to define new MIB string 51 DESCRIPTION "Registration of new charset 2107." 54 DESCRIPTION "Registration of new charsets numbered 118, 119,
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_asn1write.data | 385 Store named data: new, val_len=0 388 Stored named data: new, val_len=0, val=NULL 391 Store named data: new, val_len=4 394 Store named data: new, val_len=4, val=NULL
|
| A D | test_suite_psa_crypto_slot_management.data | 220 # Eviction from a key slot to be able to import a new persistent key. 221 Key slot eviction to import a new persistent key 224 # Eviction from a key slot to be able to import a new volatile key. 225 Key slot eviction to import a new volatile key
|
| /lib/mbedtls/external/mbedtls/tests/data_files/ |
| A D | Makefile | 289 $(OPENSSL) req -new -config $(test_ca_config_file) -key test-int-ca2.key \ 293 $(OPENSSL) req -new -config $(test_ca_config_file) -key test-int-ca3.key \ 359 $(OPENSSL) req -new -key server7.key -subj "/C=NL/O=PolarSSL/CN=localhost" -out $@ 455 $(OPENSSL) req -x509 -new -subj "/C=UK/O=mbed TLS/CN=mbed TLS Test intermediate CA 3" \ 544 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=localhost" \ 1512 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=localhost" \ 1562 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=localhost" \ 1571 $(OPENSSL) req -new -subj "/CN=selfsigned-child/OU=testing/O=PolarSSL/C=NL" \ 1826 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=localhost" \ 1838 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=localhost" \ [all …]
|
| /lib/lwip/lwip/doc/ |
| A D | ppp.txt | 180 * Creating a new PPPoS session 203 * Create a new PPPoS interface 215 * Creating a new PPPoE session 222 * Create a new PPPoE interface 238 * Creating a new PPPoL2TP session 245 * Create a new PPPoL2TP interface
|