/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | a_time.c | 140 ASN1_GENERALIZEDTIME *ret; local 148 if (!(ret = ASN1_GENERALIZEDTIME_new ())) 150 if (out) *out = ret; 152 else ret = *out; 157 if(!ASN1_STRING_set(ret, t->data, t->length)) 159 return ret; 163 if (!ASN1_STRING_set(ret, NULL, t->length + 2)) 167 str = (char *)ret->data; 174 return ret;
|
H A D | a_verify.c | 83 int ret= -1,i,inl; local 114 ret=0; 120 ret=1; 123 return(ret); 135 int ret= -1,inl; local 164 ret=0; 185 ret=0; 191 ret=1; 194 return(ret);
|
H A D | x_name.c | 134 X509_NAME *ret = NULL; local 135 ret = OPENSSL_malloc(sizeof(X509_NAME)); 136 if(!ret) goto memerr; 137 if ((ret->entries=sk_X509_NAME_ENTRY_new_null()) == NULL) 139 if((ret->bytes = BUF_MEM_new()) == NULL) goto memerr; 140 ret->canon_enc = NULL; 141 ret->canon_enclen = 0; 142 ret->modified=1; 143 *val = (ASN1_VALUE *)ret; 148 if (ret) 180 int i, j, ret; local 224 int ret; local 322 int i, set = -1, ret = 0; local [all...] |
H A D | a_bitstr.c | 68 int ret,j,bits,len; local 102 ret=1+len; 103 if (pp == NULL) return(ret); 113 return(ret); 119 ASN1_BIT_STRING *ret=NULL; local 132 if ((ret=M_ASN1_BIT_STRING_new()) == NULL) return(NULL); 135 ret=(*a); 142 ret->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); /* clear */ 143 ret->flags|=(ASN1_STRING_FLAG_BITS_LEFT|(i&0x07)); /* set */ 160 ret [all...] |
H A D | p5_pbe.c | 135 X509_ALGOR *ret; 136 ret = X509_ALGOR_new(); 137 if (!ret) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) 144 return ret; 146 X509_ALGOR_free(ret);
|
/barrelfish-2018-10-04/tools/harness/ |
H A D | checkout.py | 89 ret = {} 92 ret["branch"] = repo.active_branch.name 94 ret["branch"] = "(HEAD detached at %s)" % shortsha 95 ret["shortrev"] = shortsha 96 ret["commitmsg"] = headc.message.split("\n")[0] 97 ret["commitmsg-tail"] = "".join(headc.message.split("\n")[1:]) 98 ret["dirty"] = str(self.repo.is_dirty()) 99 ret["untracked-files"] = ",".join(self.repo.untracked_files) 100 return ret
|
/barrelfish-2018-10-04/lib/libc/locale/ |
H A D | lnumeric.c | 67 int ret; local 70 ret = __part_load_locale(name, using_locale, 74 if (ret != _LDP_ERROR) 76 if (ret == _LDP_LOADED) { 84 return (ret);
|
H A D | localeconv.c | 64 struct lconv *ret = &loc->lconv; local 70 #define M_ASSIGN_STR(NAME) (ret->NAME = (char*)mptr->NAME) 71 #define M_ASSIGN_CHAR(NAME) (ret->NAME = mptr->NAME[0]) 102 #define N_ASSIGN_STR(NAME) (ret->NAME = (char*)nptr->NAME) 111 return ret;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/bio/ |
H A D | saccept.c | 37 int ret=1,i; local 102 ret=0; 104 if (ret) 109 exit(ret); 110 return(!ret);
|
/barrelfish-2018-10-04/lib/posixcompat/ |
H A D | getpwent.c | 62 struct passwd *ret = NULL; local 66 ret = &user; 68 ret->pw_name); 70 ret = NULL; 74 return ret;
|
/barrelfish-2018-10-04/usr/arrakismon/ |
H A D | hdd.c | 60 struct hdd *ret = calloc(1, sizeof(struct hdd)); local 62 ret->disk_image = disk_image; 63 ret->disk_image_size = disk_image_size; 65 calc_chs(ret); 67 return ret;
|
/barrelfish-2018-10-04/lib/barrelfish/arch/aarch64/ |
H A D | sys_debug.c | 24 errval_t sys_debug_get_tsc_per_ms(uint64_t *ret) argument 27 *ret = sr.value; 47 errval_t sys_debug_hardware_global_timer_read(uint64_t *ret) argument 60 if(err_is_ok(sr.error) && ret) { 61 *ret = (((uint64_t) h) << 32) | ((uint32_t) l);
|
/barrelfish-2018-10-04/lib/barrelfish/arch/arm/ |
H A D | sys_debug.c | 23 errval_t sys_debug_get_tsc_per_ms(uint64_t *ret) argument 26 *ret = sr.value / 1000; 46 errval_t sys_debug_hardware_global_timer_read(uint64_t *ret) argument 59 if(err_is_ok(sr.error) && ret) { 60 *ret = (((uint64_t) h) << 32) | ((uint32_t) l);
|
/barrelfish-2018-10-04/usr/vmkitmon/ |
H A D | hdd.c | 60 struct hdd *ret = calloc(1, sizeof(struct hdd)); local 62 ret->disk_image = disk_image; 63 ret->disk_image_size = disk_image_size; 65 calc_chs(ret); 67 return ret;
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | cma.c | 242 int ret; local 245 ret = (id_priv->state == comp); 247 return ret; 254 int ret; local 257 if ((ret = (id_priv->state == comp))) 260 return ret; 341 int ret = 0; local 352 ret = ib_sa_get_mcmember_rec(id_priv->id.device, 355 if (!ret) 361 return ret; 369 int ret = -ENODEV; local 448 int qp_attr_mask, ret; local 474 int qp_attr_mask, ret; local 489 int ret; local 532 int qp_attr_mask, ret; local 567 int qp_attr_mask, ret; local 591 int ret; local 610 int ret; local 645 int ret = 0; local 937 int ret; local 987 int ret = 0; local 1069 int ret; local 1124 int ret; local 1173 int offset, ret; local 1300 int ret = 0; local 1363 int ret; local 1451 int ret; local 1477 int ret; local 1515 int ret; local 1552 int ret; local 1717 int ret; local 1752 int ret; local 1799 int ret; local 1876 int ret; local 1920 int ret; local 2010 int ret; local 2075 int ret; local 2121 int port, ret; local 2154 int port, ret, low, high; local 2240 int ret; local 2277 int ret; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ec/ |
H A D | ec_asn1.c | 568 ECPARAMETERS *ret=NULL; local 582 if ((ret = ECPARAMETERS_new()) == NULL) 590 ret = param; 593 ret->version = (long)0x1; 596 if (!ec_asn1_group2fieldid(group, ret->fieldID)) 603 if (!ec_asn1_group2curve(group, ret->curve)) 634 if (ret->base == NULL && (ret->base = ASN1_OCTET_STRING_new()) == NULL) 639 if (!ASN1_OCTET_STRING_set(ret->base, buffer, len)) 651 ret 688 ECPKPARAMETERS *ret = params; local 743 EC_GROUP *ret = NULL; local 1006 EC_GROUP *ret=NULL; local 1083 int ret=0; local 1105 EC_KEY *ret=NULL; local 1212 int ret=0, ok=0; local 1332 EC_KEY *ret; local 1364 EC_KEY *ret=NULL; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | t1_lib.c | 276 unsigned char *ret = p; local 283 ret+=2; 285 if (ret>=limit) return NULL; /* this really never occurs, but ... */ 301 if ((lenmax = limit - ret - 9) < 0 306 s2n(TLSEXT_TYPE_server_name,ret); 307 s2n(size_str+5,ret); 310 s2n(size_str+3,ret); 313 *(ret++) = (unsigned char) TLSEXT_NAMETYPE_host_name; 314 s2n(size_str,ret); 315 memcpy(ret, 507 unsigned char *ret = p; local 1332 int ret=SSL_TLSEXT_ERR_NOACK; local 1457 int ret=SSL_TLSEXT_ERR_NOACK; local 1572 tls1_process_ticket(SSL *s, unsigned char *session_id, int len, const unsigned char *limit, SSL_SESSION **ret) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_att.c | 113 X509_ATTRIBUTE *ret; local 117 ret=sk_X509_ATTRIBUTE_delete(x,loc); 118 return(ret); 161 STACK_OF(X509_ATTRIBUTE) *ret; 164 ret = X509at_add1_attr(x, attr); 166 return ret; 174 STACK_OF(X509_ATTRIBUTE) *ret; 177 ret = X509at_add1_attr(x, attr); 179 return ret; 187 STACK_OF(X509_ATTRIBUTE) *ret; 215 X509_ATTRIBUTE *ret; local 231 X509_ATTRIBUTE *ret; local [all...] |
/barrelfish-2018-10-04/lib/libc/iconv/ |
H A D | bsd_iconv.c | 59 int ret; local 74 ret = _citrus_iconv_open(&handle, in, out_noslashes); 77 ret = _citrus_iconv_open(&handle, in, out); 80 if (ret) { 81 errno = ret == ENOENT ? EINVAL : ret; 125 size_t ret; local 134 in, szin, out, szout, 0, &ret); 137 ret = (size_t)-1; 140 return (ret); 147 size_t ret; local 170 int ret; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/conf/ |
H A D | conf_lib.c | 133 int ret; local 137 ret = NCONF_load_bio(&ctmp, bp, eline); 138 if (ret) 209 int ret; local 215 ret = CONF_dump_bio(conf, btmp); 217 return ret; 236 CONF *ret; local 241 ret = meth->create(meth); 242 if (ret == NULL) 248 return ret; 280 int ret; local 369 int ret; local [all...] |
/barrelfish-2018-10-04/lib/libc/aarch64/ |
H A D | SYS.h | 45 ret; \ 53 ret; \ 62 ret; \
|
/barrelfish-2018-10-04/lib/libc/riscv/ |
H A D | SYS.h | 50 ret; \ 58 ret; \ 67 ret; \
|
/barrelfish-2018-10-04/lib/libc/stdio/ |
H A D | vsprintf.c | 53 int ret; local 60 ret = __vfprintf(&f, locale, fmt, ap); 62 return (ret);
|
/barrelfish-2018-10-04/lib/msun/i387/ |
H A D | e_exp.S | 80 ret 93 ret 97 ret
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ |
H A D | o_str.c | 109 int ret=0; local 111 while(n && (ret=*c1-*c2)==0) n--,c1++,c2++; 113 return ret;
|