/barrelfish-master/lib/libc/stdio/ |
H A D | wprintf.c | 43 int ret; local 47 ret = vfwprintf(stdout, fmt, ap); 50 return (ret); 55 int ret; local 59 ret = vfwprintf_l(stdout, locale, fmt, ap); 62 return (ret);
|
H A D | dprintf.c | 39 int ret; local 42 ret = vdprintf(fd, fmt, ap); 44 return (ret);
|
H A D | feof.c | 50 int ret; local 53 ret= __sfeof(fp); 55 return (ret);
|
H A D | ferror.c | 50 int ret; local 53 ret = __sferror(fp); 55 return (ret);
|
H A D | stdio.c | 89 int ret; local 91 ret = (*fp->_read)(fp->_cookie, buf, n); 92 if (ret > 0) { 94 if (fp->_offset <= OFF_MAX - ret) 95 fp->_offset += ret; 99 } else if (ret < 0) 101 return (ret); 107 int ret; local 117 ret = (*fp->_write)(fp->_cookie, buf, n); 119 if (ret > 134 fpos_t ret; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsa_lib.c | 115 DSA *ret; local 117 ret=(DSA *)OPENSSL_malloc(sizeof(DSA)); 118 if (ret == NULL) 123 ret->meth = DSA_get_default_method(); 130 OPENSSL_free(ret); 133 ret->engine = engine; 136 ret->engine = ENGINE_get_default_DSA(); 137 if(ret->engine) 139 ret->meth = ENGINE_get_DSA(ret 238 int ret,i; local 282 DH *ret = NULL; local [all...] |
H A D | dsa_prn.c | 68 int ret; local 76 ret=DSA_print(b,x,off); 78 return(ret); 84 int ret; local 92 ret=DSAparams_print(b, x); 94 return(ret); 101 int ret; local 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 107 return ret; 113 int ret; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | d2i_pu.c | 78 EVP_PKEY *ret; local 82 if ((ret=EVP_PKEY_new()) == NULL) 88 else ret= *a; 90 if (!EVP_PKEY_set_type(ret, type)) 96 switch (EVP_PKEY_id(ret)) 100 if ((ret->pkey.rsa=d2i_RSAPublicKey(NULL, 110 if (!d2i_DSAPublicKey(&(ret->pkey.dsa), 120 if (!o2i_ECPublicKey(&(ret->pkey.ec), 133 if (a != NULL) (*a)=ret; 134 return(ret); [all...] |
H A D | x_pkey.c | 79 M_ASN1_D2I_get_x(X509_ALGOR,ret->enc_algor,d2i_X509_ALGOR); 80 M_ASN1_D2I_get_x(ASN1_OCTET_STRING,ret->enc_pkey,d2i_ASN1_OCTET_STRING); 82 ret->cipher.cipher=EVP_get_cipherbyname( 83 OBJ_nid2ln(OBJ_obj2nid(ret->enc_algor->algorithm))); 84 if (ret->cipher.cipher == NULL) 90 if (ret->enc_algor->parameter->type == V_ASN1_OCTET_STRING) 92 i=ret->enc_algor->parameter->value.octet_string->length; 99 memcpy(ret->cipher.iv, 100 ret->enc_algor->parameter->value.octet_string->data,i); 103 memset(ret 109 X509_PKEY *ret=NULL; local [all...] |
H A D | d2i_pr.c | 74 EVP_PKEY *ret; local 78 if ((ret=EVP_PKEY_new()) == NULL) 86 ret= *a; 88 if (ret->engine) 90 ENGINE_finish(ret->engine); 91 ret->engine = NULL; 96 if (!EVP_PKEY_set_type(ret, type)) 102 if (!ret->ameth->old_priv_decode || 103 !ret->ameth->old_priv_decode(ret, p 152 EVP_PKEY *ret; local [all...] |
H A D | a_int.c | 69 int neg, ret; local 80 ret = ASN1_STRING_cmp(x, y); 83 return -ret; 85 return ret; 116 int pad=0,ret,i,neg; local 122 ret=1; 125 ret=a->length; 146 ret+=pad; 148 if (pp == NULL) return(ret); 172 *pp+=ret; 181 ASN1_INTEGER *ret=NULL; local 274 ASN1_INTEGER *ret=NULL; local 406 ASN1_INTEGER *ret; local 448 BIGNUM *ret; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | pcy_data.c | 88 X509_POLICY_DATA *ret; local 100 ret = OPENSSL_malloc(sizeof(X509_POLICY_DATA)); 101 if (!ret) 103 ret->expected_policy_set = sk_ASN1_OBJECT_new_null(); 104 if (!ret->expected_policy_set) 106 OPENSSL_free(ret); 113 ret->flags = POLICY_DATA_FLAG_CRITICAL; 115 ret->flags = 0; 118 ret->valid_policy = id; 121 ret [all...] |
/barrelfish-master/lib/libc/sys/ |
H A D | sigwait.c | 47 int ret; local 51 ret = __sys_sigwait(set, sig); 52 } while (ret == EINTR); 53 return (ret);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bio/ |
H A D | bss_fd.c | 113 BIO *ret; local 114 ret=BIO_new(BIO_s_fd()); 115 if (ret == NULL) return(NULL); 116 BIO_set_fd(ret,fd,close_flag); 117 return(ret); 146 int ret=0; local 151 ret=UP_read(b->num,out,outl); 153 if (ret <= 0) 155 if (BIO_fd_should_retry(ret)) 159 return(ret); 164 int ret; local 178 long ret=1; local 231 int n,ret; local 240 int ret=0; local [all...] |
/barrelfish-master/lib/libc/string/ |
H A D | timingsafe_bcmp.c | 29 int ret = 0; local 32 ret |= *p1++ ^ *p2++; 33 return (ret != 0);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509type.c | 68 int ret=0,i; local 82 ret=EVP_PK_RSA|EVP_PKT_SIGN; 84 ret|=EVP_PKT_ENC; 87 ret=EVP_PK_DSA|EVP_PKT_SIGN; 90 ret=EVP_PK_EC|EVP_PKT_SIGN|EVP_PKT_EXCH; 93 ret=EVP_PK_DH|EVP_PKT_EXCH; 97 ret=EVP_PKT_EXCH|EVP_PKT_SIGN; 107 ret|=EVP_PKS_RSA; 110 ret|=EVP_PKS_DSA; 113 ret| [all...] |
/barrelfish-master/lib/openssl-1.0.0d/util/pl/ |
H A D | OS2-EMX.pl | 85 local($ret,$_,$Name); 91 $ret.="$target: \$(${Name}OBJ)\n"; 94 $ret.="\t\$(RM) $target\n"; 95 $ret.="\t\$(MKLIB) $target \$(${Name}OBJ)\n"; 96 $ret.="\t\$(RANLIB) $target\n\n"; 102 $ret.="\t\$(LINK) \$(SHLIB_CFLAGS) \$(MLFLAGS) $efile$target \$(SHLIB_EX_OBJ) \$(${Name}OBJ) $ex os2/${Name}.def\n"; 103 $ret.="\temximp -o $out_def/$name.a os2/${Name}.def\n"; 104 $ret.="\temximp -o $out_def/$name.lib os2/${Name}.def\n\n"; 111 local($ret,$_); 115 $ret [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ecdsa/ |
H A D | ecs_lib.c | 107 ECDSA_DATA *ret; local 109 ret=(ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA)); 110 if (ret == NULL) 116 ret->init = NULL; 118 ret->meth = ECDSA_get_default_method(); 119 ret->engine = engine; 121 if (!ret->engine) 122 ret->engine = ENGINE_get_default_ECDSA(); 123 if (ret->engine) 125 ret 203 int ret,i; local [all...] |
/barrelfish-master/lib/libc/gen/ |
H A D | sendmmsg.c | 41 ssize_t ret; local 45 ret = __sys_sendmsg(s, &msgvec[i].msg_hdr, flags); 46 if (ret == -1) { 56 return (ret); 60 msgvec[i].msg_len = ret;
|
/barrelfish-master/lib/libc/iconv/ |
H A D | citrus_lookup.h | 55 const char *ret; local 57 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case); 58 if (ret == NULL) 59 ret = key; 61 return (ret);
|
/barrelfish-master/lib/libc/inet/ |
H A D | inet_ntoa.c | 55 static char ret[18]; local 57 strcpy(ret, "[inet_ntoa error]"); 58 (void) inet_ntop(AF_INET, &in, ret, sizeof ret); 59 return (ret);
|
/barrelfish-master/lib/libc/locale/ |
H A D | rpmatch.c | 38 int ret; local 47 ret = 1; 49 ret = 0; 51 ret = -1; 54 return (ret);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dh_depr.c | 71 DH *ret=NULL; local 73 if((ret=DH_new()) == NULL) 78 if(DH_generate_parameters_ex(ret, prime_len, generator, &cb)) 79 return ret; 80 DH_free(ret);
|
/barrelfish-master/lib/posixcompat/ |
H A D | access.c | 20 int ret; local 32 ret = 0; 37 ret = -1; 41 ret = 0; 46 return ret;
|
/barrelfish-master/usr/monitor/ |
H A D | intermon_bindings.c | 36 errval_t intermon_binding_get(coreid_t coreid, struct intermon_binding **ret) argument 38 assert(ret != NULL); 42 *ret = NULL; 47 *ret = NULL; 51 *ret = bindings[coreid]->binding;
|