Searched refs:ret (Results 26 - 50 of 1164) sorted by relevance

1234567891011>>

/barrelfish-master/lib/libc/stdio/
H A Dwprintf.c43 int ret; local
47 ret = vfwprintf(stdout, fmt, ap);
50 return (ret);
55 int ret; local
59 ret = vfwprintf_l(stdout, locale, fmt, ap);
62 return (ret);
H A Ddprintf.c39 int ret; local
42 ret = vdprintf(fd, fmt, ap);
44 return (ret);
H A Dfeof.c50 int ret; local
53 ret= __sfeof(fp);
55 return (ret);
H A Dferror.c50 int ret; local
53 ret = __sferror(fp);
55 return (ret);
H A Dstdio.c89 int ret; local
91 ret = (*fp->_read)(fp->_cookie, buf, n);
92 if (ret > 0) {
94 if (fp->_offset <= OFF_MAX - ret)
95 fp->_offset += ret;
99 } else if (ret < 0)
101 return (ret);
107 int ret; local
117 ret = (*fp->_write)(fp->_cookie, buf, n);
119 if (ret >
134 fpos_t ret; local
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/
H A Ddsa_lib.c115 DSA *ret; local
117 ret=(DSA *)OPENSSL_malloc(sizeof(DSA));
118 if (ret == NULL)
123 ret->meth = DSA_get_default_method();
130 OPENSSL_free(ret);
133 ret->engine = engine;
136 ret->engine = ENGINE_get_default_DSA();
137 if(ret->engine)
139 ret->meth = ENGINE_get_DSA(ret
238 int ret,i; local
282 DH *ret = NULL; local
[all...]
H A Ddsa_prn.c68 int ret; local
76 ret=DSA_print(b,x,off);
78 return(ret);
84 int ret; local
92 ret=DSAparams_print(b, x);
94 return(ret);
101 int ret; local
105 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
107 return ret;
113 int ret; local
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dd2i_pu.c78 EVP_PKEY *ret; local
82 if ((ret=EVP_PKEY_new()) == NULL)
88 else ret= *a;
90 if (!EVP_PKEY_set_type(ret, type))
96 switch (EVP_PKEY_id(ret))
100 if ((ret->pkey.rsa=d2i_RSAPublicKey(NULL,
110 if (!d2i_DSAPublicKey(&(ret->pkey.dsa),
120 if (!o2i_ECPublicKey(&(ret->pkey.ec),
133 if (a != NULL) (*a)=ret;
134 return(ret);
[all...]
H A Dx_pkey.c79 M_ASN1_D2I_get_x(X509_ALGOR,ret->enc_algor,d2i_X509_ALGOR);
80 M_ASN1_D2I_get_x(ASN1_OCTET_STRING,ret->enc_pkey,d2i_ASN1_OCTET_STRING);
82 ret->cipher.cipher=EVP_get_cipherbyname(
83 OBJ_nid2ln(OBJ_obj2nid(ret->enc_algor->algorithm)));
84 if (ret->cipher.cipher == NULL)
90 if (ret->enc_algor->parameter->type == V_ASN1_OCTET_STRING)
92 i=ret->enc_algor->parameter->value.octet_string->length;
99 memcpy(ret->cipher.iv,
100 ret->enc_algor->parameter->value.octet_string->data,i);
103 memset(ret
109 X509_PKEY *ret=NULL; local
[all...]
H A Dd2i_pr.c74 EVP_PKEY *ret; local
78 if ((ret=EVP_PKEY_new()) == NULL)
86 ret= *a;
88 if (ret->engine)
90 ENGINE_finish(ret->engine);
91 ret->engine = NULL;
96 if (!EVP_PKEY_set_type(ret, type))
102 if (!ret->ameth->old_priv_decode ||
103 !ret->ameth->old_priv_decode(ret, p
152 EVP_PKEY *ret; local
[all...]
H A Da_int.c69 int neg, ret; local
80 ret = ASN1_STRING_cmp(x, y);
83 return -ret;
85 return ret;
116 int pad=0,ret,i,neg; local
122 ret=1;
125 ret=a->length;
146 ret+=pad;
148 if (pp == NULL) return(ret);
172 *pp+=ret;
181 ASN1_INTEGER *ret=NULL; local
274 ASN1_INTEGER *ret=NULL; local
406 ASN1_INTEGER *ret; local
448 BIGNUM *ret; local
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/
H A Dpcy_data.c88 X509_POLICY_DATA *ret; local
100 ret = OPENSSL_malloc(sizeof(X509_POLICY_DATA));
101 if (!ret)
103 ret->expected_policy_set = sk_ASN1_OBJECT_new_null();
104 if (!ret->expected_policy_set)
106 OPENSSL_free(ret);
113 ret->flags = POLICY_DATA_FLAG_CRITICAL;
115 ret->flags = 0;
118 ret->valid_policy = id;
121 ret
[all...]
/barrelfish-master/lib/libc/sys/
H A Dsigwait.c47 int ret; local
51 ret = __sys_sigwait(set, sig);
52 } while (ret == EINTR);
53 return (ret);
/barrelfish-master/lib/openssl-1.0.0d/crypto/bio/
H A Dbss_fd.c113 BIO *ret; local
114 ret=BIO_new(BIO_s_fd());
115 if (ret == NULL) return(NULL);
116 BIO_set_fd(ret,fd,close_flag);
117 return(ret);
146 int ret=0; local
151 ret=UP_read(b->num,out,outl);
153 if (ret <= 0)
155 if (BIO_fd_should_retry(ret))
159 return(ret);
164 int ret; local
178 long ret=1; local
231 int n,ret; local
240 int ret=0; local
[all...]
/barrelfish-master/lib/libc/string/
H A Dtimingsafe_bcmp.c29 int ret = 0; local
32 ret |= *p1++ ^ *p2++;
33 return (ret != 0);
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/
H A Dx509type.c68 int ret=0,i; local
82 ret=EVP_PK_RSA|EVP_PKT_SIGN;
84 ret|=EVP_PKT_ENC;
87 ret=EVP_PK_DSA|EVP_PKT_SIGN;
90 ret=EVP_PK_EC|EVP_PKT_SIGN|EVP_PKT_EXCH;
93 ret=EVP_PK_DH|EVP_PKT_EXCH;
97 ret=EVP_PKT_EXCH|EVP_PKT_SIGN;
107 ret|=EVP_PKS_RSA;
110 ret|=EVP_PKS_DSA;
113 ret|
[all...]
/barrelfish-master/lib/openssl-1.0.0d/util/pl/
H A DOS2-EMX.pl85 local($ret,$_,$Name);
91 $ret.="$target: \$(${Name}OBJ)\n";
94 $ret.="\t\$(RM) $target\n";
95 $ret.="\t\$(MKLIB) $target \$(${Name}OBJ)\n";
96 $ret.="\t\$(RANLIB) $target\n\n";
102 $ret.="\t\$(LINK) \$(SHLIB_CFLAGS) \$(MLFLAGS) $efile$target \$(SHLIB_EX_OBJ) \$(${Name}OBJ) $ex os2/${Name}.def\n";
103 $ret.="\temximp -o $out_def/$name.a os2/${Name}.def\n";
104 $ret.="\temximp -o $out_def/$name.lib os2/${Name}.def\n\n";
111 local($ret,$_);
115 $ret
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/ecdsa/
H A Decs_lib.c107 ECDSA_DATA *ret; local
109 ret=(ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA));
110 if (ret == NULL)
116 ret->init = NULL;
118 ret->meth = ECDSA_get_default_method();
119 ret->engine = engine;
121 if (!ret->engine)
122 ret->engine = ENGINE_get_default_ECDSA();
123 if (ret->engine)
125 ret
203 int ret,i; local
[all...]
/barrelfish-master/lib/libc/gen/
H A Dsendmmsg.c41 ssize_t ret; local
45 ret = __sys_sendmsg(s, &msgvec[i].msg_hdr, flags);
46 if (ret == -1) {
56 return (ret);
60 msgvec[i].msg_len = ret;
/barrelfish-master/lib/libc/iconv/
H A Dcitrus_lookup.h55 const char *ret; local
57 ret = _citrus_lookup_simple(path, key, buf, n, ignore_case);
58 if (ret == NULL)
59 ret = key;
61 return (ret);
/barrelfish-master/lib/libc/inet/
H A Dinet_ntoa.c55 static char ret[18]; local
57 strcpy(ret, "[inet_ntoa error]");
58 (void) inet_ntop(AF_INET, &in, ret, sizeof ret);
59 return (ret);
/barrelfish-master/lib/libc/locale/
H A Drpmatch.c38 int ret; local
47 ret = 1;
49 ret = 0;
51 ret = -1;
54 return (ret);
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/
H A Ddh_depr.c71 DH *ret=NULL; local
73 if((ret=DH_new()) == NULL)
78 if(DH_generate_parameters_ex(ret, prime_len, generator, &cb))
79 return ret;
80 DH_free(ret);
/barrelfish-master/lib/posixcompat/
H A Daccess.c20 int ret; local
32 ret = 0;
37 ret = -1;
41 ret = 0;
46 return ret;
/barrelfish-master/usr/monitor/
H A Dintermon_bindings.c36 errval_t intermon_binding_get(coreid_t coreid, struct intermon_binding **ret) argument
38 assert(ret != NULL);
42 *ret = NULL;
47 *ret = NULL;
51 *ret = bindings[coreid]->binding;

Completed in 226 milliseconds

1234567891011>>