/freebsd-11-stable/usr.bin/grep/ |
H A D | util.c | 137 bool matched, ok; local 184 ok = true; 186 ok &= file_matching(p->fts_path); 188 if (ok && procfile(p->fts_path))
|
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius_client.c | 1338 int ok = 0; local 1348 ok++; 1357 ok++; 1360 if (ok == 0) 1394 int ok = 0; local 1404 ok++; 1413 ok++; 1416 if (ok == 0)
|
/freebsd-11-stable/sys/dev/dcons/ |
H A D | dcons_os.c | 334 goto ok; 359 ok:
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/ObjectFile/ELF/ |
H A D | ELFHeader.cpp | 101 bool ok = section_zero.Parse(sh_data, &offset); local 104 if (ok) {
|
/freebsd-11-stable/contrib/unbound/contrib/ |
H A D | warmup.sh | 83 ok.ru
|
/freebsd-11-stable/contrib/ntp/libparse/ |
H A D | parsesolaris.c | 368 * ok guys - beat it 476 register int ok = 1; local 554 ok = parse_timecode(dct, &parse->parse_io); 559 ok = parse_setfmt(dct, &parse->parse_io); 564 ok = parse_getfmt(dct, &parse->parse_io); 569 ok = parse_setcs(dct, &parse->parse_io); 572 mp->b_datap->db_type = ok ? M_IOCACK : M_IOCNAK; 1024 * ok - now the hard part - find ourself
|
H A D | parsestreams.c | 521 * ok guys - beat it 634 register int ok = 1; local 711 ok = parse_timecode(dct, &parse->parse_io); 716 ok = parse_setfmt(dct, &parse->parse_io); 721 ok = parse_getfmt(dct, &parse->parse_io); 726 ok = parse_setcs(dct, &parse->parse_io); 729 mp->b_datap->db_type = ok ? M_IOCACK : M_IOCNAK; 1190 * ok - now the hard part - find ourself
|
/freebsd-11-stable/contrib/ntp/sntp/libevent/ |
H A D | listener.c | 463 ev_ssize_t n, int ok); 663 accepted_socket_cb(struct event_overlapped *o, ev_uintptr_t key, ev_ssize_t n, int ok) argument 670 if (ok) { 686 BOOL ok; local 689 ok = WSAGetOverlappedResult(as->s, &o->overlapped, 691 if (ok) {
|
/freebsd-11-stable/crypto/heimdal/lib/asn1/ |
H A D | check-gen.c | 709 int ok; member in struct:test_data 744 if (td[i].ok) { 749 if (td[i].ok == 0) { 1098 "missing one byte from the end, internal length ok"}, 1176 #define test_seq_of(type, ok, ptr) \ 1189 if (ok) \ 1193 if (!ok) \
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | glob.c | 902 int ok, negate_range; local 926 ok = 0; 936 ok = 1; 941 ok = 1; 944 ok = 1; 946 if (ok == negate_range)
|
/freebsd-11-stable/crypto/openssh/ |
H A D | auth2-pubkey.c | 640 int r, ok, found_principal = 0; local 732 ok = process_principals(f, NULL, pw, cert); 741 found_principal = ok; 971 int r, ok, found_key = 0; local 1061 ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); 1070 found_key = ok;
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_clnt.c | 904 int i, al = SSL_AD_INTERNAL_ERROR, ok; local 919 SSL3_ST_CR_SRVR_HELLO_B, -1, 20000, &ok); 921 if (!ok) 1179 int al, i, ok, ret = -1; local 1193 -1, s->max_cert_list, &ok); 1195 if (!ok) 1382 int al, j, ok; local 1409 -1, s->max_cert_list, &ok); 1410 if (!ok) 2085 int ok, re local 2283 int ok, al, ret = 0, ticklen; local 2391 int ok, al; local 2460 int ok, ret = 0; local 3708 int ok = 0; local [all...] |
H A D | d1_clnt.c | 826 int n, al, ok = 0; local 834 -1, s->max_cert_list, &ok); 837 if (!ok)
|
/freebsd-11-stable/stand/libsa/ |
H A D | dosfs.c | 588 int err, ok; local 630 if ((ok = xdn == 1)) { 632 ok = chk == x && 635 if (!ok) { 637 ok = !strcasecmp(name, (const char *)sfn); 639 if (ok) {
|
/freebsd-11-stable/sys/contrib/ipfilter/netinet/ |
H A D | ip_ftp_pxy.c | 1293 int mlen, len, off, inc, i, sel, sel2, ok, ackoff, seqoff, retry; local 1380 ok = 0; 1383 ok = 1; 1387 ok = 1; 1390 ok = 1; 1395 ok = 1; 1398 ok = 1; 1401 ok = 1; 1404 ok = 1; 1410 if (!ok) [all...] |
/freebsd-11-stable/contrib/byacc/ |
H A D | output.c | 813 int ok; local 833 ok = 1; 834 for (k = 0; ok && k < t; k++) 864 ok = 0; 866 for (k = 0; ok && k < vector; k++) 869 ok = 0; 871 if (ok)
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | dpp_hostapd.c | 123 const u8 *data, size_t data_len, int ok) 127 wpa_printf(MSG_DEBUG, "DPP: TX status: dst=" MACSTR " ok=%d", 128 MAC2STR(dst), ok); 130 " result=%s", MAC2STR(dst), ok ? "SUCCESS" : "FAILED"); 165 if (!is_broadcast_ether_addr(dst) && !ok) { 181 if (!is_broadcast_ether_addr(dst) && auth->waiting_auth_resp && ok) { 1459 void hostapd_dpp_gas_status_handler(struct hostapd_data *hapd, int ok) argument 1466 wpa_printf(MSG_DEBUG, "DPP: Configuration exchange completed (ok=%d)", 1467 ok); 1471 if (ok 122 hostapd_dpp_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t data_len, int ok) argument [all...] |
/freebsd-11-stable/lib/libc/gen/ |
H A D | glob.c | 912 int ok, negate_range; local 933 ok = 0; 947 ok = 1; 950 ok = 1; 951 if (ok == negate_range)
|
/freebsd-11-stable/contrib/tcsh/ |
H A D | tc.os.c | 1464 if (st.all != status_$ok) 1545 if (st.all != status_$ok) 1549 if (st.all != status_$ok) 1570 st.all = status_$ok; 1577 if (st.all != status_$ok)
|
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | crypt_blowfish.c | 824 int save_errno, ok; local 849 ok = (p == buf.o && 861 ok = ok && ai[0] == 0xdb9c59bc && ye[17] == 0x33343500 && 867 if (ok)
|
/freebsd-11-stable/contrib/binutils/ |
H A D | configure | 5433 # We have a compiler and we are in a native configuration, bootstrap is ok 10762 ok=yes 10765 *) ok=no ;; 10768 if test $ok = yes; then 10804 ok=yes 10807 *) ok=no ;; 10810 if test $ok = yes; then 10846 ok=yes 10849 *) ok=no ;; 10852 if test $ok [all...] |
/freebsd-11-stable/sys/rpc/ |
H A D | clnt_bck.c | 200 bool_t ok; local 406 ok = xdr_replymsg(&xdrs, &reply_msg); 409 if (ok) {
|
/freebsd-11-stable/crypto/openssl/crypto/objects/ |
H A D | obj_dat.c | 783 int ok = 0; local 802 ok = OBJ_add_object(op); 806 return (ok);
|
/freebsd-11-stable/crypto/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 289 BIO_printf(out, " ok\n"); 387 int ok = 0; local 408 ok = 1; 414 if (ok) 465 BIO_puts(out, " ok\n");
|
/freebsd-11-stable/contrib/expat/lib/ |
H A D | siphash.h | 386 const int ok = sip24_valid(); local 388 if (ok) 393 return ! ok;
|