/barrelfish-master/lib/openssl-1.0.0d/crypto/ui/ |
H A D | ui_util.c | 71 int ok = 0; local 80 ok = UI_add_input_string(ui,prompt,0,buf,0,size-1); 81 if (ok >= 0 && verify) 82 ok = UI_add_verify_string(ui,prompt,0,buff,0,size-1, 84 if (ok >= 0) 85 ok=UI_process(ui); 88 if (ok > 0) 89 ok = 0; 90 return(ok);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/des/ |
H A D | read2pwd.c | 119 int ok; local 122 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 126 return(ok); 132 int ok; local 135 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 139 return(ok);
|
/barrelfish-master/lib/openssl-1.0.0d/demos/tunala/ |
H A D | cb.c | 61 int cb_ssl_verify(int ok, X509_STORE_CTX *ctx) argument 70 return ok; 98 if((cb_ssl_verify_level == 1) && ok) 99 return ok; 106 return ok; 109 if(!ok) 112 fprintf(fp_cb_ssl_verify, "--> verify return:%d\n",ok); 113 return ok; 138 int ok = 1; local 140 ok [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dh_check.c | 75 int ok=0; local 115 ok=1; 119 return(ok); 124 int ok=0; local 138 ok = 1; 141 return(ok);
|
H A D | dh_gen.c | 106 int g,ok= -1; local 161 ok=1; 163 if (ok == -1) 166 ok=0; 174 return ok;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_vfy.c | 111 static int null_callback(int ok,X509_STORE_CTX *e); 141 static int null_callback(int ok, X509_STORE_CTX *e) argument 143 return ok; 159 int depth,i,ok=0; local 255 ok = ctx->get_issuer(&xtmp, ctx, x); 256 if ((ok <= 0) || X509_cmp(x, xtmp)) 261 if (ok == 1) X509_free(xtmp); 263 ok=cb(0,ctx); 264 if (!ok) goto end; 297 ok 676 int i, last, ok; local 701 int ok, cnum; local 1299 int ok; local 1346 int ok = 0, chnum, cnum; local 1451 int ok; local 1582 int ok=0,n; local [all...] |
H A D | by_file.c | 95 int ok=0; local 105 ok = (X509_load_cert_crl_file(ctx,file, 109 ok = (X509_load_cert_crl_file(ctx,X509_get_default_cert_file(), 112 if (!ok) 120 ok = (X509_load_cert_crl_file(ctx,argp, 123 ok = (X509_load_cert_file(ctx,argp,(int)argl) != 0); 127 return(ok);
|
/barrelfish-master/lib/openssl-1.0.0d/util/ |
H A D | selftest.pl | 18 my $ok=0; 154 $ok=1; 157 if ($ok and open(IN,"<maketest.log")) { 159 $ok=2 if /^platform: $platform/; 164 if ($ok != 2) {
|
/barrelfish-master/lib/libc/amd64/sys/ |
H A D | brk.S | 45 jmp ok 57 jbe ok 63 ok: label
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p_verify.c | 70 int i,ok=0,v; local 101 ok=1; 105 if (!ok)
|
H A D | p_sign.c | 83 int i,ok=0,v; local 119 ok=1; 123 if (!ok)
|
/barrelfish-master/usr/tests/msun/ |
H A D | fmaxmin_test.c | 55 ok = 0; \ 60 ok = 0; \ 67 int ok; local 71 ok = 1; 86 return (ok);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | dec.c | 67 int verify_callback(int ok, X509_STORE_CTX *ctx); 200 int verify_callback(int ok, X509_STORE_CTX *ctx) argument 212 if (!ok) 218 ok=1; 223 ok=0; 246 BIO_printf(bio_err,"verify return:%d\n",ok); 247 return(ok);
|
H A D | verify.c | 67 int verify_callback(int ok, X509_STORE_CTX *ctx); 215 int verify_callback(int ok, X509_STORE_CTX *ctx) argument 227 if (!ok) 233 ok=1; 238 ok=0; 261 BIO_printf(bio_err,"verify return:%d\n",ok); 262 return(ok);
|
/barrelfish-master/lib/openssl-1.0.0d/demos/ |
H A D | spkigen.c | 37 int ok=0,i; local 80 ok=1; 82 if (!ok) 89 exit(!ok); 122 int ok=0; local 156 ok=1; 159 return(ok);
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_eng.c | 159 int ok =1 ; local 176 ok =0; 179 return ok; 185 int ok = 1; local 202 ok = 0; 205 return ok;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsa_key.c | 78 int ok=0; local 120 ok=1; 126 return(ok);
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | verify.c | 72 static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx); 299 static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx) argument 304 if (!ok) 325 * ok if they are self signed. But we should still warn 338 ok = 1; 342 return ok; 345 if (cert_error == X509_V_OK && ok == 2) 349 return(ok);
|
/barrelfish-master/usr/eclipseclp/lib_tcl/ |
H A D | tkmulti.tcl | 113 tk_messageBox -icon error -type ok -message "peer_multitask error ($peername): Told to start multitasking during multitasking." 146 tk_messageBox -type ok -icon error -message "peer_multitask error ($peername): Trying to multitask while not multitasking." 167 tk_messageBox -icon error -type ok -message "peer_multitask error ($peername): unknown multitasking state message from ECLiPSe: $state."
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssltest.c | 217 static int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx); 1380 fprintf(stderr, " ok.\n"); 1543 /* ok */ 1732 static int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx) argument 1740 if (ok) 1750 if (ok == 0) 1760 ok=1; 1764 if (ok == 1) 1865 return(ok); 1894 int ok local 1972 int ok; local 2038 int ok; local 2108 int ok=1; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | ssltest.c | 217 static int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx); 1380 fprintf(stderr, " ok.\n"); 1543 /* ok */ 1732 static int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx) argument 1740 if (ok) 1750 if (ok == 0) 1760 ok=1; 1764 if (ok == 1) 1865 return(ok); 1894 int ok local 1972 int ok; local 2038 int ok; local 2108 int ok=1; local [all...] |
/barrelfish-master/lib/libc/stdio/ |
H A D | fgetws.c | 67 goto ok; 114 ok:
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_gen.c | 90 int bitsp,bitsq,ok= -1,n=0; local 143 ok = 0; /* we set our own err */ 204 ok=1; 206 if (ok == -1) 209 ok=0; 217 return ok;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_prn.c | 115 int ok = 1; local 127 ok = 0; 148 ok = 0; 154 if(!method->i2r(method, ext_str, out, indent)) ok = 0; 155 } else ok = 0; 162 return ok;
|
/barrelfish-master/lib/skb/ |
H A D | skb_sscanf.c | 459 * Switch on the character; `goto ok' 485 goto ok; 492 goto ok; 494 /* digits 8 and 9 ok iff decimal or hex */ 500 goto ok; 502 /* letters ok iff hex */ 511 goto ok; 513 /* sign ok only as first character */ 517 goto ok; 521 /* x ok if [all...] |