/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/ |
H A D | cuFileIo.c | 39 int rtn; local 46 rtn = (int)lseek(fd, 0, SEEK_SET); 47 if(rtn < 0) { 50 rtn = (int)write(fd, bytes, (size_t)numBytes); 51 if(rtn != (int)numBytes) { 52 if(rtn >= 0) { 55 rtn = EIO; 58 rtn = 0; 61 return rtn; 72 int rtn; local [all...] |
H A D | cuOidParser.cpp | 57 int rtn; local 69 rtn = fstat(fd, &sb); 70 if(rtn) { 76 rtn = ENOMEM; 79 rtn = (int)lseek(fd, 0, SEEK_SET); 80 if(rtn < 0) { 83 rtn = (int)read(fd, buf, (size_t)size); 84 if(rtn != (int)size) { 85 if(rtn >= 0) { 88 rtn 108 int rtn; local [all...] |
H A D | cuTimeStr.cpp | 239 char *rtn; local 245 rtn = (char *)malloc(CSSM_TIME_STRLEN + 1); 246 rtn[0] = '\0'; 265 strcpy(rtn, "20"); 268 free(rtn); 273 strcpy(rtn, "19"); 275 memmove(rtn + 2, inStr, len - 1); // don't copy the Z 279 memmove(rtn, inStr, len); // trivial case 282 memmove(rtn, inStr, len - 1); // don't copy the Z 286 free(rtn); [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/ |
H A D | cuFileIo.c | 39 int rtn; local 46 rtn = (int)lseek(fd, 0, SEEK_SET); 47 if(rtn < 0) { 50 rtn = (int)write(fd, bytes, (size_t)numBytes); 51 if(rtn != (int)numBytes) { 52 if(rtn >= 0) { 55 rtn = EIO; 58 rtn = 0; 61 return rtn; 72 int rtn; local [all...] |
H A D | cuOidParser.cpp | 57 int rtn; local 69 rtn = fstat(fd, &sb); 70 if(rtn) { 76 rtn = ENOMEM; 79 rtn = (int)lseek(fd, 0, SEEK_SET); 80 if(rtn < 0) { 83 rtn = (int)read(fd, buf, (size_t)size); 84 if(rtn != (int)size) { 85 if(rtn >= 0) { 88 rtn 108 int rtn; local [all...] |
H A D | cuTimeStr.cpp | 239 char *rtn; local 245 rtn = (char *)malloc(CSSM_TIME_STRLEN + 1); 246 rtn[0] = '\0'; 265 strcpy(rtn, "20"); 268 free(rtn); 273 strcpy(rtn, "19"); 275 memmove(rtn + 2, inStr, len - 1); // don't copy the Z 279 memmove(rtn, inStr, len); // trivial case 282 memmove(rtn, inStr, len - 1); // don't copy the Z 286 free(rtn); [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/ |
H A D | fileIo.c | 42 int rtn; local 49 rtn = lseek(fd, 0, SEEK_SET); 50 if(rtn < 0) { 53 rtn = write(fd, bytes, (size_t)numBytes); 54 if(rtn != (int)numBytes) { 55 if(rtn >= 0) { 58 rtn = EIO; 61 rtn = 0; 64 return rtn; 75 int rtn; local [all...] |
H A D | ioSock.c | 208 int rtn = fcntl(sock, F_SETFL, O_NONBLOCK); local 209 if(rtn == -1) { 270 int rtn = fcntl(sock, F_SETFL, O_NONBLOCK); local 271 if(rtn == -1) { 278 int rtn = listen(sock, 1); local 279 switch(rtn) { 282 rtn = errSecSuccess; 288 rtn = errSecIO; 291 return rtn; 367 OSStatus rtn local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/libDER/libDERUtils/ |
H A D | fileIo.c | 19 int rtn; local 26 rtn = (int)write(fd, bytes, (size_t)numBytes); 27 if(rtn != (int)numBytes) { 28 if(rtn >= 0) { 31 rtn = EIO; 34 rtn = 0; 37 return rtn; 48 int rtn; local 60 rtn = fstat(fd, &sb); 61 if(rtn) { [all...] |
H A D | libDERUtils.h | 23 DERReturn rtn);
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | TrustSettingsUtils.cpp | 59 int rtn; local 70 rtn = fstat(fd, &sb); 71 if(rtn) { 77 rtn = ENOMEM; 80 rtn = (int)lseek(fd, 0, SEEK_SET); 81 if(rtn < 0) { 84 rtn = (int)read(fd, fileData.Data, (size_t)size); 85 if(rtn != (int)size) { 86 rtn = EIO; 89 rtn [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | TrustSettingsUtils.cpp | 59 int rtn; local 70 rtn = fstat(fd, &sb); 71 if(rtn) { 77 rtn = ENOMEM; 80 rtn = (int)lseek(fd, 0, SEEK_SET); 81 if(rtn < 0) { 84 rtn = (int)read(fd, fileData.Data, (size_t)size); 85 if(rtn != (int)size) { 86 rtn = EIO; 89 rtn [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | TrustSettingsUtils.cpp | 59 int rtn; local 70 rtn = fstat(fd, &sb); 71 if(rtn) { 77 rtn = ENOMEM; 80 rtn = (int)lseek(fd, 0, SEEK_SET); 81 if(rtn < 0) { 84 rtn = (int)read(fd, fileData.Data, (size_t)size); 85 if(rtn != (int)size) { 86 rtn = EIO; 89 rtn [all...] |
/macosx-10.9.5/Security-55471.14.18/utilities/src/ |
H A D | fileIo.c | 20 int rtn; local 39 rtn = EIO; 42 rtn = 0; 45 return rtn; 56 int rtn; local 69 rtn = fstat(fd, &sb); 70 if(rtn) { 74 rtn = EFBIG; 80 rtn = ENOMEM; 85 if(rtn > [all...] |
/macosx-10.9.5/Security-55471.14.18/utilities/utilities/ |
H A D | fileIo.c | 20 int rtn; local 39 rtn = EIO; 42 rtn = 0; 45 return rtn; 56 int rtn; local 69 rtn = fstat(fd, &sb); 70 if(rtn) { 74 rtn = EFBIG; 80 rtn = ENOMEM; 85 if(rtn > [all...] |
/macosx-10.9.5/SecurityTool-55115/ |
H A D | trust_settings_impexp.c | 44 int rtn; local 77 rtn = writeFile(settingsFile, CFDataGetBytePtr(settings), len); 78 if(rtn) { 79 fprintf(stderr, "Error (%d) writing %s.\n", rtn, settingsFile); 85 return rtn; 99 int rtn; local 120 rtn = readFile(settingsFile, &settingsData, &settingsLen); 121 if(rtn) { 122 fprintf(stderr, "Error (%d) reading %s.\n", rtn, settingsFile); 131 rtn [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_cryptkit/ |
H A D | falloc.c | 54 void *rtn; local 56 rtn = (mallocExt)(size); 59 rtn = malloc(size); 62 if(rtn == mallocWatchAddrs) { 67 return rtn; 73 void *rtn = fmalloc(origDataLen); local 75 bcopy(origData, rtn, origDataLen); 76 return rtn;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cryptkit/lib/ |
H A D | falloc.c | 54 void *rtn; local 56 rtn = (mallocExt)(size); 59 rtn = malloc(size); 62 if(rtn == mallocWatchAddrs) { 67 return rtn; 73 void *rtn = fmalloc(origDataLen); local 75 bcopy(origData, rtn, origDataLen); 76 return rtn;
|
/macosx-10.9.5/SecurityTokend-55107/lib/ |
H A D | tdclient.cpp | 41 ClientSession::ClientSession(Allocator &std, Allocator &rtn) argument 42 : ClientCommon(std, rtn)
|
/macosx-10.9.5/SecurityTokend-55107/security_tokend_client/ |
H A D | tdclient.cpp | 41 ClientSession::ClientSession(Allocator &std, Allocator &rtn) argument 42 : ClientCommon(std, rtn)
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cryptkit/ckutils/blobtest/ |
H A D | blobtest.c | 139 unsigned char *rtn; local 144 rtn = fmalloc(passwdLength); 145 bcopy(passwdPool, rtn, passwdLength); 146 return rtn; 160 unsigned rtn = 0; local 192 rtn = 1; 203 rtn = 1; 215 rtn = 1; 220 rtn = 1; 231 rtn [all...] |
/macosx-10.9.5/xnu-2422.115.4/iokit/Kernel/ |
H A D | IOCommandQueue.cpp | 206 kern_return_t rtn = KERN_SUCCESS; local 214 rtn = semaphore_wait(producerSema); 215 while( (KERN_SUCCESS != rtn) 216 && (KERN_OPERATION_TIMED_OUT != rtn) 217 && (KERN_SEMAPHORE_DESTROYED != rtn) 218 && (KERN_TERMINATED != rtn) 221 rtn = semaphore_timedwait(producerSema, MACH_TIMESPEC_ZERO); 223 if (KERN_SUCCESS != rtn) 224 return rtn; 252 return rtn; 259 kern_return_t rtn; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | DH_exchange.cpp | 85 int rtn = DH_compute_key(buf, pubKeyBn, privKey); local 86 if(rtn > 0) { 96 assert((uint32)rtn <= privSize); 98 if((uint32)rtn < toMove) { 99 toMove = (uint32)rtn; 114 if(rtn <= 0) {
|
/macosx-10.9.5/AppleUSBCDCDriver-4201.2.5/AppleUSBCDCACM/ControlDriver/Classes/ |
H A D | AppleUSBCDCACMControl.cpp | 406 IOReturn rtn; local 439 rtn = kIOReturnSuccess; 440 fCDCDriver = findCDCDriverAC(this, &rtn); 446 if (rtn == kIOReturnNotReady) 742 IOReturn rtn = kIOReturnSuccess; local 752 rtn = fCommPipe->Read(fCommPipeMDP, &fCommCompletionInfo, NULL); 753 if (rtn == kIOReturnSuccess) 762 XTRACE(this, 0, rtn, "dataAcquired - Reading the interrupt pipe failed"); 1025 IOReturn rtn = kIOReturnSuccess; local 1031 rtn 1198 IOReturn rtn = kIOReturnSuccess; local 1284 IOReturn rtn; local [all...] |
/macosx-10.9.5/IOSerialFamily-64.1.1/IOSerialFamily.kmodproj/ |
H A D | IOSerialBSDClient.cpp | 1502 IOReturn rtn = me->sessionExecuteEvent(sp, PD_E_DATA_RATE, speed << 1); 1503 debug(CONTROL, "IOSSIOSPEED_32 session execute return: 0x%x", rtn); 1504 if (kIOReturnSuccess != rtn) { 1505 error = (kIOReturnBadArgument == rtn)? EINVAL : EDEVERR; 1539 IOReturn rtn; 1563 rtn = me->sessionSetState(sp, PD_S_TX_EVENT, PD_S_TX_EVENT); 1564 assert(!rtn || rtn == kIOReturnOffline || rtn == kIOReturnNotOpen); 1623 IOReturn rtn [all...] |