/external/linux-tools-perf/util/ |
H A D | strfilter.c | 65 struct strfilter_node *ret = zalloc(sizeof(struct strfilter_node)); local 67 if (ret) { 68 ret->p = op; 69 ret->l = l; 70 ret->r = r; 73 return ret; 157 struct strfilter *ret = zalloc(sizeof(struct strfilter)); local 160 if (ret) 161 ret->root = strfilter_node__new(rules, &ep); 163 if (!ret || !re [all...] |
H A D | debug.c | 21 int ret = 0; local 26 ret = ui_helpline__show_help(fmt, args); 28 ret = vfprintf(stderr, fmt, args); 32 return ret; 38 int ret = 0; local 42 ret = vprintf(fmt, args); 46 return ret;
|
/external/openssl/crypto/asn1/ |
H A D | a_verify.c | 83 int ret= -1,i,inl; local 108 ret=0; 119 ret=0; 125 ret=1; 128 return(ret); 139 int ret= -1,inl; local 164 ret = pkey->ameth->item_verify(&ctx, it, asn, a, 170 if (ret != 2) 172 ret = -1; 194 ret [all...] |
/external/openssl/crypto/bn/ |
H A D | bn_recp.c | 73 BN_RECP_CTX *ret; local 75 if ((ret=(BN_RECP_CTX *)OPENSSL_malloc(sizeof(BN_RECP_CTX))) == NULL) 78 BN_RECP_CTX_init(ret); 79 ret->flags=BN_FLG_MALLOCED; 80 return(ret); 106 int ret=0; local 123 ret = BN_div_recp(NULL,r,ca,recp,ctx); 127 return(ret); 133 int i,j,ret=0; local 204 ret 219 int ret= -1; local [all...] |
H A D | bn_word.c | 66 BN_ULONG ret=0; local 68 BN_ULLONG ret=0; 80 ret=((ret<<BN_BITS4)|((a->d[i]>>BN_BITS4)&BN_MASK2l))%w; 81 ret=((ret<<BN_BITS4)|(a->d[i]&BN_MASK2l))%w; 83 ret=(BN_ULLONG)(((ret<<(BN_ULLONG)BN_BITS2)|a->d[i])% 87 return((BN_ULONG)ret); 92 BN_ULONG ret local [all...] |
H A D | bn_lcl.h | 243 register BN_ULONG ret; \ 245 : "=r"(ret) \ 247 ret; }) 252 register BN_ULONG ret; \ 254 : "=r"(ret) \ 256 ret; }) 262 register BN_ULONG ret,discard; \ 264 : "=a"(discard),"=d"(ret) \ 267 ret; }) 288 __uint128_t ret [all...] |
/external/oprofile/libutil++/ |
H A D | child_reader.cpp | 151 bool ret = !(end1 == 0 && end2 == 0); local 158 return ret; 168 bool ret = true; local 174 ret = block_read(); 207 bool ret = true; local 208 while (ret) { 209 ret = block_read(); 226 int ret; local 227 waitpid(pid, &ret, 0); 231 if (WIFEXITED(ret)) { [all...] |
/external/chromium/chrome/common/net/ |
H A D | x509_certificate_model.cc | 60 std::string ret; local 62 ret.reserve(std::max(kMin, data_length * 3 - 1)); 66 ret.push_back(kHexChars[(b >> 4) & 0xf]); 67 ret.push_back(kHexChars[b & 0xf]); 70 ret.push_back(line_separator); 72 ret.push_back(hex_separator); 75 return ret;
|
/external/openssl/crypto/mdc2/ |
H A D | mdc2test.c | 95 int ret=0; local 118 ret=1; 137 ret=1; 144 if (ret) printf("ERROR: %d\n", ret); 146 EXIT(ret); 147 return(ret);
|
/external/valgrind/main/none/tests/ |
H A D | thread-exits.c | 67 int ret; local 72 ret = pthread_create(&t, NULL, thr, NULL); 73 if (ret) { 74 printf("pthread_create failed: %s\n", strerror(ret)); 78 ret = pthread_join(t, NULL); 79 if (ret) { 80 printf("pthread_join failed: %s\n", strerror(ret));
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
H A D | string-fasta.js | 49 ret = seq.substring(seqi, seqi+lenOut); 54 ret = s + seq.substring(0, seqi); 74 ret = line.join(''); 79 var ret; variable 82 ret = fastaRepeat(2*count*100000, ALU); 83 ret = fastaRandom(3*count*1000, IUB); 84 ret = fastaRandom(5*count*1000, HomoSap);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
H A D | string-fasta.js | 49 ret = seq.substring(seqi, seqi+lenOut); 54 ret = s + seq.substring(0, seqi); 74 ret = line.join(''); 79 var ret; variable 82 ret = fastaRepeat(2*count*100000, ALU); 83 ret = fastaRandom(3*count*1000, IUB); 84 ret = fastaRandom(5*count*1000, HomoSap);
|
/external/openssl/crypto/ |
H A D | mem_dbg.c | 218 int ret=mh_mode; local 283 return(ret); 288 int ret = 0; local 296 ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE) 301 return(ret); 331 unsigned long ret; local 333 ret=(unsigned long)a->addr; 335 ret=ret*17851+(ret>>1 350 unsigned long ret; local 362 APP_INFO *ret = NULL; local 400 int ret=0; local 450 int ret=0; local 465 int ret=0; local [all...] |
/external/openssl/ssl/ |
H A D | t1_lib.c | 366 unsigned char *ret = p; local 373 ret+=2; 375 if (ret>=limit) return NULL; /* this really never occurs, but ... */ 391 if ((lenmax = limit - ret - 9) < 0 396 s2n(TLSEXT_TYPE_server_name,ret); 397 s2n(size_str+5,ret); 400 s2n(size_str+3,ret); 403 *(ret++) = (unsigned char) TLSEXT_NAMETYPE_host_name; 404 s2n(size_str,ret); 405 memcpy(ret, 553 s2n(sizeof(tls12_sigalgs), ret); local 693 unsigned char *ret = p; local 1804 int ret=SSL_TLSEXT_ERR_NOACK; local 1899 int ret = SSL_TLSEXT_ERR_OK; local 1964 int ret=SSL_TLSEXT_ERR_NOACK; local 2107 tls1_process_ticket(SSL *s, unsigned char *session_id, int len, const unsigned char *limit, SSL_SESSION **ret) argument 2580 int ret; local [all...] |
H A D | ssl_rsa.c | 89 int ret=0; local 126 ret=SSL_use_certificate(ssl,x); 130 return(ret); 137 int ret; local 146 ret=SSL_use_certificate(ssl,x); 148 return(ret); 155 int ret; local 176 ret=ssl_set_pkey(ssl->cert,pkey); 178 return(ret); 231 int j,ret local 278 int ret; local 297 int ret; local 316 int j,ret=0; local 363 int ret; local 458 int ret=0; local 506 int ret; local 523 int ret; local 553 int j,ret=0; local 600 int ret; local 635 int j,ret=0; local 683 int ret; local 744 int ret=0; local [all...] |
/external/openssl/crypto/bio/ |
H A D | bss_dgram.c | 211 BIO *ret; local 213 ret=BIO_new(BIO_s_datagram()); 214 if (ret == NULL) return(NULL); 215 BIO_set_fd(ret,fd,close_flag); 216 return(ret); 364 int ret=0; local 389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 396 if ( ! data->connected && ret >= 0) 400 if (ret < 0) 402 if (BIO_dgram_should_retry(ret)) 416 int ret; local 459 long ret=1; local 859 int n,ret; local 875 int ret, optval = 20000; local 993 int ret; local 1010 int ret = 0, n = 0, i, optval; local 1224 int ret; local 1332 long ret=1; local 1552 int n, sockflags, ret; local 1762 int n,ret; local [all...] |
H A D | bss_bio.c | 505 long ret; local 518 ret = 0; 523 ret = 0; 538 ret = 1; 543 ret = (long) b->size; 551 ret = 1; 553 ret = 0; 561 ret = 1; 568 ret = 0; 570 ret 794 int ret = 0; local 862 long ret; local 879 int ret; local 895 long ret; local 912 int ret; local [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_sock_util.c | 75 int ret; local 78 do ret = send(sock_fd, buf, s, 0); 79 while(ret < 0 && errno == EINTR); 80 if(ret <= 0) 82 BTIF_TRACE_ERROR3("sock fd:%d send errno:%d, ret:%d", sock_fd, errno, ret); 85 buf += ret; 86 s -= ret; 93 int ret = -1; local 96 do ret 111 ssize_t ret; local [all...] |
/external/openssl/crypto/dsa/ |
H A D | dsa_gen.c | 88 int DSA_generate_parameters_ex(DSA *ret, int bits, argument 93 if (FIPS_mode() && !(ret->meth->flags & DSA_FLAG_FIPS_METHOD) 94 && !(ret->flags & DSA_FLAG_NON_FIPS_ALLOW)) 100 if(ret->meth->dsa_paramgen) 101 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, 106 return FIPS_dsa_generate_parameters_ex(ret, bits, 127 return dsa_builtin_paramgen(ret, bits, qbits, evpmd, 132 int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits, argument 347 if(ret [all...] |
/external/qemu/android/ |
H A D | sync-utils.c | 174 int ret; local 181 ret = iolooper_wait_absolute(ssocket->iolooper, deadline); 182 if (ret > 0) { 188 ret = socket_recv(ssocket->fd, buf, size); 189 } while( ret < 0 && errno == EINTR); 190 } else if (ret == 0) { 193 ret = -1; 195 return ret; 210 int ret; local 219 ret 267 int ret = syncsocket_read_absolute(ssocket, &ch, 1, deadline); local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ctrl_iface_ap.c | 28 int len = 0, ret; local 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", 38 if (ret < 0 || (size_t) ret >= buflen - len) 40 len += ret; 50 int len, res, ret; local 53 ret = os_snprintf(buf, buflen, "FAIL\n"); 54 if (ret < 0 || (size_t) ret >= buflen) 56 return ret; 102 int ret; local 120 int ret; local 138 int ret; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ctrl_iface_ap.c | 28 int len = 0, ret; local 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", 38 if (ret < 0 || (size_t) ret >= buflen - len) 40 len += ret; 50 int len, res, ret; local 53 ret = os_snprintf(buf, buflen, "FAIL\n"); 54 if (ret < 0 || (size_t) ret >= buflen) 56 return ret; 102 int ret; local 120 int ret; local 138 int ret; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ctrl_iface_ap.c | 28 int len = 0, ret; local 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", 38 if (ret < 0 || (size_t) ret >= buflen - len) 40 len += ret; 50 int len, res, ret; local 53 ret = os_snprintf(buf, buflen, "FAIL\n"); 54 if (ret < 0 || (size_t) ret >= buflen) 56 return ret; 102 int ret; local 120 int ret; local 138 int ret; local [all...] |
/external/qemu/block/ |
H A D | qcow2-cluster.c | 34 int new_l1_size, new_l1_size2, ret, i; local 67 ret = bdrv_pwrite_sync(bs->file, new_l1_table_offset, new_l1_table, new_l1_size2); 68 if (ret < 0) 77 ret = bdrv_pwrite_sync(bs->file, offsetof(QCowHeader, l1_size), data,sizeof(data)); 78 if (ret < 0) { 90 return ret; 165 int ret; local 180 ret = bdrv_pread(bs->file, l2_offset, *l2_table, 182 if (ret < 0) { 183 return ret; 202 int i, ret; local 236 int ret; local 349 int ret, index_in_cluster, n, n1; local 400 int n, ret; local 449 int ret; local 539 int ret; local 600 int l2_index, ret; local 655 int ret; local 670 int i, j = 0, l2_index, ret; local 754 int l2_index, ret; local 877 int ret, out_len; local 903 int ret, csize, nb_csectors, sector_offset; local [all...] |
/external/qemu/target-i386/ |
H A D | hax-all.c | 129 int ret; local 132 ret = hax_capability(hax, cap); 133 if (ret) 160 int ret; local 163 ret = hax_mod_version(hax, &version); 164 if (ret < 0) 177 int ret; local 200 ret = hax_host_create_vcpu(hax_global.vm->fd, id); 201 if (ret) 211 ret 261 int ret; local 279 int vm_id = 0, ret; local 344 int ret; local 525 int ret = 0; local 628 int next = 0, ret = 0; local 827 int ret; local 890 int ret, i, n; local 944 int i, ret; local 988 int ret; local 1007 int ret; local 1056 int ret; local [all...] |