| /src/sys/rump/net/lib/libvirtif/ |
| virtif_user.c | 133 int prv; local 143 prv = poll(pfd, 2, -1); 144 if (prv == 0) 146 if (prv == -1) {
|
| /src/sys/rump/net/lib/libwg/ |
| wg_user.c | 125 int prv; local 141 prv = poll(pfd, 4, -1); 142 if (prv == 0) 144 if (prv == -1) {
|
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| simple_exec_w32.c | 92 DWORD prv = 0; local 94 GetExitCodeProcess(hProcess, &prv); 95 rv = (int) prv;
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| mlx_kmgmt.c | 189 void *prv = sub_arg->prvenc + sub_arg->prvoff; local 191 if (OSSL_PARAM_get_octet_string(p, &prv, sub_arg->prvlen, &len) != 1) 492 OSSL_PARAM *p, *pub, *prv = NULL; local 538 prv = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_PRIV_KEY); 539 if (prv != NULL) { 540 if (prv->data_type != OSSL_PARAM_OCTET_STRING) 542 prv->return_size = prvlen; 543 if (prv->data == NULL) { 544 prv = NULL; 545 } else if (prv->data_size < prvlen) [all...] |
| /src/external/bsd/file/dist/src/ |
| compress.c | 281 int urv, prv, rv = 0; local 326 prv = format_decompression_error(ms, i, newbuf); 328 prv = file_buffer(ms, -1, NULL, name, newbuf, 330 if (prv == -1)
|
| /src/crypto/external/bsd/openssh/dist/ |
| sshconnect2.c | 1241 struct sshkey *sign_key = NULL, *prv = NULL; local 1265 if ((prv = load_identity_file(id)) == NULL) 1267 if (id->key != NULL && !sshkey_equal_public(prv, id->key)) { 1273 sign_key = prv; 1320 sshkey_free(prv);
|
| ssh-keygen.c | 288 struct sshkey *prv; local 293 if ((r = sshkey_load_private(filename, "", &prv, commentp)) == 0) 294 return prv; 304 r = sshkey_load_private(filename, pass, &prv, commentp); 308 return prv; 756 struct sshkey *prv; local 765 prv = load_identity(identity_file, &comment); 766 if ((r = sshkey_write(prv, stdout)) != 0) 771 if (sshkey_is_sk(prv)) { 773 prv->sk_application, prv->sk_flags) [all...] |
| sshkey.c | 2780 sshkey_private_to_blob2(struct sshkey *prv, struct sshbuf *blob, 2844 (r = sshkey_to_blob(prv, &pubkeyblob, &pubkeylen)) != 0 || 2857 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 || 3441 struct sshkey *prv = NULL; local 3475 if ((prv = sshkey_new(KEY_UNSPEC)) == NULL) { 3483 prv->type = KEY_RSA; 3493 prv->pkey = pk; 3494 if ((r = sshkey_check_rsa_length(prv, 0)) != 0) 3498 if ((prv = sshkey_new(KEY_UNSPEC)) == NULL) { 3502 if ((prv->ecdsa_nid = sshkey_ecdsa_fixup_group(pk)) == -1 | [all...] |
| /src/external/gpl3/binutils/dist/bfd/ |
| elf32-nds32.c | 13388 struct section_id_list_t *prv = NULL; 13395 prv = cur; 13402 cur = NULL; /* To insert after prv. */ 13403 sec = cur; /* In case prv == NULL. */ 13411 /* Insert after prv. */ 13416 if (NULL != prv) 13418 result->next = prv->next; 13419 prv->next = result; 13380 struct section_id_list_t *prv = NULL; local
|
| /src/external/gpl3/binutils.old/dist/bfd/ |
| elf32-nds32.c | 13422 struct section_id_list_t *prv = NULL; 13429 prv = cur; 13436 cur = NULL; /* To insert after prv. */ 13437 sec = cur; /* In case prv == NULL. */ 13445 /* Insert after prv. */ 13450 if (NULL != prv) 13452 result->next = prv->next; 13453 prv->next = result; 13414 struct section_id_list_t *prv = NULL; local
|
| /src/external/gpl3/gdb/dist/bfd/ |
| elf32-nds32.c | 13415 struct section_id_list_t *prv = NULL; 13422 prv = cur; 13429 cur = NULL; /* To insert after prv. */ 13430 sec = cur; /* In case prv == NULL. */ 13438 /* Insert after prv. */ 13443 if (NULL != prv) 13445 result->next = prv->next; 13446 prv->next = result; 13407 struct section_id_list_t *prv = NULL; local
|
| /src/external/gpl3/gdb.old/dist/bfd/ |
| elf32-nds32.c | 13417 struct section_id_list_t *prv = NULL; 13424 prv = cur; 13431 cur = NULL; /* To insert after prv. */ 13432 sec = cur; /* In case prv == NULL. */ 13440 /* Insert after prv. */ 13445 if (NULL != prv) 13447 result->next = prv->next; 13448 prv->next = result; 13409 struct section_id_list_t *prv = NULL; local
|