/macosx-10.9.5/apr-30/apr/apr/threadproc/unix/ |
H A D | threadpriv.c | 24 APR_DECLARE(apr_status_t) apr_threadkey_private_create(apr_threadkey_t **key, 28 (*key) = (apr_threadkey_t *)apr_pcalloc(pool, sizeof(apr_threadkey_t)); 30 if ((*key) == NULL) { 34 (*key)->pool = pool; 36 return pthread_key_create(&(*key)->key, dest); 41 apr_threadkey_t *key) 44 if (pthread_getspecific(key->key,new)) 47 (*new) = pthread_getspecific(key [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/metadata/ |
H A D | clean.sh | 20 rm -f zsk.key ksk.key parent.ksk.key parent.zsk.key 21 rm -f pending.key rolling.key standby.key inact.key 22 rm -f prerev.key postrev.key oldstyl [all...] |
/macosx-10.9.5/WebKit2-7537.78.2/Shared/API/c/ |
H A D | WKPluginInformation.cpp | 37 static WebString* key = WebString::create(pluginInformationBundleIdentifierKey()).leakRef(); local 38 return toAPI(key); 43 static WebString* key = WebString::create(pluginInformationBundleVersionKey()).leakRef(); local 44 return toAPI(key); 49 static WebString* key = WebString::create(pluginInformationBundleShortVersionKey()).leakRef(); local 50 return toAPI(key); 55 static WebString* key = WebString::create(pluginInformationPathKey()).leakRef(); local 56 return toAPI(key); 61 static WebString* key = WebString::create(pluginInformationDisplayNameKey()).leakRef(); local 62 return toAPI(key); 67 static WebString* key = WebString::create(pluginInformationDefaultLoadPolicyKey()).leakRef(); local 73 static WebString* key = WebString::create(pluginInformationUpdatePastLastBlockedVersionIsKnownAvailableKey()).leakRef(); local 79 static WebString* key = WebString::create(pluginInformationHasSandboxProfileKey()).leakRef(); local 85 static WebString* key = WebString::create(pluginInformationFrameURLKey()).leakRef(); local 91 static WebString* key = WebString::create(pluginInformationMIMETypeKey()).leakRef(); local 97 static WebString* key = WebString::create(pluginInformationPageURLKey()).leakRef(); local 103 static WebString* key = WebString::create(pluginInformationPluginspageAttributeURLKey()).leakRef(); local 109 static WebString* key = WebString::create(pluginInformationPluginURLKey()).leakRef(); local 115 static WebString* key = WebString::create(plugInInformationReplacementObscuredKey()).leakRef(); local [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/cache/ |
H A D | async.tcl | 43 method get {key donecmd} { 45 lappend mywaiting($key) $donecmd 50 if {[info exists mymiss($key)]} { 51 $self NotifyUnset 1 $key 53 } elseif {[info exists myhit($key)]} { 54 $self NotifySet 1 $key 59 # not. however, if a request for this key is already in flight 64 if {[llength $mywaiting($key)] > 1} return 66 # This is the first query for this key, ask the provider. 68 after idle [linsert $myprovider end get $key [all...] |
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/ |
H A D | encrypt.h | 66 #define VALIDKEY(key) ( key[0] | key[1] | key[2] | key[3] | \ 67 key[4] | key[5] | key[6] | key[7])
|
/macosx-10.9.5/keymgr-28/ |
H A D | keymgr.h | 48 extern void * _keymgr_get_per_thread_data (unsigned int key); 49 extern int _keymgr_set_per_thread_data (unsigned int key, void *keydata); 50 extern void *_keymgr_get_and_lock_processwide_ptr (unsigned int key); 51 extern int _keymgr_get_and_lock_processwide_ptr_2 (unsigned int key, void **); 52 extern int _keymgr_set_and_unlock_processwide_ptr (unsigned int key, 54 extern int _keymgr_unlock_processwide_ptr (unsigned int key); 55 extern int _keymgr_set_lockmode_processwide_ptr (unsigned int key, 57 extern unsigned int _keymgr_get_lockmode_processwide_ptr (unsigned int key); 58 extern int _keymgr_get_lock_count_processwide_ptr (unsigned int key);
|
/macosx-10.9.5/libtelnet-13/ |
H A D | encrypt.h | 73 #define VALIDKEY(key) ( key[0] | key[1] | key[2] | key[3] | \ 74 key[4] | key[5] | key[6] | key[7])
|
/macosx-10.9.5/ruby-104/ruby/test/drb/ |
H A D | ut_timerholder.rb | 9 key = holder.add(self) 11 assert_equal(holder.peek(key), self) 12 holder.delete(key) 13 assert(!holder.include?(key)) 14 key = holder.add(self) 16 assert_equal(holder.fetch(key), nil) 17 key = holder.add(self) 18 assert_equal(holder.fetch(key), self) 19 holder.store(key, true) 20 assert_equal(holder.fetch(key), tru [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/otp/ |
H A D | otp_md.h | 36 int otp_md4_init (OtpKey key, const char *pwd, const char *seed); 38 int otp_md4_next (OtpKey key); 40 int otp_md5_init (OtpKey key, const char *pwd, const char *seed); 42 int otp_md5_next (OtpKey key); 44 int otp_sha_init (OtpKey key, const char *pwd, const char *seed); 46 int otp_sha_next (OtpKey key);
|
/macosx-10.9.5/WebKit-7537.78.2/mac/Misc/ |
H A D | WebLocalizableStringsInternal.h | 35 NSString *WebLocalizedStringInternal(const char* key); 42 #define UI_STRING_KEY_INTERNAL(string, key, comment) WebLocalizedStringInternal(key)
|
H A D | WebNSDictionaryExtras.h | 32 - (BOOL)_webkit_boolForKey:(id)key; 33 - (int)_webkit_intForKey:(id)key; 34 - (NSString *)_webkit_stringForKey:(id)key; // Returns nil if the value is not an NSString. 35 - (NSArray *)_webkit_arrayForKey:(id)key; // Returns nil if the value is not an NSArray. 42 - (void)_webkit_setInt:(int)value forKey:(id)key; 43 - (void)_webkit_setFloat:(float)value forKey:(id)key; 44 - (void)_webkit_setBool:(BOOL)value forKey:(id)key; 45 - (void)_webkit_setLongLong:(long long)value forKey:(id)key; 46 - (void)_webkit_setUnsignedLongLong:(unsigned long long)value forKey:(id)key;
|
/macosx-10.9.5/cctools-845/ld/ |
H A D | hash_string.h | 31 char *key, 37 cp = key; 42 *len = cp - key; 30 hash_string( char *key, unsigned long *len) argument
|
/macosx-10.9.5/dyld-239.4/unit-tests/test-cases/pthread-keys/ |
H A D | main.c | 31 /// The key index for main executables starts at 4 36 pthread_key_t key; local 38 int result = pthread_key_create(&key, NULL); 39 //printf("key=%u\n", key); 42 else if ( key < 4 ) 43 FAIL("pthread-keys key out of bounds");
|
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | CommonCryptorDES.c | 31 CCCryptorStatus CCDesIsWeakKey( void *key, size_t length) argument 34 return ccdes_key_is_weak(key, length); 37 void CCDesSetOddParity(void *key, size_t Length) argument 40 ccdes_key_set_odd_parity(key, Length); 44 void *key, size_t keylen, void *ivec) 47 return ccdes_cbc_cksum(in, out, length, key, keylen, ivec); 43 CCDesCBCCksum(void *in, void *out, size_t length, void *key, size_t keylen, void *ivec) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | descc.c | 58 DES_set_odd_parity(DES_cblock *key) argument 60 CCDesSetOddParity(key, sizeof(*key)); 64 DES_is_weak_key(DES_cblock *key) argument 66 if (CCDesIsWeakKey(key, sizeof(*key)))
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/ |
H A D | cssmendian.h | 40 void n2hi(CssmKey::Header &key); 41 void h2ni(CssmKey::Header &key); 43 inline void n2hi(CSSM_KEYHEADER &key) { n2hi(CssmKey::Header::overlay (key));} argument 44 inline void h2ni(CSSM_KEYHEADER &key) { h2ni(CssmKey::Header::overlay (key));} argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/ |
H A D | cssmendian.h | 40 void n2hi(CssmKey::Header &key); 41 void h2ni(CssmKey::Header &key); 43 inline void n2hi(CSSM_KEYHEADER &key) { n2hi(CssmKey::Header::overlay (key));} argument 44 inline void h2ni(CSSM_KEYHEADER &key) { h2ni(CssmKey::Header::overlay (key));} argument
|
/macosx-10.9.5/CPANInternal-140/Parse-Yapp/lib/Parse/Yapp/ |
H A D | Options.pm | 95 my($key,$value)=@_; 97 $key=lc($key); 102 exists($known_options{$key}) 103 or croak "Unknown option: '$key'"; 105 if(exists($known_options{$key}{lc($value)})) { 108 elsif(not exists($known_options{$key}{''})) { 109 croak "Invalid value '$value' for option '$key'"; 112 exists($actions{$key}) 113 and &{$actions{$key}}( [all...] |
/macosx-10.9.5/CPANInternal-140/Parse-Yapp-1.05/lib/Parse/Yapp/ |
H A D | Options.pm | 95 my($key,$value)=@_; 97 $key=lc($key); 102 exists($known_options{$key}) 103 or croak "Unknown option: '$key'"; 105 if(exists($known_options{$key}{lc($value)})) { 108 elsif(not exists($known_options{$key}{''})) { 109 croak "Invalid value '$value' for option '$key'"; 112 exists($actions{$key}) 113 and &{$actions{$key}}( [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/common/ |
H A D | rndc.key | 17 /* $Id: rndc.key,v 1.2.2.3 2011/03/12 04:59:15 tbox Exp $ */ 19 key rndc_key {
|
/macosx-10.9.5/ruby-104/ruby/test/ |
H A D | test_rbconfig.rb | 13 RbConfig::MAKEFILE_CONFIG.each do |key, val| 14 next unless /\Asite(?!arch)/ =~ key 15 next if @@with_config[key] 16 assert_match(/(?:\$\(|\/)site/, val, key) 21 RbConfig::MAKEFILE_CONFIG.each do |key, val| 22 next unless /\Avendor(?!arch)/ =~ key 23 next if @@with_config[key] 24 assert_match(/(?:\$\(|\/)vendor/, val, key) 29 RbConfig::MAKEFILE_CONFIG.each do |key, val| 30 next unless /\A(?!site|vendor|archdir\z).*arch.*dir\z/ =~ key [all...] |
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/ |
H A D | ossl-aes-cc.c | 44 AES_KEY *key) 49 if (!userKey || !key) { 67 key->data, AES_KEYST_SIZE, &key->cref, NULL); 81 AES_destroy_ctx(AES_KEY *key) argument 83 if (key && key->cref) { 84 CCCryptorRelease(key->cref); 85 key->cref = NULL; 91 AES_KEY *key) 43 _AES_set_key(int enc, const unsigned char *userKey, const int bits, AES_KEY *key) argument 90 AES_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument 97 AES_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument 105 AES_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key) argument 114 AES_decrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key) argument [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/ffidl/ffidl/demos/other/ |
H A D | test-gdbm-1.tcl | 15 foreach key [lsort [gdbm list $db]] { 16 puts stdout "$key [gdbm fetch $db $key]" 19 set key [gdbm firstkey $db] 21 while {$key != ""} { 22 set data [gdbm fetch $db $key] 23 puts stdout "found $key: $data" 24 set key [gdbm nextkey $db $key] 36 set key [gdb [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/ |
H A D | key.c | 87 dst_key_name(const dst_key_t *key) { argument 88 REQUIRE(VALID_KEY(key)); 89 return (key->key_name); 93 dst_key_size(const dst_key_t *key) { argument 94 REQUIRE(VALID_KEY(key)); 95 return (key->key_size); 99 dst_key_proto(const dst_key_t *key) { argument 100 REQUIRE(VALID_KEY(key)); 101 return (key->key_proto); 105 dst_key_alg(const dst_key_t *key) { argument 111 dst_key_flags(const dst_key_t *key) argument 117 dst_key_id(const dst_key_t *key) argument 123 dst_key_rid(const dst_key_t *key) argument 129 dst_key_class(const dst_key_t *key) argument 135 dst_key_iszonekey(const dst_key_t *key) argument 149 dst_key_isnullkey(const dst_key_t *key) argument 163 dst_key_setbits(dst_key_t *key, isc_uint16_t bits) argument 175 dst_key_getbits(const dst_key_t *key) argument [all...] |
/macosx-10.9.5/BerkeleyDB-21/db/java/src/com/sleepycat/persist/ |
H A D | KeySelector.java | 31 * Returns whether a given key should be returned via the cursor. 33 * <p>This method should not assume that the given key is for a committed 34 * record or not, nor should it assume that the key will be returned via 35 * the cursor if this method returns true. The record for this key will 37 * the record is found to be uncommitted or deleted, the key will not be 40 boolean selectKey(K key); argument
|