/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/dbm/sdbm/ |
H A D | sdbm_lock.c | 28 int lock_type = type & APR_FLOCK_TYPEMASK; local 30 if (!(lock_type == APR_FLOCK_SHARED || lock_type == APR_FLOCK_EXCLUSIVE))
|
/macosx-10.9.5/apr-30/apr-util/apr-util/dbm/sdbm/ |
H A D | sdbm_lock.c | 28 int lock_type = type & APR_FLOCK_TYPEMASK; local 30 if (!(lock_type == APR_FLOCK_SHARED || lock_type == APR_FLOCK_EXCLUSIVE))
|
/macosx-10.9.5/BerkeleyDB-21/db/examples_cxx/ |
H A D | LockExample.cpp | 169 db_lockmode_t lock_type; local 171 lock_type = DB_LOCK_READ; 173 lock_type = DB_LOCK_WRITE; 179 lock_type, &lock);
|
/macosx-10.9.5/xnu-2422.115.4/osfmk/i386/ |
H A D | simple_lock.h | 96 unsigned short lock_type; /* must be second... see lock.c */ member in struct:slock
|
H A D | locks_i386.c | 458 l->lock_type = USLOCK_TAG; 481 if (l->lock_type != USLOCK_TAG) 482 panic("%s: %p is not a usimple lock, 0x%x", caller, l, l->lock_type); 1186 lck_rw_type_t lock_type; local 1218 lock_type = LCK_RW_TYPE_SHARED; 1220 lock_type = LCK_RW_TYPE_EXCLUSIVE; 1223 LOCKSTAT_RECORD(LS_LCK_RW_DONE_RELEASE, lck, lock_type == LCK_RW_TYPE_SHARED ? 0 : 1); 1226 return(lock_type);
|
H A D | genassym.c | 136 DECLARE("SLOCK_TYPE", offsetof(usimple_lock_t, lock_type));
|
/macosx-10.9.5/CPANInternal-140/File-NFSLock/lib/File/ |
H A D | NFSLock.pm | 45 ### Convert lock_type to a number 83 $self->{lock_type} = shift; 88 $self->{lock_type} ||= 0; 100 ### force lock_type to be numerical 101 if( $self->{lock_type} && 102 $self->{lock_type} !~ /^\d+/ && 103 exists $TYPES->{$self->{lock_type}} ){ 104 $self->{lock_type} = $TYPES->{$self->{lock_type}}; 116 ."(You passed \"$self->{file}\" and \"$self->{lock_type}\")") [all...] |
/macosx-10.9.5/CPANInternal-140/File-NFSLock-1.21/lib/File/ |
H A D | NFSLock.pm | 45 ### Convert lock_type to a number 83 $self->{lock_type} = shift; 88 $self->{lock_type} ||= 0; 100 ### force lock_type to be numerical 101 if( $self->{lock_type} && 102 $self->{lock_type} !~ /^\d+/ && 103 exists $TYPES->{$self->{lock_type}} ){ 104 $self->{lock_type} = $TYPES->{$self->{lock_type}}; 116 ."(You passed \"$self->{file}\" and \"$self->{lock_type}\")") [all...] |
/macosx-10.9.5/BerkeleyDB-21/db/examples_c/ |
H A D | ex_lock.c | 40 db_lockmode_t lock_type; local 117 lock_type = DB_LOCK_READ; 119 lock_type = DB_LOCK_WRITE; 124 DB_LOCK_NOWAIT, &lock_dbt, lock_type, &lock);
|
/macosx-10.9.5/BerkeleyDB-21/db/examples_java/src/db/ |
H A D | LockExample.java | 121 LockRequestMode lock_type; 123 lock_type = LockRequestMode.READ; 125 lock_type = LockRequestMode.WRITE; 131 lock = dbenv.getLock(locker, true, entry, lock_type);
|
/macosx-10.9.5/xnu-2422.115.4/tools/tests/unit_tests/fcntlrangecheck_tests_11202484_src/ |
H A D | fcntlrangecheck_tests_11202484.c | 12 int do_fcntl_lock(int fd, int cmd, short lock_type, off_t start, short when, off_t len, int ret){ argument 17 fl.l_type = lock_type; 21 printf ("fcntl with flock(%lld,%lld,%d,%d) returned %d and errno %d \n", start, len, lock_type, when, retval, errno);
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/ |
H A D | hdb.h | 115 int lock_type; member in struct:HDB
|
H A D | db.c | 72 if (db->lock_type == HDB_WLOCK || db->lock_type == operation)
|
H A D | hdb-mitdb.c | 560 if (db->lock_type == HDB_WLOCK || db->lock_count == operation)
|
/macosx-10.9.5/BerkeleyDB-21/db/hash/ |
H A D | hash.c | 415 db_lockmode_t lock_type; local 425 lock_type = DB_LOCK_WRITE; 427 lock_type = DB_LOCK_READ; 443 prev: ret = __ham_item_prev(dbc, lock_type, pgnop); 448 ret = __ham_item_last(dbc, lock_type, pgnop); 460 next: ret = __ham_item_next(dbc, lock_type, pgnop); 465 ret = __ham_item_first(dbc, lock_type, pgnop); 471 ret = __ham_lookup(dbc, key, 0, lock_type, pgnop); 480 ret = __ham_item(dbc, lock_type, pgnop); 525 ret = __ham_item_prev(dbc, lock_type, pgno [all...] |
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/ |
H A D | CredentialsCache.h | 342 /* $Copyright:
*
* Copyright 1998-2000 by the Massachusetts Institute of Technology.
*
* All rights reserved.
*
* Export of this software from the United States of America may require a
* specific license from the United States Government. It is the
* responsibility of any person or organization contemplating export to
* obtain such a license before exporting.
*
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute
* this software and its documentation for any purpose and without fee is
* hereby granted, provided that the above copyright notice appear in all
* copies and that both that copyright notice and this permission notice
* appear in supporting documentation, and that the name of M.I.T. not be
* used in advertising or publicity pertaining to distribution of the
* software without specific, written prior permission. Furthermore if you
* modify this software you must label your software as modified software
* and not distribute it in such a fashion that it might be confused with
* the original MIT software. M.I.T. makes no representations about the
* suitability of this software for any purpose. It is provided "as is"
* without express or implied warranty.
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
* MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
*
* Individual source code files are copyright MIT, Cygnus Support,
* OpenVision, Oracle, Sun Soft, FundsXpress, and others.
*
* Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
* and Zephyr are trademarks of the Massachusetts Institute of Technology
* (MIT). No commercial use of these trademarks may be made without prior
* written permission of MIT.
*
* "Commercial use" means use of a name in a product or other for-profit
* manner. It does NOT prevent a commercial firm from referring to the MIT
* trademarks in order to convey information (although in doing so,
* recognition of their trademark status should be given).
* $
*/
/* $Header: /Volumes/backup/dsmigrate/Dumps/../CVS/passwordserver_sasl/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/CredentialsCache.h,v 1.4 2005/01/10 19:17:31 snsimon Exp $ */
/*
* Declarations for Credentials Cache API Library
*
* API specification: <http://web.mit.edu/pismere/kerberos/ccache-api-v2.html>
*
* Revision 1: Frank Dabek, 6/4/1998
* Revision 2: meeroh, 2/24/1999
* Revision 3: meeroh, 11/12/1999
*
*/
#ifndef __CREDENTIALSCACHE__
#define __CREDENTIALSCACHE__
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#include <KerberosSupport/KerberosConditionalMacros.h>
#if TARGET_API_MAC_OSX && TARGET_API_MAC_CARBON
#include <CoreServices/CoreServices.h>
#elif TARGET_API_MAC_OS8 || TARGET_API_MAC_CARBON
#include <MacTypes.h>
#else
#error "Unknown OS; no system types available"
#endif
#if PRAGMA_IMPORT
# pragma import on
#endif
/* This stuff is to make sure that we always use the same compiler options for
this header file. Otherwise we get really exciting failure modes -- meeroh */
#if PRAGMA_STRUCT_ALIGN
#pragma options align=mac68k4byte
#elif PRAGMA_STRUCT_PACKPUSH
#pragma pack(push, 4)
#elif PRAGMA_STRUCT_PACK
#pragma pack(4)
#endif
#if PRAGMA_ENUM_ALWAYSINT
#pragma enumsalwaysint on
#endif
#if TARGET_CPU_68K
#pragma fourbyteints on
#endif
/*
* Constants
*/
/* API versions */
enum {
ccapi_version_2 = 2,
ccapi_version_3 = 3,
ccapi_version_4 = 4
};
/* Errors */
enum {
ccNoError = 0,
ccIteratorEnd = 201,
ccErrBadParam,
ccErrNoMem,
ccErrInvalidContext,
ccErrInvalidCCache,
ccErrInvalidString, /* 206 */
ccErrInvalidCredentials,
ccErrInvalidCCacheIterator,
ccErrInvalidCredentialsIterator,
ccErrInvalidLock,
ccErrBadName, /* 211 */
ccErrBadCredentialsVersion,
ccErrBadAPIVersion,
ccErrContextLocked,
ccErrContextUnlocked,
ccErrCCacheLocked, /* 216 */
ccErrCCacheUnlocked,
ccErrBadLockType,
ccErrNeverDefault,
ccErrCredentialsNotFound,
ccErrCCacheNotFound, /* 221 */
ccErrContextNotFound,
ccErrServerUnavailable
};
/* Credentials versions */
enum {
cc_credentials_v4 = 1,
cc_credentials_v5 = 2,
cc_credentials_v4_v5 = 3
};
/*
* Basic types
*/
typedef UInt32 cc_uint32;
typedef SInt32 cc_int32;
typedef cc_uint32 cc_time_t;
/*
* API types
*/
/* Forward declarations */
struct cc_context_f;
typedef struct cc_context_f cc_context_f;
struct cc_ccache_f;
typedef struct cc_ccache_f cc_ccache_f;
struct cc_ccache_iterator_f;
typedef struct cc_ccache_iterator_f cc_ccache_iterator_f;
struct cc_ccache_iterator_f;
typedef struct cc_credentials_iterator_f cc_credentials_iterator_f;
struct cc_string_f;
typedef struct cc_string_f cc_string_f;
struct cc_credentials_f;
typedef struct cc_credentials_f cc_credentials_f;
/* Credentials types */
enum { /* Make sure all of these are multiples of four (for alignment sanity) */
cc_v4_name_size = 40,
cc_v4_instance_size = 40,
cc_v4_realm_size = 40,
cc_v4_ticket_size = 1254
};
enum cc_string_to_key_type {
cc_v4_stk_afs = 0,
cc_v4_stk_des = 1,
cc_v4_stk_columbia_special = 2,
cc_v4_stk_unknown = 3
};
struct cc_credentials_v4_t {
cc_uint32 version;
char principal [cc_v4_name_size];
char principal_instance [cc_v4_instance_size];
char service [cc_v4_name_size];
char service_instance [cc_v4_instance_size];
char realm [cc_v4_realm_size];
unsigned char session_key [8];
cc_int32 kvno;
cc_int32 string_to_key_type;
cc_time_t issue_date;
cc_int32 lifetime;
cc_uint32 address;
cc_int32 ticket_size;
unsigned char ticket [cc_v4_ticket_size];
};
typedef struct cc_credentials_v4_t cc_credentials_v4_t;
struct cc_data {
cc_uint32 type;
cc_uint32 length;
void* data;
};
typedef struct cc_data cc_data;
struct cc_credentials_v5_t {
char* client;
char* server;
cc_data keyblock;
cc_time_t authtime;
cc_time_t starttime;
cc_time_t endtime;
cc_time_t renew_till;
cc_uint32 is_skey;
cc_uint32 ticket_flags;
cc_data** addresses;
cc_data ticket;
cc_data second_ticket;
cc_data** authdata;
};
typedef struct cc_credentials_v5_t cc_credentials_v5_t;
struct cc_credentials_union {
cc_int32 version;
union {
cc_credentials_v4_t* credentials_v4;
cc_credentials_v5_t* credentials_v5;
} credentials;
};
typedef struct cc_credentials_union cc_credentials_union;
/* Exposed parts */
struct cc_context_d {
const cc_context_f* functions;
#if TARGET_OS_MAC
const cc_context_f* otherFunctions;
#endif
};
typedef struct cc_context_d cc_context_d;
typedef cc_context_d* cc_context_t;
struct cc_ccache_d {
const cc_ccache_f* functions;
#if TARGET_OS_MAC
const cc_ccache_f* otherFunctions;
#endif
};
typedef struct cc_ccache_d cc_ccache_d;
typedef cc_ccache_d* cc_ccache_t;
struct cc_ccache_iterator_d {
const cc_ccache_iterator_f* functions;
#if TARGET_OS_MAC
const cc_ccache_iterator_f* otherFunctions;
#endif
};
typedef struct cc_ccache_iterator_d cc_ccache_iterator_d;
typedef cc_ccache_iterator_d* cc_ccache_iterator_t;
struct cc_credentials_iterator_d {
const cc_credentials_iterator_f* functions;
#if TARGET_OS_MAC
const cc_credentials_iterator_f* otherFunctions;
#endif
};
typedef struct cc_credentials_iterator_d cc_credentials_iterator_d;
typedef cc_credentials_iterator_d* cc_credentials_iterator_t;
struct cc_string_d {
const char* data;
const cc_string_f* functions;
#if TARGET_OS_MAC
const cc_string_f* otherFunctions;
#endif
};
typedef struct cc_string_d cc_string_d;
typedef cc_string_d* cc_string_t;
struct cc_credentials_d {
const cc_credentials_union* data;
const cc_credentials_f* functions;
#if TARGET_OS_MAC
const cc_credentials_f* otherFunctions;
#endif
};
typedef struct cc_credentials_d cc_credentials_d;
typedef cc_credentials_d* cc_credentials_t;
/* Function pointer structs */
struct cc_context_f {
cc_int32 (*release) (
cc_context_t context);
cc_int32 (*get_change_time) (
cc_context_t context,
cc_time_t* time);
cc_int32 (*get_default_ccache_name) (
cc_context_t context,
cc_string_t* name);
cc_int32 (*open_ccache) (
cc_context_t context,
const char* name,
cc_ccache_t* ccache);
cc_int32 (*open_default_ccache) (
cc_context_t context,
cc_ccache_t* ccache);
cc_int32 (*create_ccache) (
cc_context_t context,
const char* name,
cc_uint32 cred_vers,
const char* principal,
cc_ccache_t* ccache);
cc_int32 (*create_default_ccache) (
cc_context_t context,
cc_uint32 cred_vers,
const char* principal,
cc_ccache_t* ccache);
cc_int32 (*create_new_ccache) (
cc_context_t context,
cc_uint32 cred_vers,
const char* principal,
cc_ccache_t* ccache);
cc_int32 (*new_ccache_iterator) (
cc_context_t context,
cc_ccache_iterator_t* iterator);
cc_int32 (*lock) (
cc_context_t context,
cc_uint32 lock_type,
cc_uint32 block);
cc_int32 (*unlock) (
cc_context_t context);
cc_int32 (*compare) (
cc_context_t context,
cc_context_t compare_to,
cc_uint32* equal);
};
struct cc_ccache_f {
cc_int32 (*release) (
cc_ccache_t ccache);
cc_int32 (*destroy) (
cc_ccache_t ccache);
cc_int32 (*set_default) (
cc_ccache_t ccache);
cc_int32 (*get_credentials_version) (
cc_ccache_t ccache,
cc_uint32* credentials_version);
cc_int32 (*get_name) (
cc_ccache_t ccache,
cc_string_t* name);
cc_int32 (*get_principal) (
cc_ccache_t ccache,
cc_uint32 credentials_version,
cc_string_t* principal);
cc_int32 (*set_principal) (
cc_ccache_t ccache,
cc_uint32 credentials_version,
const char* principal);
cc_int32 (*store_credentials) (
cc_ccache_t ccache,
const cc_credentials_union* credentials);
cc_int32 (*remove_credentials) (
cc_ccache_t ccache,
cc_credentials_t credentials);
cc_int32 (*new_credentials_iterator) (
cc_ccache_t ccache,
cc_credentials_iterator_t* iterator);
cc_int32 (*move) (
cc_ccache_t source,
cc_ccache_t destination);
cc_int32 (*lock) (
cc_ccache_t ccache,
cc_uint32 block,
cc_uint32 lock_type);
cc_int32 (*unlock) (
cc_ccache_t ccache);
cc_int32 (…)
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | voscm.vim | 35 syn keyword voscmFunction contained length lock_type locked ltrim master_disk max message min mod module_info
|
/macosx-10.9.5/ntfs-83/kext/ |
H A D | ntfs_vnops.c | 8176 lck_rw_type_t lock_type = LCK_RW_TYPE_SHARED; local 8267 lock_type = LCK_RW_TYPE_EXCLUSIVE; 8268 if (!lck_rw_try_lock(&ni->lock, lock_type)) { 8272 (lock_type == LCK_RW_TYPE_SHARED) ? 8599 if (lock_type == LCK_RW_TYPE_SHARED)
|