Searched refs:lock_type (Results 1 - 18 of 18) sorted by relevance

/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/dbm/sdbm/
H A Dsdbm_lock.c28 int lock_type = type & APR_FLOCK_TYPEMASK; local
30 if (!(lock_type == APR_FLOCK_SHARED || lock_type == APR_FLOCK_EXCLUSIVE))
/macosx-10.9.5/apr-30/apr-util/apr-util/dbm/sdbm/
H A Dsdbm_lock.c28 int lock_type = type & APR_FLOCK_TYPEMASK; local
30 if (!(lock_type == APR_FLOCK_SHARED || lock_type == APR_FLOCK_EXCLUSIVE))
/macosx-10.9.5/BerkeleyDB-21/db/examples_cxx/
H A DLockExample.cpp169 db_lockmode_t lock_type; local
171 lock_type = DB_LOCK_READ;
173 lock_type = DB_LOCK_WRITE;
179 lock_type, &lock);
/macosx-10.9.5/xnu-2422.115.4/osfmk/i386/
H A Dsimple_lock.h96 unsigned short lock_type; /* must be second... see lock.c */ member in struct:slock
H A Dlocks_i386.c458 l->lock_type = USLOCK_TAG;
481 if (l->lock_type != USLOCK_TAG)
482 panic("%s: %p is not a usimple lock, 0x%x", caller, l, l->lock_type);
1186 lck_rw_type_t lock_type; local
1218 lock_type = LCK_RW_TYPE_SHARED;
1220 lock_type = LCK_RW_TYPE_EXCLUSIVE;
1223 LOCKSTAT_RECORD(LS_LCK_RW_DONE_RELEASE, lck, lock_type == LCK_RW_TYPE_SHARED ? 0 : 1);
1226 return(lock_type);
H A Dgenassym.c136 DECLARE("SLOCK_TYPE", offsetof(usimple_lock_t, lock_type));
/macosx-10.9.5/CPANInternal-140/File-NFSLock/lib/File/
H A DNFSLock.pm45 ### Convert lock_type to a number
83 $self->{lock_type} = shift;
88 $self->{lock_type} ||= 0;
100 ### force lock_type to be numerical
101 if( $self->{lock_type} &&
102 $self->{lock_type} !~ /^\d+/ &&
103 exists $TYPES->{$self->{lock_type}} ){
104 $self->{lock_type} = $TYPES->{$self->{lock_type}};
116 ."(You passed \"$self->{file}\" and \"$self->{lock_type}\")")
[all...]
/macosx-10.9.5/CPANInternal-140/File-NFSLock-1.21/lib/File/
H A DNFSLock.pm45 ### Convert lock_type to a number
83 $self->{lock_type} = shift;
88 $self->{lock_type} ||= 0;
100 ### force lock_type to be numerical
101 if( $self->{lock_type} &&
102 $self->{lock_type} !~ /^\d+/ &&
103 exists $TYPES->{$self->{lock_type}} ){
104 $self->{lock_type} = $TYPES->{$self->{lock_type}};
116 ."(You passed \"$self->{file}\" and \"$self->{lock_type}\")")
[all...]
/macosx-10.9.5/BerkeleyDB-21/db/examples_c/
H A Dex_lock.c40 db_lockmode_t lock_type; local
117 lock_type = DB_LOCK_READ;
119 lock_type = DB_LOCK_WRITE;
124 DB_LOCK_NOWAIT, &lock_dbt, lock_type, &lock);
/macosx-10.9.5/BerkeleyDB-21/db/examples_java/src/db/
H A DLockExample.java121 LockRequestMode lock_type;
123 lock_type = LockRequestMode.READ;
125 lock_type = LockRequestMode.WRITE;
131 lock = dbenv.getLock(locker, true, entry, lock_type);
/macosx-10.9.5/xnu-2422.115.4/tools/tests/unit_tests/fcntlrangecheck_tests_11202484_src/
H A Dfcntlrangecheck_tests_11202484.c12 int do_fcntl_lock(int fd, int cmd, short lock_type, off_t start, short when, off_t len, int ret){ argument
17 fl.l_type = lock_type;
21 printf ("fcntl with flock(%lld,%lld,%d,%d) returned %d and errno %d \n", start, len, lock_type, when, retval, errno);
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/
H A Dhdb.h115 int lock_type; member in struct:HDB
H A Ddb.c72 if (db->lock_type == HDB_WLOCK || db->lock_type == operation)
H A Dhdb-mitdb.c560 if (db->lock_type == HDB_WLOCK || db->lock_count == operation)
/macosx-10.9.5/BerkeleyDB-21/db/hash/
H A Dhash.c415 db_lockmode_t lock_type; local
425 lock_type = DB_LOCK_WRITE;
427 lock_type = DB_LOCK_READ;
443 prev: ret = __ham_item_prev(dbc, lock_type, pgnop);
448 ret = __ham_item_last(dbc, lock_type, pgnop);
460 next: ret = __ham_item_next(dbc, lock_type, pgnop);
465 ret = __ham_item_first(dbc, lock_type, pgnop);
471 ret = __ham_lookup(dbc, key, 0, lock_type, pgnop);
480 ret = __ham_item(dbc, lock_type, pgnop);
525 ret = __ham_item_prev(dbc, lock_type, pgno
[all...]
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/
H A DCredentialsCache.h342 /* $Copyright: * * Copyright 1998-2000 by the Massachusetts Institute of Technology. * * All rights reserved. * * Export of this software from the United States of America may require a * specific license from the United States Government. It is the * responsibility of any person or organization contemplating export to * obtain such a license before exporting. * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute * this software and its documentation for any purpose and without fee is * hereby granted, provided that the above copyright notice appear in all * copies and that both that copyright notice and this permission notice * appear in supporting documentation, and that the name of M.I.T. not be * used in advertising or publicity pertaining to distribution of the * software without specific, written prior permission. Furthermore if you * modify this software you must label your software as modified software * and not distribute it in such a fashion that it might be confused with * the original MIT software. M.I.T. makes no representations about the * suitability of this software for any purpose. It is provided "as is" * without express or implied warranty. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF * MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. * * Individual source code files are copyright MIT, Cygnus Support, * OpenVision, Oracle, Sun Soft, FundsXpress, and others. * * Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, * and Zephyr are trademarks of the Massachusetts Institute of Technology * (MIT). No commercial use of these trademarks may be made without prior * written permission of MIT. * * "Commercial use" means use of a name in a product or other for-profit * manner. It does NOT prevent a commercial firm from referring to the MIT * trademarks in order to convey information (although in doing so, * recognition of their trademark status should be given). * $ */ /* $Header: /Volumes/backup/dsmigrate/Dumps/../CVS/passwordserver_sasl/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/CredentialsCache.h,v 1.4 2005/01/10 19:17:31 snsimon Exp $ */ /* * Declarations for Credentials Cache API Library * * API specification: <http://web.mit.edu/pismere/kerberos/ccache-api-v2.html> * * Revision 1: Frank Dabek, 6/4/1998 * Revision 2: meeroh, 2/24/1999 * Revision 3: meeroh, 11/12/1999 * */ #ifndef __CREDENTIALSCACHE__ #define __CREDENTIALSCACHE__ #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ #include <KerberosSupport/KerberosConditionalMacros.h> #if TARGET_API_MAC_OSX && TARGET_API_MAC_CARBON #include <CoreServices/CoreServices.h> #elif TARGET_API_MAC_OS8 || TARGET_API_MAC_CARBON #include <MacTypes.h> #else #error "Unknown OS; no system types available" #endif #if PRAGMA_IMPORT # pragma import on #endif /* This stuff is to make sure that we always use the same compiler options for this header file. Otherwise we get really exciting failure modes -- meeroh */ #if PRAGMA_STRUCT_ALIGN #pragma options align=mac68k4byte #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(push, 4) #elif PRAGMA_STRUCT_PACK #pragma pack(4) #endif #if PRAGMA_ENUM_ALWAYSINT #pragma enumsalwaysint on #endif #if TARGET_CPU_68K #pragma fourbyteints on #endif /* * Constants */ /* API versions */ enum { ccapi_version_2 = 2, ccapi_version_3 = 3, ccapi_version_4 = 4 }; /* Errors */ enum { ccNoError = 0, ccIteratorEnd = 201, ccErrBadParam, ccErrNoMem, ccErrInvalidContext, ccErrInvalidCCache, ccErrInvalidString, /* 206 */ ccErrInvalidCredentials, ccErrInvalidCCacheIterator, ccErrInvalidCredentialsIterator, ccErrInvalidLock, ccErrBadName, /* 211 */ ccErrBadCredentialsVersion, ccErrBadAPIVersion, ccErrContextLocked, ccErrContextUnlocked, ccErrCCacheLocked, /* 216 */ ccErrCCacheUnlocked, ccErrBadLockType, ccErrNeverDefault, ccErrCredentialsNotFound, ccErrCCacheNotFound, /* 221 */ ccErrContextNotFound, ccErrServerUnavailable }; /* Credentials versions */ enum { cc_credentials_v4 = 1, cc_credentials_v5 = 2, cc_credentials_v4_v5 = 3 }; /* * Basic types */ typedef UInt32 cc_uint32; typedef SInt32 cc_int32; typedef cc_uint32 cc_time_t; /* * API types */ /* Forward declarations */ struct cc_context_f; typedef struct cc_context_f cc_context_f; struct cc_ccache_f; typedef struct cc_ccache_f cc_ccache_f; struct cc_ccache_iterator_f; typedef struct cc_ccache_iterator_f cc_ccache_iterator_f; struct cc_ccache_iterator_f; typedef struct cc_credentials_iterator_f cc_credentials_iterator_f; struct cc_string_f; typedef struct cc_string_f cc_string_f; struct cc_credentials_f; typedef struct cc_credentials_f cc_credentials_f; /* Credentials types */ enum { /* Make sure all of these are multiples of four (for alignment sanity) */ cc_v4_name_size = 40, cc_v4_instance_size = 40, cc_v4_realm_size = 40, cc_v4_ticket_size = 1254 }; enum cc_string_to_key_type { cc_v4_stk_afs = 0, cc_v4_stk_des = 1, cc_v4_stk_columbia_special = 2, cc_v4_stk_unknown = 3 }; struct cc_credentials_v4_t { cc_uint32 version; char principal [cc_v4_name_size]; char principal_instance [cc_v4_instance_size]; char service [cc_v4_name_size]; char service_instance [cc_v4_instance_size]; char realm [cc_v4_realm_size]; unsigned char session_key [8]; cc_int32 kvno; cc_int32 string_to_key_type; cc_time_t issue_date; cc_int32 lifetime; cc_uint32 address; cc_int32 ticket_size; unsigned char ticket [cc_v4_ticket_size]; }; typedef struct cc_credentials_v4_t cc_credentials_v4_t; struct cc_data { cc_uint32 type; cc_uint32 length; void* data; }; typedef struct cc_data cc_data; struct cc_credentials_v5_t { char* client; char* server; cc_data keyblock; cc_time_t authtime; cc_time_t starttime; cc_time_t endtime; cc_time_t renew_till; cc_uint32 is_skey; cc_uint32 ticket_flags; cc_data** addresses; cc_data ticket; cc_data second_ticket; cc_data** authdata; }; typedef struct cc_credentials_v5_t cc_credentials_v5_t; struct cc_credentials_union { cc_int32 version; union { cc_credentials_v4_t* credentials_v4; cc_credentials_v5_t* credentials_v5; } credentials; }; typedef struct cc_credentials_union cc_credentials_union; /* Exposed parts */ struct cc_context_d { const cc_context_f* functions; #if TARGET_OS_MAC const cc_context_f* otherFunctions; #endif }; typedef struct cc_context_d cc_context_d; typedef cc_context_d* cc_context_t; struct cc_ccache_d { const cc_ccache_f* functions; #if TARGET_OS_MAC const cc_ccache_f* otherFunctions; #endif }; typedef struct cc_ccache_d cc_ccache_d; typedef cc_ccache_d* cc_ccache_t; struct cc_ccache_iterator_d { const cc_ccache_iterator_f* functions; #if TARGET_OS_MAC const cc_ccache_iterator_f* otherFunctions; #endif }; typedef struct cc_ccache_iterator_d cc_ccache_iterator_d; typedef cc_ccache_iterator_d* cc_ccache_iterator_t; struct cc_credentials_iterator_d { const cc_credentials_iterator_f* functions; #if TARGET_OS_MAC const cc_credentials_iterator_f* otherFunctions; #endif }; typedef struct cc_credentials_iterator_d cc_credentials_iterator_d; typedef cc_credentials_iterator_d* cc_credentials_iterator_t; struct cc_string_d { const char* data; const cc_string_f* functions; #if TARGET_OS_MAC const cc_string_f* otherFunctions; #endif }; typedef struct cc_string_d cc_string_d; typedef cc_string_d* cc_string_t; struct cc_credentials_d { const cc_credentials_union* data; const cc_credentials_f* functions; #if TARGET_OS_MAC const cc_credentials_f* otherFunctions; #endif }; typedef struct cc_credentials_d cc_credentials_d; typedef cc_credentials_d* cc_credentials_t; /* Function pointer structs */ struct cc_context_f { cc_int32 (*release) ( cc_context_t context); cc_int32 (*get_change_time) ( cc_context_t context, cc_time_t* time); cc_int32 (*get_default_ccache_name) ( cc_context_t context, cc_string_t* name); cc_int32 (*open_ccache) ( cc_context_t context, const char* name, cc_ccache_t* ccache); cc_int32 (*open_default_ccache) ( cc_context_t context, cc_ccache_t* ccache); cc_int32 (*create_ccache) ( cc_context_t context, const char* name, cc_uint32 cred_vers, const char* principal, cc_ccache_t* ccache); cc_int32 (*create_default_ccache) ( cc_context_t context, cc_uint32 cred_vers, const char* principal, cc_ccache_t* ccache); cc_int32 (*create_new_ccache) ( cc_context_t context, cc_uint32 cred_vers, const char* principal, cc_ccache_t* ccache); cc_int32 (*new_ccache_iterator) ( cc_context_t context, cc_ccache_iterator_t* iterator); cc_int32 (*lock) ( cc_context_t context, cc_uint32 lock_type, cc_uint32 block); cc_int32 (*unlock) ( cc_context_t context); cc_int32 (*compare) ( cc_context_t context, cc_context_t compare_to, cc_uint32* equal); }; struct cc_ccache_f { cc_int32 (*release) ( cc_ccache_t ccache); cc_int32 (*destroy) ( cc_ccache_t ccache); cc_int32 (*set_default) ( cc_ccache_t ccache); cc_int32 (*get_credentials_version) ( cc_ccache_t ccache, cc_uint32* credentials_version); cc_int32 (*get_name) ( cc_ccache_t ccache, cc_string_t* name); cc_int32 (*get_principal) ( cc_ccache_t ccache, cc_uint32 credentials_version, cc_string_t* principal); cc_int32 (*set_principal) ( cc_ccache_t ccache, cc_uint32 credentials_version, const char* principal); cc_int32 (*store_credentials) ( cc_ccache_t ccache, const cc_credentials_union* credentials); cc_int32 (*remove_credentials) ( cc_ccache_t ccache, cc_credentials_t credentials); cc_int32 (*new_credentials_iterator) ( cc_ccache_t ccache, cc_credentials_iterator_t* iterator); cc_int32 (*move) ( cc_ccache_t source, cc_ccache_t destination); cc_int32 (*lock) ( cc_ccache_t ccache, cc_uint32 block, cc_uint32 lock_type); cc_int32 (*unlock) ( cc_ccache_t ccache); cc_int32 (…)
/macosx-10.9.5/vim-53/runtime/syntax/
H A Dvoscm.vim35 syn keyword voscmFunction contained length lock_type locked ltrim master_disk max message min mod module_info
/macosx-10.9.5/ntfs-83/kext/
H A Dntfs_vnops.c8176 lck_rw_type_t lock_type = LCK_RW_TYPE_SHARED; local
8267 lock_type = LCK_RW_TYPE_EXCLUSIVE;
8268 if (!lck_rw_try_lock(&ni->lock, lock_type)) {
8272 (lock_type == LCK_RW_TYPE_SHARED) ?
8599 if (lock_type == LCK_RW_TYPE_SHARED)

Completed in 390 milliseconds