/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | tsget | 40 my $curl = WWW::Curl::Easy::new(); 43 $curl->setopt(CURLOPT_VERBOSE, 1) if $options{d}; 44 $curl->setopt(CURLOPT_FAILONERROR, 1); 45 $curl->setopt(CURLOPT_USERAGENT, "OpenTSA tsget.pl/" . (split / /, $::version)[2]); 48 $curl->setopt(CURLOPT_UPLOAD, 1); 49 $curl->setopt(CURLOPT_CUSTOMREQUEST, "POST"); 50 $curl->setopt(CURLOPT_HTTPHEADER, 53 $curl->setopt(CURLOPT_READFUNCTION, \&read_body); 54 $curl->setopt(CURLOPT_HEADERFUNCTION, sub { return length($_[0]); }); 57 $curl [all...] |
/netbsd-6-1-5-RELEASE/sys/miscfs/procfs/ |
H A D | procfs_mem.c | 92 struct lwp *curl, /* tracer */ 99 return (process_domem(curl, l, uio)); 91 procfs_domem( struct lwp *curl, struct lwp *l, struct pfsnode *pfs, struct uio *uio ) argument
|
H A D | procfs_regs.c | 86 struct lwp *curl, /* tracer */ 93 return (process_doregs(curl, l, uio)); 85 procfs_doregs( struct lwp *curl, struct lwp *l, struct pfsnode *pfs, struct uio *uio ) argument
|
H A D | procfs_fpregs.c | 89 struct lwp *curl, /* tracer */ 96 return (process_dofpregs(curl, l, uio)); 88 procfs_dofpregs( struct lwp *curl, struct lwp *l, struct pfsnode *pfs, struct uio *uio ) argument
|
H A D | procfs_fd.c | 47 procfs_dofd(lwp_t *curl, proc_t *p, struct pfsnode *pfs, struct uio *uio) argument 60 error = (*fp->f_ops->fo_read)(fp, &offs, uio, curl->l_cred, 0); 63 error = (*fp->f_ops->fo_write)(fp, &offs, uio, curl->l_cred, 0);
|
H A D | procfs_subr.c | 339 struct lwp *curl; local 351 curl = curlwp; 360 error = kauth_authorize_process(curl->l_cred, KAUTH_PROCESS_PROCFS, 387 error = procfs_donote(curl, p, pfs, uio); 391 error = procfs_doregs(curl, l, pfs, uio); 395 error = procfs_dofpregs(curl, l, pfs, uio); 399 error = procfs_doctl(curl, l, pfs, uio); 403 error = procfs_dostatus(curl, l, pfs, uio); 407 error = procfs_do_pid_stat(curl, l, pfs, uio); 411 error = procfs_domap(curl, 710 procfs_doemul(struct lwp *curl, struct proc *p, struct pfsnode *pfs, struct uio *uio) argument [all...] |
H A D | procfs_note.c | 88 struct lwp *curl, 87 procfs_donote( struct lwp *curl, struct proc *p, struct pfsnode *pfs, struct uio *uio ) argument
|
H A D | procfs_ctl.c | 135 procfs_control(struct lwp *curl, struct lwp *l, int op, int sig, struct pfsnode *pfs) argument 137 struct proc *curp = curl->l_proc; 170 if ((error = kauth_authorize_process(curl->l_cred, 363 struct lwp *curl, 396 error = procfs_control(curl, l, nm->nm_val, 0, pfs); 402 error = procfs_control(curl, l, PROCFS_CTL_RUN, 362 procfs_doctl( struct lwp *curl, struct lwp *l, struct pfsnode *pfs, struct uio *uio ) argument
|
H A D | procfs_linux.c | 138 procfs_domeminfo(struct lwp *curl, struct proc *p, argument 189 procfs_dodevices(struct lwp *curl, struct proc *p, argument 249 procfs_docpustat(struct lwp *curl, struct proc *p, argument 327 procfs_doloadavg(struct lwp *curl, struct proc *p, argument 363 procfs_do_pid_statm(struct lwp *curl, struct lwp *l, argument 410 procfs_do_pid_stat(struct lwp *curl, struct lwp *l, argument 510 procfs_docpuinfo(struct lwp *curl, struct proc *p, argument 534 procfs_douptime(struct lwp *curl, struct proc *p, argument 563 const struct statvfs *sfs, struct lwp *curl, int suser) 590 procfs_domounts(struct lwp *curl, struc argument 562 procfs_format_sfs(char **mtab, size_t *mlen, char *buf, size_t blen, const struct statvfs *sfs, struct lwp *curl, int suser) argument 640 procfs_doversion(struct lwp *curl, struct proc *p, struct pfsnode *pfs, struct uio *uio) argument [all...] |
H A D | procfs_map.c | 108 procfs_domap(struct lwp *curl, struct proc *p, struct pfsnode *pfs, argument 166 error = VOP_GETATTR(vp, &va, curl->l_cred); 172 MAXPATHLEN * 4, vp, curl, p);
|
H A D | procfs_cmdline.c | 65 struct lwp *curl, 64 procfs_docmdline( struct lwp *curl, struct proc *p, struct pfsnode *pfs, struct uio *uio ) argument
|
H A D | procfs_status.c | 93 struct lwp *curl, 92 procfs_dostatus( struct lwp *curl, struct lwp *l, struct pfsnode *pfs, struct uio *uio ) argument
|
/netbsd-6-1-5-RELEASE/sys/arch/powerpc/powerpc/ |
H A D | procfs_machdep.c | 48 procfs_machdep_rw(struct lwp *curl, struct lwp *l, struct pfsnode *pfs, argument 54 return (procfs_machdep_dovecregs(curl, l, pfs, uio)); 82 procfs_machdep_dovecregs(struct lwp *curl, struct lwp *l, argument 86 return (process_machdep_dovecregs(curl, l, uio));
|
H A D | process_machdep.c | 236 process_machdep_dovecregs(struct lwp *curl, struct lwp *l, struct uio *uio) argument
|
/netbsd-6-1-5-RELEASE/sys/arch/x86/x86/ |
H A D | procfs_machdep.c | 257 procfs_machdep_rw(struct lwp *curl, struct lwp *l, struct pfsnode *pfs, argument 263 return (procfs_machdep_doxmmregs(curl, l, pfs, uio)); 286 procfs_machdep_doxmmregs(struct lwp *curl, struct lwp *l, argument 290 return process_machdep_doxmmregs(curl, l, uio);
|
/netbsd-6-1-5-RELEASE/sys/kern/ |
H A D | kern_ktrace.c | 496 lwp_t *curl = curlwp; local 507 if (!auth || ktrcanset(curl, p)) 1048 ktrace_common(lwp_t *curl, int ops, int facs, int pid, file_t **fpp) argument 1059 curp = curl->l_proc; 1063 (void)ktrenter(curl); 1164 ret |= ktrsetchildren(curl, p, ops, 1167 ret |= ktrops(curl, p, ops, facs, 1180 ret |= ktrsetchildren(curl, p, ops, facs, ktd); 1182 ret |= ktrops(curl, p, ops, facs, ktd); 1202 ktrexit(curl); 1304 ktrops(lwp_t *curl, struct proc *p, int ops, int facs, struct ktr_desc *ktd) argument 1370 ktrsetchildren(lwp_t *curl, struct proc *top, int ops, int facs, struct ktr_desc *ktd) argument [all...] |
H A D | vfs_getcwd.c | 546 vnode_to_path(char *path, size_t len, struct vnode *vp, struct lwp *curl, argument 549 struct proc *curp = curl->l_proc; 569 GETCWD_CHECK_ACCESS, curl);
|
H A D | kern_event.c | 454 struct lwp *curl; local 456 curl = curlwp; 457 curp = curl->l_proc; 472 if (kauth_authorize_process(curl->l_cred, KAUTH_PROCESS_KEVENT_FILTER,
|
H A D | kern_lwp.c | 353 lwp_suspend(struct lwp *curl, struct lwp *t) argument 360 KASSERT(curl != t || curl->l_stat == LSONPROC); 366 if ((curl->l_flag & (LW_WEXIT | LW_WCORE)) != 0) {
|
H A D | sys_process.c | 946 process_doregs(struct lwp *curl /*tracer*/, 996 process_dofpregs(struct lwp *curl /*tracer*/, 1055 process_domem(struct lwp *curl /*tracer*/,
|
/netbsd-6-1-5-RELEASE/sys/arch/sh3/sh3/ |
H A D | process_machdep.c | 228 process_machdep_doregs40(struct lwp *curl, struct lwp *l, struct uio *uio) argument
|
/netbsd-6-1-5-RELEASE/sys/arch/i386/i386/ |
H A D | process_machdep.c | 514 process_machdep_doxmmregs(struct lwp *curl, struct lwp *l, struct uio *uio) argument 515 /* curl: tracer */
|