Searched refs:leaf (Results 1 - 25 of 111) sorted by path

12345

/macosx-10.10.1/BerkeleyDB-21/db/btree/
H A Dbt_verify.c182 * Verify a recno leaf page.
287 * Verify a btree leaf or internal page.
592 * a btree leaf and they're onpage duplicate keys--
640 * on leaf pages are stored as the entire entry.
920 * we inc. by one or two depends on whether we're a leaf page--
921 * on a leaf page, we care only about keys. On internal pages
1064 * If we're a btree leaf, check to see
1322 * For each leaf page we hit, we'll want to make sure that
1325 * and vdp->prev_pgno to our page number, and the next leaf page in
1332 * caller's leaf pag
[all...]
/macosx-10.10.1/CPANInternal-159.1/Heap-0.80/lib/Heap/
H A DBinary.pm250 # child up until a pair of larger children is found or a leaf node is
256 my $leaf = int(@$h/2);
258 while( $i < $leaf ) {
/macosx-10.10.1/CPANInternal-159.1/Tree-Simple-1.18/lib/Tree/
H A DSimple.pm846 tree to the furthest leaf node.
851 it is a count of all the leaf nodes.
/macosx-10.10.1/CPANInternal-159.1/Tree-Simple-VisitorFactory-0.10/lib/Tree/Simple/Visitor/
H A DCreateDirectoryTree.pm65 # if its a leaf and it
152 =item Any node which is not a leaf is considered a directory.
154 Obviously since files themselves are leaf nodes, this makes sense that non-leaves will be directories.
156 =item Any node (including leaf nodes) which ends in either the character C</> or C<\> is considered a directory.
H A DLoadClassHierarchy.pm45 # it must be a leaf
46 ($tree->isLeaf()) || die "Illegal Operation : The tree must be a leaf node to load a class hierarchy";
159 The C<$tree> argument which is passed to C<visit> must be a leaf node. This is because this Visitor will create all the sub-nodes for this tree. If the tree is not a leaf, an exception is thrown. We do not require the tree to be a root though, and this Visitor will not affect any nodes above the C<$tree> argument.
H A DLoadDirectoryTree.pm63 # it must be a leaf
64 ($tree->isLeaf()) || die "Illegal Operation : The tree must be a leaf node to load a directory";
200 The C<$tree> argument which is passed to C<visit> must be a leaf node. This is because this Visitor will create all the sub-nodes for this tree. If the tree is not a leaf, an exception is thrown. We do not require the tree to be a root though, and this Visitor will not affect any nodes above the C<$tree> argument.
/macosx-10.10.1/CPANInternal-159.1/Tree-Simple-VisitorFactory-0.10/t/
H A D80_Tree_Simple_Visitor_Sort_test.t163 # test visitiing a leaf node
164 my $leaf = Tree::Simple->new("leaf");
165 $leaf->accept($visitor);
/macosx-10.10.1/Heimdal-398.1.2/lib/akadmin/
H A DHeimODAdmin.c1906 CFStringRef leaf = NULL, anchor = NULL; local
1983 leaf = CFStringCreateWithCString(kCFAllocatorDefault, subjectstr, kCFStringEncodingUTF8);
1984 if (leaf == NULL) {
1997 if (!HeimODAddCertificateSubjectAndTrustAnchor(node, record, leaf, anchor, error))
2001 if (leaf)
2002 CFRelease(leaf);
/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/
H A Dtest_cms.in431 --embed-leaf-only \
/macosx-10.10.1/Heimdal-398.1.2/lib/roken/
H A Dsearch.hin30 leaf
H A Dtsearch-test.c50 if (order == postorder || order == leaf) {
H A Dtsearch.c82 (*action)(root, leaf, level);
/macosx-10.10.1/Heimdal-398.1.2/lib/sqlite/
H A Dsqlite3.c47618 u8 leaf; /* True if leaf flag is set */ member in struct:MemPage
[all...]
/macosx-10.10.1/IOFireWireFamily-456/IOFireWireFamily.kmodproj/
H A DIOFireWireDevice.cpp1134 // Get entry as data because leaf may not have text descriptor key
1144 UInt32 * leaf = (UInt32 *)(iidcVendorData->getBytesNoCopy()); // get data pointer local
1146 UInt32 len = iidcVendorData->getLength() - 8; // subtract header bytes of text leaf descriptor
1148 if ( len <= 256 && leaf ) // defend against a bad ROM
1151 char * text = (char *)(&leaf[2]);
1161 // Because IIDC 1.31 & 1212 don't require text within a text leaf descriptor to be
1185 // Get entry as data because leaf may not have text descriptor key
1195 UInt32 * leaf = (UInt32 *)(iidcModelData->getBytesNoCopy()); // get data pointer local
1197 UInt32 len = iidcModelData->getLength() - 8; // subtract header bytes of text leaf descriptor
1202 char * text = (char *)(&leaf[
[all...]
/macosx-10.10.1/IOPCIFamily-239.1.2/
H A Dvtd.c435 uint64_t did, ppnum_t addr, ppnum_t mask, bool leaf)
439 unit->iotlb->address = ptoa_64(addr) | (leaf << 6) | mask;
1518 unsigned int leaf; local
1530 leaf = true;
1541 unit_invalidate(unit, kTheDomain, unitAddr[idx], unit->rounding, leaf);
1567 unsigned int leaf, isLarge; local
1595 leaf = true;
1636 unit->qi_table[idx].address = ptoa_64(unitAddr) | (leaf << 6) | mask;
434 unit_invalidate(vtd_unit_t * unit, uint64_t did, ppnum_t addr, ppnum_t mask, bool leaf) argument
/macosx-10.10.1/JavaScriptCore-7600.1.17/disassembler/udis86/
H A Dud_opcode.py194 # make leaf node entries
195 leaf = self.updateTable(table, index, 'insn', '')
197 leaf['mnemonic'] = insn.mnemonic
198 leaf['prefixes'] = insn.prefixes
199 leaf['operands'] = insn.operands
/macosx-10.10.1/Libc-1044.1.2/include/
H A Dsearch.h29 leaf enumerator in enum:__anon2766
/macosx-10.10.1/Libc-1044.1.2/stdlib/FreeBSD/
H A Dtwalk.c38 (*action)(root, leaf, level);
/macosx-10.10.1/NFS-82/rpc.statd/
H A Dfile.c165 if ((v != postorder) && (v != leaf))
/macosx-10.10.1/OpenSSL098-52/src/crypto/
H A Dsparccpuid.S145 be 1f ! could have been a leaf function...
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A Dpolicyengine.cpp946 if (SecCertificateRef leaf = SecCertificateRef(CFArrayGetValueAtIndex(chain, 0)))
947 if (CFStringRef summary = SecCertificateCopyLongDescription(NULL, leaf, NULL)) {
H A Dsyspolicy.sql140 values (1, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9] exists');
144 values (2, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.10] exists');
148 values (1, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and certificate leaf[field.1.2.840.113635.100.6.1.13] exists');
150 values (2, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and (certificate leaf[field.1.2.840.113635.100.6.1.14] or certificate leaf[field.1.2.840.113635.100.6.1.13])');
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpPolicies.cpp1185 * leaf cert's subject common name against the caller's (optional)
1198 TPCertInfo *leaf = certGroup.certAtIndex(0); local
1199 assert(leaf != NULL);
1246 match = tpCompareSubjectName(*leaf, SN_CommonName, false, hostName, hostNameLen,
1283 if(leaf->addStatusCode(CSSMERR_APPLETP_HOSTNAME_MISMATCH)) {
1288 if(leaf->addStatusCode(CSSMERR_APPLETP_CA_PIN_MISMATCH)) {
1296 * leaf, that either anyExtendedKeyUsage or the appropriate
1345 if(leaf->addStatusCode(CSSMERR_APPLETP_SSL_BAD_EXT_KEY_USE)) {
1369 /* we only have the leaf? */
1370 if(leaf
1415 TPCertInfo *leaf = certGroup.certAtIndex(0); local
1893 TPCertInfo *leaf = certGroup.certAtIndex(0); local
1921 TPCertInfo *leaf = certGroup.certAtIndex(0); local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A Dpolicyengine.cpp946 if (SecCertificateRef leaf = SecCertificateRef(CFArrayGetValueAtIndex(chain, 0)))
947 if (CFStringRef summary = SecCertificateCopyLongDescription(NULL, leaf, NULL)) {
H A Dsyspolicy.sql140 values (1, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9] exists');
144 values (2, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.10] exists');
148 values (1, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and certificate leaf[field.1.2.840.113635.100.6.1.13] exists');
150 values (2, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and (certificate leaf[field.1.2.840.113635.100.6.1.14] or certificate leaf[field.1.2.840.113635.100.6.1.13])');

Completed in 782 milliseconds

12345