/netbsd-6-1-5-RELEASE/bin/pax/ |
H A D | ftree.c | 532 } else { /* move back to parent */ 540 ftnode = ftnode->parent; 541 if (ftnode->parent == ftnode)
|
/netbsd-6-1-5-RELEASE/bin/sh/ |
H A D | eval.c | 490 * of the shell, which make the last process in a pipeline the parent 842 * child's address space is actually shared with the parent as 864 * so, set vforked = 2 so the parent 891 goto parent; 897 goto parent; /* at end of routine */ 1066 parent: /* parent process gets here (if we forked) */ 1089 * location of the command will be available in the parent as well as
|
/netbsd-6-1-5-RELEASE/common/lib/libc/gen/ |
H A D | ptree.c | 213 pt_node_t *parent; local 215 for (parent = &pt->pt_rootnode;;) { 217 &PTN_BRANCH_SLOT(parent, ptree_testnode(pt, branch, parent)); 222 parent = PT_NODE(*nodep); 266 * However, it's possible that mask's parent is itself. If 638 pt_node_t *ptn, *parent; local 646 parent = &pt->pt_rootnode; 649 const uintptr_t node = PTN_BRANCH_SLOT(parent, parent_slot); 679 parent 820 pt_node_t *ptn, *parent; local 1069 ptree_check_find_node2(const pt_tree_t *pt, const pt_node_t *parent, uintptr_t target) argument 1094 ptree_check_leaf(const pt_tree_t *pt, const pt_node_t *parent, const pt_node_t *ptn) argument 1131 ptree_check_branch(const pt_tree_t *pt, const pt_node_t *parent, const pt_node_t *ptn) argument 1200 const pt_node_t * const parent = &pt->pt_rootnode; local [all...] |
H A D | rb.c | 116 struct rb_node *parent = rbt->rbt_root; local 118 while (!RB_SENTINEL_P(parent)) { 119 void *pobj = RB_NODETOITEM(rbto, parent); 124 parent = parent->rb_nodes[diff < 0]; 135 struct rb_node *parent = rbt->rbt_root, *last = NULL; local 137 while (!RB_SENTINEL_P(parent)) { 138 void *pobj = RB_NODETOITEM(rbto, parent); 144 last = parent; 145 parent 156 struct rb_node *parent = rbt->rbt_root, *last = NULL; local 177 struct rb_node *parent, *tmp, *self = RB_ITEMTONODE(rbto, object); local 803 rb_tree_removal_rebalance(struct rb_tree *rbt, struct rb_node *parent, unsigned int which) argument [all...] |
H A D | rpst.c | 182 struct rpst_node *parent; local 187 parent = NULL; 191 n->n_parent = parent; 196 KASSERT(cur->n_parent == parent); 215 parent = cur; 241 * also, return the parent node via parentp. (NULL for the root node.) 248 struct rpst_node * const parent = n->n_parent; local 251 *parentp = parent; 252 if (parent == NULL) { 256 if (parent 269 rpst_remove_node_at(struct rpst_node *parent, struct rpst_node **where, struct rpst_node *cur) argument 352 struct rpst_node *parent; local [all...] |
/netbsd-6-1-5-RELEASE/common/lib/libprop/ |
H A D | prop_rb.c | 157 struct rb_node *parent, *tmp; local 171 parent = (struct rb_node *)&rbt->rbt_root; 185 parent = tmp; 192 tmp = parent->rb_nodes[position]; 200 prev = parent; 202 next = parent; 225 self->rb_parent = parent; 228 if (__predict_false(parent == (struct rb_node *) &rbt->rbt_root)) { 234 KASSERT(RB_SENTINEL_P(parent->rb_nodes[position])); 235 self->rb_left = parent 360 struct rb_node *parent = rbt->rbt_root; local 535 struct rb_node *parent = self->rb_parent; local 629 rb_tree_removal_rebalance(struct rb_tree *rbt, struct rb_node *parent, unsigned int which) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/base/ |
H A D | heimbase.c | 76 struct heim_auto_release *parent; member in struct:heim_auto_release 458 tls->current = ar->parent; 503 ar->parent = tls->current;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | connect.c | 555 * accept a new TCP connection on `d[parent]' and store it in `d[child]' 561 struct descr *d, int parent, int child) 569 s = accept(d[parent].s, d[child].sa, &d[child].sock_len); 559 add_new_tcp(krb5_context context, krb5_kdc_configuration *config, struct descr *d, int parent, int child) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | cert.c | 931 * subject certificate nor the parent. 1055 hx509_cert *parent) 1061 *parent = NULL; 1096 ret = hx509_certs_find(context, pool, &q, parent); 1105 ret = hx509_certs_find(context, trust_anchors, &q, parent); 1221 * follow the chain upward until we no longer find a parent or we hit 1242 hx509_cert parent, current; local 1257 pool, current, &parent); 1262 ret = _hx509_path_append(context, path, parent); 1265 current = parent; 1049 find_parent(hx509_context context, time_t time_now, hx509_certs trust_anchors, hx509_path *path, hx509_certs pool, hx509_cert current, hx509_cert *parent) argument 2292 int parent = (i < path.len - 1) ? i + 1 : i; local [all...] |
H A D | revoke.c | 176 hx509_cert parent) 191 q.issuer_name = &_hx509_get_cert(parent)->tbsCertificate.issuer; 215 if (hx509_cert_cmp(signer, parent) != 0) { 216 Certificate *p = _hx509_get_cert(parent); 228 parent, 462 hx509_cert parent) 495 if (_hx509_check_key_usage(context, parent, 1 << 6, FALSE) == 0) { 496 signer = hx509_cert_ref(parent); 523 * CRL signing cert too, this include all parent CRL signer cert 539 "Failed to find parent o 172 verify_ocsp(hx509_context context, struct revoke_ocsp *ocsp, time_t time_now, hx509_certs certs, hx509_cert parent) argument 457 verify_crl(hx509_context context, hx509_revoke_ctx ctx, CRLCertificateList *crl, time_t time_now, hx509_certs certs, hx509_cert parent) argument 863 hx509_cert parent; member in struct:ocsp_add_ctx 871 hx509_cert parent = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | config_file.c | 83 krb5_config_binding **parent, 86 krb5_config_binding **parent, 90 _krb5_config_get_entry(krb5_config_section **parent, const char *name, int type) argument 94 for(q = parent; *q != NULL; q = &(*q)->next) 123 * `s' and hooking it into `parent'. 128 parse_section(char *p, krb5_config_section **s, krb5_config_section **parent, argument 140 tmp = _krb5_config_get_entry(parent, p + 1, krb5_config_list); 151 * `parent'. 156 parse_list(struct fileptr *f, unsigned *lineno, krb5_config_binding **parent, argument 180 ret = parse_binding (f, lineno, p, &b, parent, err_messag 194 parse_binding(struct fileptr *f, unsigned *lineno, char *p, krb5_config_binding **b, krb5_config_binding **parent, const char **err_message) argument 276 krb5_config_section *tmp, **parent = context; local 299 parse_plist_config(krb5_context context, const char *path, krb5_config_section **parent) argument [all...] |
H A D | config_reg.c | 296 DWORD type, DWORD cbdata, krb5_config_section ** parent) 307 value = _krb5_config_get_entry(parent, valuename, krb5_config_string); 329 krb5_config_section ** parent) 349 code = parse_reg_value(context, key, name, type, cbdata, parent); 360 krb5_config_section ** parent) 380 section = _krb5_config_get_entry(parent, name, krb5_config_list); 407 krb5_config_section ** parent) 412 libdefaults = _krb5_config_get_entry(parent, "libdefaults", krb5_config_list); 422 return parse_reg_subkeys(context, key, parent); 294 parse_reg_value(krb5_context context, HKEY key, const char * valuename, DWORD type, DWORD cbdata, krb5_config_section ** parent) argument 327 parse_reg_values(krb5_context context, HKEY key, krb5_config_section ** parent) argument 358 parse_reg_subkeys(krb5_context context, HKEY key, krb5_config_section ** parent) argument 405 parse_reg_root(krb5_context context, HKEY key, krb5_config_section ** parent) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | crypto.h | 230 pgp_stream_t *parent;/* parent parse_info structure */ member in struct:pgp_reader_t
|
H A D | packet-parse.c | 185 subregion->parent = region; 424 if (region->parent && region->length > region->parent->length) { 429 } while ((region = region->parent) != NULL);
|
H A D | packet-parse.h | 62 struct pgp_region_t *parent; member in struct:pgp_region_t
|
H A D | reader.c | 218 stream->readinfo.parent = stream; 1413 if (encrypted->prevplain && !readinfo->parent->reading_mpi_len) { 1414 if (!readinfo->parent->reading_v3_secret) { 1421 } else if (readinfo->parent->reading_v3_secret && 1422 readinfo->parent->reading_mpi_len) { 1433 (readinfo->parent->reading_v3_secret || 1434 readinfo->parent->exact_read)) { 1471 if ((readinfo->parent->reading_v3_secret || 1472 readinfo->parent->exact_read) && n > length) { 1480 if (!readinfo->parent [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ |
H A D | crypto.h | 160 typedef int CRYPTO_EX_new(void *parent, void *ptr, CRYPTO_EX_DATA *ad, 163 typedef void CRYPTO_EX_free(void *parent, void *ptr, CRYPTO_EX_DATA *ad,
|
H A D | ossl_typ.h | 191 typedef int CRYPTO_EX_new(void *parent, void *ptr, CRYPTO_EX_DATA *ad, 193 typedef void CRYPTO_EX_free(void *parent, void *ptr, CRYPTO_EX_DATA *ad,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/engine/ |
H A D | eng_dyn.c | 164 static void dynamic_data_ctx_free_func(void *parent, void *ptr, argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509_vfy.c | 473 if (ctx->parent) 679 if (ctx->parent) 1114 * parent. This could be optimised somewhat since a lot of path checking 1115 * will be duplicated by the parent, but this will rarely be used in 1124 if (ctx->parent) 1133 crl_ctx.parent = ctx; 1492 if (ctx->parent) 1901 return ctx->parent; 2028 ctx->parent = NULL; 2148 if (ctx->parent [all...] |
H A D | x509_vfy.h | 275 X509_STORE_CTX *parent; /* For CRL path validation: parent context */ member in struct:x509_store_ctx_st
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509v3/ |
H A D | pcy_int.h | 67 * RFC3280. NB this structure contains no pointers to parent or child 139 X509_POLICY_NODE *parent; member in struct:X509_POLICY_NODE_st 198 const X509_POLICY_NODE *parent, 206 X509_POLICY_NODE *parent,
|
H A D | pcy_lib.c | 164 return node->parent;
|
H A D | pcy_node.c | 95 const X509_POLICY_NODE *parent, 103 if (node->parent == parent) 114 X509_POLICY_NODE *parent, 122 node->parent = parent; 154 if (parent) 155 parent->nchild++; 94 level_find_node(const X509_POLICY_LEVEL *level, const X509_POLICY_NODE *parent, const ASN1_OBJECT *id) argument 112 level_add_node(X509_POLICY_LEVEL *level, const X509_POLICY_DATA *data, X509_POLICY_NODE *parent, X509_POLICY_TREE *tree) argument
|
H A D | pcy_tree.c | 336 * link any data from CertificatePolicies onto matching parent 353 * no match with the parent valid_policy_set. So we create 370 * Create new data for any unmatched policies in the parent and link 518 node->parent->nchild--; 533 node->parent->nchild--; 540 if (curr->anyPolicy->parent) 541 curr->anyPolicy->parent->nchild--; 618 if ((node->parent == anyptr) 680 node = level_add_node(NULL, extra, anyPolicy->parent,
|