/freebsd/contrib/ntp/sntp/libevent/ |
H A D | bufferevent-internal.h | 486 struct bufferevent_private *locking = BEV_UPCAST(b); \ 487 EVLOCK_LOCK(locking->lock, 0); \ 492 struct bufferevent_private *locking = BEV_UPCAST(b); \ 493 EVLOCK_UNLOCK(locking->lock, 0); \
|
/freebsd/contrib/libevent/ |
H A D | bufferevent-internal.h | 486 struct bufferevent_private *locking = BEV_UPCAST(b); \ 487 EVLOCK_LOCK(locking->lock, 0); \ 492 struct bufferevent_private *locking = BEV_UPCAST(b); \ 493 EVLOCK_UNLOCK(locking->lock, 0); \
|
/freebsd/contrib/unbound/libunbound/ |
H A D | context.c | 198 context_obtain_alloc(struct ub_ctx* ctx, int locking) in context_obtain_alloc() argument 202 if(locking) { in context_obtain_alloc() 209 if(locking) { in context_obtain_alloc() 225 int locking) in context_release_alloc() argument 229 if(locking) { in context_release_alloc() 234 if(locking) { in context_release_alloc()
|
H A D | context.h | 241 struct alloc_cache* context_obtain_alloc(struct ub_ctx* ctx, int locking); 250 int locking);
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | keymgmt_lib.c | 222 int evp_keymgmt_util_clear_operation_cache(EVP_PKEY *pk, int locking) in evp_keymgmt_util_clear_operation_cache() argument 225 if (locking && pk->lock != NULL && !CRYPTO_THREAD_write_lock(pk->lock)) in evp_keymgmt_util_clear_operation_cache() 229 if (locking && pk->lock != NULL) in evp_keymgmt_util_clear_operation_cache()
|
/freebsd/contrib/sendmail/ |
H A D | KNOWNBUGS | 23 * Berkeley DB map locking problem with fcntl(). 25 For Linux the default is to use fcntl() for file locking. However, 234 * Berkeley DB 2.X race condition with fcntl() locking 237 operating systems which use fcntl() style locking, such as 241 reopens it. fcntl() locking drops the lock when any file 267 permission failure race as sendmail checks the permissions before locking
|
H A D | README | 117 Any application which uses either flock() or fcntl() style locking or 118 other APIs that use one of these locking methods (such as open() with 122 File locking is used throughout sendmail for a variety of files 127 statistics files. For system which use flock() for file locking, a 155 use fcntl() style locking. Since it does not interfere with normal 329 File locking using fcntl() does not interoperate with Berkeley DB 427 it does mailbox locking differently than other systems.
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | evp_keymgmt_util_export_to_provider.pod | 28 int evp_keymgmt_util_clear_operation_cache(EVP_PKEY *pk, int locking); 55 clear the cache of operation key references. If I<locking> is set to 1 then
|
/freebsd/contrib/sendmail/libsmutil/ |
H A D | t-maplock-0.sh | 36 $0: test basic makemap locking;
|
/freebsd/contrib/llvm-project/libcxx/modules/std/ |
H A D | mutex.cppm |
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_STORE_new.pod | 7 - X509_STORE allocation, freeing and locking functions
|
H A D | BN_CTX_new.pod | 45 locking is performed, and the internal pool allocator will not properly handle
|
H A D | EVP_RAND.pod | 160 EVP_RAND_enable_locking() enables locking for the RAND I<ctx> and all of 163 I<ctx> from multiple threads. Typically locking should be enabled before a 347 An B<EVP_RAND_CTX> needs to have locking enabled if it acts as the parent of
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_RAND.pod | 104 by its child DRBG instances. The necessary locking is done internally. 109 locking via the EVP_RAND interface. 117 All other DRBG instances created by an application don't support locking, 135 RAND_add() ==> <primary> <-| shared DRBG (with locking) |
|
H A D | openssl-threads.pod | 75 will do any necessary locking. 77 do no locking at all; this can be considered a bug.
|
H A D | provider-rand.pod | 139 When DRBGs are used by multiple threads, there must be locking employed to 140 ensure their proper operation. Because locking introduces an overhead, it 143 OSSL_FUNC_rand_enable_locking() allows locking to be turned on for a DRBG and all of
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | crypto.h.in | 257 * The old locking functions have been removed completely without compatibility 260 * Replacing the locking functions with no-ops would cause race condition 263 * On the other hand, the locking callbacks are no longer used. Consequently, 273 * These defines where used in combination with the old locking callbacks,
|
/freebsd/usr.sbin/cron/doc/ |
H A D | THANKS | 13 Paul Close made a suggestion which led to /etc/crond.pid and the mutex locking
|
/freebsd/sys/kern/ |
H A D | vnode_if.src | 31 # is a specification of the locking protocol used by each vop call. 35 # return, and the "error" column defines the locking state on error exit. 37 # The locking value can take the following values: 62 # XXX - the lookup locking protocol defies simple description and depends
|
/freebsd/sys/geom/ |
H A D | notes | 16 therefore the two fields do not generally need locking. These 61 the bio when it is completed. There are no concurrency or locking
|
/freebsd/sbin/route/ |
H A D | route.c | 91 static int locking, lockrest; variable 815 if (lockrest || locking) in set_metric() 817 if (locking) in set_metric() 818 locking = 0; in set_metric() 900 locking = 1; in newroute()
|
/freebsd/contrib/sendmail/contrib/ |
H A D | mailprio | 94 $locking = "flock"; # "flock" or "fcntl" 255 # File locking 283 X if ($locking eq "flock") { 361 X In mailprio check: #!perl path, $home, $priodb, $locking
|
/freebsd/lib/libc/locale/ |
H A D | DESIGN.xlocale | 38 and it can therefore be used without locking. It is the responsibility of the 104 calls to `localeconv()`. This is not protected by any locking, however this is
|
/freebsd/contrib/nvi/ |
H A D | README | 22 Sven Verdoolaege added the iconv support and the DB3 locking.
|
/freebsd/sys/contrib/device-tree/Bindings/mtd/ |
H A D | mtd-physmap.txt | 31 Bits) locking.
|