Lines Matching defs:pid
239 pid_t pid, pidw;
360 pid = fork();
361 if (pid < 0) {
363 } else if (pid == 0) {
373 pidw = waitpid(pid, &status, 0);
374 if (pidw != pid) {
385 pid = fork();
386 if (pid < 0) {
388 } else if (pid == 0) {
397 pidw = waitpid(pid, &status, 0);
398 if (pidw != pid) {
672 void ssl_helper_pid(pid_t pid, int sock);
1389 pid_t pid, pidw;
1440 pid = fork();
1441 if (pid < 0) {
1443 } else if (pid == 0) {
1453 pidw = waitpid(pid, &status, 0);
1454 if (pidw != pid) {
2926 void ssl_helper_pid(pid_t pid, int sock) {
2945 if (pid == 0) {
2993 if (db) fprintf(stderr, "ssl_helper_pid(%d, %d)\n", pid, sock);
2999 if (helpers[i] == pid) {
3022 helpers[empty] = pid;
3041 helpers[empty] = pid;
3240 pid_t pid;
3473 pid = fork();
3475 if (pid > 0) {
3476 pid %d: \n",
3477 peerport, (int) pid);
3480 if (pid < 0) {
3490 } else if (pid == 0) {
3498 if (db) fprintf(stderr, "helper pid in: %d %d %d %d\n", f_in, f_out, sock, listen);
3866 if (db) fprintf(stderr, "helper process is: %d\n", pid);
3881 rfbLog("SSL: accept_openssl: connection from ssl_helper[%d] FAILED.\n", pid);
3884 kill(pid, SIGTERM);
3885 waitpid(pid, &status, WNOHANG);
3974 rfbLog("SSL: VENCRYPT mode=%d accepted. helper[%d]\n", vencrypt_sel, pid);
3981 rfbLog("SSL: ANONTLS mode=%d accepted. helper[%d]\n", anontls_sel, pid);
3989 rfbLog("SSL: accept_openssl: cookie from ssl_helper[%d] FAILED. %d\n", pid, n);
4001 rfbLog("SSL: BUT WAIT! HTTPS for helper process[%d] succeeded. Good.\n", pid);
4012 rfbLog("helper[%d]:\n", pid);
4023 ssl_helper_pid(pid, -2);
4044 rfbLog("SSL: -httpsredir guess port: %d helper[%d]\n", screen->port, pid);
4053 waitpid(pid, &status, WNOHANG);
4054 if (kill(pid, 0) != 0) {
4055 rfbLog("SSL: helper[%d] pid finished\n", pid);
4060 rfbLog("SSL: httpSock for helper[%d] went away\n", pid);
4065 pid, dnow() - start);
4094 rfbLog("SSL: screen->port %d for helper[%d]\n", screen->port, pid);
4103 waitpid(pid, &status, WNOHANG);
4104 if (kill(pid, 0) != 0) {
4105 rfbLog("SSL: helper[%d] pid finished\n", pid);
4110 rfbLog("SSL: httpSock for helper[%d] went away\n", pid);
4116 pid, dnow() - start);
4129 kill(pid, SIGTERM);
4130 waitpid(pid, &status, WNOHANG);
4141 rfbLog("SSL: handshake with helper process[%d] succeeded.\n", pid);
4143 openssl_last_helper_pid = pid;
4144 ssl_helper_pid(pid, vsock);
4204 kill(pid, SIGTERM);
4205 waitpid(pid, &status, WNOHANG);
4219 pid_t pid = fork();
4229 if (pid < 0) {
4233 if (pid) {
4260 kill(pid, SIGTERM);
4261 waitpid(pid, &status, WNOHANG);