/freebsd-13-stable/contrib/bzip2/ |
H A D | bzlib_private.h | 406 Int32 limit [BZ_N_GROUPS][BZ_MAX_ALPHA_SIZE]; member in struct:__anon505
|
/freebsd-13-stable/contrib/libevent/include/event2/ |
H A D | http.h | 750 /** Sets the retry limit for this connection - -1 repeats indefinitely */ 1178 * @param limit destination buffer size 1183 char *evhttp_uri_join(struct evhttp_uri *uri, char *buf, size_t limit);
|
/freebsd-13-stable/contrib/ntp/sntp/libevent/ |
H A D | bufferevent_openssl.c | 734 ev_ssize_t limit; local 760 /* Respect the rate limit */ 761 limit = bufferevent_get_read_max_(&bev->bev); 762 if (result > limit) { 763 result = limit; 806 * regrettable). The damage to the rate-limit has
|
/freebsd-13-stable/contrib/ntp/sntp/libevent/include/event2/ |
H A D | http.h | 715 /** Sets the retry limit for this connection - -1 repeats indefinitely */ 1143 * @param limit destination buffer size 1148 char *evhttp_uri_join(struct evhttp_uri *uri, char *buf, size_t limit);
|
/freebsd-13-stable/contrib/ncurses/progs/ |
H A D | infocmp.c | 429 * macro is used for limit-checks against the symbols that tic uses to omit 433 #define check_user_definable(n,limit) if (!_nc_user_definable && (n) > (limit)) break 435 #define check_user_definable(n,limit) if ((n) > (limit)) break
|
/freebsd-13-stable/sys/netgraph/bluetooth/hci/ |
H A D | ng_hci_evnt.c | 253 send_data_packets(ng_hci_unit_p unit, int link_type, int limit) argument 260 for (total_sent = 0; limit > 0; ) { 293 for (sent = 0; limit > 0; limit --, total_sent ++, sent ++) {
|
/freebsd-13-stable/sys/kern/ |
H A D | kern_malloc.c | 267 u_long size, limit; local 271 limit = uma_limit(); 272 if (size > limit) 275 size = limit - size;
|
/freebsd-13-stable/sys/dev/usb/storage/ |
H A D | ustorage_fs.c | 1136 uint16_t limit; local 1170 limit = 255; 1176 limit = 65535; 1213 if (len > limit) {
|
/freebsd-13-stable/sys/amd64/vmm/amd/ |
H A D | vmcb.h | 227 uint32_t limit; member in struct:vmcb_segment
|
/freebsd-13-stable/sys/cddl/dev/dtrace/amd64/ |
H A D | dtrace_subr.c | 132 dtrace_toxic_ranges(void (*func)(uintptr_t base, uintptr_t limit)) argument
|
/freebsd-13-stable/sys/cddl/dev/dtrace/i386/ |
H A D | dtrace_subr.c | 134 dtrace_toxic_ranges(void (*func)(uintptr_t base, uintptr_t limit)) argument
|
/freebsd-13-stable/sys/contrib/alpine-hal/ |
H A D | al_hal_pcie.h | 1088 * limit marks the region's end address. 1093 * - address <= base_addr + limit 1095 uint64_t limit; member in struct:al_pcie_atu_region 1101 * (target_addr + 0x1000) in case limit >= 0x1000 1108 * is not in the region bounded by the base address and limit address
|
/freebsd-13-stable/contrib/dialog/ |
H A D | calendar.c | 104 size_t len, limit = MON_WIDE - 1; local 114 if ((len = strlen(value)) > limit) 115 value[limit] = '\0';
|
/freebsd-13-stable/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_rtl.cpp | 194 uptr limit = uptr(flags()->memory_limit_mb) << 20; local 197 (u64)rss >> 20, (u64)last_rss >> 20, (u64)limit >> 20); 198 if (2 * rss > limit + last_rss) {
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/modes/ |
H A D | ccm.c | 643 size_t limit; local 664 limit = 8 < q ? 8 : q; 666 for (i = 0, j = 0, k = 15; i < limit; i++, j += 8, k--) {
|
/freebsd-13-stable/sys/dev/bhnd/nvram/ |
H A D | bhnd_nvram_data_sprom.c | 619 size_t limit; local 624 limit = *olen; 651 else if (limit < *olen)
|
/freebsd-13-stable/contrib/ntp/ntpq/ |
H A D | ntpq-subs.c | 219 #define LENHOSTNAME 256 /* host name limit */ 2554 int limit; local 2597 limit = min(3 * MAXFRAGS, ntpd_row_limit); 2659 "Reverted to row limit from fragments limit.\n"); 2661 /* ntpd has lower cap on row limit */ 2663 limit = min(limit, ntpd_row_limit); 2666 "Row limit reduced to %d following CERR_BADVALUE.\n", 2667 limit); [all...] |
/freebsd-13-stable/contrib/netbsd-tests/lib/libcurses/slave/ |
H A D | curses_commands.c | 479 int limit; local 485 if (sscanf(args[0], "%d", &limit) == 0) { 491 if ((string = malloc(limit + 1)) == NULL) { 499 report_return(getnstr(string, limit)); 535 int limit; local 541 if (sscanf(args[0], "%d", &limit) == 0) { 547 if ((string = malloc((limit + 1) * sizeof(chtype))) == NULL) { 555 report_return(inchnstr(string, limit)); 579 int limit; local 585 if (sscanf(args[0], "%d", &limit) [all...] |
/freebsd-13-stable/sys/fs/ext2fs/ |
H A D | ext2_htree.c | 93 uint16_t limit); 200 ext2_htree_set_limit(struct ext2fs_htree_entry *ep, uint16_t limit) argument 202 ((struct ext2fs_htree_count *)(ep))->h_entries_max = htole16(limit);
|
/freebsd-13-stable/crypto/openssh/openbsd-compat/ |
H A D | glob.c | 184 struct glob_lim limit = { 0, 0, 0 }; local 226 return globexp1(patbuf, pglob, &limit); 228 return glob0(patbuf, pglob, &limit);
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_fs_fs/ |
H A D | fs_fs.c | 62 /* Begin deltification after a node history exceeded this this limit. 71 during commits, limit the deltification range to this value. 1043 "### For 1.8, the default value is 1023; earlier versions have no limit." NL 1091 "### much larger than the limit set here. The threshold will be applied" NL 1197 apr_size_t limit; 1204 limit = sizeof(buf); 1205 SVN_ERR(svn_io_read_length_line(uuid_file, buf, &limit, scratch_pool)); 1211 limit = sizeof(buf); 1212 SVN_ERR(svn_io_read_length_line(uuid_file, buf, &limit, 1195 apr_size_t limit; local
|
/freebsd-13-stable/sys/dev/rl/ |
H A D | if_rl.c | 1128 uint16_t limit; local 1139 limit = CSR_READ_2(sc, RL_CURRXBUF) % RL_RXBUFLEN; 1141 if (limit < cur_rx) 1142 max_bytes = (RL_RXBUFLEN - cur_rx) + limit; 1144 max_bytes = limit - cur_rx;
|
/freebsd-13-stable/usr.sbin/rtadvd/ |
H A D | rtadvd.c | 764 syslog(LOG_ERR, "failed to get receiving hop limit"); 808 "RS with invalid hop limit(%d) " 853 "RA with invalid hop limit(%d) " 970 * Decide whether to send RA according to the rate-limit 1412 nd6_options(struct nd_opt_hdr *hdr, int limit, argument 1417 for (; limit > 0; limit -= optlen) { 1418 if ((size_t)limit < sizeof(struct nd_opt_hdr)) { 1431 if (optlen > limit) { 1750 /* specify the hop limit o [all...] |
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 65 RATEKISS, /* Rate limit Kiss Code */ 454 * are less than a hard limit of 2 * sys_maxclock associations, 456 * sys_maxclock associations. The hard limit prevents unbounded 460 * resulted in 60 associations without the hard limit. A 461 * similar hard limit on manycastclient ephemeral associations 755 ** the beginning of the MAC, to identify the upper limit of 1764 * packet was received. We limit the check to 2684 DPRINTF(2, ("%s", "broadcast volley: initial delay exceeds limit\n")); 3001 u_long next, utemp, limit; local 3047 limit [all...] |
/freebsd-13-stable/sys/dev/usb/controller/ |
H A D | dwc_otg.c | 396 uint32_t limit; local 398 limit = (x == 1) ? MIN(DWC_OTG_TX_MAX_FIFO_SIZE, 403 if (limit <= fifo_size) { 404 pf->max_buffer = limit; 407 limit = MIN(DWC_OTG_TX_MAX_FIFO_SIZE, 0x40); 408 if (limit <= fifo_size) { 412 limit = 0; 417 ((limit / 4) << 16) | (tx_start / 4)); 418 tx_start += limit; 419 fifo_size -= limit; [all...] |