/freebsd-13-stable/lib/libpfctl/ |
H A D | libpfctl.c | 362 rule->max_src_conn_rate.limit = 363 nvlist_get_number(nvl, "max_src_conn_rate.limit"); 468 nvlist_add_number(nvlr, "max_src_conn_rate.limit", 469 r->max_src_conn_rate.limit);
|
/freebsd-13-stable/contrib/bzip2/ |
H A D | decompress.c | 83 gLimit = &(s->limit[gSel][0]); \ 346 &(s->limit[t][0]),
|
/freebsd-13-stable/sys/dev/ath/ath_hal/ar5210/ |
H A D | ar5210_reset.c | 722 ar5210SetTxPowerLimit(struct ath_hal *ah, uint32_t limit) argument 724 AH_PRIVATE(ah)->ah_powerLimit = AH_MIN(limit, AR5210_MAX_RATE_POWER);
|
/freebsd-13-stable/contrib/lua/src/ |
H A D | ldebug.c | 210 StkId limit = (ci == L->ci) ? L->top : ci->next->func; local 211 if (limit - base >= n && n > 0) { /* is 'n' inside 'ci' stack? */
|
H A D | lstrlib.c | 31 ** pattern-matching. This limit is arbitrary, but must fit in 1079 ** All formats except '%f' do not need that large limit. The other 1080 ** float formats use exponents, so that they fit in the 99 limit for 1082 ** to the buffer; all integer formats also fit in the 99 limit. The 1687 int limit = (size <= SZINT) ? size : SZINT; local 1688 for (i = limit - 1; i >= 0; i--) { 1700 for (i = limit; i < size; i++) {
|
H A D | lparser.c | 74 static l_noret errorlimit (FuncState *fs, int limit, const char *what) { argument 81 msg = luaO_pushfstring(L, "too many %s (limit is %d) in %s", 82 what, limit, where); 1246 ** where 'binop' is any binary operator with a priority higher than 'limit' 1248 static BinOpr subexpr (LexState *ls, expdesc *v, int limit) { argument 1260 /* expand while operators have priorities higher than 'limit' */ 1262 while (op != OPR_NOBINOPR && priority[op].left > limit) { 1568 exp1(ls); /* limit */
|
H A D | lua.h | 467 LUA_API int (lua_setcstacklimit) (lua_State *L, unsigned int limit);
|
/freebsd-13-stable/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_freebsd.c | 61 ar9300_freebsd_set_tx_power_limit(struct ath_hal *ah, uint32_t limit) argument 63 return (ar9300_set_tx_power_limit(ah, limit, 0, 0));
|
/freebsd-13-stable/sys/netpfil/pf/ |
H A D | pf_nv.c | 548 PFNV_CHK(pf_nvuint32(nvl, "max_src_conn_rate.limit", 549 &rule->max_src_conn_rate.limit)); 717 nvlist_add_number(nvl, "max_src_conn_rate.limit", 718 rule->max_src_conn_rate.limit);
|
/freebsd-13-stable/sys/netinet/ |
H A D | sctp_usrreq.c | 1001 size_t limit, 1019 if (limit == 0) 1115 if (actual + sizeof(struct sockaddr_in6) > limit) { 1124 if (actual + sizeof(struct sockaddr_in) > limit) { 1178 if (actual + sizeof(struct sockaddr_in6) > limit) { 1207 if (actual + sa_len > limit) { 1237 size_t limit, 1244 size = sctp_fill_up_addresses_vrf(inp, stcb, limit, addr, 1858 size_t limit; local 1870 limit 999 sctp_fill_up_addresses_vrf(struct sctp_inpcb *inp, struct sctp_tcb *stcb, size_t limit, struct sockaddr *addr, uint32_t vrf_id) argument 1235 sctp_fill_up_addresses(struct sctp_inpcb *inp, struct sctp_tcb *stcb, size_t limit, struct sockaddr *addr) argument 2285 size_t limit, actual; local [all...] |
H A D | sctp_auth.c | 1772 sctp_validate_init_auth_params(struct mbuf *m, int offset, int limit) argument 1788 if (offset + plen > limit) { 1886 if (offset >= limit) {
|
/freebsd-13-stable/contrib/libarchive/libarchive/test/ |
H A D | main.c | 82 * easily lead to very messy code. It's best to limit yourself 2722 static const int limit = sizeof(tests) / sizeof(tests[0]); local 2742 for (i = 0; i < limit; i++) 2860 static const int limit = sizeof(tests) / sizeof(tests[0]); local 3141 test_num = get_test_set(test_set, limit, *argv, tests); 3183 for (i = 0; i < limit; ++i) {
|
/freebsd-13-stable/sys/dev/rt/ |
H A D | if_rt.c | 156 struct rt_softc_rx_ring *ring, int limit); 1847 rt_rx_eof(struct rt_softc *sc, struct rt_softc_rx_ring *ring, int limit) argument 1864 while (limit != 0) { 1984 limit--; 1998 return (limit == 0);
|
/freebsd-13-stable/contrib/sendmail/src/ |
H A D | queue.c | 1548 ** Notice: CurRunners is an upper limit, in some cases 2164 /* Has the WorkList reached the limit? */ 3123 /* Check if the per queue group item limit will be exceeded */ 6770 ** OCC_EXCEEDED -- is an outgoing connection limit exceeded? 6779 ** true iff an outgoing connection limit is exceeded 6792 char *limit; /* allocated from e_rpool by rscheck(), no need to free() */ local 6795 #define STR2INT(r, limit, val) \ 6798 if ((r) == EX_OK && (limit) != NULL) \ 6799 (val) = atoi((limit)); \ 6805 limit [all...] |
/freebsd-13-stable/contrib/subversion/subversion/svnserve/ |
H A D | serve.c | 2444 apr_uint64_t limit, include_merged_revs_param; 2453 &strict_node, &limit, 2488 so we assume no limit. If it's larger than INT_MAX then someone is 2490 us anything that big, so play it safe and default to no limit. */ 2491 if (limit == SVN_RA_SVN_UNSPECIFIED_NUMBER || limit > INT_MAX) 2492 limit = 0; 2511 (int) limit, send_changed_paths, 2521 end_rev, (int) limit, 2443 apr_uint64_t limit, include_merged_revs_param; local
|
/freebsd-13-stable/sys/contrib/openzfs/cmd/zfs/ |
H A D | zfs_main.c | 392 return (gettext("\tprogram [-jn] [-t <instruction limit>] " 393 "[-m <memory limit (b)>]\n" 2028 int limit = 0; local 2048 limit = parse_depth(optarg, &flags); 2220 argc > 1 && (flags & ZFS_ITER_RECURSE) == 0 && limit == 0) { 2222 limit = 1; 2251 &cb.cb_proplist, limit, get_callback, &cb); 3614 int limit = 0; local 3630 limit = parse_depth(optarg, &flags); 3726 argc > 0 && (flags & ZFS_ITER_RECURSE) == 0 && limit 6538 int limit = 0; local [all...] |
/freebsd-13-stable/sys/dev/ath/ath_hal/ar5211/ |
H A D | ar5211_reset.c | 1296 * Set the limit on the overall output power. Used for dynamic 1302 ar5211SetTxPowerLimit(struct ath_hal *ah, uint32_t limit) argument 1305 AH_PRIVATE(ah)->ah_powerLimit = AH_MIN(limit, MAX_RATE_POWER); 1306 OS_REG_WRITE(ah, AR_PHY_POWER_TX_RATE_MAX, limit); 1622 * this unless specially configured. Then we limit 2034 "%s: Max gain limit.\n", __func__); 2053 "%s: Min gain limit.\n", __func__);
|
/freebsd-13-stable/sys/net/ |
H A D | pfvar.h | 356 u_int32_t limit; member in struct:pf_krule::__anon14907 987 counter_u64_t lcounters[LCNT_MAX]; /* limit counters */ 1020 * to avoid DoS by linear seaching. Instead of a global limit, 1021 * use a limit per entry point. For large packets these sum up. 1133 unsigned limit; member in struct:pfioc_limit 1648 u_int limit; member in struct:pf_limit
|
/freebsd-13-stable/contrib/subversion/subversion/include/ |
H A D | svn_client.h | 2785 * If @a limit is greater than zero only invoke @a receiver on the first 2786 * @a limit logs. 2815 int limit, 2838 int limit, 2863 int limit, 2891 int limit, 2901 * Similar to svn_client_log2(), but with @a limit set to 0, and the
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | ra_serf.h | 1213 int limit, 1619 /* Default limit for in-memory size of a request body. */
|
/freebsd-13-stable/contrib/processor-trace/libipt/include/ |
H A D | intel-pt.h | 1708 /** Set the image section cache limit. 1710 * Set the limit for a section cache in bytes. A non-zero limit will keep the 1711 * least recently used sections mapped until the limit is reached. A limit of 1718 pt_iscache_set_limit(struct pt_image_section_cache *iscache, uint64_t limit);
|
/freebsd-13-stable/crypto/heimdal/lib/asn1/ |
H A D | asn1parse.c | 1899 lex_error_message("Non-integer used in limit");
|
/freebsd-13-stable/contrib/subversion/subversion/svnadmin/ |
H A D | svnadmin.c | 467 "If --revision is specified, limit the loaded revisions to only those\n" 484 "If --revision is specified, limit the loaded revisions to only those\n" 1833 svn_revnum_t youngest, limit; 1847 SVN_ERR(get_revnum(&limit, &opt_state->start_revision, youngest, repos, 1857 if (limit != SVN_INVALID_REVNUM) 1865 if (base > limit) 1831 svn_revnum_t youngest, limit; local
|
/freebsd-13-stable/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar5416.h | 315 extern HAL_BOOL ar5416SetTxPowerLimit(struct ath_hal *ah, uint32_t limit);
|
/freebsd-13-stable/sys/dev/usb/wlan/ |
H A D | if_rsureg.h | 454 uint32_t limit; member in struct:r92s_fw_cmd_sitesurvey
|