/barrelfish-2018-10-04/lib/libc/string/ |
H A D | strnlen.c | 33 strnlen(const char *s, size_t maxlen) argument 37 for (len = 0; len < maxlen; len++, s++) {
|
H A D | wcsnlen.c | 33 wcsnlen(const wchar_t *s, size_t maxlen) argument 37 for (len = 0; len < maxlen; len++, s++) {
|
H A D | strndup.c | 27 strndup(const char *str, size_t maxlen) argument 32 len = strnlen(str, maxlen);
|
/barrelfish-2018-10-04/lib/tommath/ |
H A D | bn_mp_toradix_n.c | 20 * Stores upto maxlen-1 chars and always a NULL byte 22 int mp_toradix_n(mp_int * a, char *str, int radix, int maxlen) argument 29 /* check range of the maxlen, radix */ 30 if (maxlen < 2 || radix < 2 || radix > 64) { 55 --maxlen; 60 if (--maxlen < 1) {
|
/barrelfish-2018-10-04/lib/skb/ |
H A D | skb_snprintf.c | 178 static int dopr(char *buffer, size_t maxlen, const char *format, 180 static int fmtstr(char *buffer, size_t *currlen, size_t maxlen, 182 static int fmtint(char *buffer, size_t *currlen, size_t maxlen, 184 static int fmtfp(char *buffer, size_t *currlen, size_t maxlen, 186 static int fmtcap(char *buffer, size_t *currlen, size_t maxlen, struct capref c); 189 dopr(char *buffer, size_t maxlen, const char *format, va_list args_in) argument 219 DOPR_OUTCH(buffer, currlen, maxlen, ch); 334 if (fmtint(buffer, &currlen, maxlen, 354 if (fmtint(buffer, &currlen, maxlen, value, 374 if (fmtint(buffer, &currlen, maxlen, valu 520 fmtstr(char *buffer, size_t *currlen, size_t maxlen, char *value, int flags, int min, int max) argument 560 fmtcap(char *buffer, size_t *currlen, size_t maxlen, struct capref c) argument 582 fmtint(char *buffer, size_t *currlen, size_t maxlen, intmax_t value, int base, int min, int max, int flags) argument 742 fmtfp(char *buffer, size_t *currlen, size_t maxlen, LDOUBLE fvalue, int min, int max, int flags) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bio/ |
H A D | b_print.c | 136 size_t *maxlen, size_t *retlen, int *truncated, 172 size_t *maxlen, 195 if (ch == '\0' || (buffer == NULL && currlen >= *maxlen)) 203 doapr_outch(sbuffer,buffer, &currlen, maxlen, ch); 309 fmtint(sbuffer, buffer, &currlen, maxlen, 335 fmtint(sbuffer, buffer, &currlen, maxlen, value, 344 fmtfp(sbuffer, buffer, &currlen, maxlen, 364 doapr_outch(sbuffer, buffer, &currlen, maxlen, 373 max = *maxlen; 375 fmtstr(sbuffer, buffer, &currlen, maxlen, strvalu 169 _dopr( char **sbuffer, char **buffer, size_t *maxlen, size_t *retlen, int *truncated, const char *format, va_list args) argument 433 fmtstr( char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, const char *value, int flags, int min, int max) argument 473 fmtint( char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, LLONG value, int base, int min, int max, int flags) argument 601 fmtfp( char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, LDOUBLE fvalue, int min, int max, int flags) argument 726 doapr_outch( char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, int c) argument [all...] |
H A D | bss_rtcp.c | 126 static int get ( io_channel chan, char *buffer, int maxlen, int *length ) argument 131 buffer, maxlen, 0, 0, 0, 0 );
|
/barrelfish-2018-10-04/include/barrelfish/ |
H A D | bulk_transfer.h | 90 uintptr_t id, size_t *maxlen) 93 if (maxlen != NULL) { 94 *maxlen = 0; 98 if (maxlen != NULL) { 99 *maxlen = bt->size - id; 89 bulk_slave_buf_get_mem(struct bulk_transfer_slave *bt, uintptr_t id, size_t *maxlen) argument
|
/barrelfish-2018-10-04/include/rpc/ |
H A D | types.h | 91 unsigned int maxlen; member in struct:netbuf
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | t1_reneg.c | 117 int maxlen) 121 if((s->s3->previous_client_finished_len+1) > maxlen) 197 int maxlen) 202 s->s3->previous_server_finished_len + 1) > maxlen) 116 ssl_add_clienthello_renegotiate_ext(SSL *s, unsigned char *p, int *len, int maxlen) argument 196 ssl_add_serverhello_renegotiate_ext(SSL *s, unsigned char *p, int *len, int maxlen) argument
|
H A D | ssl_task.c | 167 static int get ( io_channel chan, char *buffer, int maxlen, int *length ) argument 172 buffer, maxlen, 0, 0, 0, 0 );
|
/barrelfish-2018-10-04/lib/libc/inet/ |
H A D | nsap_addr.c | 45 inet_nsap_addr(const char *ascii, u_char *binary, int maxlen) { argument 53 while ((c = *ascii++) != '\0' && len < (u_int)maxlen) {
|
/barrelfish-2018-10-04/usr/ramfsd/ |
H A D | service.c | 252 trivfs_offset_t offset, trivfs_fsize_t maxlen, 273 if (*len > maxlen) { 274 *len = maxlen; 308 trivfs_offset_t offset, trivfs_fsize_t maxlen, 340 if (maxlen > bulk_size) { 341 maxlen = bulk_size; 344 // limit read len to maxlen 345 if (len > maxlen) { 346 len = maxlen; 377 size_t maxlen; local 251 read(struct trivfs_binding *b, trivfs_fh_t fh, trivfs_offset_t offset, trivfs_fsize_t maxlen, errval_t *reterr, uint8_t data[2048], size_t *len) argument 307 read_bulk(struct trivfs_binding *b, trivfs_fh_t fh, trivfs_offset_t offset, trivfs_fsize_t maxlen, trivfs_bulkid_t bulkid, errval_t *reterr, trivfs_fsize_t *retlen) argument [all...] |
H A D | ramfs.h | 32 size_t *maxlen);
|
H A D | ramfs.c | 151 size_t *maxlen) 161 *maxlen = 0; 165 *maxlen = f->u.file.size - offset; 150 ramfs_read(struct dirent *f, off_t offset, uint8_t **retbuf, size_t *maxlen) argument
|
/barrelfish-2018-10-04/kernel/ |
H A D | string.c | 191 maxlen = len1 > len2 ? len1 : len2; local 193 return strncmp(s1, s2, maxlen);
|
/barrelfish-2018-10-04/lib/libc/rpc/ |
H A D | svc_vc.c | 161 xprt->xp_ltaddr.maxlen = xprt->xp_ltaddr.len = sslocal.ss_len; 169 xprt->xp_rtaddr.maxlen = sizeof (struct sockaddr_storage); 202 ret->xp_ltaddr.maxlen = ret->xp_ltaddr.len = ss.ss_len; 215 ret->xp_rtaddr.maxlen = ret->xp_rtaddr.len = ss.ss_len; 233 mem_free(ret->xp_ltaddr.buf, rep->xp_ltaddr.maxlen); 352 newxprt->xp_ltaddr.maxlen = newxprt->xp_ltaddr.len = 0; 354 newxprt->xp_ltaddr.maxlen = newxprt->xp_ltaddr.len = sslocal.ss_len; 358 newxprt->xp_ltaddr.maxlen = newxprt->xp_ltaddr.len = 0; 407 mem_free(xprt->xp_rtaddr.buf, xprt->xp_rtaddr.maxlen); 409 mem_free(xprt->xp_ltaddr.buf, xprt->xp_ltaddr.maxlen); [all...] |
H A D | rpcb_prot.c | 308 if (!xdr_u_int32_t(xdrs, (u_int32_t *) &objp->maxlen)) { 313 (u_int *)&(objp->len), objp->maxlen);
|
H A D | rpcb_clnt.c | 214 ad_cache->ac_taddr->len = ad_cache->ac_taddr->maxlen = taddr->len; 369 taddr.len = taddr.maxlen = tres->ai_addrlen; 385 fprintf(stderr, "\tnetbuf len = %d, maxlen = %d\n", 386 taddr.len, taddr.maxlen); 445 nbuf.maxlen = sizeof (struct sockaddr_un); 802 address->len = address->maxlen = remote.len; 1024 if (na->len > address->maxlen) { 1146 if (na->len > addr_ptr->maxlen) {
|
H A D | rpc_soc.c | 129 bindaddr.maxlen = bindaddr.len = sizeof (struct sockaddr_in); 454 svcaddr->maxlen = sizeof (struct sockaddr_un); 503 taddr.addr.len = taddr.addr.maxlen = addrlen;
|
H A D | svc_dg.c | 144 xprt->xp_rtaddr.maxlen = sizeof (struct sockaddr_storage); 152 xprt->xp_ltaddr.maxlen = sizeof (struct sockaddr_storage); 163 su->su_srcaddr.maxlen = sizeof (ss); 403 (void) mem_free(su->su_srcaddr.buf, su->su_srcaddr.maxlen); 406 (void) mem_free(xprt->xp_rtaddr.buf, xprt->xp_rtaddr.maxlen); 408 (void) mem_free(xprt->xp_ltaddr.buf, xprt->xp_ltaddr.maxlen);
|
H A D | rpc_generic.c | 702 sin->sin_len = ret->maxlen = ret->len = sizeof *sin; 719 sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6; 730 ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun);
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/include/linux/ |
H A D | moduleparam.h | 61 unsigned int maxlen; member in struct:kparam_string
|
/barrelfish-2018-10-04/usr/webserver/ |
H A D | http_server.c | 274 size_t maxlen = 16000 - (conn->reply_pos - conn->reply_sent); local 275 // debug_printf("%s: %zd %zd\n", __func__, len, maxlen); 276 if (len > maxlen) 277 len = maxlen;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | apps.h | 316 int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
|