/barrelfish-master/lib/libc/string/ |
H A D | wcslcpy.c | 42 * Copy src to string dst of size siz. At most siz-1 characters 43 * will be copied. Always NUL terminates (unless siz == 0). 44 * Returns wcslen(src); if retval >= siz, truncation occurred. 47 wcslcpy(wchar_t *dst, const wchar_t *src, size_t siz) argument 51 size_t n = siz; 63 if (siz != 0)
|
H A D | wcslcat.c | 42 * Appends src to string dst of size siz (unlike wcsncat, siz is the 43 * full size of dst, not space left). At most siz-1 characters 44 * will be copied. Always NUL terminates (unless siz == 0). 45 * Returns wcslen(initial dst) + wcslen(src); if retval >= siz, 49 wcslcat(wchar_t *dst, const wchar_t *src, size_t siz) argument 53 size_t n = siz; 60 n = siz - dlen;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/buffer/ |
H A D | buffer.h | 89 char * BUF_strndup(const char *str, size_t siz); 90 void * BUF_memdup(const void *data, size_t siz); 91 void BUF_reverse(unsigned char *out, unsigned char *in, size_t siz); 94 size_t BUF_strlcpy(char *dst,const char *src,size_t siz); 95 size_t BUF_strlcat(char *dst,const char *src,size_t siz);
|
H A D | buffer.c | 171 char *BUF_strndup(const char *str, size_t siz) argument 177 ret=OPENSSL_malloc(siz+1); 183 BUF_strlcpy(ret,str,siz+1); 187 void *BUF_memdup(const void *data, size_t siz) argument 193 ret=OPENSSL_malloc(siz); 199 return memcpy(ret, data, siz);
|
/barrelfish-master/include/openssl/ |
H A D | buffer.h | 89 char * BUF_strndup(const char *str, size_t siz); 90 void * BUF_memdup(const void *data, size_t siz); 91 void BUF_reverse(unsigned char *out, unsigned char *in, size_t siz); 94 size_t BUF_strlcpy(char *dst,const char *src,size_t siz); 95 size_t BUF_strlcat(char *dst,const char *src,size_t siz);
|
/barrelfish-master/lib/libc/posix1e/ |
H A D | mac.c | 416 size_t siz; local 432 siz = 5; 433 error = sysctlnametomib(mibname, mib, &siz); 436 siz = 3; 437 error = sysctlnametomib("security.mac", mib, &siz);
|
/barrelfish-master/lib/libc/db/test/hash.tests/ |
H A D | tread2.c | 54 int num, siz; member in struct:__anon938
|
H A D | tverify.c | 54 int num, siz; member in struct:__anon939
|
/barrelfish-master/lib/libc/nameser/ |
H A D | ns_print.c | 586 unsigned int siz; local 596 siz = (edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */ 597 if (siz > sizeof(base64_cert) * 3/4) { 602 len = b64_ntop(rdata, edata-rdata, base64_cert, siz); 883 unsigned int siz; local 887 siz = (edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */ 888 if (siz > sizeof(base64_dhcid) * 3/4) { 892 len = b64_ntop(rdata, edata-rdata, base64_dhcid, siz); 919 unsigned int siz; local 979 siz 1011 unsigned int siz; local [all...] |
/barrelfish-master/lib/libc/resolv/ |
H A D | res_query.c | 451 res_hostalias(const res_state statp, const char *name, char *dst, size_t siz) { argument 480 strncpy(dst, cp1, siz - 1); 481 dst[siz - 1] = '\0';
|
H A D | res_debug.c | 920 u_int8_t siz = 0x12; /*%< default = 1e2 cm = 1.00m */ local 979 siz = precsize_aton(&cp); 1007 *bcp++ = siz;
|
/barrelfish-master/lib/libc/net/ |
H A D | sctp_sys_calls.c | 75 socklen_t siz; local 79 siz = sizeof(av); 90 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 626 socklen_t siz; local 629 siz = sizeof(sp); 633 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | apps.c | 2991 int raw_read_stdin(void *buf,int siz) argument 2994 if (ReadFile(GetStdHandle(STD_INPUT_HANDLE),buf,siz,&n,NULL)) 2999 int raw_read_stdin(void *buf,int siz) argument 3000 { return read(fileno(stdin),buf,siz); } 3004 int raw_write_stdout(const void *buf,int siz) argument 3007 if (WriteFile(GetStdHandle(STD_OUTPUT_HANDLE),buf,siz,&n,NULL)) 3012 int raw_write_stdout(const void *buf,int siz) argument 3013 { return write(fileno(stdout),buf,siz); }
|