/freebsd-current/usr.bin/mkuzip/ |
H A D | mkuz_blockcache.c | 43 struct mkuz_blk_info hit; member in struct:mkuz_blkcache_itm 63 if (lseek(fd, bcep->hit.offset, SEEK_SET) < 0) { 106 if (blkcache.first[h].hit.len == 0) { 110 if (bcep->hit.len != bp->info.len) 112 if (memcmp(bp->info.digest, bcep->hit.digest, 121 fprintf(stderr, "cache hit %jd, %jd, %jd, %jd\n", 122 I2J(bcep->hit.blkno), I2J(bcep->hit.offset), 125 return (&bcep->hit); 144 bcep->hit [all...] |
/freebsd-current/contrib/wpa/src/utils/ |
H A D | radiotap.c | 238 int hit = 0; local 363 hit = 1; 385 /* we've got a hit! */ 386 hit = 1; 393 if (hit)
|
/freebsd-current/contrib/ldns/ldns/ |
H A D | rdata.h | 447 * \param[out] hit the hit data 453 uint8_t *hit_size, uint8_t** hit, 461 * \param[in] hit the hit data 467 uint8_t hit_size, uint8_t *hit, uint16_t pk_size, uint8_t *pk);
|
/freebsd-current/contrib/cortex-strings/src/arm/ |
H A D | memchr.S | 115 cbz r2, 40f @ 0 length or hit the end already then not found 132 60: @ We're here because the fast path found a hit - now we have to track down exactly which word it was 141 @ r0 currently points to the 3rd byte of the word containing the hit
|
/freebsd-current/contrib/arm-optimized-routines/string/arm/ |
H A D | memchr.S | 109 cbz r2, 40f @ 0 length or hit the end already then not found 129 60: @ We're here because the fast path found a hit - now we have to track down exactly which word it was 144 @ r0 currently points to the 3rd byte of the word containing the hit
|
/freebsd-current/usr.sbin/rpcbind/ |
H A D | pmap_svc.c | 147 register struct pmaplist *hit = NULL; local 154 hit = pml; 158 return (hit);
|
H A D | rpcb_svc_com.c | 156 * find_service returns a hit even if 1358 register rpcblist_ptr hit = NULL; local 1366 hit = rbl; 1370 return (hit);
|
/freebsd-current/contrib/libarchive/libarchive/ |
H A D | archive_read_support_format_warc.c | 840 const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U); 842 if (hit != NULL) { 843 hit += sizeof(_marker) - 1U; 845 return hit; 852 const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U); 854 return hit; 839 const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U); local 851 const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U); local
|
/freebsd-current/contrib/ldns/ |
H A D | rdata.c | 538 uint8_t *hit_size, uint8_t** hit, 544 if (! rdf || ! alg || ! hit || ! hit_size || ! pk || ! pk_size) { 555 *hit = data + 4; 566 uint8_t hit_size, uint8_t *hit, 584 memcpy(data + 4, hit, hit_size); 537 ldns_rdf_hip_get_alg_hit_pk(ldns_rdf *rdf, uint8_t* alg, uint8_t *hit_size, uint8_t** hit, uint16_t *pk_size, uint8_t** pk) argument 565 ldns_rdf_hip_new_frm_alg_hit_pk(ldns_rdf** rdf, uint8_t alg, uint8_t hit_size, uint8_t *hit, uint16_t pk_size, uint8_t *pk) argument
|
H A D | str2host.c | 1579 const char *hit = str == NULL ? NULL : strchr(str, ' '); local 1580 const char *pk = hit == NULL ? NULL : strchr(hit + 1, ' '); 1581 size_t hit_size = hit == NULL ? 0 1582 : pk == NULL ? strlen(hit + 1) : (size_t) (pk - hit) - 1; 1602 hit += 1; 1638 for (dp = data + 4; *hit && *hit != ' '; dp++) { 1640 if ((hi = ldns_hexdigit_to_int(*hit [all...] |
/freebsd-current/crypto/openssl/ssl/statem/ |
H A D | extensions.c | 540 || (s->hit && (extctx & SSL_EXT_IGNORE_ON_RESUMPTION) != 0)) 962 if (sent && ret == SSL_TLSEXT_ERR_OK && !s->hit) { 992 if (!s->hit) { 1207 if (!s->server && s->hit) { 1283 if (!sent && SSL_IS_TLS13(s) && !s->hit) { 1315 && (!s->hit 1375 && (!s->hit 1410 if (!s->hit 1664 || !s->hit 1691 if (s->server && s->hit [all...] |
H A D | extensions_srvr.c | 129 if (!s->hit || SSL_IS_TLS13(s)) { 188 if (s->hit && s->session->ext.max_fragment_len_mode != value) { 234 if (!s->hit) { 273 if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 1)) { 292 if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 0)) { 307 if (s->hit) 579 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) 907 if (!s->hit || SSL_IS_TLS13(s)) { 1273 if (s->hit && !SSL_IS_TLS13(s)) 1615 if (!s->hit || !tls13_generate_handshake_secre [all...] |
H A D | statem_srvr.c | 465 if (s->hit) 532 } else if (s->hit || s->num_tickets <= s->sent_tickets) { 601 if (s->hit) { 651 if (s->hit) { 670 if (s->hit) { 852 if (SSL_IS_DTLS(s) && s->hit) { 918 if (SSL_IS_DTLS(s) && !s->hit) { 947 if (SSL_IS_DTLS(s) && s->hit) { 1697 s->hit = 0; 1793 s->hit [all...] |
H A D | extensions_clnt.c | 1308 if (!s->hit) { 1333 if (!s->hit) { 1606 if (!s->hit) { 1700 if (!s->hit) 1804 if (!s->hit) { 1913 || !s->hit) { 1950 s->hit = 1; 1976 s->hit = 1;
|
H A D | statem_clnt.c | 122 if (s->hit) { 252 if (s->hit) { 276 s->hit = 1; 626 if (s->hit) { 634 if (s->hit) { 686 if (s->hit) { 818 if (s->hit) { 834 if (wst == WORK_MORE_A && SSL_IS_DTLS(s) && s->hit == 0) { 1347 if (s->hit && (s->session->cipher_id != c->id)) { 1498 s->hit [all...] |
H A D | statem_lib.c | 194 s->hit = 0; 1119 if (s->hit) 2070 * Whenever "hole == 1", and we hit an enabled method, its version becomes 2074 * If "hole == 0" and we hit an enabled method, then "single" is cleared, 2075 * as we support a contiguous range of at least two methods. If we hit 2078 * If we again hit an enabled method after the new hole, it becomes
|
/freebsd-current/sys/fs/nfsserver/ |
H A D | nfs_nfsdcache.c | 40 * - I think a false hit is more serious than a false miss 41 * - A false hit for an RPC that has Op(s) that order via seqid# must be 43 * - A valid hit will probably happen a long time after the original reply 75 * - a hit (reply from cache) 155 * hit. For V4, the non-idempotent Op will return NFSERR_RESOURCE in 616 int hit, ret = 0; local 624 hit = 1; 656 hit = 0; 661 * Can be a hit only if one entry left. 662 * Note possible hit entr [all...] |
/freebsd-current/contrib/tzcode/ |
H A D | zdump.c | 736 hunt(timezone_t tz, time_t lot, time_t hit, bool only_ok) argument 754 int rem_sum = lot % 2 + hit % 2; 755 time_t t = (rem_sum == 2) - (rem_sum < 0) + lot / 2 + hit / 2; 767 } else hit = t; 769 return hit;
|
/freebsd-current/usr.sbin/rpc.yppasswdd/ |
H A D | yppasswdd_server.c | 256 int hit = 0; local 287 hit++; 294 if (hit > 1) {
|
/freebsd-current/sys/contrib/openzfs/module/zfs/ |
H A D | dmu_zfetch.c | 317 /* Allow immediate stream reuse until first hit. */ 343 * Process stream hit access for nblks blocks starting at zs_blkid. Return 524 goto hit; 528 goto hit; 534 * is a hit in its new part. Access ahead of stream position considered 535 * a hit for metadata prefetch, since we do not care about fill percent, 561 goto hit; 582 hit:
|
/freebsd-current/contrib/less/ |
H A D | search.c | 405 int hit = 0; local 415 hit = 1; 421 hit = 1; 439 if (hit) 1209 * we hit end-of-file (or beginning-of-file if we're 1210 * going backwards), or until we hit the end position. 1770 * something that isn't filtered, or hit the end.
|
/freebsd-current/lib/libpmc/ |
H A D | libpmc.c | 479 __K8MASK(page-hit, 0), 517 __K8MASK(probe-hit, 1), 518 __K8MASK(probe-hit-dirty-no-memory-cancel, 2), 519 __K8MASK(probe-hit-dirty-with-memory-cancel, 3),
|
/freebsd-current/tools/tools/shlib-compat/ |
H A D | shlib-compat.py | 112 self.hit = 0 116 total = self.hit + self.miss 120 ratio = '%f' % (self.hit/float(total)) 121 return '%s cache stats: hit: %d; miss: %d; ratio: %s' % \ 122 (name, self.hit, self.miss, ratio) 134 self.stats.hit += 1
|
/freebsd-current/sys/kern/ |
H A D | vfs_cache.c | 151 * introduces significant hit single-threaded and serialization multi-threaded. 303 SDT_PROBE_DEFINE2(vfs, namecache, fullpath_smr, hit, "struct vnode *", 308 SDT_PROBE_DEFINE3(vfs, namecache, fullpath, hit, "struct vnode *", 313 SDT_PROBE_DEFINE3(vfs, namecache, lookup, hit, "struct vnode *", "char *", 319 SDT_PROBE_DEFINE2(vfs, namecache, removecnp, hit, "struct vnode *", 1209 * split into hot and cold entries. Entries get promoted after getting a hit. 1833 SDT_PROBE2(vfs, namecache, removecnp, hit, dvp, cnp); 1871 SDT_PROBE2(vfs, namecache, removecnp, hit, dvp, cnp); 1887 SDT_PROBE3(vfs, namecache, lookup, hit, dvp, ".", *vpp); 1949 SDT_PROBE3(vfs, namecache, lookup, hit, dv [all...] |
/freebsd-current/crypto/openssl/ssl/ |
H A D | ssl_lib.c | 604 s->hit = 0; 2884 if (s->hit && !SSL_IS_TLS13(s)) 2915 if (!SSL_IS_TLS13(s) && s->hit && s->session->ext.hostname != NULL) 3759 && (!s->hit || SSL_IS_TLS13(s))) { 4146 ret->hit = s->hit; 4860 return s->hit;
|