/dragonfly/usr.bin/patch/ |
H A D | pch.c | 140 if (p_len == NULL) in set_hunkmax() 158 p_len = reallocf(p_len, new_hunkmax * sizeof(unsigned short)); in grow_hunkmax() 820 p_len[p_end] = 0; in another_hunk() 851 p_len[filldst] = p_len[filldst + 1]; in another_hunk() 883 p_len[filldst] = p_len[fillsrc]; in another_hunk() 1139 p_len[i - 1] -= 1; in another_hunk() 1274 tp_len = p_len; in pch_swap() 1277 p_len = NULL; in pch_swap() 1284 free(p_len); in pch_swap() 1285 p_len = tp_len; in pch_swap() [all …]
|
/dragonfly/lib/libc/stdio/ |
H A D | printfcommon.h | 137 int p_len; in io_printandpad() local 139 p_len = ep - p; in io_printandpad() 140 if (p_len > len) in io_printandpad() 141 p_len = len; in io_printandpad() 142 if (p_len > 0) { in io_printandpad() 143 if (io_print(iop, p, p_len, locale)) in io_printandpad() 146 p_len = 0; in io_printandpad() 148 return (io_pad(iop, len - p_len, with, locale)); in io_printandpad()
|
/dragonfly/lib/libdmsg/ |
H A D | crypto.c | 676 int p_len; in dmsg_crypto_decrypt() local 687 if (p_len == 0) in dmsg_crypto_decrypt() 690 while (p_len >= DMSG_CRYPTO_CHUNK_SIZE) { in dmsg_crypto_decrypt() 701 p_len, used, in dmsg_crypto_decrypt() 704 p_len -= used; in dmsg_crypto_decrypt() 724 int p_len, used, ct_used; in dmsg_crypto_encrypt() local 734 p_len = iov[i].iov_len; in dmsg_crypto_encrypt() 735 assert((p_len & DMSG_ALIGNMASK) == 0); in dmsg_crypto_encrypt() 737 while (p_len >= DMSG_CRYPTO_CHUNK_SIZE && in dmsg_crypto_encrypt() 749 *nactp, p_len, ct_used, used, nmax); in dmsg_crypto_encrypt() [all …]
|
/dragonfly/contrib/nvi2/vi/ |
H A D | v_paragraph.c | 311 size_t p_len, s_len; in v_buildps() local 318 p_len = p_p == NULL ? 0 : strlen(p_p); in v_buildps() 321 if (p_len == 0 && s_len == 0) in v_buildps() 324 MALLOC_RET(sp, p, p_len + s_len + 1); in v_buildps() 330 memmove(p, p_p, p_len + 1); in v_buildps() 332 memmove(p + p_len, s_p, s_len + 1); in v_buildps()
|
/dragonfly/sys/bus/u4b/ |
H A D | usb_util.c | 182 usb_printbcd(char *p, uint16_t p_len, uint16_t bcd) in usb_printbcd() argument 184 if (ksnprintf(p, p_len, "%x.%02x", bcd >> 8, bcd & 0xff)) { in usb_printbcd()
|
H A D | usb_util.h | 31 void usb_printbcd(char *p, uint16_t p_len, uint16_t bcd);
|
/dragonfly/contrib/bmake/ |
H A D | meta.c | 321 static size_t p_len; in is_submake() local 328 p_len = strlen(p_make); in is_submake() 337 switch (cp2[p_len]) { in is_submake()
|
/dragonfly/sys/net/pf/ |
H A D | pf_norm.c | 1799 || pd->p_len > 0 || (th->th_flags & TH_SYN)) && in pf_normalize_tcp_stateful() 1829 if (pd->p_len > 0 && (src->scrub->pfss_flags & PFSS_DATA_TS)) { in pf_normalize_tcp_stateful() 1855 if (pd->p_len > 0 && src->scrub && (src->scrub->pfss_flags & in pf_normalize_tcp_stateful()
|
H A D | pf.c | 4024 u_int32_t ack = ntohl(th->th_seq) + pd->p_len; in pf_test_rule() 4157 s->src.seqhi = s->src.seqlo + pd->p_len + 1; in pf_create_state() 4470 end = seq + pd->p_len; in pf_tcp_track_full() 4520 end = seq + pd->p_len; in pf_tcp_track_full() 4679 "pkts=%llu:%llu dir=%s,%s\n", seq, orig_seq, ack, pd->p_len, in pf_tcp_track_full() 4753 seq, orig_seq, ack, pd->p_len, ackskew, in pf_tcp_track_full() 6623 pd.p_len = pd.tot_len - off - (th.th_off << 2); in pf_test() 6625 if ((th.th_flags & TH_ACK) && pd.p_len == 0) in pf_test() 7024 pd.p_len = pd.tot_len - off - (th.th_off << 2); in pf_test6()
|
H A D | pfvar.h | 1224 u_int32_t p_len; /* total length of payload */ member
|
/dragonfly/sys/net/ip_mroute/ |
H A D | ip_mroute.c | 1774 tbf_control(struct vif *vifp, struct mbuf *m, struct ip *ip, u_long p_len) in tbf_control() argument 1778 if (p_len > MAX_BKT_SIZE) { /* drop if packet is too large */ in tbf_control() 1787 if (p_len <= t->tbf_n_tok) { /* send packet if enough tokens */ in tbf_control() 1788 t->tbf_n_tok -= p_len; in tbf_control()
|
/dragonfly/contrib/tcsh-6/ |
H A D | tc.func.c | 1336 size_t p_len = Strlen(upause); in insert() local 1369 now->word = xcalloc(1, (cmd_len + p_len + 4) * sizeof(Char)); in insert()
|