Lines Matching defs:arg_size

518  * A valid header looks like the following (size is arg_size, does
539 * +----------------------------------+ <----- data_off (= arg_size)
550 size_t arg_size,
567 if ((arg_size & 3) || (phdr->dbd_off & 3) || (phdr->key_off & 3) ||
572 * the input arg_size is the length of the request header
575 if (phdr->data_off != arg_size || arg_size > NSCD_PHDR_MAXLEN)
676 * A valid buffer looks like the following (size is arg_size):
695 size_t arg_size,
717 * the input arg_size is the buffer length and should
720 if (phdr->pbufsiz != arg_size || arg_size > NSCD_N2NBUF_MAXLEN)
731 lookup(char *argp, size_t arg_size)
737 NSCD_ALLOC_LOOKUP_BUFFER(argp, arg_size, phdr, space,
748 largs.bufsize = arg_size;
762 NSCD_SET_RETURN_ARG(phdr, arg_size);
763 (void) door_return(argp, arg_size, NULL, 0);
767 getent(char *argp, size_t arg_size)
772 NSCD_ALLOC_LOOKUP_BUFFER(argp, arg_size, phdr, space, sizeof (space));
774 nss_pgetent(argp, arg_size);
776 NSCD_SET_RETURN_ARG(phdr, arg_size);
777 (void) door_return(argp, arg_size, NULL, 0);
856 if_selfcred_return_per_user_door(char *argp, size_t arg_size,
900 space = alloca(arg_size + len);
902 (void) memcpy(space, phdr, arg_size);
903 (void) strncpy((char *)space + arg_size, dblist, len);
907 arg_size += len;
908 (void) door_return(space, arg_size, dp, 1);
913 switcher(void *cookie, char *argp, size_t arg_size,
946 if (validate_pheader(argp, arg_size,
948 (void) door_return(argp, arg_size, NULL, 0);
956 if_selfcred_return_per_user_door(argp, arg_size,
958 lookup(argp, arg_size);
967 if_selfcred_return_per_user_door(argp, arg_size,
969 nss_psetent(argp, arg_size, ent_pid);
975 getent(argp, arg_size);
980 nss_pendent(argp, arg_size);
1009 (void) door_return(argp, arg_size, NULL, 0);
1023 if (validate_N2Nbuf(argp, arg_size, callnum) == -1)
1024 (void) door_return(argp, arg_size, NULL, 0);
1115 (void) door_return(argp, arg_size, NULL, 0);
1119 (void) door_return(argp, arg_size, NULL, 0);