/osnet-11/usr/src/grub/grub2/util/ |
H A D | grub-fstest.c | 103 grub_util_error (_("disk read fails at offset %lld, length %d"), 140 file->offset = skip; 149 grub_util_error (_("read error at offset %llu: %s"), ofs, 225 grub_util_error (_("read error at offset %llu: %s"), ofs, grub_errmsg); 236 grub_util_error (_("compare fail at offset %llu"), ofs);
|
H A D | grub-mount.c | 253 file->offset = off;
|
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | oid.c | 453 return oiddata->offset;
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ |
H A D | iperlsys.h | 695 #define PerlLIO_lseek(fd, offset, mode) \ 696 (*PL_LIO->pLseek)(PL_LIO, (fd), (offset), (mode)) 738 #define PerlLIO_lseek(fd, offset, mode) lseek((fd), (offset), (mode))
|
H A D | pp_hot.c | 1479 STRLEN offset; local 1560 offset = 0; 1566 offset = SvCUR(sv); 1571 offset = 0; 1588 if (!sv_gets(sv, fp, offset) 1644 U8 *s = (U8*)SvPVX(sv) + offset; 1645 STRLEN len = SvCUR(sv) - offset;
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Tie/ |
H A D | Hash.pm | 161 from offset 1 in the array referenced by C<tied(%tiedhash)>; this is the
|
/osnet-11/usr/src/lib/libc/capabilities/sun4v-fjathena/common/ |
H A D | memcmp.s | 267 ! o4 -- s1's offset (must not zero) 327 ! o5 -- s2's offset (must not zero)
|
/osnet-11/usr/src/lib/libc/sparc/gen/ |
H A D | strncpy.s | 138 andcc %l0, 3, %l1 ! dst offset relative to word boundary
|
/osnet-11/usr/src/lib/libsqlite/src/ |
H A D | vdbe.c | 1870 ** how big the total record is. Idx(0) contains the offset to the start 1871 ** of data(0). Idx(k) contains the offset to the start of data(k). 3130 int amt, offset, end, payloadSize; local 3192 offset = aHdr[0]; 3195 offset |= aHdr[1]<<8; 3198 offset |= aHdr[2]<<16; 3202 amt = end - offset; 3203 if( amt<0 || offset<0 || end>payloadSize ){ 3208 /* amt and offset now hold the offset t [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softASN1.c | 111 int offset; local 122 offset = (src.big_value[0] == 0x00) ? 1 : 0; 123 dst->big_value_len = src.big_value_len - offset; 134 (void) memcpy(dst->big_value, &(src.big_value[offset]),
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | cryptodisk.c | 517 PRIxGRUB_UINT64_T " with offset of %" PRIuGRUB_UINT64_T "\n", 518 size, sector, dev->offset); 522 - GRUB_DISK_SECTOR_BITS)) + dev->offset, 0,
|
/osnet-11/usr/src/grub/grub2/grub-core/fs/ |
H A D | bfs.c | 210 unsigned offset, 890 data->ino, file->offset, buf, len, file->read_hook); 205 read_bfs_file(grub_disk_t disk, const struct grub_bfs_superblock *sb, const struct grub_bfs_inode *ino, grub_off_t off, void *buf, grub_size_t len, void NESTED_FUNC_ATTR (*read_hook) (grub_disk_addr_t sector, unsigned offset, unsigned length)) argument
|
H A D | jfs.c | 67 /* The physical offset of the first block on the disk. */ 99 /* The offset is the key used to lookup an extent. */ 564 unsigned offset, unsigned length), 839 return grub_jfs_read_file (data, file->read_hook, file->offset, len, buf); 561 grub_jfs_read_file(struct grub_jfs_data *data, void NESTED_FUNC_ATTR (*read_hook) (grub_disk_addr_t sector, unsigned offset, unsigned length), grub_off_t pos, grub_size_t len, char *buf) argument
|
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | milter.c | 2305 milter_getsymlist(m, buf, rlen, offset) 2309 int offset; 2317 while (offset + MILTER_LEN_BYTES < rlen) 2323 (void) memcpy((char *) &v, buf + offset, MILTER_LEN_BYTES); 2327 offset += MILTER_LEN_BYTES; 2366 len = strlen(buf + offset); 2370 buf + offset, nummac); 2381 offset += len + 1;
|
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | forcedeth.c | 348 static int reg_delay(int offset, u32 mask, argument 362 } while ((readl(base + offset) & mask) != target);
|
/osnet-11/usr/src/cmd/ntfsprogs/ |
H A D | sd.c | 47 * Now at offset 0x14, as specified in the security descriptor, we have 57 * Now at offset 0x1c, just after the DACL's ACL, we have the first 89 * Now at offset 0x30 within security descriptor, just after the first 129 * Now at offset 0x48 into the security descriptor, as specified in the 144 * Now at offset 0x54 into the security descriptor, as specified in the 413 sds->offset = const_cpu_to_le64(0x00); 508 sds->offset = const_cpu_to_le64(0x80);
|
/osnet-11/usr/src/lib/pybootmgmt/common/bootmgmt/ |
H A D | pysol.py | 927 def fstyp_init(fd, offset=0, module_dir=None): 930 r = _libfstyp.fstyp_init(fd, offset, module_dir, byref(handle))
|
/osnet-11/usr/src/lib/libsqlite/tool/ |
H A D | lemon.c | 215 int iTknOfst, iNtOfst; /* yy_action[] offset for terminals and nonterms */ 479 ** Return the offset into the action table of the new transaction. 505 /* Scan the existing action table looking for an offset where we can 507 ** offset is found. In the worst case, we fall out of the loop when 553 /* Return the offset that is added to the lookahead in order to get the 1461 ** the offset to the "next" field within the structure. The offset to 1474 #define NEXT(A) (*(char**)(((unsigned long)A)+offset)) 1481 ** offset: Offset in the structure to the "next" field. 1491 static char *merge(a,b,cmp,offset) 1548 unsigned long offset; local [all...] |
/osnet-11/usr/src/lib/libproc/common/ |
H A D | Pgcore.c | 616 uintptr_t addr, ulong_t offset, size_t size, uint_t link, uint_t info, 627 shdr.sh_offset = offset; 648 shdr.sh_offset = offset; 615 write_shdr(pgcore_t *pgc, shstrtype_t name, uint_t type, ulong_t flags, uintptr_t addr, ulong_t offset, size_t size, uint_t link, uint_t info, uintptr_t addralign, uintptr_t entsize) argument
|
/osnet-11/usr/src/lib/libshell/common/sh/ |
H A D | io.c | 352 off_t offset; member in struct:subfile 381 Sfoff_t offset; member in struct:Match 388 mp->offset += (ptr-mp->base); 2335 * the stream <sp> starting at offset <offset> 2339 static Sfio_t *subopen(Shell_t *shp,Sfio_t* sp, off_t offset, long size) argument 2342 if(sfseek(sp,offset,SEEK_SET) <0) 2348 disp->offset = offset; 2363 sfseek(disp->oldsp,disp->offset,SEEK_SE 2498 sh_seek(register int fd, off_t offset, int whence) argument [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_ads.c | 1608 int rc, offset, container_len, domain_len; local 1616 /* offset to last domain_len characters */ 1617 offset = container_len - domain_len; 1619 if (smb_strcasecmp(container + offset,
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | des.c | 399 #define DO_PERMUTATION(a, temp, b, offset, mask) \ 400 temp = ((a>>offset) ^ b) & mask; \ 402 a ^= temp<<offset;
|
/osnet-11/usr/src/cmd/sendmail/db/hash/ |
H A D | hash_page.c | 118 * ISDUP is set, and offset is at the beginning of the datum. 1613 u_int32_t offset, splitnum; local 1640 offset = hcp->hdr->spares[splitnum] - 1642 new_addr = PGNO_OF(hcp, hcp->hdr->ovfl_point, offset);
|
/osnet-11/usr/src/lib/mpapi/libmpapi/common/ |
H A D | mpapi.c | 88 static int lock_register(int fd, int cmd, int type, off_t offset, int whence, 3331 lock_register(int fd, int cmd, int type, off_t offset, int whence, off_t len) argument 3336 lock.l_start = offset; 3345 * "buflen"). If it is not found, "write_offset" has the offset in "buf" where 3347 * "write_offset" has its offset in "buf" 3355 * - It is the offset in buf where srch_str is or should be 3359 * Zero - "srch_id" found in "buf"... "write_offset" has offset in "buf"
|
/osnet-11/usr/src/lib/udapl/udapl_tavor/tavor/ |
H A D | dapl_tavor_ibtf_util.c | 1989 uint32_t offset) 2002 (offset + (uintptr_t)cur_page->dbp_page_addr)); 2023 return ((uint32_t *)(offset + (uintptr_t)new_page->dbp_page_addr)); 1988 dapls_ib_get_dbp(uint64_t maplen, int fd, uint64_t mapoffset, uint32_t offset) argument
|