Searched refs:bad (Results 1 - 10 of 10) sorted by relevance

/systemd/src/basic/
H A Descape.h50 char *xescape(const char *s, const char *bad);
52 char *shell_escape(const char *s, const char *bad);
H A Descape.c387 char *xescape(const char *s, const char *bad) { argument
391 /* Escapes all chars in bad, in addition to \ and all special
402 (*f == '\\') || strchr(bad, *f)) {
416 static char *strcpy_backslash_escaped(char *t, const char *s, const char *bad) { argument
417 assert(bad);
420 if (*s == '\\' || strchr(bad, *s))
429 char *shell_escape(const char *s, const char *bad) { argument
436 t = strcpy_backslash_escaped(r, s, bad);
H A Dstrv.h155 char **strv_shell_escape(char **l, const char *bad);
H A Dstring-util.h128 char *delete_chars(char *s, const char *bad);
H A Dstring-util.c294 char *delete_chars(char *s, const char *bad) { argument
300 if (strchr(bad, *f))
H A Dstrv.c781 char **strv_shell_escape(char **l, const char *bad) { argument
784 /* Escapes every character in every string in l that is in bad,
790 v = shell_escape(*s, bad);
/systemd/src/resolve/
H A Dresolved-bus.c768 DnsQuery *bad = NULL; local
783 bad = aux;
787 bad = aux;
795 assert(bad);
797 if (bad->state == DNS_TRANSACTION_SUCCESS) {
798 assert(bad->auxiliary_result != 0);
800 if (bad->auxiliary_result == -ELOOP) {
801 r = sd_bus_reply_method_errorf(q->request, BUS_ERROR_CNAME_LOOP, "CNAME loop detected, or CNAME resolving disabled on '%s'", dns_query_string(bad));
805 r = bad->auxiliary_result;
809 r = reply_query_state(bad);
[all...]
H A Dresolved-dns-query.c887 DnsQueryCandidate *bad = NULL, *c; local
923 bad = c;
931 dns_query_accept(q, bad);
/systemd/src/core/
H A Dmanager.c824 goto bad;
844 goto bad;
852 bad:
/systemd/src/test/
H A Dtest-util.c1520 static void test_shell_escape_one(const char *s, const char *bad, const char *expected) { argument
1523 assert_se(r = shell_escape(s, bad));

Completed in 4260 milliseconds