/systemd/src/journal/ |
H A D | lookup3.h | 8 uint32_t jenkins_hashword(const uint32_t *k, size_t length, uint32_t initval) _pure_; 9 void jenkins_hashword2(const uint32_t *k, size_t length, uint32_t *pc, uint32_t *pb); 11 uint32_t jenkins_hashlittle(const void *key, size_t length, uint32_t initval) _pure_; 12 void jenkins_hashlittle2(const void *key, size_t length, uint32_t *pc, uint32_t *pb); 14 uint32_t jenkins_hashbig(const void *key, size_t length, uint32_t initval) _pure_; 16 static inline uint64_t hash64(const void *data, size_t length) { argument 19 jenkins_hashlittle2(data, length, &a, &b);
|
H A D | lookup3.c | 30 then use c as the hash value. If you have a variable length array of 169 -- that the length be the number of uint32_t's in the key 173 except that the length has to be measured in uint32_ts rather than in 180 size_t length, /* the length of the key, in uint32_ts */ 186 a = b = c = 0xdeadbeef + (((uint32_t)length)<<2) + initval; 189 while (length > 3) 195 length -= 3; 200 switch(length) /* all the case statements fall through */ 224 size_t length, /* th 178 jenkins_hashword( const uint32_t *k, size_t length, uint32_t initval) argument 222 jenkins_hashword2( const uint32_t *k, size_t length, uint32_t *pc, uint32_t *pb) argument 287 jenkins_hashlittle( const void *key, size_t length, uint32_t initval) argument 468 jenkins_hashlittle2( const void *key, size_t length, uint32_t *pc, uint32_t *pb) argument 651 jenkins_hashbig( const void *key, size_t length, uint32_t initval) argument [all...] |
H A D | journald-stream.c | 83 size_t length; member in struct:StdoutStream 395 remaining = s->length; 431 s->length = remaining; 449 l = read(s->fd, s->buffer+s->length, sizeof(s->buffer)-1-s->length); 464 s->length += l;
|
/systemd/src/reply-password/ |
H A D | reply-password.c | 55 size_t length; local 76 length = 1 + strlen(packet+1) + 1; 79 length = 1; 92 r = send_on_socket(fd, argv[2], packet, length);
|
/systemd/src/libsystemd-network/ |
H A D | lldp-internal.h | 39 uint16_t length; member in struct:lldp_neighbour_port 59 uint16_t length; member in struct:lldp_chassis_id 89 int lldp_handle_packet(tlv_packet *m, uint16_t length);
|
H A D | lldp-tlv.h | 38 uint16_t length; member in struct:sd_lldp_section 59 uint16_t length; member in struct:sd_lldp_packet
|
H A D | dhcp-lease-internal.h | 42 uint8_t length; member in struct:sd_dhcp_raw_option
|
H A D | dhcp-server-internal.h | 32 size_t length; member in struct:DHCPClientId 88 size_t length);
|
H A D | lldp-internal.c | 39 uint16_t length, ttl; local 47 r = sd_lldp_packet_read_port_id(tlv, &type, &data, &length); 54 if ((p->type == type && p->length == length && !memcmp(p->data, data, p->length))) { 77 uint16_t length; local 84 r = sd_lldp_packet_read_port_id(tlv, &type, &data, &length); 91 if (p->type == type && p->length == length && !memcmp(p->data, data, p->length)) { 108 uint16_t ttl, length; local 248 uint16_t length, ttl; local 301 uint16_t length; local 338 uint16_t length; local [all...] |
H A D | test-dhcp-server.c | 91 uint8_t length; member in struct:__anon196::__anon197 96 uint8_t length; member in struct:__anon196::__anon198 101 uint8_t length; member in struct:__anon196::__anon199 106 uint8_t length; member in struct:__anon196::__anon200 117 .option_type.length = 1, 139 test.option_type.length = 0; 143 test.option_type.length = 1; 165 test.option_requested_ip.length = 4; 169 test.option_server_id.length = 4; 184 test.option_client_id.length [all...] |
H A D | test-lldp.c | 112 uint16_t length; local 121 assert_se(tlv_packet_read_bytes(m, &p, &length) >= 0); 138 uint16_t length; local 147 assert_se(tlv_packet_read_string(m, &str, &length) >= 0); 149 p = strndup(str, length-1); 166 uint16_t length; local 169 assert_se(tlv_packet_read_string(m, &str, &length) >= 0); 171 p = strndup(str, length); 184 uint16_t length; local 187 assert_se(tlv_packet_read_string(m, &str, &length) > 302 uint16_t length, ttl; local [all...] |
H A D | lldp-tlv.c | 100 if (m->length + data_length > ETHER_MAX_LEN) 103 p = m->pdu + m->length; 105 m->length += data_length; 148 m->container_pos = m->pdu + m->length; 161 type |= htons(((m->pdu + m->length) - (m->container_pos + 2)) & 0x01ff); 242 *data_length = m->container->data + m->container->length - m->container->read_pos; 260 *data_length = m->container->data + m->container->length - m->container->read_pos; 291 section->length = ntohs(t) & 0x01ff; 301 section->length >= LLDP_OUI_LEN + 1) { 306 section->length 396 lldp_tlv_packet_read_string_tlv(tlv_packet *tlv, uint16_t type, char **data, uint16_t *length) argument 418 sd_lldp_packet_read_chassis_id(tlv_packet *tlv, uint8_t *type, uint8_t **data, uint16_t *length) argument 456 sd_lldp_packet_read_port_id(tlv_packet *tlv, uint8_t *type, uint8_t **data, uint16_t *length) argument 511 sd_lldp_packet_read_system_name(tlv_packet *tlv, char **data, uint16_t *length) argument 517 sd_lldp_packet_read_system_description(tlv_packet *tlv, char **data, uint16_t *length) argument 523 sd_lldp_packet_read_port_description(tlv_packet *tlv, char **data, uint16_t *length) argument 566 sd_lldp_packet_read_vlan_name(tlv_packet *tlv, uint16_t *vlan_id, char **name, uint16_t *length) argument [all...] |
H A D | network-internal.c | 450 uint8_t length; local 454 assert_se(sd_dhcp_route_get_destination_prefix_length(routes[i], &length) >= 0); 456 fprintf(f, "%s/%" PRIu8, inet_ntoa(dest), length);
|
H A D | sd-dhcp-lease.c | 443 log_debug("Failed to determine destination prefix length from class based IP, ignoring"); 701 option->length = len; 854 r = serialize_dhcp_option(f, key, option->data, option->length); 1164 int sd_dhcp_route_get_destination_prefix_length(sd_dhcp_route *route, uint8_t *length) { argument 1166 assert_return(length, -EINVAL); 1168 *length = route->dst_prefixlen;
|
H A D | sd-dhcp-server.c | 118 assert(id->length); 121 siphash24_compress(&id->length, sizeof(id->length), state); 122 siphash24_compress(id->data, id->length, state); 131 assert(!a->length || a->data); 132 assert(!b->length || b->data); 134 if (a->length != b->length) 135 return a->length < b->length 697 dhcp_server_handle_message(sd_dhcp_server *server, DHCPMessage *message, size_t length) argument [all...] |
H A D | sd-lldp.c | 78 siphash24_compress(&id->length, sizeof(id->length), state); 79 siphash24_compress(id->data, id->length, state); 88 assert(!a->length || a->data); 89 assert(!b->length || b->data); 94 if (a->length != b->length) 95 return a->length < b->length ? -1 : 1; 97 return memcmp(a->data, b->data, a->length); 145 lldp_handle_packet(tlv_packet *tlv, uint16_t length) argument 456 uint16_t data = 0, length = 0; local [all...] |
/systemd/src/resolve/ |
H A D | resolved-resolv-conf.c | 170 unsigned *length) { 174 assert(length); 177 *length + strlen(domain) > 256) { 180 if (*length <= 256) 181 fputs(" # Total length of all search domains is too long, remaining ones ignored.", f); 186 (*length) += strlen(domain); 213 unsigned length = 0, count = 0; local 218 write_resolv_conf_search(domain, f, &count, &length); 166 write_resolv_conf_search( const char *domain, FILE *f, unsigned *count, unsigned *length) argument
|
/systemd/src/basic/ |
H A D | utf8.c | 147 bool utf8_is_printable_newline(const char* str, size_t length, bool newline) { argument 152 for (p = str; length;) { 158 (size_t) encoded_len > length) 167 length -= encoded_len; 276 * The length of the character is returned. It is not zero-terminated! If the 277 * output buffer is NULL, only the length is returned. 279 * Returns: The length in bytes that the UTF-8 representation does or would 314 char *utf16_to_utf8(const void *s, size_t length) { argument 318 r = new(char, (length * 4 + 1) / 2 + 1); 325 while (f < (const uint8_t*) s + length) { [all...] |
H A D | escape.c | 120 int cunescape_one(const char *p, size_t length, char32_t *ret, bool *eight_bit) { argument 133 if (length != (size_t) -1 && length < 1) 178 if (length != (size_t) -1 && length < 3) 206 if (length != (size_t) -1 && length < 5) 233 if (length != (size_t) -1 && length < 9) 270 if (length ! 307 cunescape_length_with_prefix(const char *s, size_t length, const char *prefix, UnescapeFlags flags, char **ret) argument 379 cunescape_length(const char *s, size_t length, UnescapeFlags flags, char **ret) argument [all...] |
H A D | string-util.c | 521 char *ellipsize(const char *s, size_t length, unsigned percent) { argument 522 return ellipsize_mem(s, strlen(s), length, percent);
|
/systemd/src/shared/ |
H A D | acpi-fpdt.c | 35 uint32_t length; member in struct:acpi_table_header 52 uint8_t length; member in struct:acpi_fpdt_header 60 uint32_t length; member in struct:acpi_fpdt_boot_header 71 uint8_t length; member in struct:acpi_fpdt_boot 100 if (l != tbl->length) 109 rec = (struct acpi_fpdt_header *)((char *)rec + rec->length)) { 110 if (rec->length <= 0) 114 if (rec->length != sizeof(struct acpi_fpdt_header)) 136 if (hbrec.length < sizeof(struct acpi_fpdt_boot_header) + sizeof(struct acpi_fpdt_boot)) 143 if (brec.length ! [all...] |
/systemd/src/import/ |
H A D | pull-job.c | 252 log_error("Content length incorrect."); 393 _cleanup_free_ char *length = NULL, *last_modified = NULL; local 426 r = curl_header_strdup(contents, sz, "Content-Length:", &length); 432 (void) safe_atou64(length, &j->content_length);
|
/systemd/src/libsystemd/sd-daemon/ |
H A D | sd-daemon.c | 325 _public_ int sd_is_socket_unix(int fd, int type, int listening, const char *path, size_t length) { argument 346 if (length == 0) 347 length = strlen(path); 349 if (length == 0) 356 (l >= offsetof(struct sockaddr_un, sun_path) + length + 1) && 357 memcmp(path, sockaddr.un.sun_path, length+1) == 0; 361 (l == offsetof(struct sockaddr_un, sun_path) + length) && 362 memcmp(path, sockaddr.un.sun_path, length) == 0;
|
/systemd/src/activate/ |
H A D | activate.c | 135 unsigned n_env = 0, length; local 146 length = strv_length(arg_setenv); 149 envp = new0(char *, length + 8);
|
/systemd/src/libsystemd/sd-netlink/ |
H A D | netlink-message.c | 248 size_t length, size; local 260 length = strnlen(data, size+1); 261 if (length > size) 264 length = strlen(data); 266 r = add_rtattr(m, type, data, length + 1);
|