/src/sys/arch/hpc/stand/libsa/ |
diskio.h | 56 DWORD sb_len; /* offset 4 */ member in struct:_SG_REQ::__anon92c77dae0208
|
winblk.c | 320 req.sr_sglist[0].sb_len = nsecs * BLKSZ;
|
/src/sys/arch/hpcmips/stand/libsa/ |
diskio.h | 56 DWORD sb_len; /* offset 4 */ member in struct:_SG_REQ::__anon0fa6fba70208
|
winblk.c | 320 req.sr_sglist[0].sb_len = nsecs * BLKSZ;
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
argon2-encoding.c | 263 size_t sb_len; \ 268 sb_len = strlen(dst); \ 269 dst += sb_len; \ 270 dst_len -= sb_len; \
|
/src/sys/kern/ |
uipc_syscalls.c | 288 name.sb_len = UCHAR_MAX; 326 name.sb_len = UCHAR_MAX; 1408 if (len > addr->sb_len) 1409 len = addr->sb_len; 1481 sbig.sb_len = UCHAR_MAX; 1506 sbig.sb_len = UCHAR_MAX; 1523 * will overflow sb_len. Further no reasonable buflen is <= 1525 * the size of the preamble sb_len and sb_family members. 1541 if (sb->sb_family == 0 && sb->sb_len < AF_MAX) 1542 sb->sb_family = sb->sb_len; [all...] |
/src/sys/compat/linux/common/ |
linux_socket.c | 424 error = sockargs(&m, &nam, nam.sb_len, UIO_SYSSPACE, MT_SONAME); 429 msg.msg_namelen = nam.sb_len; 1691 sb->sb_len = namelen; 1811 name.sb_len = UCHAR_MAX;
|
/src/usr.bin/xlint/lint1/ |
lint1.h | 275 size_t sb_len; /* length (without '\0') */ member in struct:__anondcf084d01108
|
lex.c | 480 sb->sb_len = len; 1474 char *s = level_zero_alloc(1, sb->sb_len + 1, "string"); 1475 (void)memcpy(s, sb->sb_name, sb->sb_len + 1);
|
decl.c | 1950 char *s = level_zero_alloc(1, renaming->sb_len + 1, "string"); 1951 (void)memcpy(s, renaming->sb_name, renaming->sb_len + 1);
|
/src/sys/sys/ |
socket.h | 275 * sizeof(sb_len) + sizeof(sb_family) + 253 + '\0' 281 __uint8_t sb_len; member in struct:sockaddr_big::__anon4a1c4148010a::__anon4a1c41480208
|