Home
last modified time | relevance | path

Searched refs:NAME_MAX (Results 1 – 25 of 31) sorted by relevance

12

/glibc-2.36/rt/
Dtst-mqueue4.c41 char name[sizeof "/tst-mqueue4-" + sizeof (pid_t) * 3 + NAME_MAX]; in do_test()
59 memset (p + 1, 'x', NAME_MAX + 1 - (p - name)); in do_test()
60 name[NAME_MAX + 1] = '\0'; in do_test()
81 name[NAME_MAX + 1] = 'x'; in do_test()
82 name[NAME_MAX + 2] = '\0'; in do_test()
/glibc-2.36/sysdeps/unix/sysv/linux/
Dreaddir64_r.c82 if (reclen > offsetof (struct dirent64, d_name) + NAME_MAX + 1) in __readdir64_r()
88 if (namelen <= NAME_MAX) in __readdir64_r()
187 if (reclen > offsetof (struct __old_dirent64, d_name) + NAME_MAX + 1)
193 if (namelen <= NAME_MAX)
Dreaddir_r.c38 if (reclen <= offsetof (struct dirent, d_name) + NAME_MAX + 1) in __readdir_r()
44 if (namelen <= NAME_MAX) in __readdir_r()
/glibc-2.36/elf/
Ddl-main.h28 #ifdef NAME_MAX
29 # define SECURE_NAME_LIMIT NAME_MAX
/glibc-2.36/sysdeps/posix/
Dpathconf.c66 #ifdef NAME_MAX in __pathconf()
76 return NAME_MAX; in __pathconf()
Dfpathconf.c65 #ifdef NAME_MAX in __fpathconf()
75 return NAME_MAX; in __fpathconf()
/glibc-2.36/posix/
Dexecvpe.c98 size_t file_len = __strnlen (file, NAME_MAX) + 1; in __execvpe_common()
102 if ((file_len - 1 > NAME_MAX) in __execvpe_common()
Dtst-getconf.sh219 NAME_MAX
Dtst-glob_lstat_compat.c73 char room_for_dirent[NAME_MAX];
Dtst-gnuglob-skeleton.c96 char room_for_dirent[NAME_MAX];
Dtst-dir.c53 char room [offsetof (struct dirent64, d_name[0]) + NAME_MAX + 1]; in main()
/glibc-2.36/sysdeps/pthread/
Dsem_routines.c40 char name[NAME_MAX + 1];
73 if (namelen > NAME_MAX) in __sem_check_add_mapping()
/glibc-2.36/dirent/
Ddirent.h238 # ifdef NAME_MAX
239 # define MAXNAMLEN NAME_MAX
/glibc-2.36/sysdeps/mach/hurd/bits/
Dlocal_lim.h27 #define NAME_MAX 255 macro
/glibc-2.36/include/
Dshm-directory.h32 char name[sizeof (SHMDIR) + 4 + NAME_MAX];
/glibc-2.36/sysdeps/unix/
Dgetlogin.c38 char tty_pathname[2 + 2 * NAME_MAX]; in getlogin()
Dgetlogin_r.c39 char tty_pathname[2 + 2 * NAME_MAX]; in __getlogin_r()
/glibc-2.36/io/
Dtst-ftw-bz28126.c36 static const char folder[NAME_MAX] = { [0 ... 253] = 'a', [254] = '\0' };
/glibc-2.36/support/
Dtemp_file.c50 static char toolong_subdir[NAME_MAX + 1];
/glibc-2.36/conform/data/
Dlimits.h-data76 allow NAME_MAX
/glibc-2.36/manual/
Dconf.texi1099 @deftypevr Macro int NAME_MAX
1105 @code{NAME_MAX}, but does not actually enforce this limit.
1131 This is the BSD name for @code{NAME_MAX}. It is defined in
1184 @code{NAME_MAX} generate an @code{ENAMETOOLONG} error. Otherwise, file
1351 Inquire about the value of @code{NAME_MAX}.
Dio.texi333 has a length greater than @code{NAME_MAX}. @xref{Limits for Files}.
Dfilesys.texi537 On systems which do not define @code{NAME_MAX}, it may not be possible
577 for at least @code{NAME_MAX + 1} characters in the @code{d_name} array.
584 char b[offsetof (struct dirent, d_name) + NAME_MAX + 1];
861 @code{NAME_MAX} bytes (e.g., because they support up to 255 Unicode
/glibc-2.36/ChangeLog.old/
DChangeLog.21948 * sysdeps/unix/mk-local_lim.c (NAME_MAX): Define to 255 if undefined.
3571 * sysdeps/unix/bsd/mk-local_lim.c: Use MAXNAMLEN for NAME_MAX,
/glibc-2.36/
DNEWS4061 NAME_MAX limit assumption (CVE-2016-1234)
4902 * CVE-2013-4237 The readdir_r function could write more than NAME_MAX bytes

12