Searched refs:NAME_MAX (Results 1 – 25 of 31) sorted by relevance
12
/glibc-2.36/rt/ |
D | tst-mqueue4.c | 41 char name[sizeof "/tst-mqueue4-" + sizeof (pid_t) * 3 + NAME_MAX]; in do_test() 59 memset (p + 1, 'x', NAME_MAX + 1 - (p - name)); in do_test() 60 name[NAME_MAX + 1] = '\0'; in do_test() 81 name[NAME_MAX + 1] = 'x'; in do_test() 82 name[NAME_MAX + 2] = '\0'; in do_test()
|
/glibc-2.36/sysdeps/unix/sysv/linux/ |
D | readdir64_r.c | 82 if (reclen > offsetof (struct dirent64, d_name) + NAME_MAX + 1) in __readdir64_r() 88 if (namelen <= NAME_MAX) in __readdir64_r() 187 if (reclen > offsetof (struct __old_dirent64, d_name) + NAME_MAX + 1) 193 if (namelen <= NAME_MAX)
|
D | readdir_r.c | 38 if (reclen <= offsetof (struct dirent, d_name) + NAME_MAX + 1) in __readdir_r() 44 if (namelen <= NAME_MAX) in __readdir_r()
|
/glibc-2.36/elf/ |
D | dl-main.h | 28 #ifdef NAME_MAX 29 # define SECURE_NAME_LIMIT NAME_MAX
|
/glibc-2.36/sysdeps/posix/ |
D | pathconf.c | 66 #ifdef NAME_MAX in __pathconf() 76 return NAME_MAX; in __pathconf()
|
D | fpathconf.c | 65 #ifdef NAME_MAX in __fpathconf() 75 return NAME_MAX; in __fpathconf()
|
/glibc-2.36/posix/ |
D | execvpe.c | 98 size_t file_len = __strnlen (file, NAME_MAX) + 1; in __execvpe_common() 102 if ((file_len - 1 > NAME_MAX) in __execvpe_common()
|
D | tst-getconf.sh | 219 NAME_MAX
|
D | tst-glob_lstat_compat.c | 73 char room_for_dirent[NAME_MAX];
|
D | tst-gnuglob-skeleton.c | 96 char room_for_dirent[NAME_MAX];
|
D | tst-dir.c | 53 char room [offsetof (struct dirent64, d_name[0]) + NAME_MAX + 1]; in main()
|
/glibc-2.36/sysdeps/pthread/ |
D | sem_routines.c | 40 char name[NAME_MAX + 1]; 73 if (namelen > NAME_MAX) in __sem_check_add_mapping()
|
/glibc-2.36/dirent/ |
D | dirent.h | 238 # ifdef NAME_MAX 239 # define MAXNAMLEN NAME_MAX
|
/glibc-2.36/sysdeps/mach/hurd/bits/ |
D | local_lim.h | 27 #define NAME_MAX 255 macro
|
/glibc-2.36/include/ |
D | shm-directory.h | 32 char name[sizeof (SHMDIR) + 4 + NAME_MAX];
|
/glibc-2.36/sysdeps/unix/ |
D | getlogin.c | 38 char tty_pathname[2 + 2 * NAME_MAX]; in getlogin()
|
D | getlogin_r.c | 39 char tty_pathname[2 + 2 * NAME_MAX]; in __getlogin_r()
|
/glibc-2.36/io/ |
D | tst-ftw-bz28126.c | 36 static const char folder[NAME_MAX] = { [0 ... 253] = 'a', [254] = '\0' };
|
/glibc-2.36/support/ |
D | temp_file.c | 50 static char toolong_subdir[NAME_MAX + 1];
|
/glibc-2.36/conform/data/ |
D | limits.h-data | 76 allow NAME_MAX
|
/glibc-2.36/manual/ |
D | conf.texi | 1099 @deftypevr Macro int NAME_MAX 1105 @code{NAME_MAX}, but does not actually enforce this limit. 1131 This is the BSD name for @code{NAME_MAX}. It is defined in 1184 @code{NAME_MAX} generate an @code{ENAMETOOLONG} error. Otherwise, file 1351 Inquire about the value of @code{NAME_MAX}.
|
D | io.texi | 333 has a length greater than @code{NAME_MAX}. @xref{Limits for Files}.
|
D | filesys.texi | 537 On systems which do not define @code{NAME_MAX}, it may not be possible 577 for at least @code{NAME_MAX + 1} characters in the @code{d_name} array. 584 char b[offsetof (struct dirent, d_name) + NAME_MAX + 1]; 861 @code{NAME_MAX} bytes (e.g., because they support up to 255 Unicode
|
/glibc-2.36/ChangeLog.old/ |
D | ChangeLog.2 | 1948 * sysdeps/unix/mk-local_lim.c (NAME_MAX): Define to 255 if undefined. 3571 * sysdeps/unix/bsd/mk-local_lim.c: Use MAXNAMLEN for NAME_MAX,
|
/glibc-2.36/ |
D | NEWS | 4061 NAME_MAX limit assumption (CVE-2016-1234) 4902 * CVE-2013-4237 The readdir_r function could write more than NAME_MAX bytes
|
12