Searched refs:_size (Results 1 – 22 of 22) sorted by relevance
109 int _size; in __sfvwrite() local112 _size = fp->_bf._size; in __sfvwrite()114 _size = (_size << 1) + 1; in __sfvwrite()115 } while (_size < blen + len); in __sfvwrite()116 _base = realloc(fp->_bf._base, _size + 1); in __sfvwrite()119 fp->_w += _size - fp->_bf._size; in __sfvwrite()121 fp->_bf._size = _size; in __sfvwrite()139 } else if (len >= (w = fp->_bf._size)) { in __sfvwrite()172 w = fp->_w + fp->_bf._size; in __sfvwrite()179 } else if (s >= (w = fp->_bf._size)) { in __sfvwrite()
59 _UB(fp)._size = BUFSIZ; in __submore()66 i = _UB(fp)._size; in __submore()74 _UB(fp)._size = i * 2; in __submore()112 if (fp->_r >= _UB(fp)._size && __submore(fp)) in ungetc()139 _UB(fp)._size = sizeof(fp->_ubuf); in ungetc()
73 if (n >= fp->_bf._size) { in __swbuf()80 if (++n == fp->_bf._size || (fp->_flags & __SLBF && c == '\n')) in __swbuf()
58 fp->_bf._size = 1; in __smakebuf()65 fp->_bf._size = 1; in __smakebuf()70 fp->_bf._size = size; in __smakebuf()
82 fp->_lbfsize = -fp->_bf._size; in __swsetup()84 fp->_w = fp->_flags & __SNBF ? 0 : fp->_bf._size; in __swsetup()
110 fp->_bf._size = 1; in setvbuf()140 fp->_bf._size = size; in setvbuf()149 fp->_lbfsize = -fp->_bf._size; in setvbuf()
58 fp->_w = fp->_flags & (__SLBF|__SNBF) ? 0 : fp->_bf._size; in fpurge()
54 f._bf._size = f._r = strlen(str); in vsscanf()
47 if (fp->_lb._size >= newsize) in __slbexpand()52 fp->_lb._size = newsize; in __slbexpand()
65 f._bf._size = sizeof(buf); in vdprintf()
39 f._bf._size = f._w = 127; /* Leave room for the NUL */ in vasprintf()
81 f._bf._size = f._r = mlen; in vswscanf()
63 f._bf._size = f._w = 127; /* Leave room for the NUL */ in vswprintf()
14 *overall\_size* is set to the total size of the buffer returned. If this15 *info\_size*20 *backtrace\_size* is set to the maximum number of backtrace entries38 *backtrace\_size* as returned by the original call to45 of backtrace entries is less than *backtrace\_size*, the rest of the54 *overall\_size* divided by *info\_size*.
380 free/malloc\_usable\_size/realloc calls are passed valid pointers.393 malloc\_usable\_size, realloc.455 This indicates that a function (malloc\_usable\_size) was called with
39 return fp->_bf._size; in __fbufsize()
113 fp->_r = (*fp->_read)(fp->_cookie, (char *)fp->_p, fp->_bf._size); in __srefill()
55 size_t _size; member57 int _size; member
194 fp->_bf._size = 0; in __sfp()199 fp->_lb._size = 0; in __sfp()364 fp->_bf._size = 0; in freopen()367 _UB(fp)._size = 0; in freopen()370 fp->_lb._size = 0; in freopen()512 fp->_w = (fp->_flags & (__SLBF|__SNBF)) ? 0 : fp->_bf._size; in __sflush()1043 f._bf._size = f._w = n - 1; in vsnprintf()1131 if (total > static_cast<size_t>(fp->_bf._size)) break; in fread_unlocked()
102 fake._bf._size = fake._w = sizeof(buf); in __sbprintf()
63 f._bf._size = f._r = max_len; in wcstod()
59 There is no hook for malloc\_usable\_size as of now.71 it runs the risk of crashing whenever a malloc\_usable\_size call is made.