Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.218.76.193
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
gettext /
intl /
[ HOME SHELL ]
Name
Size
Permission
Action
COPYING.LIB
25.92
KB
-rw-r--r--
Makefile.in
24.53
KB
-rw-r--r--
VERSION
42
B
-rw-r--r--
bindtextdom.c
9.33
KB
-rw-r--r--
config.charset
22.5
KB
-rwxr-xr-x
dcgettext.c
1.71
KB
-rw-r--r--
dcigettext.c
46.49
KB
-rw-r--r--
dcngettext.c
1.74
KB
-rw-r--r--
dgettext.c
1.67
KB
-rw-r--r--
dngettext.c
1.78
KB
-rw-r--r--
eval-plural.h
2.67
KB
-rw-r--r--
explodename.c
3.26
KB
-rw-r--r--
export.h
157
B
-rw-r--r--
finddomain.c
5.86
KB
-rw-r--r--
gettext.c
1.78
KB
-rw-r--r--
gettextP.h
9.95
KB
-rw-r--r--
gmo.h
4.74
KB
-rw-r--r--
hash-string.c
1.51
KB
-rw-r--r--
hash-string.h
1.28
KB
-rw-r--r--
intl-compat.c
3.37
KB
-rw-r--r--
intl-exports.c
1.73
KB
-rw-r--r--
l10nflist.c
10.64
KB
-rw-r--r--
langprefs.c
12.42
KB
-rw-r--r--
libgnuintl.in.h
16.4
KB
-rw-r--r--
libintl.rc
1.58
KB
-rw-r--r--
loadinfo.h
4.99
KB
-rw-r--r--
loadmsgcat.c
33.73
KB
-rw-r--r--
localcharset.c
20.04
KB
-rw-r--r--
localcharset.h
1.31
KB
-rw-r--r--
locale.alias
3.01
KB
-rw-r--r--
localealias.c
10.39
KB
-rw-r--r--
localename.c
84.12
KB
-rw-r--r--
lock.c
26.16
KB
-rw-r--r--
lock.h
35.46
KB
-rw-r--r--
log.c
3.76
KB
-rw-r--r--
ngettext.c
1.86
KB
-rw-r--r--
os2compat.c
2.77
KB
-rw-r--r--
os2compat.h
1.47
KB
-rw-r--r--
osdep.c
988
B
-rw-r--r--
plural-exp.c
3.79
KB
-rw-r--r--
plural-exp.h
4.54
KB
-rw-r--r--
plural.c
52.03
KB
-rw-r--r--
plural.y
7.34
KB
-rw-r--r--
printf-args.c
6.43
KB
-rw-r--r--
printf-args.h
3.88
KB
-rw-r--r--
printf-parse.c
21.67
KB
-rw-r--r--
printf-parse.h
2.53
KB
-rw-r--r--
printf.c
10.09
KB
-rw-r--r--
ref-add.sin
1.02
KB
-rw-r--r--
ref-del.sin
996
B
-rw-r--r--
relocatable.c
17.09
KB
-rw-r--r--
relocatable.h
3.07
KB
-rw-r--r--
setlocale.c
32.34
KB
-rw-r--r--
textdomain.c
3.72
KB
-rw-r--r--
threadlib.c
1.89
KB
-rw-r--r--
tsearch.c
20.98
KB
-rw-r--r--
tsearch.h
2.75
KB
-rw-r--r--
vasnprintf.c
218.1
KB
-rw-r--r--
vasnprintf.h
2.74
KB
-rw-r--r--
vasnwprintf.h
1.64
KB
-rw-r--r--
verify.h
10.76
KB
-rw-r--r--
version.c
935
B
-rw-r--r--
wprintf-parse.h
2.58
KB
-rw-r--r--
xsize.c
78
B
-rw-r--r--
xsize.h
3.57
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : xsize.h
/* xsize.h -- Checked size_t computations. Copyright (C) 2003, 2008-2016 Free Software Foundation, Inc. This program is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this program; if not, see <http://www.gnu.org/licenses/>. */ #ifndef _XSIZE_H #define _XSIZE_H /* Get size_t. */ #include <stddef.h> /* Get SIZE_MAX. */ #include <limits.h> #if HAVE_STDINT_H # include <stdint.h> #endif #ifndef _GL_INLINE_HEADER_BEGIN #error "Please include config.h first." #endif _GL_INLINE_HEADER_BEGIN #ifndef XSIZE_INLINE # define XSIZE_INLINE _GL_INLINE #endif /* The size of memory objects is often computed through expressions of type size_t. Example: void* p = malloc (header_size + n * element_size). These computations can lead to overflow. When this happens, malloc() returns a piece of memory that is way too small, and the program then crashes while attempting to fill the memory. To avoid this, the functions and macros in this file check for overflow. The convention is that SIZE_MAX represents overflow. malloc (SIZE_MAX) is not guaranteed to fail -- think of a malloc implementation that uses mmap --, it's recommended to use size_overflow_p() or size_in_bounds_p() before invoking malloc(). The example thus becomes: size_t size = xsum (header_size, xtimes (n, element_size)); void *p = (size_in_bounds_p (size) ? malloc (size) : NULL); */ /* Convert an arbitrary value >= 0 to type size_t. */ #define xcast_size_t(N) \ ((N) <= SIZE_MAX ? (size_t) (N) : SIZE_MAX) /* Sum of two sizes, with overflow check. */ XSIZE_INLINE size_t #if __GNUC__ >= 3 __attribute__ ((__pure__)) #endif xsum (size_t size1, size_t size2) { size_t sum = size1 + size2; return (sum >= size1 ? sum : SIZE_MAX); } /* Sum of three sizes, with overflow check. */ XSIZE_INLINE size_t #if __GNUC__ >= 3 __attribute__ ((__pure__)) #endif xsum3 (size_t size1, size_t size2, size_t size3) { return xsum (xsum (size1, size2), size3); } /* Sum of four sizes, with overflow check. */ XSIZE_INLINE size_t #if __GNUC__ >= 3 __attribute__ ((__pure__)) #endif xsum4 (size_t size1, size_t size2, size_t size3, size_t size4) { return xsum (xsum (xsum (size1, size2), size3), size4); } /* Maximum of two sizes, with overflow check. */ XSIZE_INLINE size_t #if __GNUC__ >= 3 __attribute__ ((__pure__)) #endif xmax (size_t size1, size_t size2) { /* No explicit check is needed here, because for any n: max (SIZE_MAX, n) == SIZE_MAX and max (n, SIZE_MAX) == SIZE_MAX. */ return (size1 >= size2 ? size1 : size2); } /* Multiplication of a count with an element size, with overflow check. The count must be >= 0 and the element size must be > 0. This is a macro, not a function, so that it works correctly even when N is of a wider type and N > SIZE_MAX. */ #define xtimes(N, ELSIZE) \ ((N) <= SIZE_MAX / (ELSIZE) ? (size_t) (N) * (ELSIZE) : SIZE_MAX) /* Check for overflow. */ #define size_overflow_p(SIZE) \ ((SIZE) == SIZE_MAX) /* Check against overflow. */ #define size_in_bounds_p(SIZE) \ ((SIZE) != SIZE_MAX) _GL_INLINE_HEADER_END #endif /* _XSIZE_H */
Close