/external/tcpdump/ |
D | print-forces.c | 394 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length)), \ argument 401 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_32BITS(&(ilv)->length)), \ argument 417 static inline u_int tlv_valid(const struct forces_tlv *tlv, u_int rlen) in tlv_valid() argument 419 if (rlen < TLV_HDRL) in tlv_valid() 423 if (EXTRACT_16BITS(&tlv->length) > rlen) in tlv_valid() 425 if (rlen < F_ALN_LEN(EXTRACT_16BITS(&tlv->length))) in tlv_valid() 431 static inline int ilv_valid(const struct forces_ilv *ilv, u_int rlen) in ilv_valid() argument 433 if (rlen < ILV_HDRL) in ilv_valid() 437 if (EXTRACT_32BITS(&ilv->length) > rlen) in ilv_valid() 439 if (rlen < F_ALN_LEN(EXTRACT_32BITS(&ilv->length))) in ilv_valid() [all …]
|
/external/strace/ |
D | net.c | 226 int ulen, rlen; in decode_sockname() local 244 if (syserror(tcp) || umove(tcp, tcp->u_arg[2], &rlen) < 0) { in decode_sockname() 248 decode_sockaddr(tcp, tcp->u_arg[1], ulen > rlen ? rlen : ulen); in decode_sockname() 249 if (ulen != rlen) in decode_sockname() 250 tprintf(", [%d->%d]", ulen, rlen); in decode_sockname() 252 tprintf(", [%d]", rlen); in decode_sockname() 326 int ulen, rlen; in SYS_FUNC() local 350 if (!fetch_socklen(tcp, &rlen, tcp->u_arg[4], tcp->u_arg[5])) { in SYS_FUNC() 366 decode_sockaddr(tcp, tcp->u_arg[4], ulen > rlen ? rlen : ulen); in SYS_FUNC() 368 if (ulen != rlen) in SYS_FUNC() [all …]
|
/external/openssh/ |
D | sshbuf.c | 234 size_t rlen; in sshbuf_set_max_size() local 251 rlen = SSHBUF_SIZE_INIT; in sshbuf_set_max_size() 253 rlen = ROUNDUP(buf->size, SSHBUF_SIZE_INC); in sshbuf_set_max_size() 254 if (rlen > max_size) in sshbuf_set_max_size() 255 rlen = max_size; in sshbuf_set_max_size() 257 SSHBUF_DBG(("new alloc = %zu", rlen)); in sshbuf_set_max_size() 258 if ((dp = realloc(buf->d, rlen)) == NULL) in sshbuf_set_max_size() 261 buf->alloc = rlen; in sshbuf_set_max_size() 321 size_t rlen, need; in sshbuf_allocate() local 342 rlen = ROUNDUP(buf->alloc + need, SSHBUF_SIZE_INC); in sshbuf_allocate() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_gtc.c | 98 size_t rlen; in eap_gtc_process() local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); in eap_gtc_process() 101 if (pos == NULL || rlen < 1) in eap_gtc_process() 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); in eap_gtc_process() 110 if (rlen < 10) { in eap_gtc_process() 117 end = pos + rlen; in eap_gtc_process() 161 rlen = end - pos; in eap_gtc_process() 164 pos, rlen); in eap_gtc_process() 176 if (rlen != sm->user->password_len || in eap_gtc_process() 177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
|
/external/libxml2/doc/examples/ |
D | io1.c | 24 static int rlen; variable 55 rlen = strlen(result); in sqlOpen() 71 rlen = 0; in sqlClose() 92 if (len > rlen) len = rlen; in sqlRead() 94 rlen -= len; in sqlRead()
|
/external/libcxx/test/std/strings/string.view/string.view.ops/ |
D | copy.pass.cpp | 30 const size_t rlen = std::min ( n, sv.size() - pos ); in test1() local 32 CharT *dest1 = new CharT [rlen + 1]; dest1[rlen] = 0; in test1() 33 CharT *dest2 = new CharT [rlen + 1]; dest2[rlen] = 0; in test1() 47 std::copy_n(sv.begin() + pos, rlen, dest2); in test1() 48 for ( size_t i = 0; i <= rlen; ++i ) in test1()
|
/external/python/cpython2/Lib/ |
D | binhex.py | 61 rlen = fp.tell() 62 return file, finfo, dlen, rlen 175 name, finfo, dlen, rlen = name_finfo_dlen_rlen 186 self.rlen = rlen 199 d4 = struct.pack('>ii', self.dlen, self.rlen) 226 raise Error, 'Incorrect data size, diff=%r' % (self.rlen,) 235 self.rlen = self.rlen - len(data) 246 if self.rlen != 0: 248 "Incorrect resource-datasize, diff=%r" % (self.rlen,) 426 self.rlen = struct.unpack('>l', rest[15:19])[0] [all …]
|
/external/u-boot/net/ |
D | nfs.c | 611 int rlen; in nfs_readlink_reply() local 635 rlen = ntohl(rpc_pkt.u.reply.data[1 + nfsv3_data_offset]); in nfs_readlink_reply() 644 rlen); in nfs_readlink_reply() 645 nfs_path[pathlen + rlen] = 0; in nfs_readlink_reply() 649 rlen); in nfs_readlink_reply() 650 nfs_path[rlen] = 0; in nfs_readlink_reply() 658 int rlen; in nfs_read_reply() local 688 rlen = ntohl(rpc_pkt.u.reply.data[18]); in nfs_read_reply() 695 rlen = ntohl(rpc_pkt.u.reply.data[1 + nfsv3_data_offset]); in nfs_read_reply() 704 if (store_block(data_ptr, nfs_offset, rlen)) in nfs_read_reply() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_write.c | 47 size_t rlen; in tls_write_server_hello() local 175 &rlen) < 0) { in tls_write_server_hello() 181 pos = rhdr + rlen; in tls_write_server_hello() 193 size_t rlen; in tls_write_server_certificate() local 265 &rlen) < 0) { in tls_write_server_certificate() 271 pos = rhdr + rlen; in tls_write_server_certificate() 288 size_t rlen; in tls_write_server_certificate_status() local 352 &rlen) < 0) { in tls_write_server_certificate_status() 358 pos = rhdr + rlen; in tls_write_server_certificate_status() 374 size_t rlen; in tls_write_server_key_exchange() local [all …]
|
D | tlsv1_record.c | 282 size_t i, rlen, hlen; in tlsv1_record_receive() local 299 rlen = WPA_GET_BE16(in_data + 3); in tlsv1_record_receive() 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); in tlsv1_record_receive() 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { in tlsv1_record_receive() 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); in tlsv1_record_receive() 326 if (rlen > in_len) { in tlsv1_record_receive() 329 (unsigned long) rlen, (unsigned long) in_len); in tlsv1_record_receive() 334 in_data, rlen); in tlsv1_record_receive() 346 in_len = rlen; in tlsv1_record_receive() 484 return TLS_RECORD_HEADER_LEN + rlen; in tlsv1_record_receive()
|
D | tlsv1_client_write.c | 268 size_t rlen; in tls_write_client_certificate() local 332 &rlen) < 0) { in tls_write_client_certificate() 338 pos = rhdr + rlen; in tls_write_client_certificate() 522 size_t rlen; in tls_write_client_key_exchange() local 561 &rlen) < 0) { in tls_write_client_key_exchange() 567 pos = rhdr + rlen; in tls_write_client_key_exchange() 580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 732 &rlen) < 0) { in tls_write_client_certificate_verify() 738 pos = rhdr + rlen; in tls_write_client_certificate_verify() 751 size_t rlen; in tls_write_client_change_cipher_spec() local [all …]
|
/external/python/cpython3/Lib/ |
D | binhex.py | 141 name, finfo, dlen, rlen = name_finfo_dlen_rlen 155 self.rlen = rlen 177 d4 = struct.pack('>ii', self.dlen, self.rlen) 204 raise Error('Incorrect data size, diff=%r' % (self.rlen,)) 213 self.rlen = self.rlen - len(data) 224 if self.rlen != 0: 225 raise Error("Incorrect resource-datasize, diff=%r" % (self.rlen,)) 398 self.rlen = struct.unpack('>l', rest[15:19])[0] 437 n = min(n, self.rlen) 439 n = self.rlen [all …]
|
/external/libcxx/test/std/strings/basic.string/string.cons/ |
D | substr.pass.cpp | 42 typename S::size_type rlen = str.size() - pos; in test() local 43 assert(s2.size() == rlen); in test() 44 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); in test() 74 typename S::size_type rlen = std::min<typename S::size_type>(str.size() - pos, n); in test() local 75 assert(s2.size() == rlen); in test() 76 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); in test() 106 typename S::size_type rlen = std::min<typename S::size_type>(str.size() - pos, n); in test() local 107 assert(s2.size() == rlen); in test() 108 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); in test()
|
/external/libxml2/ |
D | testlimits.c | 91 static int rlen; variable 132 rlen = strlen(hugeTests[currentTest].start); in hugeOpen() 187 if (len >= rlen) { in hugeRead() 188 len = rlen; in hugeRead() 189 rlen = 0; in hugeRead() 196 rlen -= len; in hugeRead() 200 if (len >= rlen) { in hugeRead() 201 len = rlen; in hugeRead() 202 rlen = 0; in hugeRead() 208 rlen -= len; in hugeRead() [all …]
|
/external/guava/guava/src/com/google/common/escape/ |
D | CharEscaper.java | 100 int rlen = r.length; in escapeSlow() local 106 int sizeNeeded = destIndex + charsSkipped + rlen; in escapeSlow() 119 if (rlen > 0) { in escapeSlow() 120 System.arraycopy(r, 0, dest, destIndex, rlen); in escapeSlow() 121 destIndex += rlen; in escapeSlow()
|
/external/honggfuzz/examples/glibc/ |
D | resolver.c | 37 static size_t rlen = 0; variable 82 *((uint16_t *)rbuf) = htons(rlen - 2); in getdata() 86 if (send(nfd, rbuf, rlen, MSG_NOSIGNAL) == -1) { in getdata() 130 rlen = 0; in main() 145 rlen = len - tmplen; in main()
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 404 int rlen, rec; in scard_get_aid() local 427 rlen = scard_get_record_len(scard, rec, in scard_get_aid() 429 if (rlen < 0) { in scard_get_aid() 435 if (rlen > (int) blen) { in scard_get_aid() 439 if (scard_read_record(scard, buf, rlen, rec, in scard_get_aid() 445 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); in scard_get_aid() 454 if (efdir->appl_template_len > rlen - 2) { in scard_get_aid() 457 efdir->appl_template_len, rlen); in scard_get_aid() 781 uint32_t rlen; in scard_transmit() local 783 unsigned long rlen; in scard_transmit() local [all …]
|
/external/libmtp/src/ |
D | libusb-glue.c | 1266 PTPUSBBulkContainer *packet, unsigned long *rlen) in ptp_usb_getpacket() argument 1280 *rlen = params->response_packet_size; in ptp_usb_getpacket() 1288 ret = ptp_read_func(packet_size, &memhandler, params->data, rlen, 0); in ptp_usb_getpacket() 1289 ptp_exit_recv_memory_handler (&memhandler, &x, rlen); in ptp_usb_getpacket() 1291 memcpy (packet, x, *rlen); in ptp_usb_getpacket() 1309 unsigned long len, rlen; in ptp_usb_getdata() local 1311 ret = ptp_usb_getpacket(params, &usbdata, &rlen); in ptp_usb_getdata() 1343 if (rlen == ptp_usb->inep_maxpacket) { in ptp_usb_getdata() 1347 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data in ptp_usb_getdata() 1371 if (rlen > dtoh32(usbdata.length)) { in ptp_usb_getdata() [all …]
|
D | libopenusb1-glue.c | 1277 PTPUSBBulkContainer *packet, unsigned long *rlen) { in ptp_usb_getpacket() argument 1290 *rlen = params->response_packet_size; in ptp_usb_getpacket() 1298 ret = ptp_read_func(packet_size, &memhandler, params->data, rlen, 0); in ptp_usb_getpacket() 1299 ptp_exit_recv_memory_handler(&memhandler, &x, rlen); in ptp_usb_getpacket() 1301 memcpy(packet, x, *rlen); in ptp_usb_getpacket() 1321 unsigned long len, rlen; in ptp_usb_getdata() local 1323 ret = ptp_usb_getpacket(params, &usbdata, &rlen); in ptp_usb_getdata() 1355 if (rlen == ptp_usb->inep_maxpacket) { in ptp_usb_getdata() 1359 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data in ptp_usb_getdata() 1383 if (rlen > dtoh32(usbdata.length)) { in ptp_usb_getdata() [all …]
|
D | libusb1-glue.c | 1291 PTPUSBBulkContainer *packet, unsigned long *rlen) in ptp_usb_getpacket() argument 1305 *rlen = params->response_packet_size; in ptp_usb_getpacket() 1313 ret = ptp_read_func(packet_size, &memhandler, params->data, rlen, 0); in ptp_usb_getpacket() 1314 ptp_exit_recv_memory_handler (&memhandler, &x, rlen); in ptp_usb_getpacket() 1316 memcpy (packet, x, *rlen); in ptp_usb_getpacket() 1334 unsigned long len, rlen; in ptp_usb_getdata() local 1336 ret = ptp_usb_getpacket(params, &usbdata, &rlen); in ptp_usb_getdata() 1368 if (rlen == ptp_usb->inep_maxpacket) { in ptp_usb_getdata() 1372 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data in ptp_usb_getdata() 1396 if (rlen > dtoh32(usbdata.length)) { in ptp_usb_getdata() [all …]
|
/external/u-boot/examples/api/ |
D | glue.c | 273 lbasize_t *rlen) in ub_dev_read() argument 286 if (!err && rlen) in ub_dev_read() 287 *rlen = act_len; in ub_dev_read() 303 int ub_dev_recv(int handle, void *buf, int len, int *rlen) in ub_dev_recv() argument 315 if (!err && rlen) in ub_dev_recv() 316 *rlen = act_len; in ub_dev_recv()
|
/external/libunwind/src/ia64/ |
D | unwind_decoder.h | 186 unw_word rlen; in unw_decode_r1() local 188 rlen = (code & 0x1f); in unw_decode_r1() 189 UNW_DEC_PROLOGUE(R1, body, rlen, arg); in unw_decode_r1() 197 unw_word rlen; in unw_decode_r2() local 203 rlen = unw_decode_uleb128 (&dp); in unw_decode_r2() 204 UNW_DEC_PROLOGUE_GR(R2, rlen, mask, grsave, arg); in unw_decode_r2() 211 unw_word rlen; in unw_decode_r3() local 213 rlen = unw_decode_uleb128 (&dp); in unw_decode_r3() 214 UNW_DEC_PROLOGUE(R3, ((code & 0x3) == 1), rlen, arg); in unw_decode_r3()
|
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/main/util/ |
D | utility.c | 24 short k, rlen, status = 0; in readframe() local 28 rlen = (short)fread(data, sizeof(short), length, inp); in readframe() 29 if (rlen < length) { in readframe() 30 for (k = rlen; k < length; k++) in readframe()
|
/external/selinux/libsemanage/src/ |
D | utilities.c | 236 size_t count = 0, slen, rlen, newsize; in semanage_str_replace() local 241 rlen = strlen(replace); in semanage_str_replace() 257 newsize = strlen(src) + 1 + count * (rlen - slen); in semanage_str_replace() 273 if (rlen != 0) { in semanage_str_replace() 274 memcpy(pres, replace, rlen); in semanage_str_replace() 275 pres += rlen; in semanage_str_replace()
|
/external/webrtc/webrtc/modules/audio_coding/codecs/g722/test/ |
D | testG722.cc | 34 size_t rlen = fread(data, sizeof(int16_t), length, inp); in readframe() local 35 if (rlen >= length) in readframe() 37 memset(data + rlen, 0, (length - rlen) * sizeof(int16_t)); in readframe()
|