/external/strace/tests-m32/ |
D | ioctl_sg_io_v4.c | 118 sg_io->response_len, in main() 126 sg_io->response_len, in main() 153 sg_io->response_len = 2; in main() 154 sg_io->response = (unsigned long) efault - sg_io->response_len; in main() 213 sg_io->response_len, in main() 225 sg_io->response_len, in main()
|
/external/strace/tests/ |
D | ioctl_sg_io_v4.c | 118 sg_io->response_len, in main() 126 sg_io->response_len, in main() 153 sg_io->response_len = 2; in main() 154 sg_io->response = (unsigned long) efault - sg_io->response_len; in main() 213 sg_io->response_len, in main() 225 sg_io->response_len, in main()
|
/external/strace/tests-mx32/ |
D | ioctl_sg_io_v4.c | 118 sg_io->response_len, in main() 126 sg_io->response_len, in main() 153 sg_io->response_len = 2; in main() 154 sg_io->response = (unsigned long) efault - sg_io->response_len; in main() 213 sg_io->response_len, in main() 225 sg_io->response_len, in main()
|
/external/u-boot/lib/ |
D | tpm-v2.c | 134 size_t response_len = COMMAND_BUFFER_SIZE; in tpm2_pcr_read() local 145 ret = tpm_sendrecv_command(command_v2, response, &response_len); in tpm2_pcr_read() 149 if (unpack_byte_string(response, response_len, "ds", in tpm2_pcr_read() 151 response_len - TPM2_DIGEST_LEN, data, in tpm2_pcr_read() 174 size_t response_len = COMMAND_BUFFER_SIZE; in tpm2_get_capability() local 178 ret = tpm_sendrecv_command(command_v2, response, &response_len); in tpm2_get_capability() 189 memcpy(buf, &response[properties_off], response_len - properties_off); in tpm2_get_capability()
|
/external/ppp/pppd/ |
D | chap-md5.c | 65 int challenge_len, response_len; in chap_md5_verify_response() local 68 response_len = *response++; in chap_md5_verify_response() 69 if (response_len == MD5_HASH_SIZE) { in chap_md5_verify_response()
|
D | chap_ms.c | 200 int challenge_len, response_len; in chapms_verify_response() local 203 response_len = *response++; in chapms_verify_response() 204 if (response_len != MS_CHAP_RESPONSE_LEN) in chapms_verify_response() 248 int challenge_len, response_len; in chapms2_verify_response() local 251 response_len = *response++; in chapms2_verify_response() 252 if (response_len != MS_CHAP2_RESPONSE_LEN) in chapms2_verify_response()
|
D | chap-new.c | 312 int response_len, ok, mlen; in chap_handle_response() local 325 GETCHAR(response_len, pkt); in chap_handle_response() 326 len -= response_len + 1; /* length of name */ in chap_handle_response() 327 name = (char *)pkt + response_len; in chap_handle_response()
|
/external/grpc-grpc/src/php/tests/interop/ |
D | interop_client.php | 88 $response_len = 314159; 92 $request->setResponseSize($response_len); 111 hardAssert(strlen($payload->getBody()) === $response_len, 113 hardAssert($payload->getBody() === str_repeat("\0", $response_len), 406 $response_len = 314159; 410 $request->setResponseSize($response_len); 444 $response_parameters->setSize($response_len);
|
/external/grpc-grpc/test/http2_test/ |
D | test_rst_during_data.py | 37 response_len = len(response_data) 38 truncated_response_data = response_data[0:response_len/2]
|
/external/strace/ |
D | sg_io_v4.c | 122 PRINT_FIELD_U(", ", sg_io, response_len); in decode_response() 123 PRINT_FIELD_SG_IO_BUFFER(", ", sg_io, response, sg_io.response_len, in decode_response() 136 PRINT_FIELD_U(", ", sg_io, response_len); in decode_response()
|
D | ChangeLog | 19896 (decode_response): Print names of response_len, response,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_leap.c | 193 u8 response_len, pw_hash[16], pw_hash_hash[16], in eap_leap_process_response() local 221 response_len = *pos++; in eap_leap_process_response() 222 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { in eap_leap_process_response() 225 response_len, (unsigned long) wpabuf_len(reqData)); in eap_leap_process_response()
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 517 int challenge_len, response_len; in winbind_chap_verify() local 526 response_len = *response++; in winbind_chap_verify() 556 if (response_len != MS_CHAP_RESPONSE_LEN) in winbind_chap_verify() 607 if (response_len != MS_CHAP2_RESPONSE_LEN) in winbind_chap_verify()
|
/external/boringssl/src/tool/ |
D | server.cc | 198 size_t response_len; in HandleWWW() local 199 if (BIO_mem_contents(bio.get(), &response, &response_len)) { in HandleWWW() 200 SSL_write(ssl, response, response_len); in HandleWWW()
|
/external/kernel-headers/original/uapi/linux/ |
D | bsg.h | 57 __u32 response_len; /* [o] bytes of response actually written */ member
|
/external/ppp/pppd/plugins/radius/ |
D | radius.c | 343 int challenge_len, response_len; in radius_chap_verify() local 353 response_len = *response++; in radius_chap_verify() 400 if (response_len != MD5_HASH_SIZE) in radius_chap_verify() 417 if (response_len != MS_CHAP_RESPONSE_LEN) in radius_chap_verify() 436 if (response_len != MS_CHAP2_RESPONSE_LEN) in radius_chap_verify()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 620 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument 626 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { in eap_ttls_process_phase2_mschap() 630 (unsigned long) response_len); in eap_ttls_process_phase2_mschap() 696 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument 704 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { in eap_ttls_process_phase2_mschapv2() 708 (unsigned long) response_len); in eap_ttls_process_phase2_mschapv2()
|
/external/f2fs-tools/tools/sg_write_buffer/include/ |
D | sg_pt_linux.h | 78 __u32 response_len; /* [o] bytes of response actually written */ member
|
/external/boringssl/src/ssl/ |
D | ssl_cert.cc | 976 size_t response_len) { in SSL_CTX_set_ocsp_response() argument 978 CRYPTO_BUFFER_new(response, response_len, nullptr)); in SSL_CTX_set_ocsp_response() 983 size_t response_len) { in SSL_set_ocsp_response() argument 988 CRYPTO_BUFFER_new(response, response_len, nullptr)); in SSL_set_ocsp_response()
|
/external/f2fs-tools/tools/sg_write_buffer/ |
D | sg_pt_linux_nvme.c | 208 ptp->io_hdr.response_len = dsense ? 8 : ((n < 18) ? n : 18); in mk_sense_asc_ascq() 239 ptp->io_hdr.response_len = (dsense ? 8 : ((n < 18) ? n : 18)); in mk_sense_from_nvme_status() 266 ptp->io_hdr.response_len = dsense ? 8 : ((n < 18) ? n : 18); in mk_sense_invalid_fld() 350 ptp->io_hdr.response_len = n; in do_nvme_admin_cmd() 690 ptp->io_hdr.response_len = 0; in sntl_req_sense()
|
D | sg_pt_linux.c | 691 return ptp->io_hdr.response_len; in get_scsi_pt_sense_len() 883 ptp->io_hdr.response_len = (__u32)v3_hdr.sb_len_wr; in do_scsi_pt_v3()
|
/external/libevent/ |
D | evdns.c | 298 size_t response_len; member 1439 int r = sendto(port->socket, req->response, (int)req->response_len, 0, in server_port_flush() 1974 req->response_len = j; in evdns_server_request_format_response() 1976 if (!(req->response = mm_malloc(req->response_len))) { in evdns_server_request_format_response() 1981 memcpy(req->response, buf, req->response_len); in evdns_server_request_format_response() 2001 r = sendto(port->socket, req->response, (int)req->response_len, 0, in evdns_server_request_respond()
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 993 size_t response_len); 1000 size_t response_len);
|
/external/mesa3d/src/intel/compiler/ |
D | brw_eu_emit.c | 2560 unsigned response_len, in brw_send_indirect_surface_message() argument 2590 brw_inst_set_rlen(devinfo, insn, response_len); in brw_send_indirect_surface_message()
|