hash
int64 -9,197,960,073,880,366,000
9,199,363,627B
| project
stringclasses 2
values | size
int64 2
5.68k
| label
int64 0
1
| functionSource
stringlengths 31
235k
|
---|---|---|---|---|
6,320,019,361,007,853,000 | debian | 12 | 0 | static void copy_frame_default ( AVFrame * f , const uint8_t * src , int src_stride , int linelen , int height ) {
int i ;
uint8_t * dst = f -> data [ 0 ] ;
dst += ( height - 1 ) * f -> linesize [ 0 ] ;
for ( i = height ;
i ;
i -- ) {
memcpy ( dst , src , linelen ) ;
src += src_stride ;
dst -= f -> linesize [ 0 ] ;
}
} |
7,607,805,321,589,710,000 | debian | 9 | 0 | static int zcvs ( i_ctx_t * i_ctx_p ) {
os_ptr op = osp ;
int code ;
check_write_type ( * op , t_string ) ;
check_op ( 2 ) ;
code = convert_to_string ( imemory , op - 1 , op ) ;
if ( code >= 0 ) pop ( 1 ) ;
return code ;
} |
-7,899,851,216,763,490,000 | chrome | 84 | 0 | static void U_CALLCONV ucnv_toUnicode_UTF8_OFFSETS_LOGIC ( UConverterToUnicodeArgs * args , UErrorCode * err ) {
UConverter * cnv = args -> converter ;
const unsigned char * mySource = ( unsigned char * ) args -> source ;
UChar * myTarget = args -> target ;
int32_t * myOffsets = args -> offsets ;
int32_t offsetNum = 0 ;
const unsigned char * sourceLimit = ( unsigned char * ) args -> sourceLimit ;
const UChar * targetLimit = args -> targetLimit ;
unsigned char * toUBytes = cnv -> toUBytes ;
UBool isCESU8 = hasCESU8Data ( cnv ) ;
uint32_t ch , ch2 = 0 ;
int32_t i , inBytes ;
if ( cnv -> toUnicodeStatus && myTarget < targetLimit ) {
inBytes = cnv -> mode ;
i = cnv -> toULength ;
cnv -> toULength = 0 ;
ch = cnv -> toUnicodeStatus ;
cnv -> toUnicodeStatus = 0 ;
goto morebytes ;
}
while ( mySource < sourceLimit && myTarget < targetLimit ) {
ch = * ( mySource ++ ) ;
if ( ch < 0x80 ) {
* ( myTarget ++ ) = ( UChar ) ch ;
* ( myOffsets ++ ) = offsetNum ++ ;
}
else {
toUBytes [ 0 ] = ( char ) ch ;
inBytes = bytesFromUTF8 [ ch ] ;
i = 1 ;
morebytes : while ( i < inBytes ) {
if ( mySource < sourceLimit ) {
toUBytes [ i ] = ( char ) ( ch2 = * mySource ) ;
if ( ! U8_IS_TRAIL ( ch2 ) ) {
break ;
}
ch = ( ch << 6 ) + ch2 ;
++ mySource ;
i ++ ;
}
else {
cnv -> toUnicodeStatus = ch ;
cnv -> mode = inBytes ;
cnv -> toULength = ( int8_t ) i ;
goto donefornow ;
}
}
ch -= offsetsFromUTF8 [ inBytes ] ;
if ( i == inBytes && ch <= MAXIMUM_UTF && ch >= utf8_minChar32 [ i ] && ( isCESU8 ? i <= 3 : ! U_IS_SURROGATE ( ch ) ) ) {
if ( ch <= MAXIMUM_UCS2 ) {
* ( myTarget ++ ) = ( UChar ) ch ;
* ( myOffsets ++ ) = offsetNum ;
}
else {
ch -= HALF_BASE ;
* ( myTarget ++ ) = ( UChar ) ( ( ch >> HALF_SHIFT ) + SURROGATE_HIGH_START ) ;
* ( myOffsets ++ ) = offsetNum ;
ch = ( ch & HALF_MASK ) + SURROGATE_LOW_START ;
if ( myTarget < targetLimit ) {
* ( myTarget ++ ) = ( UChar ) ch ;
* ( myOffsets ++ ) = offsetNum ;
}
else {
cnv -> UCharErrorBuffer [ 0 ] = ( UChar ) ch ;
cnv -> UCharErrorBufferLength = 1 ;
* err = U_BUFFER_OVERFLOW_ERROR ;
}
}
offsetNum += i ;
}
else {
cnv -> toULength = ( int8_t ) i ;
* err = U_ILLEGAL_CHAR_FOUND ;
break ;
}
}
}
donefornow : if ( mySource < sourceLimit && myTarget >= targetLimit && U_SUCCESS ( * err ) ) {
* err = U_BUFFER_OVERFLOW_ERROR ;
}
args -> target = myTarget ;
args -> source = ( const char * ) mySource ;
args -> offsets = myOffsets ;
} |
5,610,242,550,647,094,000 | debian | 23 | 1 | static int fill_vaapi_ReferenceFrames ( VAPictureParameterBufferH264 * pic_param , H264Context * h ) {
DPB dpb ;
int i ;
dpb . size = 0 ;
dpb . max_size = FF_ARRAY_ELEMS ( pic_param -> ReferenceFrames ) ;
dpb . va_pics = pic_param -> ReferenceFrames ;
for ( i = 0 ;
i < dpb . max_size ;
i ++ ) init_vaapi_pic ( & dpb . va_pics [ i ] ) ;
for ( i = 0 ;
i < h -> short_ref_count ;
i ++ ) {
Picture * const pic = h -> short_ref [ i ] ;
if ( pic && pic -> f . reference && dpb_add ( & dpb , pic ) < 0 ) return - 1 ;
}
for ( i = 0 ;
i < 16 ;
i ++ ) {
Picture * const pic = h -> long_ref [ i ] ;
if ( pic && pic -> f . reference && dpb_add ( & dpb , pic ) < 0 ) return - 1 ;
}
return 0 ;
} |
7,092,216,800,726,730,000 | debian | 4 | 0 | static int dissect_h245_ConnectionIdentifier ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h245_ConnectionIdentifier , ConnectionIdentifier_sequence ) ;
return offset ;
} |
8,572,106,347,813,672,000 | debian | 18 | 0 | static int verify_address_len ( const void * p ) {
const struct sadb_address * sp = p ;
const struct sockaddr * addr = ( const struct sockaddr * ) ( sp + 1 ) ;
const struct sockaddr_in * sin ;
# if IS_ENABLED ( CONFIG_IPV6 ) const struct sockaddr_in6 * sin6 ;
# endif int len ;
switch ( addr -> sa_family ) {
case AF_INET : len = DIV_ROUND_UP ( sizeof ( * sp ) + sizeof ( * sin ) , sizeof ( uint64_t ) ) ;
if ( sp -> sadb_address_len != len || sp -> sadb_address_prefixlen > 32 ) return - EINVAL ;
break ;
# if IS_ENABLED ( CONFIG_IPV6 ) case AF_INET6 : len = DIV_ROUND_UP ( sizeof ( * sp ) + sizeof ( * sin6 ) , sizeof ( uint64_t ) ) ;
if ( sp -> sadb_address_len != len || sp -> sadb_address_prefixlen > 128 ) return - EINVAL ;
break ;
# endif default : return - EINVAL ;
break ;
}
return 0 ;
} |
914,926,989,019,402,500 | debian | 11 | 0 | int xsnprintf_func ( char * str , int n , const char * fmt , ... ) {
va_list a ;
int ret ;
va_start ( a , fmt ) ;
ret = vsnprintf_func ( str , n , fmt , a ) ;
va_end ( a ) ;
if ( ret < 0 ) {
ret = n ;
}
return ret ;
} |
6,250,095,321,513,210,000 | debian | 25 | 1 | rfbBool rfbSendTextChatMessage ( rfbClientPtr cl , uint32_t length , char * buffer ) {
rfbTextChatMsg tc ;
int bytesToSend = 0 ;
memset ( ( char * ) & tc , 0 , sizeof ( tc ) ) ;
tc . type = rfbTextChat ;
tc . length = Swap32IfLE ( length ) ;
switch ( length ) {
case rfbTextChatOpen : case rfbTextChatClose : case rfbTextChatFinished : bytesToSend = 0 ;
break ;
default : bytesToSend = length ;
if ( bytesToSend > rfbTextMaxSize ) bytesToSend = rfbTextMaxSize ;
}
if ( cl -> ublen + sz_rfbTextChatMsg + bytesToSend > UPDATE_BUF_SIZE ) {
if ( ! rfbSendUpdateBuf ( cl ) ) return FALSE ;
}
memcpy ( & cl -> updateBuf [ cl -> ublen ] , ( char * ) & tc , sz_rfbTextChatMsg ) ;
cl -> ublen += sz_rfbTextChatMsg ;
if ( bytesToSend > 0 ) {
memcpy ( & cl -> updateBuf [ cl -> ublen ] , buffer , bytesToSend ) ;
cl -> ublen += bytesToSend ;
}
rfbStatRecordMessageSent ( cl , rfbTextChat , sz_rfbTextChatMsg + bytesToSend , sz_rfbTextChatMsg + bytesToSend ) ;
if ( ! rfbSendUpdateBuf ( cl ) ) return FALSE ;
return TRUE ;
} |
-2,928,324,134,072,492,500 | debian | 4 | 0 | void remove_tap_listener_iax2_calls ( void ) {
remove_tap_listener ( & ( the_tapinfo_struct . iax2_dummy ) ) ;
have_iax2_tap_listener = FALSE ;
} |
8,460,430,819,945,784,000 | debian | 4 | 0 | static inline uint8_t NVRAM_get_byte ( m48t59_t * nvram , uint32_t addr ) {
m48t59_set_addr ( nvram , addr ) ;
return m48t59_read ( nvram ) ;
} |
8,971,837,418,146,377,000 | chrome | 3 | 0 | void xsltFreeLocale ( xsltLocale locale ) {
# ifdef XSLT_LOCALE_XLOCALE freelocale ( locale ) ;
# endif } |
-5,493,081,488,206,620,000 | debian | 17 | 0 | static const char * cmd_upload_keep_files ( cmd_parms * cmd , void * _dcfg , const char * p1 ) {
directory_config * dcfg = ( directory_config * ) _dcfg ;
if ( dcfg == NULL ) return NULL ;
if ( strcasecmp ( p1 , "on" ) == 0 ) {
dcfg -> upload_keep_files = KEEP_FILES_ON ;
}
else if ( strcasecmp ( p1 , "off" ) == 0 ) {
dcfg -> upload_keep_files = KEEP_FILES_OFF ;
}
else if ( strcasecmp ( p1 , "relevantonly" ) == 0 ) {
dcfg -> upload_keep_files = KEEP_FILES_RELEVANT_ONLY ;
}
else {
return apr_psprintf ( cmd -> pool , "ModSecurity: Invalid setting for SecUploadKeepFiles: %s" , p1 ) ;
}
return NULL ;
} |
-4,370,220,620,850,259,000 | debian | 16 | 0 | static void sipr_decode_lp ( float * lsfnew , const float * lsfold , float * Az , int num_subfr ) {
double lsfint [ LP_FILTER_ORDER ] ;
int i , j ;
float t , t0 = 1.0 / num_subfr ;
t = t0 * 0.5 ;
for ( i = 0 ;
i < num_subfr ;
i ++ ) {
for ( j = 0 ;
j < LP_FILTER_ORDER ;
j ++ ) lsfint [ j ] = lsfold [ j ] * ( 1 - t ) + t * lsfnew [ j ] ;
ff_amrwb_lsp2lpc ( lsfint , Az , LP_FILTER_ORDER ) ;
Az += LP_FILTER_ORDER ;
t += t0 ;
}
} |
6,600,620,671,673,715,000 | debian | 18 | 0 | static byte * i_alloc_string_immovable ( gs_memory_t * mem , uint nbytes , client_name_t cname ) {
gs_ref_memory_t * const imem = ( gs_ref_memory_t * ) mem ;
byte * str ;
uint asize ;
clump_t * cp ;
nbytes += HDR_ID_OFFSET ;
# ifdef MEMENTO if ( Memento_failThisEvent ( ) ) return NULL ;
# endif asize = string_clump_space ( nbytes ) + sizeof ( clump_head_t ) ;
cp = alloc_acquire_clump ( imem , ( ulong ) asize , true , "large string clump" ) ;
if ( cp == 0 ) return 0 ;
cp -> c_alone = true ;
str = cp -> ctop = cp -> climit - nbytes ;
if_debug4m ( 'a' , mem , "[a%d|+>L]%s(%u) = 0x%lx\n" , alloc_trace_space ( imem ) , client_name_string ( cname ) , nbytes , ( ulong ) str ) ;
gs_alloc_fill ( str , gs_alloc_fill_alloc , nbytes ) ;
str += HDR_ID_OFFSET ;
ASSIGN_HDR_ID ( str ) ;
return str ;
} |
5,917,118,798,851,366,000 | debian | 20 | 0 | void proto_register_zbee_zcl_met_idt ( void ) {
static hf_register_info hf [ ] = {
{
& hf_zbee_zcl_met_idt_attr_id , {
"Attribute" , "zbee_zcl_ha.metidt.attr_id" , FT_UINT16 , BASE_HEX , VALS ( zbee_zcl_met_idt_attr_names ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_met_idt_meter_type_id , {
"Meter Type ID" , "zbee_zcl_ha.metidt.attr.meter_type.id" , FT_UINT16 , BASE_HEX , VALS ( zbee_zcl_met_idt_meter_type_names ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_met_idt_data_quality_id , {
"Data Quality ID" , "zbee_zcl_ha.metidt.attr.data_quality.id" , FT_UINT16 , BASE_HEX , VALS ( zbee_zcl_met_idt_data_quality_names ) , 0x00 , NULL , HFILL }
}
}
;
proto_zbee_zcl_met_idt = proto_register_protocol ( "ZigBee ZCL Meter Identification" , "ZCL Meter Identification" , ZBEE_PROTOABBREV_ZCL_METIDT ) ;
proto_register_field_array ( proto_zbee_zcl_met_idt , hf , array_length ( hf ) ) ;
register_dissector ( ZBEE_PROTOABBREV_ZCL_METIDT , dissect_zbee_zcl_met_idt , proto_zbee_zcl_met_idt ) ;
} |
-6,552,851,419,396,579,000 | debian | 9 | 0 | static int dissect_printer_attributes ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep ) {
guint32 attributes ;
static const int * hf_attributes [ ] = {
& hf_printer_attributes_published , & hf_printer_attributes_raw_only , & hf_printer_attributes_enable_bidi , & hf_printer_attributes_work_offline , & hf_printer_attributes_do_complete_first , & hf_printer_attributes_keep_printed_jobs , & hf_printer_attributes_enable_devq , & hf_printer_attributes_local , & hf_printer_attributes_hidden , & hf_printer_attributes_network , & hf_printer_attributes_shared , & hf_printer_attributes_default , & hf_printer_attributes_direct , & hf_printer_attributes_queued , NULL }
;
offset = dissect_ndr_uint32 ( tvb , offset , pinfo , NULL , di , drep , - 1 , & attributes ) ;
proto_tree_add_bitmask_value_with_flags ( tree , tvb , offset - 4 , hf_printer_attributes , ett_printer_attributes , hf_attributes , attributes , BMT_NO_APPEND ) ;
return offset ;
} |
2,521,579,609,370,336,000 | debian | 12 | 0 | int dtls1_send_server_done ( SSL * s ) {
unsigned char * p ;
if ( s -> state == SSL3_ST_SW_SRVR_DONE_A ) {
p = ( unsigned char * ) s -> init_buf -> data ;
p = dtls1_set_message_header ( s , p , SSL3_MT_SERVER_DONE , 0 , 0 , 0 ) ;
s -> state = SSL3_ST_SW_SRVR_DONE_B ;
s -> init_num = DTLS1_HM_HEADER_LENGTH ;
s -> init_off = 0 ;
dtls1_buffer_message ( s , 0 ) ;
}
return ( dtls1_do_write ( s , SSL3_RT_HANDSHAKE ) ) ;
} |
8,280,197,130,498,467,000 | debian | 3 | 0 | static void incomplete_class_write_property ( zval * object , zval * member , zval * value , const zend_literal * key TSRMLS_DC ) {
incomplete_class_message ( object , E_NOTICE TSRMLS_CC ) ;
} |
-7,187,272,991,279,784,000 | debian | 5 | 0 | static void cpu_halt_signal ( void * opaque , int irq , int level ) {
if ( level && current_cpu ) {
cpu_interrupt ( current_cpu , CPU_INTERRUPT_HALT ) ;
}
} |
7,163,083,127,251,596,000 | chrome | 18 | 0 | IN_PROC_BROWSER_TEST_F ( BookmarkBubbleSignInDelegateTest , BrowserRemoved ) {
Browser * extra_browser = CreateBrowser ( profile ( ) ) ;
ReplaceBlank ( extra_browser ) ;
int starting_tab_count = extra_browser -> tab_strip_model ( ) -> count ( ) ;
scoped_ptr < BookmarkBubbleDelegate > delegate ;
delegate . reset ( new BookmarkBubbleSignInDelegate ( browser ( ) ) ) ;
BrowserList : : SetLastActive ( extra_browser ) ;
browser ( ) -> tab_strip_model ( ) -> CloseAllTabs ( ) ;
content : : RunAllPendingInMessageLoop ( ) ;
delegate -> OnSignInLinkClicked ( ) ;
if ( kHasProfileChooser ) {
EXPECT_TRUE ( ProfileChooserView : : IsShowing ( ) ) ;
}
else {
int tab_count = extra_browser -> tab_strip_model ( ) -> count ( ) ;
EXPECT_EQ ( starting_tab_count + 1 , tab_count ) ;
}
} |
3,672,688,962,041,927,000 | chrome | 26 | 0 | const vpx_codec_cx_pkt_t * vpx_codec_get_cx_data ( vpx_codec_ctx_t * ctx , vpx_codec_iter_t * iter ) {
const vpx_codec_cx_pkt_t * pkt = NULL ;
if ( ctx ) {
if ( ! iter ) ctx -> err = VPX_CODEC_INVALID_PARAM ;
else if ( ! ctx -> iface || ! ctx -> priv ) ctx -> err = VPX_CODEC_ERROR ;
else if ( ! ( ctx -> iface -> caps & VPX_CODEC_CAP_ENCODER ) ) ctx -> err = VPX_CODEC_INCAPABLE ;
else pkt = ctx -> iface -> enc . get_cx_data ( get_alg_priv ( ctx ) , iter ) ;
}
if ( pkt && pkt -> kind == VPX_CODEC_CX_FRAME_PKT ) {
vpx_codec_priv_t * const priv = ctx -> priv ;
char * const dst_buf = ( char * ) priv -> enc . cx_data_dst_buf . buf ;
if ( dst_buf && pkt -> data . raw . buf != dst_buf && pkt -> data . raw . sz + priv -> enc . cx_data_pad_before + priv -> enc . cx_data_pad_after <= priv -> enc . cx_data_dst_buf . sz ) {
vpx_codec_cx_pkt_t * modified_pkt = & priv -> enc . cx_data_pkt ;
memcpy ( dst_buf + priv -> enc . cx_data_pad_before , pkt -> data . raw . buf , pkt -> data . raw . sz ) ;
* modified_pkt = * pkt ;
modified_pkt -> data . raw . buf = dst_buf ;
modified_pkt -> data . raw . sz += priv -> enc . cx_data_pad_before + priv -> enc . cx_data_pad_after ;
pkt = modified_pkt ;
}
if ( dst_buf == pkt -> data . raw . buf ) {
priv -> enc . cx_data_dst_buf . buf = dst_buf + pkt -> data . raw . sz ;
priv -> enc . cx_data_dst_buf . sz -= pkt -> data . raw . sz ;
}
}
return pkt ;
} |
355,220,887,711,506,900 | debian | 54 | 0 | static double var_eq_const ( VariableStatData * vardata , Oid operator , Datum constval , bool constisnull , bool varonleft ) {
double selec ;
bool isdefault ;
Oid opfuncoid ;
if ( constisnull ) return 0.0 ;
if ( vardata -> isunique && vardata -> rel && vardata -> rel -> tuples >= 1.0 ) return 1.0 / vardata -> rel -> tuples ;
if ( HeapTupleIsValid ( vardata -> statsTuple ) && statistic_proc_security_check ( vardata , ( opfuncoid = get_opcode ( operator ) ) ) ) {
Form_pg_statistic stats ;
Datum * values ;
int nvalues ;
float4 * numbers ;
int nnumbers ;
bool match = false ;
int i ;
stats = ( Form_pg_statistic ) GETSTRUCT ( vardata -> statsTuple ) ;
if ( get_attstatsslot ( vardata -> statsTuple , vardata -> atttype , vardata -> atttypmod , STATISTIC_KIND_MCV , InvalidOid , NULL , & values , & nvalues , & numbers , & nnumbers ) ) {
FmgrInfo eqproc ;
fmgr_info ( opfuncoid , & eqproc ) ;
for ( i = 0 ;
i < nvalues ;
i ++ ) {
if ( varonleft ) match = DatumGetBool ( FunctionCall2Coll ( & eqproc , DEFAULT_COLLATION_OID , values [ i ] , constval ) ) ;
else match = DatumGetBool ( FunctionCall2Coll ( & eqproc , DEFAULT_COLLATION_OID , constval , values [ i ] ) ) ;
if ( match ) break ;
}
}
else {
values = NULL ;
numbers = NULL ;
i = nvalues = nnumbers = 0 ;
}
if ( match ) {
selec = numbers [ i ] ;
}
else {
double sumcommon = 0.0 ;
double otherdistinct ;
for ( i = 0 ;
i < nnumbers ;
i ++ ) sumcommon += numbers [ i ] ;
selec = 1.0 - sumcommon - stats -> stanullfrac ;
CLAMP_PROBABILITY ( selec ) ;
otherdistinct = get_variable_numdistinct ( vardata , & isdefault ) - nnumbers ;
if ( otherdistinct > 1 ) selec /= otherdistinct ;
if ( nnumbers > 0 && selec > numbers [ nnumbers - 1 ] ) selec = numbers [ nnumbers - 1 ] ;
}
free_attstatsslot ( vardata -> atttype , values , nvalues , numbers , nnumbers ) ;
}
else {
selec = 1.0 / get_variable_numdistinct ( vardata , & isdefault ) ;
}
CLAMP_PROBABILITY ( selec ) ;
return selec ;
} |
-5,357,254,031,401,750,000 | debian | 10 | 0 | int luaD_protectedparser ( lua_State * L , ZIO * z , const char * name ) {
struct SParser p ;
int status ;
p . z = z ;
p . name = name ;
luaZ_initbuffer ( L , & p . buff ) ;
status = luaD_pcall ( L , f_parser , & p , savestack ( L , L -> top ) , L -> errfunc ) ;
luaZ_freebuffer ( L , & p . buff ) ;
return status ;
} |
-2,423,144,171,479,607,000 | debian | 4 | 0 | static void pdf_run_BI ( fz_context * ctx , pdf_processor * proc , fz_image * image ) {
pdf_run_processor * pr = ( pdf_run_processor * ) proc ;
pdf_show_image ( ctx , pr , image ) ;
} |
-8,721,757,784,652,752,000 | debian | 19 | 0 | int ratestrtosize ( char * s , uint_fast32_t rawsize , uint_fast32_t * size ) {
jpc_flt_t f ;
if ( strchr ( s , 'B' ) ) {
* size = atoi ( s ) ;
}
else {
f = atof ( s ) ;
if ( f < 0 ) {
* size = 0 ;
}
else if ( f > 1.0 ) {
* size = rawsize + 1 ;
}
else {
* size = f * rawsize ;
}
}
return 0 ;
} |
1,245,821,301,839,614,700 | debian | 290 | 1 | static void copy_move_file ( CopyMoveJob * copy_job , GFile * src , GFile * dest_dir , gboolean same_fs , gboolean unique_names , char * * dest_fs_type , SourceInfo * source_info , TransferInfo * transfer_info , GHashTable * debuting_files , GdkPoint * position , gboolean overwrite , gboolean * skipped_file , gboolean readonly_source_fs ) {
GFile * dest , * new_dest ;
g_autofree gchar * dest_uri = NULL ;
GError * error ;
GFileCopyFlags flags ;
char * primary , * secondary , * details ;
int response ;
ProgressData pdata ;
gboolean would_recurse , is_merge ;
CommonJob * job ;
gboolean res ;
int unique_name_nr ;
gboolean handled_invalid_filename ;
job = ( CommonJob * ) copy_job ;
if ( should_skip_file ( job , src ) ) {
* skipped_file = TRUE ;
return ;
}
unique_name_nr = 1 ;
handled_invalid_filename = * dest_fs_type != NULL ;
if ( unique_names ) {
dest = get_unique_target_file ( src , dest_dir , same_fs , * dest_fs_type , unique_name_nr ++ ) ;
}
else if ( copy_job -> target_name != NULL ) {
dest = get_target_file_with_custom_name ( src , dest_dir , * dest_fs_type , same_fs , copy_job -> target_name ) ;
}
else {
dest = get_target_file ( src , dest_dir , * dest_fs_type , same_fs ) ;
}
if ( test_dir_is_parent ( dest_dir , src ) ) {
if ( job -> skip_all_error ) {
goto out ;
}
primary = copy_job -> is_move ? g_strdup ( _ ( "You cannot move a folder into itself." ) ) : g_strdup ( _ ( "You cannot copy a folder into itself." ) ) ;
secondary = g_strdup ( _ ( "The destination folder is inside the source folder." ) ) ;
response = run_cancel_or_skip_warning ( job , primary , secondary , NULL , source_info -> num_files , source_info -> num_files - transfer_info -> num_files ) ;
if ( response == 0 || response == GTK_RESPONSE_DELETE_EVENT ) {
abort_job ( job ) ;
}
else if ( response == 1 ) {
job -> skip_all_error = TRUE ;
}
else if ( response == 2 ) {
}
else {
g_assert_not_reached ( ) ;
}
goto out ;
}
if ( test_dir_is_parent ( src , dest ) ) {
if ( job -> skip_all_error ) {
goto out ;
}
primary = copy_job -> is_move ? g_strdup ( _ ( "You cannot move a file over itself." ) ) : g_strdup ( _ ( "You cannot copy a file over itself." ) ) ;
secondary = g_strdup ( _ ( "The source file would be overwritten by the destination." ) ) ;
response = run_cancel_or_skip_warning ( job , primary , secondary , NULL , source_info -> num_files , source_info -> num_files - transfer_info -> num_files ) ;
if ( response == 0 || response == GTK_RESPONSE_DELETE_EVENT ) {
abort_job ( job ) ;
}
else if ( response == 1 ) {
job -> skip_all_error = TRUE ;
}
else if ( response == 2 ) {
}
else {
g_assert_not_reached ( ) ;
}
goto out ;
}
retry : error = NULL ;
flags = G_FILE_COPY_NOFOLLOW_SYMLINKS ;
if ( overwrite ) {
flags |= G_FILE_COPY_OVERWRITE ;
}
if ( readonly_source_fs ) {
flags |= G_FILE_COPY_TARGET_DEFAULT_PERMS ;
}
pdata . job = copy_job ;
pdata . last_size = 0 ;
pdata . source_info = source_info ;
pdata . transfer_info = transfer_info ;
if ( copy_job -> is_move ) {
res = g_file_move ( src , dest , flags , job -> cancellable , copy_file_progress_callback , & pdata , & error ) ;
}
else {
res = g_file_copy ( src , dest , flags , job -> cancellable , copy_file_progress_callback , & pdata , & error ) ;
}
if ( res ) {
GFile * real ;
real = map_possibly_volatile_file_to_real ( dest , job -> cancellable , & error ) ;
if ( real == NULL ) {
res = FALSE ;
}
else {
g_object_unref ( dest ) ;
dest = real ;
}
}
if ( res ) {
transfer_info -> num_files ++ ;
report_copy_progress ( copy_job , source_info , transfer_info ) ;
if ( debuting_files ) {
dest_uri = g_file_get_uri ( dest ) ;
if ( position ) {
nautilus_file_changes_queue_schedule_position_set ( dest , * position , job -> screen_num ) ;
}
else if ( eel_uri_is_desktop ( dest_uri ) ) {
nautilus_file_changes_queue_schedule_position_remove ( dest ) ;
}
g_hash_table_replace ( debuting_files , g_object_ref ( dest ) , GINT_TO_POINTER ( TRUE ) ) ;
}
if ( copy_job -> is_move ) {
nautilus_file_changes_queue_file_moved ( src , dest ) ;
}
else {
nautilus_file_changes_queue_file_added ( dest ) ;
}
if ( copy_job -> desktop_location != NULL && g_file_equal ( copy_job -> desktop_location , dest_dir ) && is_trusted_desktop_file ( src , job -> cancellable ) ) {
mark_desktop_file_trusted ( job , job -> cancellable , dest , FALSE ) ;
}
if ( job -> undo_info != NULL ) {
nautilus_file_undo_info_ext_add_origin_target_pair ( NAUTILUS_FILE_UNDO_INFO_EXT ( job -> undo_info ) , src , dest ) ;
}
g_object_unref ( dest ) ;
return ;
}
if ( ! handled_invalid_filename && IS_IO_ERROR ( error , INVALID_FILENAME ) ) {
handled_invalid_filename = TRUE ;
g_assert ( * dest_fs_type == NULL ) ;
* dest_fs_type = query_fs_type ( dest_dir , job -> cancellable ) ;
if ( unique_names ) {
new_dest = get_unique_target_file ( src , dest_dir , same_fs , * dest_fs_type , unique_name_nr ) ;
}
else {
new_dest = get_target_file ( src , dest_dir , * dest_fs_type , same_fs ) ;
}
if ( ! g_file_equal ( dest , new_dest ) ) {
g_object_unref ( dest ) ;
dest = new_dest ;
g_error_free ( error ) ;
goto retry ;
}
else {
g_object_unref ( new_dest ) ;
}
}
if ( ! overwrite && IS_IO_ERROR ( error , EXISTS ) ) {
gboolean is_merge ;
FileConflictResponse * response ;
g_error_free ( error ) ;
if ( unique_names ) {
g_object_unref ( dest ) ;
dest = get_unique_target_file ( src , dest_dir , same_fs , * dest_fs_type , unique_name_nr ++ ) ;
goto retry ;
}
is_merge = FALSE ;
if ( is_dir ( dest ) && is_dir ( src ) ) {
is_merge = TRUE ;
}
if ( ( is_merge && job -> merge_all ) || ( ! is_merge && job -> replace_all ) ) {
overwrite = TRUE ;
goto retry ;
}
if ( job -> skip_all_conflict ) {
goto out ;
}
response = handle_copy_move_conflict ( job , src , dest , dest_dir ) ;
if ( response -> id == GTK_RESPONSE_CANCEL || response -> id == GTK_RESPONSE_DELETE_EVENT ) {
file_conflict_response_free ( response ) ;
abort_job ( job ) ;
}
else if ( response -> id == CONFLICT_RESPONSE_SKIP ) {
if ( response -> apply_to_all ) {
job -> skip_all_conflict = TRUE ;
}
file_conflict_response_free ( response ) ;
}
else if ( response -> id == CONFLICT_RESPONSE_REPLACE ) {
if ( response -> apply_to_all ) {
if ( is_merge ) {
job -> merge_all = TRUE ;
}
else {
job -> replace_all = TRUE ;
}
}
overwrite = TRUE ;
file_conflict_response_free ( response ) ;
goto retry ;
}
else if ( response -> id == CONFLICT_RESPONSE_RENAME ) {
g_object_unref ( dest ) ;
dest = get_target_file_for_display_name ( dest_dir , response -> new_name ) ;
file_conflict_response_free ( response ) ;
goto retry ;
}
else {
g_assert_not_reached ( ) ;
}
}
else if ( overwrite && IS_IO_ERROR ( error , IS_DIRECTORY ) ) {
gboolean existing_file_deleted ;
DeleteExistingFileData data ;
g_error_free ( error ) ;
data . job = job ;
data . source = src ;
existing_file_deleted = delete_file_recursively ( dest , job -> cancellable , existing_file_removed_callback , & data ) ;
if ( existing_file_deleted ) {
goto retry ;
}
}
else if ( IS_IO_ERROR ( error , WOULD_RECURSE ) || IS_IO_ERROR ( error , WOULD_MERGE ) ) {
is_merge = error -> code == G_IO_ERROR_WOULD_MERGE ;
would_recurse = error -> code == G_IO_ERROR_WOULD_RECURSE ;
g_error_free ( error ) ;
if ( overwrite && would_recurse ) {
error = NULL ;
if ( ! g_file_delete ( dest , job -> cancellable , & error ) && ! IS_IO_ERROR ( error , NOT_FOUND ) ) {
if ( job -> skip_all_error ) {
g_error_free ( error ) ;
goto out ;
}
if ( copy_job -> is_move ) {
primary = f ( _ ( "Error while moving “%B”." ) , src ) ;
}
else {
primary = f ( _ ( "Error while copying “%B”." ) , src ) ;
}
secondary = f ( _ ( "Could not remove the already existing file with the same name in %F." ) , dest_dir ) ;
details = error -> message ;
response = run_warning ( job , primary , secondary , details , TRUE , CANCEL , SKIP_ALL , SKIP , NULL ) ;
g_error_free ( error ) ;
if ( response == 0 || response == GTK_RESPONSE_DELETE_EVENT ) {
abort_job ( job ) ;
}
else if ( response == 1 ) {
job -> skip_all_error = TRUE ;
}
else if ( response == 2 ) {
}
else {
g_assert_not_reached ( ) ;
}
goto out ;
}
if ( error ) {
g_error_free ( error ) ;
error = NULL ;
}
nautilus_file_changes_queue_file_removed ( dest ) ;
}
if ( is_merge ) {
same_fs = FALSE ;
}
if ( ! copy_move_directory ( copy_job , src , & dest , same_fs , would_recurse , dest_fs_type , source_info , transfer_info , debuting_files , skipped_file , readonly_source_fs ) ) {
g_assert ( * dest_fs_type != NULL ) ;
handled_invalid_filename = TRUE ;
goto retry ;
}
g_object_unref ( dest ) ;
return ;
}
else if ( IS_IO_ERROR ( error , CANCELLED ) ) {
g_error_free ( error ) ;
}
else {
if ( job -> skip_all_error ) {
g_error_free ( error ) ;
goto out ;
}
primary = f ( _ ( "Error while copying “%B”." ) , src ) ;
secondary = f ( _ ( "There was an error copying the file into %F." ) , dest_dir ) ;
details = error -> message ;
response = run_cancel_or_skip_warning ( job , primary , secondary , details , source_info -> num_files , source_info -> num_files - transfer_info -> num_files ) ;
g_error_free ( error ) ;
if ( response == 0 || response == GTK_RESPONSE_DELETE_EVENT ) {
abort_job ( job ) ;
}
else if ( response == 1 ) {
job -> skip_all_error = TRUE ;
}
else if ( response == 2 ) {
}
else {
g_assert_not_reached ( ) ;
}
}
out : * skipped_file = TRUE ;
g_object_unref ( dest ) ;
} |
-7,777,644,912,037,189,000 | debian | 47 | 0 | static int dissect_udvm_reference_operand_memory ( guint8 * buff , guint operand_address , guint16 * value , guint * result_dest ) {
guint bytecode ;
guint16 operand ;
guint offset = operand_address ;
guint test_bits ;
guint8 temp_data ;
guint16 temp_data16 ;
if ( operand_address >= UDVM_MEMORY_SIZE ) return - 1 ;
bytecode = buff [ operand_address ] ;
test_bits = bytecode >> 7 ;
if ( test_bits == 1 ) {
test_bits = bytecode >> 6 ;
if ( test_bits == 2 ) {
temp_data = buff [ operand_address ] & 0x3f ;
operand = temp_data << 8 ;
temp_data = buff [ ( operand_address + 1 ) & 0xffff ] ;
operand = operand | temp_data ;
operand = ( operand * 2 ) ;
* result_dest = operand ;
temp_data16 = buff [ operand ] << 8 ;
temp_data16 = temp_data16 | buff [ ( operand + 1 ) & 0xffff ] ;
* value = temp_data16 ;
offset = offset + 2 ;
}
else {
operand_address ++ ;
operand = buff [ operand_address ] << 8 ;
operand = operand | buff [ ( operand_address + 1 ) & 0xffff ] ;
* result_dest = operand ;
temp_data16 = buff [ operand ] << 8 ;
temp_data16 = temp_data16 | buff [ ( operand + 1 ) & 0xffff ] ;
* value = temp_data16 ;
offset = offset + 3 ;
}
}
else {
operand = ( bytecode & 0x7f ) ;
operand = ( operand * 2 ) ;
* result_dest = operand ;
temp_data16 = buff [ operand ] << 8 ;
temp_data16 = temp_data16 | buff [ ( operand + 1 ) & 0xffff ] ;
* value = temp_data16 ;
offset ++ ;
}
if ( offset >= UDVM_MEMORY_SIZE || * result_dest >= UDVM_MEMORY_SIZE - 1 ) return - 1 ;
return offset ;
} |
-281,311,800,725,760,060 | debian | 7 | 0 | static void set_sample_rate_params ( AVCodecContext * avctx ) {
TAKDecContext * s = avctx -> priv_data ;
int shift = 3 - ( avctx -> sample_rate / 11025 ) ;
shift = FFMAX ( 0 , shift ) ;
s -> uval = FFALIGN ( avctx -> sample_rate + 511 >> 9 , 4 ) << shift ;
s -> subframe_scale = FFALIGN ( avctx -> sample_rate + 511 >> 9 , 4 ) << 1 ;
} |
6,968,788,423,709,606,000 | debian | 165 | 0 | static MagickBooleanType EncodeImage ( const ImageInfo * image_info , Image * image , const size_t data_size ) {
# define MaxCode ( number_bits ) ( ( one << ( number_bits ) ) - 1 ) # define MaxHashTable 5003 # define MaxGIFBits 12UL # define MaxGIFTable ( 1UL << MaxGIFBits ) # define GIFOutputCode ( code ) \ {
if ( bits > 0 ) datum |= ( code ) << bits ;
else datum = code ;
bits += number_bits ;
while ( bits >= 8 ) {
packet [ length ++ ] = ( unsigned char ) ( datum & 0xff ) ;
if ( length >= 254 ) {
( void ) WriteBlobByte ( image , ( unsigned char ) length ) ;
( void ) WriteBlob ( image , length , packet ) ;
length = 0 ;
}
datum >>= 8 ;
bits -= 8 ;
}
if ( free_code > max_code ) {
number_bits ++ ;
if ( number_bits == MaxGIFBits ) max_code = MaxGIFTable ;
else max_code = MaxCode ( number_bits ) ;
}
\ }
IndexPacket index ;
short * hash_code , * hash_prefix , waiting_code ;
size_t bits , clear_code , datum , end_of_information_code , free_code , length , max_code , next_pixel , number_bits , one , pass ;
ssize_t displacement , offset , k , y ;
unsigned char * packet , * hash_suffix ;
assert ( image != ( Image * ) NULL ) ;
one = 1 ;
packet = ( unsigned char * ) AcquireQuantumMemory ( 256 , sizeof ( * packet ) ) ;
hash_code = ( short * ) AcquireQuantumMemory ( MaxHashTable , sizeof ( * hash_code ) ) ;
hash_prefix = ( short * ) AcquireQuantumMemory ( MaxHashTable , sizeof ( * hash_prefix ) ) ;
hash_suffix = ( unsigned char * ) AcquireQuantumMemory ( MaxHashTable , sizeof ( * hash_suffix ) ) ;
if ( ( packet == ( unsigned char * ) NULL ) || ( hash_code == ( short * ) NULL ) || ( hash_prefix == ( short * ) NULL ) || ( hash_suffix == ( unsigned char * ) NULL ) ) {
if ( packet != ( unsigned char * ) NULL ) packet = ( unsigned char * ) RelinquishMagickMemory ( packet ) ;
if ( hash_code != ( short * ) NULL ) hash_code = ( short * ) RelinquishMagickMemory ( hash_code ) ;
if ( hash_prefix != ( short * ) NULL ) hash_prefix = ( short * ) RelinquishMagickMemory ( hash_prefix ) ;
if ( hash_suffix != ( unsigned char * ) NULL ) hash_suffix = ( unsigned char * ) RelinquishMagickMemory ( hash_suffix ) ;
return ( MagickFalse ) ;
}
( void ) ResetMagickMemory ( hash_code , 0 , MaxHashTable * sizeof ( * hash_code ) ) ;
( void ) ResetMagickMemory ( hash_prefix , 0 , MaxHashTable * sizeof ( * hash_prefix ) ) ;
( void ) ResetMagickMemory ( hash_suffix , 0 , MaxHashTable * sizeof ( * hash_suffix ) ) ;
number_bits = data_size ;
max_code = MaxCode ( number_bits ) ;
clear_code = ( ( short ) one << ( data_size - 1 ) ) ;
end_of_information_code = clear_code + 1 ;
free_code = clear_code + 2 ;
length = 0 ;
datum = 0 ;
bits = 0 ;
GIFOutputCode ( clear_code ) ;
offset = 0 ;
pass = 0 ;
waiting_code = 0 ;
for ( y = 0 ;
y < ( ssize_t ) image -> rows ;
y ++ ) {
register const IndexPacket * magick_restrict indexes ;
register const PixelPacket * magick_restrict p ;
register ssize_t x ;
p = GetVirtualPixels ( image , 0 , offset , image -> columns , 1 , & image -> exception ) ;
if ( p == ( const PixelPacket * ) NULL ) break ;
indexes = GetVirtualIndexQueue ( image ) ;
if ( y == 0 ) {
waiting_code = ( short ) ( * indexes ) ;
p ++ ;
}
for ( x = ( ssize_t ) ( y == 0 ? 1 : 0 ) ;
x < ( ssize_t ) image -> columns ;
x ++ ) {
index = ( IndexPacket ) ( ( size_t ) GetPixelIndex ( indexes + x ) & 0xff ) ;
p ++ ;
k = ( ssize_t ) ( ( ( size_t ) index << ( MaxGIFBits - 8 ) ) + waiting_code ) ;
if ( k >= MaxHashTable ) k -= MaxHashTable ;
next_pixel = MagickFalse ;
displacement = 1 ;
if ( hash_code [ k ] > 0 ) {
if ( ( hash_prefix [ k ] == waiting_code ) && ( hash_suffix [ k ] == ( unsigned char ) index ) ) {
waiting_code = hash_code [ k ] ;
continue ;
}
if ( k != 0 ) displacement = MaxHashTable - k ;
for ( ;
;
) {
k -= displacement ;
if ( k < 0 ) k += MaxHashTable ;
if ( hash_code [ k ] == 0 ) break ;
if ( ( hash_prefix [ k ] == waiting_code ) && ( hash_suffix [ k ] == ( unsigned char ) index ) ) {
waiting_code = hash_code [ k ] ;
next_pixel = MagickTrue ;
break ;
}
}
if ( next_pixel != MagickFalse ) continue ;
}
GIFOutputCode ( ( size_t ) waiting_code ) ;
if ( free_code < MaxGIFTable ) {
hash_code [ k ] = ( short ) free_code ++ ;
hash_prefix [ k ] = waiting_code ;
hash_suffix [ k ] = ( unsigned char ) index ;
}
else {
for ( k = 0 ;
k < MaxHashTable ;
k ++ ) hash_code [ k ] = 0 ;
free_code = clear_code + 2 ;
GIFOutputCode ( clear_code ) ;
number_bits = data_size ;
max_code = MaxCode ( number_bits ) ;
}
waiting_code = ( short ) index ;
}
if ( image_info -> interlace == NoInterlace ) offset ++ ;
else switch ( pass ) {
case 0 : default : {
offset += 8 ;
if ( offset >= ( ssize_t ) image -> rows ) {
pass ++ ;
offset = 4 ;
}
break ;
}
case 1 : {
offset += 8 ;
if ( offset >= ( ssize_t ) image -> rows ) {
pass ++ ;
offset = 2 ;
}
break ;
}
case 2 : {
offset += 4 ;
if ( offset >= ( ssize_t ) image -> rows ) {
pass ++ ;
offset = 1 ;
}
break ;
}
case 3 : {
offset += 2 ;
break ;
}
}
}
GIFOutputCode ( ( size_t ) waiting_code ) ;
GIFOutputCode ( end_of_information_code ) ;
if ( bits > 0 ) {
packet [ length ++ ] = ( unsigned char ) ( datum & 0xff ) ;
if ( length >= 254 ) {
( void ) WriteBlobByte ( image , ( unsigned char ) length ) ;
( void ) WriteBlob ( image , length , packet ) ;
length = 0 ;
}
}
if ( length > 0 ) {
( void ) WriteBlobByte ( image , ( unsigned char ) length ) ;
( void ) WriteBlob ( image , length , packet ) ;
}
hash_suffix = ( unsigned char * ) RelinquishMagickMemory ( hash_suffix ) ;
hash_prefix = ( short * ) RelinquishMagickMemory ( hash_prefix ) ;
hash_code = ( short * ) RelinquishMagickMemory ( hash_code ) ;
packet = ( unsigned char * ) RelinquishMagickMemory ( packet ) ;
return ( MagickTrue ) ;
} |
-7,237,039,260,294,671,000 | debian | 3 | 0 | static int dissect_nlm4_share ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree , void * data _U_ ) {
return dissect_nlm_share ( tvb , 0 , pinfo , tree , 4 , ( rpc_call_info_value * ) data ) ;
} |
4,187,524,518,637,656,600 | debian | 21 | 0 | int __glob_pattern_type ( pattern , quote ) const char * pattern ;
int quote ;
{
register const char * p ;
int ret = 0 ;
for ( p = pattern ;
* p != '\0' ;
++ p ) switch ( * p ) {
case '?' : case '*' : return 1 ;
case '\\' : if ( quote ) {
if ( p [ 1 ] != '\0' ) ++ p ;
ret |= 2 ;
}
break ;
case '[' : ret |= 4 ;
break ;
case ']' : if ( ret & 4 ) return 1 ;
break ;
}
return ret ;
} |
-4,960,438,251,319,819,000 | chrome | 49 | 0 | static int calc_arf_boost ( VP9_COMP * cpi , int offset , int f_frames , int b_frames , int * f_boost , int * b_boost ) {
TWO_PASS * const twopass = & cpi -> twopass ;
int i ;
double boost_score = 0.0 ;
double mv_ratio_accumulator = 0.0 ;
double decay_accumulator = 1.0 ;
double this_frame_mv_in_out = 0.0 ;
double mv_in_out_accumulator = 0.0 ;
double abs_mv_in_out_accumulator = 0.0 ;
int arf_boost ;
int flash_detected = 0 ;
for ( i = 0 ;
i < f_frames ;
++ i ) {
const FIRSTPASS_STATS * this_frame = read_frame_stats ( twopass , i + offset ) ;
if ( this_frame == NULL ) break ;
accumulate_frame_motion_stats ( this_frame , & this_frame_mv_in_out , & mv_in_out_accumulator , & abs_mv_in_out_accumulator , & mv_ratio_accumulator ) ;
flash_detected = detect_flash ( twopass , i + offset ) || detect_flash ( twopass , i + offset + 1 ) ;
if ( ! flash_detected ) {
decay_accumulator *= get_prediction_decay_rate ( & cpi -> common , this_frame ) ;
decay_accumulator = decay_accumulator < MIN_DECAY_FACTOR ? MIN_DECAY_FACTOR : decay_accumulator ;
}
boost_score += decay_accumulator * calc_frame_boost ( cpi , this_frame , this_frame_mv_in_out , GF_MAX_BOOST ) ;
}
* f_boost = ( int ) boost_score ;
boost_score = 0.0 ;
mv_ratio_accumulator = 0.0 ;
decay_accumulator = 1.0 ;
this_frame_mv_in_out = 0.0 ;
mv_in_out_accumulator = 0.0 ;
abs_mv_in_out_accumulator = 0.0 ;
for ( i = - 1 ;
i >= - b_frames ;
-- i ) {
const FIRSTPASS_STATS * this_frame = read_frame_stats ( twopass , i + offset ) ;
if ( this_frame == NULL ) break ;
accumulate_frame_motion_stats ( this_frame , & this_frame_mv_in_out , & mv_in_out_accumulator , & abs_mv_in_out_accumulator , & mv_ratio_accumulator ) ;
flash_detected = detect_flash ( twopass , i + offset ) || detect_flash ( twopass , i + offset + 1 ) ;
if ( ! flash_detected ) {
decay_accumulator *= get_prediction_decay_rate ( & cpi -> common , this_frame ) ;
decay_accumulator = decay_accumulator < MIN_DECAY_FACTOR ? MIN_DECAY_FACTOR : decay_accumulator ;
}
boost_score += decay_accumulator * calc_frame_boost ( cpi , this_frame , this_frame_mv_in_out , GF_MAX_BOOST ) ;
}
* b_boost = ( int ) boost_score ;
arf_boost = ( * f_boost + * b_boost ) ;
if ( arf_boost < ( ( b_frames + f_frames ) * 20 ) ) arf_boost = ( ( b_frames + f_frames ) * 20 ) ;
return arf_boost ;
} |
-7,076,754,245,473,579,000 | chrome | 7 | 1 | static void evhttp_maybe_add_content_length_header ( struct evkeyvalq * headers , long content_length ) {
if ( evhttp_find_header ( headers , "Transfer-Encoding" ) == NULL && evhttp_find_header ( headers , "Content-Length" ) == NULL ) {
char len [ 12 ] ;
evutil_snprintf ( len , sizeof ( len ) , "%ld" , content_length ) ;
evhttp_add_header ( headers , "Content-Length" , len ) ;
}
} |
-1,929,262,071,302,712,000 | debian | 37 | 0 | static void * Type_MPEmatrix_Read ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , cmsUInt32Number * nItems , cmsUInt32Number SizeOfTag ) {
cmsStage * mpe ;
cmsUInt16Number InputChans , OutputChans ;
cmsUInt32Number nElems , i ;
cmsFloat64Number * Matrix ;
cmsFloat64Number * Offsets ;
if ( ! _cmsReadUInt16Number ( io , & InputChans ) ) return NULL ;
if ( ! _cmsReadUInt16Number ( io , & OutputChans ) ) return NULL ;
nElems = InputChans * OutputChans ;
Matrix = ( cmsFloat64Number * ) _cmsCalloc ( self -> ContextID , nElems , sizeof ( cmsFloat64Number ) ) ;
if ( Matrix == NULL ) return NULL ;
Offsets = ( cmsFloat64Number * ) _cmsCalloc ( self -> ContextID , OutputChans , sizeof ( cmsFloat64Number ) ) ;
if ( Offsets == NULL ) {
_cmsFree ( self -> ContextID , Matrix ) ;
return NULL ;
}
for ( i = 0 ;
i < nElems ;
i ++ ) {
cmsFloat32Number v ;
if ( ! _cmsReadFloat32Number ( io , & v ) ) return NULL ;
Matrix [ i ] = v ;
}
for ( i = 0 ;
i < OutputChans ;
i ++ ) {
cmsFloat32Number v ;
if ( ! _cmsReadFloat32Number ( io , & v ) ) return NULL ;
Offsets [ i ] = v ;
}
mpe = cmsStageAllocMatrix ( self -> ContextID , OutputChans , InputChans , Matrix , Offsets ) ;
_cmsFree ( self -> ContextID , Matrix ) ;
_cmsFree ( self -> ContextID , Offsets ) ;
* nItems = 1 ;
return mpe ;
cmsUNUSED_PARAMETER ( SizeOfTag ) ;
} |
-2,607,754,285,145,856,500 | debian | 16 | 0 | static void isofile_connect_hardlink_files ( struct iso9660 * iso9660 ) {
struct archive_rb_node * n ;
struct hardlink * hl ;
struct isofile * target , * nf ;
ARCHIVE_RB_TREE_FOREACH ( n , & ( iso9660 -> hardlink_rbtree ) ) {
hl = ( struct hardlink * ) n ;
target = hl -> file_list . first ;
archive_entry_set_nlink ( target -> entry , hl -> nlink ) ;
for ( nf = target -> hlnext ;
nf != NULL ;
nf = nf -> hlnext ) {
nf -> hardlink_target = target ;
archive_entry_set_nlink ( nf -> entry , hl -> nlink ) ;
}
}
} |
2,820,551,931,453,396,000 | debian | 24 | 0 | int jas_image_addfmt ( int id , char * name , char * ext , char * desc , jas_image_fmtops_t * ops ) {
jas_image_fmtinfo_t * fmtinfo ;
assert ( id >= 0 && name && ext && ops ) ;
if ( jas_image_numfmts >= JAS_IMAGE_MAXFMTS ) {
return - 1 ;
}
fmtinfo = & jas_image_fmtinfos [ jas_image_numfmts ] ;
fmtinfo -> id = id ;
if ( ! ( fmtinfo -> name = jas_strdup ( name ) ) ) {
return - 1 ;
}
if ( ! ( fmtinfo -> ext = jas_strdup ( ext ) ) ) {
jas_free ( fmtinfo -> name ) ;
return - 1 ;
}
if ( ! ( fmtinfo -> desc = jas_strdup ( desc ) ) ) {
jas_free ( fmtinfo -> name ) ;
jas_free ( fmtinfo -> ext ) ;
return - 1 ;
}
fmtinfo -> ops = * ops ;
++ jas_image_numfmts ;
return 0 ;
} |
-5,280,794,106,681,745,000 | debian | 18 | 0 | static gboolean gst_asf_demux_check_buffer_is_header ( GstASFDemux * demux , GstBuffer * buf ) {
AsfObject obj ;
GstMapInfo map ;
gboolean valid ;
g_assert ( buf != NULL ) ;
GST_LOG_OBJECT ( demux , "Checking if buffer is a header" ) ;
gst_buffer_map ( buf , & map , GST_MAP_READ ) ;
if ( map . size < ASF_OBJECT_HEADER_SIZE ) {
gst_buffer_unmap ( buf , & map ) ;
return FALSE ;
}
valid = asf_demux_peek_object ( demux , map . data , ASF_OBJECT_HEADER_SIZE , & obj , TRUE ) ;
gst_buffer_unmap ( buf , & map ) ;
if ( valid && obj . id == ASF_OBJ_HEADER ) {
return TRUE ;
}
return FALSE ;
} |
5,400,542,917,484,464,000 | chrome | 91 | 1 | vpx_codec_err_t vpx_svc_init ( SvcContext * svc_ctx , vpx_codec_ctx_t * codec_ctx , vpx_codec_iface_t * iface , vpx_codec_enc_cfg_t * enc_cfg ) {
vpx_codec_err_t res ;
int i ;
SvcInternal * const si = get_svc_internal ( svc_ctx ) ;
if ( svc_ctx == NULL || codec_ctx == NULL || iface == NULL || enc_cfg == NULL ) {
return VPX_CODEC_INVALID_PARAM ;
}
if ( si == NULL ) return VPX_CODEC_MEM_ERROR ;
si -> codec_ctx = codec_ctx ;
si -> width = enc_cfg -> g_w ;
si -> height = enc_cfg -> g_h ;
if ( enc_cfg -> kf_max_dist < 2 ) {
svc_log ( svc_ctx , SVC_LOG_ERROR , "key frame distance too small: %d\n" , enc_cfg -> kf_max_dist ) ;
return VPX_CODEC_INVALID_PARAM ;
}
si -> kf_dist = enc_cfg -> kf_max_dist ;
if ( svc_ctx -> spatial_layers == 0 ) svc_ctx -> spatial_layers = VPX_SS_DEFAULT_LAYERS ;
if ( svc_ctx -> spatial_layers < 1 || svc_ctx -> spatial_layers > VPX_SS_MAX_LAYERS ) {
svc_log ( svc_ctx , SVC_LOG_ERROR , "spatial layers: invalid value: %d\n" , svc_ctx -> spatial_layers ) ;
return VPX_CODEC_INVALID_PARAM ;
}
res = parse_quantizer_values ( svc_ctx , si -> quantizers ) ;
if ( res != VPX_CODEC_OK ) return res ;
res = parse_scale_factors ( svc_ctx , si -> scale_factors ) ;
if ( res != VPX_CODEC_OK ) return res ;
res = parse_options ( svc_ctx , si -> options ) ;
if ( res != VPX_CODEC_OK ) return res ;
if ( svc_ctx -> spatial_layers < 1 ) svc_ctx -> spatial_layers = 1 ;
if ( svc_ctx -> spatial_layers > VPX_SS_MAX_LAYERS ) svc_ctx -> spatial_layers = VPX_SS_MAX_LAYERS ;
if ( svc_ctx -> temporal_layers < 1 ) svc_ctx -> temporal_layers = 1 ;
if ( svc_ctx -> temporal_layers > VPX_TS_MAX_LAYERS ) svc_ctx -> temporal_layers = VPX_TS_MAX_LAYERS ;
si -> layers = svc_ctx -> spatial_layers ;
if ( si -> layers > 1 ) {
float total = 0 ;
float alloc_ratio [ VPX_SS_MAX_LAYERS ] = {
0 }
;
assert ( si -> layers <= VPX_SS_MAX_LAYERS ) ;
for ( i = 0 ;
i < si -> layers ;
++ i ) {
int pos = i + VPX_SS_MAX_LAYERS - svc_ctx -> spatial_layers ;
if ( pos < VPX_SS_MAX_LAYERS && si -> scaling_factor_den [ pos ] > 0 ) {
alloc_ratio [ i ] = ( float ) ( si -> scaling_factor_num [ pos ] * 1.0 / si -> scaling_factor_den [ pos ] ) ;
alloc_ratio [ i ] *= alloc_ratio [ i ] ;
total += alloc_ratio [ i ] ;
}
}
for ( i = 0 ;
i < si -> layers ;
++ i ) {
if ( total > 0 ) {
enc_cfg -> ss_target_bitrate [ i ] = ( unsigned int ) ( enc_cfg -> rc_target_bitrate * alloc_ratio [ i ] / total ) ;
}
}
}
# if CONFIG_SPATIAL_SVC for ( i = 0 ;
i < si -> layers ;
++ i ) enc_cfg -> ss_enable_auto_alt_ref [ i ] = si -> enable_auto_alt_ref [ i ] ;
# endif if ( svc_ctx -> temporal_layers > 1 ) {
int i ;
for ( i = 0 ;
i < svc_ctx -> temporal_layers ;
++ i ) {
enc_cfg -> ts_target_bitrate [ i ] = enc_cfg -> rc_target_bitrate / svc_ctx -> temporal_layers ;
enc_cfg -> ts_rate_decimator [ i ] = 1 << ( svc_ctx -> temporal_layers - 1 - i ) ;
}
}
enc_cfg -> ss_number_layers = si -> layers ;
enc_cfg -> ts_number_layers = svc_ctx -> temporal_layers ;
enc_cfg -> rc_dropframe_thresh = 0 ;
enc_cfg -> rc_resize_allowed = 0 ;
if ( enc_cfg -> g_pass == VPX_RC_ONE_PASS ) {
enc_cfg -> rc_min_quantizer = 33 ;
enc_cfg -> rc_max_quantizer = 33 ;
}
enc_cfg -> rc_undershoot_pct = 100 ;
enc_cfg -> rc_overshoot_pct = 15 ;
enc_cfg -> rc_buf_initial_sz = 500 ;
enc_cfg -> rc_buf_optimal_sz = 600 ;
enc_cfg -> rc_buf_sz = 1000 ;
if ( enc_cfg -> g_error_resilient == 0 && si -> use_multiple_frame_contexts == 0 ) enc_cfg -> g_error_resilient = 1 ;
res = vpx_codec_enc_init ( codec_ctx , iface , enc_cfg , VPX_CODEC_USE_PSNR ) ;
if ( res != VPX_CODEC_OK ) {
svc_log ( svc_ctx , SVC_LOG_ERROR , "svc_enc_init error\n" ) ;
return res ;
}
vpx_codec_control ( codec_ctx , VP9E_SET_SVC , 1 ) ;
vpx_codec_control ( codec_ctx , VP8E_SET_TOKEN_PARTITIONS , 1 ) ;
return VPX_CODEC_OK ;
} |
1,223,258,652,239,369,200 | debian | 7 | 0 | SPL_METHOD ( DirectoryIterator , getFilename ) {
spl_filesystem_object * intern = ( spl_filesystem_object * ) zend_object_store_get_object ( getThis ( ) TSRMLS_CC ) ;
if ( zend_parse_parameters_none ( ) == FAILURE ) {
return ;
}
RETURN_STRING ( intern -> u . dir . entry . d_name , 1 ) ;
} |
2,546,373,479,020,365,300 | debian | 11 | 0 | static inline void relocate ( MIMEField * field , MIMEFieldBlockImpl * dest_block , MIMEFieldBlockImpl * src_block ) {
for ( ;
src_block ;
src_block = src_block -> m_next , dest_block = dest_block -> m_next ) {
ink_release_assert ( dest_block ) ;
if ( field -> m_next_dup >= src_block -> m_field_slots && field -> m_next_dup < src_block -> m_field_slots + src_block -> m_freetop ) {
field -> m_next_dup = rebase ( field -> m_next_dup , dest_block -> m_field_slots , src_block -> m_field_slots ) ;
return ;
}
}
} |
-2,127,895,299,879,503,400 | debian | 6 | 0 | static void macio_ide_realizefn ( DeviceState * dev , Error * * errp ) {
MACIOIDEState * s = MACIO_IDE ( dev ) ;
ide_init2 ( & s -> bus , s -> irq ) ;
s -> dma . ops = & dbdma_ops ;
s -> bus . dma = & s -> dma ;
} |
-2,423,144,171,479,607,000 | debian | 9 | 0 | static void pdf_copy_pattern_gstate ( fz_context * ctx , pdf_gstate * gs , const pdf_gstate * old ) {
gs -> ctm = old -> ctm ;
pdf_drop_font ( ctx , gs -> text . font ) ;
gs -> text . font = pdf_keep_font ( ctx , old -> text . font ) ;
pdf_drop_xobject ( ctx , gs -> softmask ) ;
gs -> softmask = pdf_keep_xobject ( ctx , old -> softmask ) ;
fz_drop_stroke_state ( ctx , gs -> stroke_state ) ;
gs -> stroke_state = fz_keep_stroke_state ( ctx , old -> stroke_state ) ;
} |
3,599,206,110,384,554,500 | debian | 72 | 0 | static ossl_inline t2 * sk_ ## t1 ## _value ( const STACK_OF ( t1 ) * sk , int idx ) {
return ( t2 * ) OPENSSL_sk_value ( ( const OPENSSL_STACK * ) sk , idx ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _new ( sk_ ## t1 ## _compfunc compare ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_new ( ( OPENSSL_sk_compfunc ) compare ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _new_null ( void ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_new_null ( ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _new_reserve ( sk_ ## t1 ## _compfunc compare , int n ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_new_reserve ( ( OPENSSL_sk_compfunc ) compare , n ) ;
}
static ossl_inline int sk_ ## t1 ## _reserve ( STACK_OF ( t1 ) * sk , int n ) {
return OPENSSL_sk_reserve ( ( OPENSSL_STACK * ) sk , n ) ;
}
static ossl_inline void sk_ ## t1 ## _free ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_free ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline void sk_ ## t1 ## _zero ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_zero ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _delete ( STACK_OF ( t1 ) * sk , int i ) {
return ( t2 * ) OPENSSL_sk_delete ( ( OPENSSL_STACK * ) sk , i ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _delete_ptr ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_delete_ptr ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _push ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_push ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _unshift ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_unshift ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _pop ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_pop ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _shift ( STACK_OF ( t1 ) * sk ) {
return ( t2 * ) OPENSSL_sk_shift ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline void sk_ ## t1 ## _pop_free ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _freefunc freefunc ) {
OPENSSL_sk_pop_free ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline int sk_ ## t1 ## _insert ( STACK_OF ( t1 ) * sk , t2 * ptr , int idx ) {
return OPENSSL_sk_insert ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr , idx ) ;
}
static ossl_inline t2 * sk_ ## t1 ## _set ( STACK_OF ( t1 ) * sk , int idx , t2 * ptr ) {
return ( t2 * ) OPENSSL_sk_set ( ( OPENSSL_STACK * ) sk , idx , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline int sk_ ## t1 ## _find_ex ( STACK_OF ( t1 ) * sk , t2 * ptr ) {
return OPENSSL_sk_find_ex ( ( OPENSSL_STACK * ) sk , ( const void * ) ptr ) ;
}
static ossl_inline void sk_ ## t1 ## _sort ( STACK_OF ( t1 ) * sk ) {
OPENSSL_sk_sort ( ( OPENSSL_STACK * ) sk ) ;
}
static ossl_inline int sk_ ## t1 ## _is_sorted ( const STACK_OF ( t1 ) * sk ) {
return OPENSSL_sk_is_sorted ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _dup ( const STACK_OF ( t1 ) * sk ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_dup ( ( const OPENSSL_STACK * ) sk ) ;
}
static ossl_inline STACK_OF ( t1 ) * sk_ ## t1 ## _deep_copy ( const STACK_OF ( t1 ) * sk , sk_ ## t1 ## _copyfunc copyfunc , sk_ ## t1 ## _freefunc freefunc ) {
return ( STACK_OF ( t1 ) * ) OPENSSL_sk_deep_copy ( ( const OPENSSL_STACK * ) sk , ( OPENSSL_sk_copyfunc ) copyfunc , ( OPENSSL_sk_freefunc ) freefunc ) ;
}
static ossl_inline sk_ ## t1 ## _compfunc sk_ ## t1 ## _set_cmp_func ( STACK_OF ( t1 ) * sk , sk_ ## t1 ## _compfunc compare ) {
return ( sk_ ## t1 ## _compfunc ) OPENSSL_sk_set_cmp_func ( ( OPENSSL_STACK * ) sk , ( OPENSSL_sk_compfunc ) compare ) ;
}
# define DEFINE_SPECIAL_STACK_OF ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , t2 , t2 ) # define DEFINE_STACK_OF ( t ) SKM_DEFINE_STACK_OF ( t , t , t ) # define DEFINE_SPECIAL_STACK_OF_CONST ( t1 , t2 ) SKM_DEFINE_STACK_OF ( t1 , const t2 , t2 ) # define DEFINE_STACK_OF_CONST ( t ) SKM_DEFINE_STACK_OF ( t , const t , t ) typedef char * OPENSSL_STRING ;
typedef const char * OPENSSL_CSTRING ;
DEFINE_SPECIAL_STACK_OF ( OPENSSL_STRING , char ) DEFINE_SPECIAL_STACK_OF_CONST ( OPENSSL_CSTRING , char ) |
-7,019,074,708,255,237,000 | debian | 10 | 0 | static float noise_enhancer ( float fixed_gain , float * prev_tr_gain , float voice_fac , float stab_fac ) {
float sm_fac = 0.5 * ( 1 - voice_fac ) * stab_fac ;
float g0 ;
if ( fixed_gain < * prev_tr_gain ) {
g0 = FFMIN ( * prev_tr_gain , fixed_gain + fixed_gain * ( 6226 * ( 1.0f / ( 1 << 15 ) ) ) ) ;
}
else g0 = FFMAX ( * prev_tr_gain , fixed_gain * ( 27536 * ( 1.0f / ( 1 << 15 ) ) ) ) ;
* prev_tr_gain = g0 ;
return sm_fac * g0 + ( 1 - sm_fac ) * fixed_gain ;
} |
4,489,017,523,191,997,000 | debian | 4 | 0 | static int dissect_h225_InfoRequestResponseStatus ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_choice ( tvb , offset , actx , tree , hf_index , ett_h225_InfoRequestResponseStatus , InfoRequestResponseStatus_choice , NULL ) ;
return offset ;
} |
-866,921,002,076,081,900 | debian | 16 | 0 | int cont_data_handler ( TSCont contp , TSEvent , void * ) {
MyData * my_data = ( MyData * ) TSContDataGet ( contp ) ;
if ( my_data -> data1 == 1 && my_data -> data2 == 2 ) {
SDK_RPRINT ( SDK_ContData_test , "TSContDataSet" , "TestCase1" , TC_PASS , "ok" ) ;
SDK_RPRINT ( SDK_ContData_test , "TSContDataGet" , "TestCase1" , TC_PASS , "ok" ) ;
* SDK_ContData_pstatus = REGRESSION_TEST_PASSED ;
}
else {
SDK_RPRINT ( SDK_ContData_test , "TSContDataSet" , "TestCase1" , TC_FAIL , "bad data" ) ;
SDK_RPRINT ( SDK_ContData_test , "TSContDataGet" , "TestCase1" , TC_FAIL , "bad data" ) ;
* SDK_ContData_pstatus = REGRESSION_TEST_FAILED ;
}
TSfree ( my_data ) ;
TSContDestroy ( contp ) ;
return 0 ;
} |
2,546,373,479,020,365,300 | debian | 3 | 0 | void mime_scanner_init ( MIMEScanner * scanner ) {
_mime_scanner_init ( scanner ) ;
} |
-2,242,211,406,757,466,600 | debian | 10 | 0 | static gint handle_message_connect ( tvbuff_t * tvb , packet_info * pinfo , gint offset , proto_tree * message_tree ) {
guint8 the_one_byte ;
the_one_byte = tvb_get_guint8 ( tvb , offset ) ;
if ( 0 == the_one_byte ) {
col_set_str ( pinfo -> cinfo , COL_INFO , "CONNECT-initial byte" ) ;
proto_tree_add_item ( message_tree , hf_alljoyn_connect_byte_value , tvb , offset , 1 , ENC_NA ) ;
offset += 1 ;
}
return offset ;
} |
8,139,827,869,427,660,000 | debian | 16 | 0 | static int unescape_octals ( gx_device_pdf * pdev , char * src , int size ) {
char * start , * dest ;
start = src ;
dest = src ;
while ( size ) {
if ( size > 4 && src [ 0 ] == '\\' && src [ 1 ] == '\\' && src [ 2 ] > 0x29 && src [ 2 ] < 0x35 && src [ 3 ] > 0x29 && src [ 3 ] < 0x38 && src [ 4 ] > 0x29 && src [ 4 ] < 0x38 ) {
src ++ ;
size -- ;
}
else {
* dest ++ = * src ++ ;
size -- ;
}
}
return ( dest - start ) ;
} |
7,072,059,544,915,634,000 | chrome | 14 | 0 | static size_t LMBCSConvertUni ( ulmbcs_byte_t * pLMBCS , UChar uniChar ) {
uint8_t LowCh = ( uint8_t ) ( uniChar & 0x00FF ) ;
uint8_t HighCh = ( uint8_t ) ( uniChar >> 8 ) ;
* pLMBCS ++ = ULMBCS_GRP_UNICODE ;
if ( LowCh == 0 ) {
* pLMBCS ++ = ULMBCS_UNICOMPATZERO ;
* pLMBCS ++ = HighCh ;
}
else {
* pLMBCS ++ = HighCh ;
* pLMBCS ++ = LowCh ;
}
return ULMBCS_UNICODE_SIZE ;
} |
-7,506,793,256,180,115,000 | chrome | 30 | 0 | int GetCertificateFailure ( JNIEnv * env , const JavaParamRef < jclass > & obj , const JavaParamRef < jobject > & java_web_contents ) {
enum CertificateFailure {
NONE = 0 , CERTIFICATE_FAIL_UNSPECIFIED = 1 , CERTIFICATE_FAIL_UNTRUSTED = 2 , CERTIFICATE_FAIL_REVOKED = 3 , CERTIFICATE_FAIL_NOT_YET_VALID = 4 , CERTIFICATE_FAIL_EXPIRED = 5 , CERTIFICATE_FAIL_UNABLE_TO_CHECK_REVOCATION_STATUS = 6 , }
;
content : : WebContents * web_contents = content : : WebContents : : FromJavaWebContents ( java_web_contents ) ;
content : : NavigationEntry * entry = web_contents -> GetController ( ) . GetVisibleEntry ( ) ;
if ( ! entry ) return NONE ;
const content : : SSLStatus & ssl = entry -> GetSSL ( ) ;
if ( ssl . certificate && entry -> GetURL ( ) . SchemeIsCryptographic ( ) ) {
if ( net : : IsCertStatusError ( ssl . cert_status ) ) {
if ( ssl . cert_status & net : : CERT_STATUS_AUTHORITY_INVALID ) {
return CERTIFICATE_FAIL_UNTRUSTED ;
}
if ( ssl . cert_status & net : : CERT_STATUS_REVOKED ) {
return CERTIFICATE_FAIL_REVOKED ;
}
if ( ssl . cert_status & net : : CERT_STATUS_DATE_INVALID ) {
return CERTIFICATE_FAIL_EXPIRED ;
}
if ( ssl . cert_status & net : : CERT_STATUS_UNABLE_TO_CHECK_REVOCATION ) {
return CERTIFICATE_FAIL_UNABLE_TO_CHECK_REVOCATION_STATUS ;
}
return CERTIFICATE_FAIL_UNSPECIFIED ;
}
if ( ssl . content_status & content : : SSLStatus : : DISPLAYED_INSECURE_CONTENT || ssl . content_status & content : : SSLStatus : : DISPLAYED_CONTENT_WITH_CERT_ERRORS ) {
return CERTIFICATE_FAIL_UNSPECIFIED ;
}
}
return NONE ;
} |
-1,929,262,071,302,712,000 | debian | 12 | 0 | static void * Type_Measurement_Read ( struct _cms_typehandler_struct * self , cmsIOHANDLER * io , cmsUInt32Number * nItems , cmsUInt32Number SizeOfTag ) {
cmsICCMeasurementConditions mc ;
memset ( & mc , 0 , sizeof ( mc ) ) ;
if ( ! _cmsReadUInt32Number ( io , & mc . Observer ) ) return NULL ;
if ( ! _cmsReadXYZNumber ( io , & mc . Backing ) ) return NULL ;
if ( ! _cmsReadUInt32Number ( io , & mc . Geometry ) ) return NULL ;
if ( ! _cmsRead15Fixed16Number ( io , & mc . Flare ) ) return NULL ;
if ( ! _cmsReadUInt32Number ( io , & mc . IlluminantType ) ) return NULL ;
* nItems = 1 ;
return _cmsDupMem ( self -> ContextID , & mc , sizeof ( cmsICCMeasurementConditions ) ) ;
cmsUNUSED_PARAMETER ( SizeOfTag ) ;
} |
4,489,017,523,191,997,000 | debian | 7 | 0 | static int dissect_h225_TBCD_STRING ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
# line 912 "./asn1/h225/h225.cnf" int min_len , max_len ;
gboolean has_extension ;
get_size_constraint_from_stack ( actx , "TBCD_STRING" , & min_len , & max_len , & has_extension ) ;
offset = dissect_per_restricted_character_string ( tvb , offset , actx , tree , hf_index , min_len , max_len , has_extension , "0123456789#*abc" , 15 , NULL ) ;
return offset ;
} |
2,895,622,461,494,525,400 | debian | 36 | 0 | static void test_bug5399 ( ) {
# define NUM_OF_USED_STMT 97 MYSQL_STMT * stmt_list [ NUM_OF_USED_STMT ] ;
MYSQL_STMT * * stmt ;
MYSQL_BIND my_bind [ 1 ] ;
char buff [ 600 ] ;
int rc ;
int32 no ;
myheader ( "test_bug5399" ) ;
memset ( my_bind , 0 , sizeof ( my_bind ) ) ;
my_bind [ 0 ] . buffer_type = MYSQL_TYPE_LONG ;
my_bind [ 0 ] . buffer = & no ;
for ( stmt = stmt_list ;
stmt != stmt_list + NUM_OF_USED_STMT ;
++ stmt ) {
sprintf ( buff , "select %d" , ( int ) ( stmt - stmt_list ) ) ;
* stmt = mysql_stmt_init ( mysql ) ;
rc = mysql_stmt_prepare ( * stmt , buff , strlen ( buff ) ) ;
check_execute ( * stmt , rc ) ;
mysql_stmt_bind_result ( * stmt , my_bind ) ;
}
if ( ! opt_silent ) printf ( "%d statements prepared.\n" , NUM_OF_USED_STMT ) ;
for ( stmt = stmt_list ;
stmt != stmt_list + NUM_OF_USED_STMT ;
++ stmt ) {
rc = mysql_stmt_execute ( * stmt ) ;
check_execute ( * stmt , rc ) ;
rc = mysql_stmt_store_result ( * stmt ) ;
check_execute ( * stmt , rc ) ;
rc = mysql_stmt_fetch ( * stmt ) ;
DIE_UNLESS ( rc == 0 ) ;
DIE_UNLESS ( ( int32 ) ( stmt - stmt_list ) == no ) ;
}
for ( stmt = stmt_list ;
stmt != stmt_list + NUM_OF_USED_STMT ;
++ stmt ) mysql_stmt_close ( * stmt ) ;
# undef NUM_OF_USED_STMT } |
4,489,017,523,191,997,000 | debian | 15 | 0 | static int dissect_h225_Progress_UUIE ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
# line 414 "./asn1/h225/h225.cnf" h225_packet_info * h225_pi ;
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_Progress_UUIE , Progress_UUIE_sequence ) ;
# line 418 "./asn1/h225/h225.cnf" h225_pi = ( h225_packet_info * ) p_get_proto_data ( wmem_packet_scope ( ) , actx -> pinfo , proto_h225 , 0 ) ;
if ( h225_pi != NULL ) {
h225_pi -> cs_type = H225_PROGRESS ;
if ( contains_faststart ) {
char temp [ 50 ] ;
g_snprintf ( temp , 50 , "%s OLC (%s)" , val_to_str ( h225_pi -> cs_type , T_h323_message_body_vals , "<unknown>" ) , h225_pi -> frame_label ) ;
g_strlcpy ( h225_pi -> frame_label , temp , 50 ) ;
}
else g_snprintf ( h225_pi -> frame_label , 50 , "%s" , val_to_str ( h225_pi -> cs_type , T_h323_message_body_vals , "<unknown>" ) ) ;
}
return offset ;
} |
2,335,222,688,263,906,300 | debian | 30 | 0 | static void rv34_gen_vlc ( const uint8_t * bits , int size , VLC * vlc , const uint8_t * insyms , const int num ) {
int i ;
int counts [ 17 ] = {
0 }
, codes [ 17 ] ;
uint16_t cw [ MAX_VLC_SIZE ] , syms [ MAX_VLC_SIZE ] ;
uint8_t bits2 [ MAX_VLC_SIZE ] ;
int maxbits = 0 , realsize = 0 ;
for ( i = 0 ;
i < size ;
i ++ ) {
if ( bits [ i ] ) {
bits2 [ realsize ] = bits [ i ] ;
syms [ realsize ] = insyms ? insyms [ i ] : i ;
realsize ++ ;
maxbits = FFMAX ( maxbits , bits [ i ] ) ;
counts [ bits [ i ] ] ++ ;
}
}
codes [ 0 ] = 0 ;
for ( i = 0 ;
i < 16 ;
i ++ ) codes [ i + 1 ] = ( codes [ i ] + counts [ i ] ) << 1 ;
for ( i = 0 ;
i < realsize ;
i ++ ) cw [ i ] = codes [ bits2 [ i ] ] ++ ;
vlc -> table = & table_data [ table_offs [ num ] ] ;
vlc -> table_allocated = table_offs [ num + 1 ] - table_offs [ num ] ;
ff_init_vlc_sparse ( vlc , FFMIN ( maxbits , 9 ) , realsize , bits2 , 1 , 1 , cw , 2 , 2 , syms , 2 , 2 , INIT_VLC_USE_NEW_STATIC ) ;
} |
5,347,874,611,477,979,000 | chrome | 35 | 0 | static void test_registerfds ( void ) {
int i , j ;
int pair [ 2 ] ;
struct event read_evs [ 512 ] ;
struct event write_evs [ 512 ] ;
struct event_base * base = event_base_new ( ) ;
fprintf ( stdout , "Testing register fds: " ) ;
for ( i = 0 ;
i < 512 ;
++ i ) {
if ( evutil_socketpair ( AF_UNIX , SOCK_STREAM , 0 , pair ) == - 1 ) {
break ;
}
event_set ( & read_evs [ i ] , pair [ 0 ] , EV_READ | EV_PERSIST , simple_read_cb , NULL ) ;
event_base_set ( base , & read_evs [ i ] ) ;
event_add ( & read_evs [ i ] , NULL ) ;
event_set ( & write_evs [ i ] , pair [ 1 ] , EV_WRITE | EV_PERSIST , simple_write_cb , NULL ) ;
event_base_set ( base , & write_evs [ i ] ) ;
event_add ( & write_evs [ i ] , NULL ) ;
event_base_loop ( base , EVLOOP_ONCE ) ;
}
for ( j = 0 ;
j < i ;
++ j ) {
event_del ( & read_evs [ j ] ) ;
event_del ( & write_evs [ j ] ) ;
# ifndef WIN32 close ( read_evs [ j ] . ev_fd ) ;
close ( write_evs [ j ] . ev_fd ) ;
# else CloseHandle ( ( HANDLE ) read_evs [ j ] . ev_fd ) ;
CloseHandle ( ( HANDLE ) write_evs [ j ] . ev_fd ) ;
# endif event_base_loop ( base , EVLOOP_ONCE ) ;
}
event_base_free ( base ) ;
fprintf ( stdout , "OK\n" ) ;
} |
8,206,514,580,434,226,000 | chrome | 10 | 0 | IN_PROC_BROWSER_TEST_F ( HttpsEngagementPageLoadMetricsBrowserTest , SameOrigin_Http ) {
StartHttpServer ( ) ;
NavigateTwiceInTabAndClose ( http_test_server_ -> GetURL ( "/simple.html" ) , http_test_server_ -> GetURL ( "/empty.html" ) ) ;
histogram_tester_ . ExpectTotalCount ( internal : : kHttpEngagementHistogram , 2 ) ;
histogram_tester_ . ExpectTotalCount ( internal : : kHttpsEngagementHistogram , 0 ) ;
FakeUserMetricsUpload ( ) ;
histogram_tester_ . ExpectTotalCount ( internal : : kHttpsEngagementSessionPercentage , 1 ) ;
int32_t ratio_bucket = histogram_tester_ . GetAllSamples ( internal : : kHttpsEngagementSessionPercentage ) [ 0 ] . min ;
EXPECT_EQ ( 0 , ratio_bucket ) ;
} |
2,473,550,066,879,118,300 | debian | 56 | 0 | gpg_err_code_t _gcry_ecc_ecdsa_verify ( gcry_mpi_t input , ECC_public_key * pkey , gcry_mpi_t r , gcry_mpi_t s ) {
gpg_err_code_t err = 0 ;
gcry_mpi_t hash , h , h1 , h2 , x ;
mpi_point_struct Q , Q1 , Q2 ;
mpi_ec_t ctx ;
unsigned int nbits ;
if ( ! ( mpi_cmp_ui ( r , 0 ) > 0 && mpi_cmp ( r , pkey -> E . n ) < 0 ) ) return GPG_ERR_BAD_SIGNATURE ;
if ( ! ( mpi_cmp_ui ( s , 0 ) > 0 && mpi_cmp ( s , pkey -> E . n ) < 0 ) ) return GPG_ERR_BAD_SIGNATURE ;
nbits = mpi_get_nbits ( pkey -> E . n ) ;
err = _gcry_dsa_normalize_hash ( input , & hash , nbits ) ;
if ( err ) return err ;
h = mpi_alloc ( 0 ) ;
h1 = mpi_alloc ( 0 ) ;
h2 = mpi_alloc ( 0 ) ;
x = mpi_alloc ( 0 ) ;
point_init ( & Q ) ;
point_init ( & Q1 ) ;
point_init ( & Q2 ) ;
ctx = _gcry_mpi_ec_p_internal_new ( pkey -> E . model , pkey -> E . dialect , 0 , pkey -> E . p , pkey -> E . a , pkey -> E . b ) ;
mpi_invm ( h , s , pkey -> E . n ) ;
mpi_mulm ( h1 , hash , h , pkey -> E . n ) ;
_gcry_mpi_ec_mul_point ( & Q1 , h1 , & pkey -> E . G , ctx ) ;
mpi_mulm ( h2 , r , h , pkey -> E . n ) ;
_gcry_mpi_ec_mul_point ( & Q2 , h2 , & pkey -> Q , ctx ) ;
_gcry_mpi_ec_add_points ( & Q , & Q1 , & Q2 , ctx ) ;
if ( ! mpi_cmp_ui ( Q . z , 0 ) ) {
if ( DBG_CIPHER ) log_debug ( "ecc verify: Rejected\n" ) ;
err = GPG_ERR_BAD_SIGNATURE ;
goto leave ;
}
if ( _gcry_mpi_ec_get_affine ( x , NULL , & Q , ctx ) ) {
if ( DBG_CIPHER ) log_debug ( "ecc verify: Failed to get affine coordinates\n" ) ;
err = GPG_ERR_BAD_SIGNATURE ;
goto leave ;
}
mpi_mod ( x , x , pkey -> E . n ) ;
if ( mpi_cmp ( x , r ) ) {
if ( DBG_CIPHER ) {
log_mpidump ( " x" , x ) ;
log_mpidump ( " r" , r ) ;
log_mpidump ( " s" , s ) ;
}
err = GPG_ERR_BAD_SIGNATURE ;
goto leave ;
}
leave : _gcry_mpi_ec_free ( ctx ) ;
point_free ( & Q2 ) ;
point_free ( & Q1 ) ;
point_free ( & Q ) ;
mpi_free ( x ) ;
mpi_free ( h2 ) ;
mpi_free ( h1 ) ;
mpi_free ( h ) ;
if ( hash != input ) mpi_free ( hash ) ;
return err ;
} |
4,180,964,683,905,831,000 | debian | 39 | 0 | static int sb_finish_set_opts ( struct super_block * sb ) {
struct superblock_security_struct * sbsec = sb -> s_security ;
struct dentry * root = sb -> s_root ;
struct inode * root_inode = d_backing_inode ( root ) ;
int rc = 0 ;
if ( sbsec -> behavior == SECURITY_FS_USE_XATTR ) {
if ( ! ( root_inode -> i_opflags & IOP_XATTR ) ) {
printk ( KERN_WARNING "SELinux: (dev %s, type %s) has no " "xattr support\n" , sb -> s_id , sb -> s_type -> name ) ;
rc = - EOPNOTSUPP ;
goto out ;
}
rc = __vfs_getxattr ( root , root_inode , XATTR_NAME_SELINUX , NULL , 0 ) ;
if ( rc < 0 && rc != - ENODATA ) {
if ( rc == - EOPNOTSUPP ) printk ( KERN_WARNING "SELinux: (dev %s, type " "%s) has no security xattr handler\n" , sb -> s_id , sb -> s_type -> name ) ;
else printk ( KERN_WARNING "SELinux: (dev %s, type " "%s) getxattr errno %d\n" , sb -> s_id , sb -> s_type -> name , - rc ) ;
goto out ;
}
}
if ( sbsec -> behavior > ARRAY_SIZE ( labeling_behaviors ) ) printk ( KERN_ERR "SELinux: initialized (dev %s, type %s), unknown behavior\n" , sb -> s_id , sb -> s_type -> name ) ;
sbsec -> flags |= SE_SBINITIALIZED ;
if ( selinux_is_sblabel_mnt ( sb ) ) sbsec -> flags |= SBLABEL_MNT ;
rc = inode_doinit_with_dentry ( root_inode , root ) ;
spin_lock ( & sbsec -> isec_lock ) ;
next_inode : if ( ! list_empty ( & sbsec -> isec_head ) ) {
struct inode_security_struct * isec = list_entry ( sbsec -> isec_head . next , struct inode_security_struct , list ) ;
struct inode * inode = isec -> inode ;
list_del_init ( & isec -> list ) ;
spin_unlock ( & sbsec -> isec_lock ) ;
inode = igrab ( inode ) ;
if ( inode ) {
if ( ! IS_PRIVATE ( inode ) ) inode_doinit ( inode ) ;
iput ( inode ) ;
}
spin_lock ( & sbsec -> isec_lock ) ;
goto next_inode ;
}
spin_unlock ( & sbsec -> isec_lock ) ;
out : return rc ;
} |
7,749,168,290,238,235,000 | debian | 36 | 0 | static int test_source_cksum_offset ( xd3_stream * stream , int ignore ) {
xd3_source source ;
struct {
xoff_t cpos ;
xoff_t ipos ;
xoff_t size ;
usize_t input ;
xoff_t output ;
}
cksum_test [ ] = {
{
1 , 1 , 1 , 1 , 1 }
, # if XD3_USE_LARGEFILE64 {
0x100100000ULL , 0x100000000ULL , 0x100200000ULL , 0x00000000UL , 0x100000000ULL }
, {
0x100100000ULL , 0x100000000ULL , 0x100200000ULL , 0xF0000000UL , 0x0F0000000ULL }
, {
0x100200000ULL , 0x100100000ULL , 0x100200000ULL , 0x00300000UL , 0x000300000ULL }
, {
25771983104ULL , 25770000000ULL , 26414808769ULL , 2139216707UL , 23614053187ULL }
, # endif {
0 , 0 , 0 , 0 , 0 }
, }
, * test_ptr ;
stream -> src = & source ;
for ( test_ptr = cksum_test ;
test_ptr -> cpos ;
test_ptr ++ ) {
xoff_t r ;
stream -> srcwin_cksum_pos = test_ptr -> cpos ;
stream -> total_in = test_ptr -> ipos ;
r = xd3_source_cksum_offset ( stream , test_ptr -> input ) ;
CHECK ( r == test_ptr -> output ) ;
}
return 0 ;
} |
-7,456,613,930,747,244,000 | debian | 37 | 1 | static int decode_frame ( AVCodecContext * avctx , void * data , int * got_frame_ptr , AVPacket * avpkt ) {
BinkAudioContext * s = avctx -> priv_data ;
AVFrame * frame = data ;
GetBitContext * gb = & s -> gb ;
int ret , consumed = 0 ;
if ( ! get_bits_left ( gb ) ) {
uint8_t * buf ;
if ( ! avpkt -> size ) {
* got_frame_ptr = 0 ;
return 0 ;
}
if ( avpkt -> size < 4 ) {
av_log ( avctx , AV_LOG_ERROR , "Packet is too small\n" ) ;
return AVERROR_INVALIDDATA ;
}
buf = av_realloc ( s -> packet_buffer , avpkt -> size + FF_INPUT_BUFFER_PADDING_SIZE ) ;
if ( ! buf ) return AVERROR ( ENOMEM ) ;
s -> packet_buffer = buf ;
memcpy ( s -> packet_buffer , avpkt -> data , avpkt -> size ) ;
init_get_bits ( gb , s -> packet_buffer , avpkt -> size * 8 ) ;
consumed = avpkt -> size ;
skip_bits_long ( gb , 32 ) ;
}
frame -> nb_samples = s -> frame_len ;
if ( ( ret = ff_get_buffer ( avctx , frame ) ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "get_buffer() failed\n" ) ;
return ret ;
}
if ( decode_block ( s , ( float * * ) frame -> extended_data , avctx -> codec -> id == AV_CODEC_ID_BINKAUDIO_DCT ) ) {
av_log ( avctx , AV_LOG_ERROR , "Incomplete packet\n" ) ;
return AVERROR_INVALIDDATA ;
}
get_bits_align32 ( gb ) ;
frame -> nb_samples = s -> block_size / avctx -> channels ;
* got_frame_ptr = 1 ;
return consumed ;
} |
1,202,634,027,547,122,400 | debian | 389 | 0 | static int diffie_hellman_sha256 ( LIBSSH2_SESSION * session , _libssh2_bn * g , _libssh2_bn * p , int group_order , unsigned char packet_type_init , unsigned char packet_type_reply , unsigned char * midhash , unsigned long midhash_len , kmdhgGPshakex_state_t * exchange_state ) {
int ret = 0 ;
int rc ;
libssh2_sha256_ctx exchange_hash_ctx ;
if ( exchange_state -> state == libssh2_NB_state_idle ) {
exchange_state -> e_packet = NULL ;
exchange_state -> s_packet = NULL ;
exchange_state -> k_value = NULL ;
exchange_state -> ctx = _libssh2_bn_ctx_new ( ) ;
exchange_state -> x = _libssh2_bn_init ( ) ;
exchange_state -> e = _libssh2_bn_init ( ) ;
exchange_state -> f = _libssh2_bn_init_from_bin ( ) ;
exchange_state -> k = _libssh2_bn_init ( ) ;
memset ( & exchange_state -> req_state , 0 , sizeof ( packet_require_state_t ) ) ;
_libssh2_bn_rand ( exchange_state -> x , group_order * 8 - 1 , 0 , - 1 ) ;
_libssh2_bn_mod_exp ( exchange_state -> e , g , exchange_state -> x , p , exchange_state -> ctx ) ;
exchange_state -> e_packet_len = _libssh2_bn_bytes ( exchange_state -> e ) + 6 ;
if ( _libssh2_bn_bits ( exchange_state -> e ) % 8 ) {
exchange_state -> e_packet_len -- ;
}
exchange_state -> e_packet = LIBSSH2_ALLOC ( session , exchange_state -> e_packet_len ) ;
if ( ! exchange_state -> e_packet ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Out of memory error" ) ;
goto clean_exit ;
}
exchange_state -> e_packet [ 0 ] = packet_type_init ;
_libssh2_htonu32 ( exchange_state -> e_packet + 1 , exchange_state -> e_packet_len - 5 ) ;
if ( _libssh2_bn_bits ( exchange_state -> e ) % 8 ) {
_libssh2_bn_to_bin ( exchange_state -> e , exchange_state -> e_packet + 5 ) ;
}
else {
exchange_state -> e_packet [ 5 ] = 0 ;
_libssh2_bn_to_bin ( exchange_state -> e , exchange_state -> e_packet + 6 ) ;
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Sending KEX packet %d" , ( int ) packet_type_init ) ;
exchange_state -> state = libssh2_NB_state_created ;
}
if ( exchange_state -> state == libssh2_NB_state_created ) {
rc = _libssh2_transport_send ( session , exchange_state -> e_packet , exchange_state -> e_packet_len , NULL , 0 ) ;
if ( rc == LIBSSH2_ERROR_EAGAIN ) {
return rc ;
}
else if ( rc ) {
ret = _libssh2_error ( session , rc , "Unable to send KEX init message" ) ;
goto clean_exit ;
}
exchange_state -> state = libssh2_NB_state_sent ;
}
if ( exchange_state -> state == libssh2_NB_state_sent ) {
if ( session -> burn_optimistic_kexinit ) {
int burn_type ;
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Waiting for badly guessed KEX packet (to be ignored)" ) ;
burn_type = _libssh2_packet_burn ( session , & exchange_state -> burn_state ) ;
if ( burn_type == LIBSSH2_ERROR_EAGAIN ) {
return burn_type ;
}
else if ( burn_type <= 0 ) {
ret = burn_type ;
goto clean_exit ;
}
session -> burn_optimistic_kexinit = 0 ;
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Burnt packet of type: %02x" , ( unsigned int ) burn_type ) ;
}
exchange_state -> state = libssh2_NB_state_sent1 ;
}
if ( exchange_state -> state == libssh2_NB_state_sent1 ) {
rc = _libssh2_packet_require ( session , packet_type_reply , & exchange_state -> s_packet , & exchange_state -> s_packet_len , 0 , NULL , 0 , & exchange_state -> req_state ) ;
if ( rc == LIBSSH2_ERROR_EAGAIN ) {
return rc ;
}
if ( rc ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_TIMEOUT , "Timed out waiting for KEX reply" ) ;
goto clean_exit ;
}
exchange_state -> s = exchange_state -> s_packet + 1 ;
session -> server_hostkey_len = _libssh2_ntohu32 ( exchange_state -> s ) ;
exchange_state -> s += 4 ;
if ( session -> server_hostkey ) LIBSSH2_FREE ( session , session -> server_hostkey ) ;
session -> server_hostkey = LIBSSH2_ALLOC ( session , session -> server_hostkey_len ) ;
if ( ! session -> server_hostkey ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Unable to allocate memory for a copy " "of the host key" ) ;
goto clean_exit ;
}
memcpy ( session -> server_hostkey , exchange_state -> s , session -> server_hostkey_len ) ;
exchange_state -> s += session -> server_hostkey_len ;
# if LIBSSH2_MD5 {
libssh2_md5_ctx fingerprint_ctx ;
if ( libssh2_md5_init ( & fingerprint_ctx ) ) {
libssh2_md5_update ( fingerprint_ctx , session -> server_hostkey , session -> server_hostkey_len ) ;
libssh2_md5_final ( fingerprint_ctx , session -> server_hostkey_md5 ) ;
session -> server_hostkey_md5_valid = TRUE ;
}
else {
session -> server_hostkey_md5_valid = FALSE ;
}
}
# ifdef LIBSSH2DEBUG {
char fingerprint [ 50 ] , * fprint = fingerprint ;
int i ;
for ( i = 0 ;
i < 16 ;
i ++ , fprint += 3 ) {
snprintf ( fprint , 4 , "%02x:" , session -> server_hostkey_md5 [ i ] ) ;
}
* ( -- fprint ) = '\0' ;
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server's MD5 Fingerprint: %s" , fingerprint ) ;
}
# endif # endif {
libssh2_sha1_ctx fingerprint_ctx ;
if ( libssh2_sha1_init ( & fingerprint_ctx ) ) {
libssh2_sha1_update ( fingerprint_ctx , session -> server_hostkey , session -> server_hostkey_len ) ;
libssh2_sha1_final ( fingerprint_ctx , session -> server_hostkey_sha1 ) ;
session -> server_hostkey_sha1_valid = TRUE ;
}
else {
session -> server_hostkey_sha1_valid = FALSE ;
}
}
# ifdef LIBSSH2DEBUG {
char fingerprint [ 64 ] , * fprint = fingerprint ;
int i ;
for ( i = 0 ;
i < 20 ;
i ++ , fprint += 3 ) {
snprintf ( fprint , 4 , "%02x:" , session -> server_hostkey_sha1 [ i ] ) ;
}
* ( -- fprint ) = '\0' ;
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server's SHA1 Fingerprint: %s" , fingerprint ) ;
}
# endif if ( session -> hostkey -> init ( session , session -> server_hostkey , session -> server_hostkey_len , & session -> server_hostkey_abstract ) ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_HOSTKEY_INIT , "Unable to initialize hostkey importer" ) ;
goto clean_exit ;
}
exchange_state -> f_value_len = _libssh2_ntohu32 ( exchange_state -> s ) ;
exchange_state -> s += 4 ;
exchange_state -> f_value = exchange_state -> s ;
exchange_state -> s += exchange_state -> f_value_len ;
_libssh2_bn_from_bin ( exchange_state -> f , exchange_state -> f_value_len , exchange_state -> f_value ) ;
exchange_state -> h_sig_len = _libssh2_ntohu32 ( exchange_state -> s ) ;
exchange_state -> s += 4 ;
exchange_state -> h_sig = exchange_state -> s ;
_libssh2_bn_mod_exp ( exchange_state -> k , exchange_state -> f , exchange_state -> x , p , exchange_state -> ctx ) ;
exchange_state -> k_value_len = _libssh2_bn_bytes ( exchange_state -> k ) + 5 ;
if ( _libssh2_bn_bits ( exchange_state -> k ) % 8 ) {
exchange_state -> k_value_len -- ;
}
exchange_state -> k_value = LIBSSH2_ALLOC ( session , exchange_state -> k_value_len ) ;
if ( ! exchange_state -> k_value ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Unable to allocate buffer for K" ) ;
goto clean_exit ;
}
_libssh2_htonu32 ( exchange_state -> k_value , exchange_state -> k_value_len - 4 ) ;
if ( _libssh2_bn_bits ( exchange_state -> k ) % 8 ) {
_libssh2_bn_to_bin ( exchange_state -> k , exchange_state -> k_value + 4 ) ;
}
else {
exchange_state -> k_value [ 4 ] = 0 ;
_libssh2_bn_to_bin ( exchange_state -> k , exchange_state -> k_value + 5 ) ;
}
exchange_state -> exchange_hash = ( void * ) & exchange_hash_ctx ;
libssh2_sha256_init ( & exchange_hash_ctx ) ;
if ( session -> local . banner ) {
_libssh2_htonu32 ( exchange_state -> h_sig_comp , strlen ( ( char * ) session -> local . banner ) - 2 ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , ( char * ) session -> local . banner , strlen ( ( char * ) session -> local . banner ) - 2 ) ;
}
else {
_libssh2_htonu32 ( exchange_state -> h_sig_comp , sizeof ( LIBSSH2_SSH_DEFAULT_BANNER ) - 1 ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , LIBSSH2_SSH_DEFAULT_BANNER , sizeof ( LIBSSH2_SSH_DEFAULT_BANNER ) - 1 ) ;
}
_libssh2_htonu32 ( exchange_state -> h_sig_comp , strlen ( ( char * ) session -> remote . banner ) ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , session -> remote . banner , strlen ( ( char * ) session -> remote . banner ) ) ;
_libssh2_htonu32 ( exchange_state -> h_sig_comp , session -> local . kexinit_len ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , session -> local . kexinit , session -> local . kexinit_len ) ;
_libssh2_htonu32 ( exchange_state -> h_sig_comp , session -> remote . kexinit_len ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , session -> remote . kexinit , session -> remote . kexinit_len ) ;
_libssh2_htonu32 ( exchange_state -> h_sig_comp , session -> server_hostkey_len ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , session -> server_hostkey , session -> server_hostkey_len ) ;
if ( packet_type_init == SSH_MSG_KEX_DH_GEX_INIT ) {
# ifdef LIBSSH2_DH_GEX_NEW _libssh2_htonu32 ( exchange_state -> h_sig_comp , LIBSSH2_DH_GEX_MINGROUP ) ;
_libssh2_htonu32 ( exchange_state -> h_sig_comp + 4 , LIBSSH2_DH_GEX_OPTGROUP ) ;
_libssh2_htonu32 ( exchange_state -> h_sig_comp + 8 , LIBSSH2_DH_GEX_MAXGROUP ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 12 ) ;
# else _libssh2_htonu32 ( exchange_state -> h_sig_comp , LIBSSH2_DH_GEX_OPTGROUP ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
# endif }
if ( midhash ) {
libssh2_sha256_update ( exchange_hash_ctx , midhash , midhash_len ) ;
}
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> e_packet + 1 , exchange_state -> e_packet_len - 1 ) ;
_libssh2_htonu32 ( exchange_state -> h_sig_comp , exchange_state -> f_value_len ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> h_sig_comp , 4 ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> f_value , exchange_state -> f_value_len ) ;
libssh2_sha256_update ( exchange_hash_ctx , exchange_state -> k_value , exchange_state -> k_value_len ) ;
libssh2_sha256_final ( exchange_hash_ctx , exchange_state -> h_sig_comp ) ;
if ( session -> hostkey -> sig_verify ( session , exchange_state -> h_sig , exchange_state -> h_sig_len , exchange_state -> h_sig_comp , SHA256_DIGEST_LENGTH , & session -> server_hostkey_abstract ) ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_HOSTKEY_SIGN , "Unable to verify hostkey signature" ) ;
goto clean_exit ;
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Sending NEWKEYS message" ) ;
exchange_state -> c = SSH_MSG_NEWKEYS ;
exchange_state -> state = libssh2_NB_state_sent2 ;
}
if ( exchange_state -> state == libssh2_NB_state_sent2 ) {
rc = _libssh2_transport_send ( session , & exchange_state -> c , 1 , NULL , 0 ) ;
if ( rc == LIBSSH2_ERROR_EAGAIN ) {
return rc ;
}
else if ( rc ) {
ret = _libssh2_error ( session , rc , "Unable to send NEWKEYS message" ) ;
goto clean_exit ;
}
exchange_state -> state = libssh2_NB_state_sent3 ;
}
if ( exchange_state -> state == libssh2_NB_state_sent3 ) {
rc = _libssh2_packet_require ( session , SSH_MSG_NEWKEYS , & exchange_state -> tmp , & exchange_state -> tmp_len , 0 , NULL , 0 , & exchange_state -> req_state ) ;
if ( rc == LIBSSH2_ERROR_EAGAIN ) {
return rc ;
}
else if ( rc ) {
ret = _libssh2_error ( session , rc , "Timed out waiting for NEWKEYS" ) ;
goto clean_exit ;
}
session -> state |= LIBSSH2_STATE_NEWKEYS ;
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Received NEWKEYS message" ) ;
LIBSSH2_FREE ( session , exchange_state -> tmp ) ;
if ( ! session -> session_id ) {
session -> session_id = LIBSSH2_ALLOC ( session , SHA256_DIGEST_LENGTH ) ;
if ( ! session -> session_id ) {
ret = _libssh2_error ( session , LIBSSH2_ERROR_ALLOC , "Unable to allocate buffer for SHA digest" ) ;
goto clean_exit ;
}
memcpy ( session -> session_id , exchange_state -> h_sig_comp , SHA256_DIGEST_LENGTH ) ;
session -> session_id_len = SHA256_DIGEST_LENGTH ;
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "session_id calculated" ) ;
}
if ( session -> local . crypt -> dtor ) {
session -> local . crypt -> dtor ( session , & session -> local . crypt_abstract ) ;
}
if ( session -> local . crypt -> init ) {
unsigned char * iv = NULL , * secret = NULL ;
int free_iv = 0 , free_secret = 0 ;
LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( iv , session -> local . crypt -> iv_len , "A" ) ;
if ( ! iv ) {
ret = - 1 ;
goto clean_exit ;
}
LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( secret , session -> local . crypt -> secret_len , "C" ) ;
if ( ! secret ) {
LIBSSH2_FREE ( session , iv ) ;
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
if ( session -> local . crypt -> init ( session , session -> local . crypt , iv , & free_iv , secret , & free_secret , 1 , & session -> local . crypt_abstract ) ) {
LIBSSH2_FREE ( session , iv ) ;
LIBSSH2_FREE ( session , secret ) ;
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
if ( free_iv ) {
memset ( iv , 0 , session -> local . crypt -> iv_len ) ;
LIBSSH2_FREE ( session , iv ) ;
}
if ( free_secret ) {
memset ( secret , 0 , session -> local . crypt -> secret_len ) ;
LIBSSH2_FREE ( session , secret ) ;
}
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Client to Server IV and Key calculated" ) ;
if ( session -> remote . crypt -> dtor ) {
session -> remote . crypt -> dtor ( session , & session -> remote . crypt_abstract ) ;
}
if ( session -> remote . crypt -> init ) {
unsigned char * iv = NULL , * secret = NULL ;
int free_iv = 0 , free_secret = 0 ;
LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( iv , session -> remote . crypt -> iv_len , "B" ) ;
if ( ! iv ) {
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( secret , session -> remote . crypt -> secret_len , "D" ) ;
if ( ! secret ) {
LIBSSH2_FREE ( session , iv ) ;
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
if ( session -> remote . crypt -> init ( session , session -> remote . crypt , iv , & free_iv , secret , & free_secret , 0 , & session -> remote . crypt_abstract ) ) {
LIBSSH2_FREE ( session , iv ) ;
LIBSSH2_FREE ( session , secret ) ;
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
if ( free_iv ) {
memset ( iv , 0 , session -> remote . crypt -> iv_len ) ;
LIBSSH2_FREE ( session , iv ) ;
}
if ( free_secret ) {
memset ( secret , 0 , session -> remote . crypt -> secret_len ) ;
LIBSSH2_FREE ( session , secret ) ;
}
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server to Client IV and Key calculated" ) ;
if ( session -> local . mac -> dtor ) {
session -> local . mac -> dtor ( session , & session -> local . mac_abstract ) ;
}
if ( session -> local . mac -> init ) {
unsigned char * key = NULL ;
int free_key = 0 ;
LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( key , session -> local . mac -> key_len , "E" ) ;
if ( ! key ) {
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
session -> local . mac -> init ( session , key , & free_key , & session -> local . mac_abstract ) ;
if ( free_key ) {
memset ( key , 0 , session -> local . mac -> key_len ) ;
LIBSSH2_FREE ( session , key ) ;
}
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Client to Server HMAC Key calculated" ) ;
if ( session -> remote . mac -> dtor ) {
session -> remote . mac -> dtor ( session , & session -> remote . mac_abstract ) ;
}
if ( session -> remote . mac -> init ) {
unsigned char * key = NULL ;
int free_key = 0 ;
LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA256_HASH ( key , session -> remote . mac -> key_len , "F" ) ;
if ( ! key ) {
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
session -> remote . mac -> init ( session , key , & free_key , & session -> remote . mac_abstract ) ;
if ( free_key ) {
memset ( key , 0 , session -> remote . mac -> key_len ) ;
LIBSSH2_FREE ( session , key ) ;
}
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server to Client HMAC Key calculated" ) ;
if ( session -> local . comp && session -> local . comp -> dtor ) {
session -> local . comp -> dtor ( session , 1 , & session -> local . comp_abstract ) ;
}
if ( session -> local . comp && session -> local . comp -> init ) {
if ( session -> local . comp -> init ( session , 1 , & session -> local . comp_abstract ) ) {
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Client to Server compression initialized" ) ;
if ( session -> remote . comp && session -> remote . comp -> dtor ) {
session -> remote . comp -> dtor ( session , 0 , & session -> remote . comp_abstract ) ;
}
if ( session -> remote . comp && session -> remote . comp -> init ) {
if ( session -> remote . comp -> init ( session , 0 , & session -> remote . comp_abstract ) ) {
ret = LIBSSH2_ERROR_KEX_FAILURE ;
goto clean_exit ;
}
}
_libssh2_debug ( session , LIBSSH2_TRACE_KEX , "Server to Client compression initialized" ) ;
}
clean_exit : _libssh2_bn_free ( exchange_state -> x ) ;
exchange_state -> x = NULL ;
_libssh2_bn_free ( exchange_state -> e ) ;
exchange_state -> e = NULL ;
_libssh2_bn_free ( exchange_state -> f ) ;
exchange_state -> f = NULL ;
_libssh2_bn_free ( exchange_state -> k ) ;
exchange_state -> k = NULL ;
_libssh2_bn_ctx_free ( exchange_state -> ctx ) ;
exchange_state -> ctx = NULL ;
if ( exchange_state -> e_packet ) {
LIBSSH2_FREE ( session , exchange_state -> e_packet ) ;
exchange_state -> e_packet = NULL ;
}
if ( exchange_state -> s_packet ) {
LIBSSH2_FREE ( session , exchange_state -> s_packet ) ;
exchange_state -> s_packet = NULL ;
}
if ( exchange_state -> k_value ) {
LIBSSH2_FREE ( session , exchange_state -> k_value ) ;
exchange_state -> k_value = NULL ;
}
exchange_state -> state = libssh2_NB_state_idle ;
return ret ;
} |
7,889,142,355,347,192,000 | debian | 53 | 0 | int __udp6_lib_rcv ( struct sk_buff * skb , struct udp_table * udptable , int proto ) {
struct net * net = dev_net ( skb -> dev ) ;
struct sock * sk ;
struct udphdr * uh ;
struct in6_addr * saddr , * daddr ;
u32 ulen = 0 ;
if ( ! pskb_may_pull ( skb , sizeof ( struct udphdr ) ) ) goto short_packet ;
saddr = & ipv6_hdr ( skb ) -> saddr ;
daddr = & ipv6_hdr ( skb ) -> daddr ;
uh = udp_hdr ( skb ) ;
ulen = ntohs ( uh -> len ) ;
if ( ulen > skb -> len ) goto short_packet ;
if ( proto == IPPROTO_UDP ) {
if ( ulen == 0 ) ulen = skb -> len ;
if ( ulen < sizeof ( * uh ) ) goto short_packet ;
if ( ulen < skb -> len ) {
if ( pskb_trim_rcsum ( skb , ulen ) ) goto short_packet ;
saddr = & ipv6_hdr ( skb ) -> saddr ;
daddr = & ipv6_hdr ( skb ) -> daddr ;
uh = udp_hdr ( skb ) ;
}
}
if ( udp6_csum_init ( skb , uh , proto ) ) goto discard ;
if ( ipv6_addr_is_multicast ( daddr ) ) return __udp6_lib_mcast_deliver ( net , skb , saddr , daddr , udptable ) ;
sk = __udp6_lib_lookup_skb ( skb , uh -> source , uh -> dest , udptable ) ;
if ( sk == NULL ) {
if ( ! xfrm6_policy_check ( NULL , XFRM_POLICY_IN , skb ) ) goto discard ;
if ( udp_lib_checksum_complete ( skb ) ) goto discard ;
UDP6_INC_STATS_BH ( net , UDP_MIB_NOPORTS , proto == IPPROTO_UDPLITE ) ;
icmpv6_send ( skb , ICMPV6_DEST_UNREACH , ICMPV6_PORT_UNREACH , 0 ) ;
kfree_skb ( skb ) ;
return 0 ;
}
if ( sk_rcvqueues_full ( sk , skb ) ) {
sock_put ( sk ) ;
goto discard ;
}
bh_lock_sock ( sk ) ;
if ( ! sock_owned_by_user ( sk ) ) udpv6_queue_rcv_skb ( sk , skb ) ;
else if ( sk_add_backlog ( sk , skb ) ) {
atomic_inc ( & sk -> sk_drops ) ;
bh_unlock_sock ( sk ) ;
sock_put ( sk ) ;
goto discard ;
}
bh_unlock_sock ( sk ) ;
sock_put ( sk ) ;
return 0 ;
short_packet : LIMIT_NETDEBUG ( KERN_DEBUG "UDP%sv6: short packet: %d/%u\n" , proto == IPPROTO_UDPLITE ? "-Lite" : "" , ulen , skb -> len ) ;
discard : UDP6_INC_STATS_BH ( net , UDP_MIB_INERRORS , proto == IPPROTO_UDPLITE ) ;
kfree_skb ( skb ) ;
return 0 ;
} |
7,549,435,794,356,072,000 | debian | 3 | 0 | VALUE asn1str_to_str ( const ASN1_STRING * str ) {
return rb_str_new ( ( const char * ) str -> data , str -> length ) ;
} |
9,199,363,626,704,328,000 | debian | 34 | 1 | static int vble_decode_frame ( AVCodecContext * avctx , void * data , int * got_frame , AVPacket * avpkt ) {
VBLEContext * ctx = avctx -> priv_data ;
AVFrame * pic = avctx -> coded_frame ;
GetBitContext gb ;
const uint8_t * src = avpkt -> data ;
int version ;
int offset = 0 ;
int width_uv = avctx -> width / 2 , height_uv = avctx -> height / 2 ;
pic -> reference = 0 ;
if ( pic -> data [ 0 ] ) avctx -> release_buffer ( avctx , pic ) ;
if ( ff_get_buffer ( avctx , pic ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "Could not allocate buffer.\n" ) ;
return AVERROR ( ENOMEM ) ;
}
pic -> key_frame = 1 ;
pic -> pict_type = AV_PICTURE_TYPE_I ;
version = AV_RL32 ( src ) ;
if ( version != 1 ) av_log ( avctx , AV_LOG_WARNING , "Unsupported VBLE Version: %d\n" , version ) ;
init_get_bits ( & gb , src + 4 , ( avpkt -> size - 4 ) * 8 ) ;
if ( vble_unpack ( ctx , & gb ) < 0 ) {
av_log ( avctx , AV_LOG_ERROR , "Invalid Code\n" ) ;
return AVERROR_INVALIDDATA ;
}
vble_restore_plane ( ctx , 0 , offset , avctx -> width , avctx -> height ) ;
if ( ! ( ctx -> avctx -> flags & CODEC_FLAG_GRAY ) ) {
offset += avctx -> width * avctx -> height ;
vble_restore_plane ( ctx , 1 , offset , width_uv , height_uv ) ;
offset += width_uv * height_uv ;
vble_restore_plane ( ctx , 2 , offset , width_uv , height_uv ) ;
}
* got_frame = 1 ;
* ( AVFrame * ) data = * pic ;
return avpkt -> size ;
} |
6,675,626,110,148,442,000 | debian | 22 | 0 | long jas_stream_seek ( jas_stream_t * stream , long offset , int origin ) {
long newpos ;
assert ( ! ( ( stream -> bufmode_ & JAS_STREAM_RDBUF ) && ( stream -> bufmode_ & JAS_STREAM_WRBUF ) ) ) ;
stream -> flags_ &= ~ JAS_STREAM_EOF ;
if ( stream -> bufmode_ & JAS_STREAM_RDBUF ) {
if ( origin == SEEK_CUR ) {
offset -= stream -> cnt_ ;
}
}
else if ( stream -> bufmode_ & JAS_STREAM_WRBUF ) {
if ( jas_stream_flush ( stream ) ) {
return - 1 ;
}
}
stream -> cnt_ = 0 ;
stream -> ptr_ = stream -> bufstart_ ;
stream -> bufmode_ &= ~ ( JAS_STREAM_RDBUF | JAS_STREAM_WRBUF ) ;
if ( ( newpos = ( * stream -> ops_ -> seek_ ) ( stream -> obj_ , offset , origin ) ) < 0 ) {
return - 1 ;
}
return newpos ;
} |
-1,102,844,685,921,778,700 | debian | 70 | 0 | static int archive_string_append_unicode ( struct archive_string * as , const void * _p , size_t len , struct archive_string_conv * sc ) {
const char * s ;
char * p , * endp ;
uint32_t uc ;
size_t w ;
int n , ret = 0 , ts , tm ;
int ( * parse ) ( uint32_t * , const char * , size_t ) ;
size_t ( * unparse ) ( char * , size_t , uint32_t ) ;
if ( sc -> flag & SCONV_TO_UTF16BE ) {
unparse = unicode_to_utf16be ;
ts = 2 ;
}
else if ( sc -> flag & SCONV_TO_UTF16LE ) {
unparse = unicode_to_utf16le ;
ts = 2 ;
}
else if ( sc -> flag & SCONV_TO_UTF8 ) {
unparse = unicode_to_utf8 ;
ts = 1 ;
}
else {
if ( sc -> flag & SCONV_FROM_UTF16BE ) {
unparse = unicode_to_utf16be ;
ts = 2 ;
}
else if ( sc -> flag & SCONV_FROM_UTF16LE ) {
unparse = unicode_to_utf16le ;
ts = 2 ;
}
else {
unparse = unicode_to_utf8 ;
ts = 1 ;
}
}
if ( sc -> flag & SCONV_FROM_UTF16BE ) {
parse = utf16be_to_unicode ;
tm = 1 ;
}
else if ( sc -> flag & SCONV_FROM_UTF16LE ) {
parse = utf16le_to_unicode ;
tm = 1 ;
}
else {
parse = cesu8_to_unicode ;
tm = ts ;
}
if ( archive_string_ensure ( as , as -> length + len * tm + ts ) == NULL ) return ( - 1 ) ;
s = ( const char * ) _p ;
p = as -> s + as -> length ;
endp = as -> s + as -> buffer_length - ts ;
while ( ( n = parse ( & uc , s , len ) ) != 0 ) {
if ( n < 0 ) {
n *= - 1 ;
ret = - 1 ;
}
s += n ;
len -= n ;
while ( ( w = unparse ( p , endp - p , uc ) ) == 0 ) {
as -> length = p - as -> s ;
if ( archive_string_ensure ( as , as -> buffer_length + len * tm + ts ) == NULL ) return ( - 1 ) ;
p = as -> s + as -> length ;
endp = as -> s + as -> buffer_length - ts ;
}
p += w ;
}
as -> length = p - as -> s ;
as -> s [ as -> length ] = '\0' ;
if ( ts == 2 ) as -> s [ as -> length + 1 ] = '\0' ;
return ( ret ) ;
} |
-3,569,070,884,878,445,600 | debian | 40 | 0 | static int get_buffer ( AVCodecContext * avctx , Picture * pic ) {
SVQ3Context * s = avctx -> priv_data ;
H264Context * h = & s -> h ;
const int big_mb_num = h -> mb_stride * ( h -> mb_height + 1 ) + 1 ;
const int mb_array_size = h -> mb_stride * h -> mb_height ;
const int b4_stride = h -> mb_width * 4 + 1 ;
const int b4_array_size = b4_stride * h -> mb_height * 4 ;
int ret ;
if ( ! pic -> motion_val_buf [ 0 ] ) {
int i ;
pic -> mb_type_buf = av_buffer_allocz ( ( big_mb_num + h -> mb_stride ) * sizeof ( uint32_t ) ) ;
if ( ! pic -> mb_type_buf ) return AVERROR ( ENOMEM ) ;
pic -> mb_type = ( uint32_t * ) pic -> mb_type_buf -> data + 2 * h -> mb_stride + 1 ;
for ( i = 0 ;
i < 2 ;
i ++ ) {
pic -> motion_val_buf [ i ] = av_buffer_allocz ( 2 * ( b4_array_size + 4 ) * sizeof ( int16_t ) ) ;
pic -> ref_index_buf [ i ] = av_buffer_allocz ( 4 * mb_array_size ) ;
if ( ! pic -> motion_val_buf [ i ] || ! pic -> ref_index_buf [ i ] ) {
ret = AVERROR ( ENOMEM ) ;
goto fail ;
}
pic -> motion_val [ i ] = ( int16_t ( * ) [ 2 ] ) pic -> motion_val_buf [ i ] -> data + 4 ;
pic -> ref_index [ i ] = pic -> ref_index_buf [ i ] -> data ;
}
}
pic -> f . motion_subsample_log2 = 2 ;
pic -> reference = ! ( h -> pict_type == AV_PICTURE_TYPE_B ) ;
ret = ff_get_buffer ( avctx , & pic -> f , pic -> reference ? AV_GET_BUFFER_FLAG_REF : 0 ) ;
if ( ret < 0 ) goto fail ;
if ( ! h -> edge_emu_buffer ) {
h -> edge_emu_buffer = av_mallocz ( pic -> f . linesize [ 0 ] * 17 ) ;
if ( ! h -> edge_emu_buffer ) return AVERROR ( ENOMEM ) ;
}
h -> linesize = pic -> f . linesize [ 0 ] ;
h -> uvlinesize = pic -> f . linesize [ 1 ] ;
return 0 ;
fail : free_picture ( avctx , pic ) ;
return ret ;
} |
-7,559,567,117,301,601,000 | debian | 29 | 1 | int main ( int argc , char * argv [ ] ) {
libettercap_init ( ) ;
ef_globals_alloc ( ) ;
select_text_interface ( ) ;
libettercap_ui_init ( ) ;
fprintf ( stdout , "\n" EC_COLOR_BOLD "%s %s" EC_COLOR_END " copyright %s %s\n\n" , PROGRAM , EC_VERSION , EC_COPYRIGHT , EC_AUTHORS ) ;
EF_GBL -> lineno = 1 ;
parse_options ( argc , argv ) ;
if ( EF_GBL_OPTIONS -> source_file ) {
yyin = fopen ( EF_GBL_OPTIONS -> source_file , "r" ) ;
if ( yyin == NULL ) FATAL_ERROR ( "Input file not found !" ) ;
}
else {
FATAL_ERROR ( "No source file." ) ;
}
setbuf ( yyin , NULL ) ;
setbuf ( stdout , NULL ) ;
setbuf ( stderr , NULL ) ;
load_tables ( ) ;
load_constants ( ) ;
fprintf ( stdout , "\n Parsing source file \'%s\' " , EF_GBL_OPTIONS -> source_file ) ;
fflush ( stdout ) ;
ef_debug ( 1 , "\n" ) ;
if ( yyparse ( ) == 0 ) fprintf ( stdout , " done.\n\n" ) ;
else fprintf ( stdout , "\n\nThe script contains errors...\n\n" ) ;
if ( write_output ( ) != E_SUCCESS ) FATAL_ERROR ( "Cannot write output file (%s)" , EF_GBL_OPTIONS -> output_file ) ;
ef_globals_free ( ) ;
return 0 ;
} |
5,917,118,798,851,366,000 | debian | 12 | 0 | static void dissect_zcl_appl_stats_log_queue_rsp ( tvbuff_t * tvb , proto_tree * tree , guint * offset ) {
gint list_len ;
proto_tree_add_item ( tree , hf_zbee_zcl_appl_stats_log_queue_size , tvb , * offset , 1 , ENC_NA ) ;
* offset += 1 ;
list_len = tvb_reported_length_remaining ( tvb , * offset ) ;
if ( list_len > 0 ) {
while ( * offset < ( guint ) list_len ) {
proto_tree_add_item ( tree , hf_zbee_zcl_appl_stats_log_id , tvb , * offset , 4 , ENC_LITTLE_ENDIAN ) ;
* offset += 4 ;
}
}
} |
4,423,867,112,908,499,000 | chrome | 39 | 0 | void vp9_quantize_b_32x32_c ( const tran_low_t * coeff_ptr , intptr_t n_coeffs , int skip_block , const int16_t * zbin_ptr , const int16_t * round_ptr , const int16_t * quant_ptr , const int16_t * quant_shift_ptr , tran_low_t * qcoeff_ptr , tran_low_t * dqcoeff_ptr , const int16_t * dequant_ptr , int zbin_oq_value , uint16_t * eob_ptr , const int16_t * scan , const int16_t * iscan ) {
const int zbins [ 2 ] = {
ROUND_POWER_OF_TWO ( zbin_ptr [ 0 ] + zbin_oq_value , 1 ) , ROUND_POWER_OF_TWO ( zbin_ptr [ 1 ] + zbin_oq_value , 1 ) }
;
const int nzbins [ 2 ] = {
zbins [ 0 ] * - 1 , zbins [ 1 ] * - 1 }
;
int idx = 0 ;
int idx_arr [ 1024 ] ;
int i , eob = - 1 ;
( void ) iscan ;
vpx_memset ( qcoeff_ptr , 0 , n_coeffs * sizeof ( * qcoeff_ptr ) ) ;
vpx_memset ( dqcoeff_ptr , 0 , n_coeffs * sizeof ( * dqcoeff_ptr ) ) ;
if ( ! skip_block ) {
for ( i = 0 ;
i < n_coeffs ;
i ++ ) {
const int rc = scan [ i ] ;
const int coeff = coeff_ptr [ rc ] ;
if ( coeff >= zbins [ rc != 0 ] || coeff <= nzbins [ rc != 0 ] ) idx_arr [ idx ++ ] = i ;
}
for ( i = 0 ;
i < idx ;
i ++ ) {
const int rc = scan [ idx_arr [ i ] ] ;
const int coeff = coeff_ptr [ rc ] ;
const int coeff_sign = ( coeff >> 31 ) ;
int tmp ;
int abs_coeff = ( coeff ^ coeff_sign ) - coeff_sign ;
abs_coeff += ROUND_POWER_OF_TWO ( round_ptr [ rc != 0 ] , 1 ) ;
abs_coeff = clamp ( abs_coeff , INT16_MIN , INT16_MAX ) ;
tmp = ( ( ( ( abs_coeff * quant_ptr [ rc != 0 ] ) >> 16 ) + abs_coeff ) * quant_shift_ptr [ rc != 0 ] ) >> 15 ;
qcoeff_ptr [ rc ] = ( tmp ^ coeff_sign ) - coeff_sign ;
dqcoeff_ptr [ rc ] = qcoeff_ptr [ rc ] * dequant_ptr [ rc != 0 ] / 2 ;
if ( tmp ) eob = idx_arr [ i ] ;
}
}
* eob_ptr = eob + 1 ;
} |
8,461,782,184,979,846,000 | chrome | 10 | 1 | TEST_F ( ProtocolHandlerRegistryTest , TestReplaceNonDefaultHandler ) {
ProtocolHandler ph1 = CreateProtocolHandler ( "mailto" , GURL ( "http://test.com/%s" ) , "test1" ) ;
ProtocolHandler ph2 = CreateProtocolHandler ( "mailto" , GURL ( "http://test.com/updated-url/%s" ) , "test2" ) ;
ProtocolHandler ph3 = CreateProtocolHandler ( "mailto" , GURL ( "http://else.com/%s" ) , "test3" ) ;
registry ( ) -> OnAcceptRegisterProtocolHandler ( ph1 ) ;
registry ( ) -> OnAcceptRegisterProtocolHandler ( ph3 ) ;
ASSERT_TRUE ( registry ( ) -> AttemptReplace ( ph2 ) ) ;
const ProtocolHandler & handler ( registry ( ) -> GetHandlerFor ( "mailto" ) ) ;
ASSERT_EQ ( handler . url ( ) , ph3 . url ( ) ) ;
} |
-7,076,754,245,473,579,000 | chrome | 3 | 0 | static void fake_freeaddrinfo ( struct addrinfo * ai ) {
free ( ai -> ai_addr ) ;
} |
1,859,256,631,654,517,000 | chrome | 29 | 0 | void ff_h264_draw_horiz_band ( H264Context * h , int y , int height ) {
AVCodecContext * avctx = h -> avctx ;
Picture * cur = & h -> cur_pic ;
Picture * last = h -> ref_list [ 0 ] [ 0 ] . f . data [ 0 ] ? & h -> ref_list [ 0 ] [ 0 ] : NULL ;
const AVPixFmtDescriptor * desc = av_pix_fmt_desc_get ( avctx -> pix_fmt ) ;
int vshift = desc -> log2_chroma_h ;
const int field_pic = h -> picture_structure != PICT_FRAME ;
if ( field_pic ) {
height <<= 1 ;
y <<= 1 ;
}
height = FFMIN ( height , avctx -> height - y ) ;
if ( field_pic && h -> first_field && ! ( avctx -> slice_flags & SLICE_FLAG_ALLOW_FIELD ) ) return ;
if ( avctx -> draw_horiz_band ) {
AVFrame * src ;
int offset [ AV_NUM_DATA_POINTERS ] ;
int i ;
if ( cur -> f . pict_type == AV_PICTURE_TYPE_B || h -> low_delay || ( avctx -> slice_flags & SLICE_FLAG_CODED_ORDER ) ) src = & cur -> f ;
else if ( last ) src = & last -> f ;
else return ;
offset [ 0 ] = y * src -> linesize [ 0 ] ;
offset [ 1 ] = offset [ 2 ] = ( y >> vshift ) * src -> linesize [ 1 ] ;
for ( i = 3 ;
i < AV_NUM_DATA_POINTERS ;
i ++ ) offset [ i ] = 0 ;
emms_c ( ) ;
avctx -> draw_horiz_band ( avctx , src , offset , y , h -> picture_structure , height ) ;
}
} |
7,549,435,794,356,072,000 | debian | 4 | 0 | static VALUE ossl_asn1cons_each ( VALUE self ) {
rb_ary_each ( ossl_asn1_get_value ( self ) ) ;
return self ;
} |
692,314,327,553,049,500 | chrome | 67 | 0 | unsigned int vp8_variance8x8_neon ( const unsigned char * src_ptr , int source_stride , const unsigned char * ref_ptr , int recon_stride , unsigned int * sse ) {
int i ;
uint8x8_t d0u8 , d1u8 , d2u8 , d3u8 , d4u8 , d5u8 , d6u8 , d7u8 ;
int16x4_t d22s16 , d23s16 , d24s16 , d25s16 , d26s16 , d27s16 , d28s16 , d29s16 ;
uint32x2_t d0u32 , d10u32 ;
int64x1_t d0s64 , d1s64 ;
uint16x8_t q11u16 , q12u16 , q13u16 , q14u16 ;
int32x4_t q8s32 , q9s32 , q10s32 ;
int64x2_t q0s64 , q1s64 , q5s64 ;
q8s32 = vdupq_n_s32 ( 0 ) ;
q9s32 = vdupq_n_s32 ( 0 ) ;
q10s32 = vdupq_n_s32 ( 0 ) ;
for ( i = 0 ;
i < 2 ;
i ++ ) {
d0u8 = vld1_u8 ( src_ptr ) ;
src_ptr += source_stride ;
d1u8 = vld1_u8 ( src_ptr ) ;
src_ptr += source_stride ;
d2u8 = vld1_u8 ( src_ptr ) ;
src_ptr += source_stride ;
d3u8 = vld1_u8 ( src_ptr ) ;
src_ptr += source_stride ;
d4u8 = vld1_u8 ( ref_ptr ) ;
ref_ptr += recon_stride ;
d5u8 = vld1_u8 ( ref_ptr ) ;
ref_ptr += recon_stride ;
d6u8 = vld1_u8 ( ref_ptr ) ;
ref_ptr += recon_stride ;
d7u8 = vld1_u8 ( ref_ptr ) ;
ref_ptr += recon_stride ;
q11u16 = vsubl_u8 ( d0u8 , d4u8 ) ;
q12u16 = vsubl_u8 ( d1u8 , d5u8 ) ;
q13u16 = vsubl_u8 ( d2u8 , d6u8 ) ;
q14u16 = vsubl_u8 ( d3u8 , d7u8 ) ;
d22s16 = vreinterpret_s16_u16 ( vget_low_u16 ( q11u16 ) ) ;
d23s16 = vreinterpret_s16_u16 ( vget_high_u16 ( q11u16 ) ) ;
q8s32 = vpadalq_s16 ( q8s32 , vreinterpretq_s16_u16 ( q11u16 ) ) ;
q9s32 = vmlal_s16 ( q9s32 , d22s16 , d22s16 ) ;
q10s32 = vmlal_s16 ( q10s32 , d23s16 , d23s16 ) ;
d24s16 = vreinterpret_s16_u16 ( vget_low_u16 ( q12u16 ) ) ;
d25s16 = vreinterpret_s16_u16 ( vget_high_u16 ( q12u16 ) ) ;
q8s32 = vpadalq_s16 ( q8s32 , vreinterpretq_s16_u16 ( q12u16 ) ) ;
q9s32 = vmlal_s16 ( q9s32 , d24s16 , d24s16 ) ;
q10s32 = vmlal_s16 ( q10s32 , d25s16 , d25s16 ) ;
d26s16 = vreinterpret_s16_u16 ( vget_low_u16 ( q13u16 ) ) ;
d27s16 = vreinterpret_s16_u16 ( vget_high_u16 ( q13u16 ) ) ;
q8s32 = vpadalq_s16 ( q8s32 , vreinterpretq_s16_u16 ( q13u16 ) ) ;
q9s32 = vmlal_s16 ( q9s32 , d26s16 , d26s16 ) ;
q10s32 = vmlal_s16 ( q10s32 , d27s16 , d27s16 ) ;
d28s16 = vreinterpret_s16_u16 ( vget_low_u16 ( q14u16 ) ) ;
d29s16 = vreinterpret_s16_u16 ( vget_high_u16 ( q14u16 ) ) ;
q8s32 = vpadalq_s16 ( q8s32 , vreinterpretq_s16_u16 ( q14u16 ) ) ;
q9s32 = vmlal_s16 ( q9s32 , d28s16 , d28s16 ) ;
q10s32 = vmlal_s16 ( q10s32 , d29s16 , d29s16 ) ;
}
q10s32 = vaddq_s32 ( q10s32 , q9s32 ) ;
q0s64 = vpaddlq_s32 ( q8s32 ) ;
q1s64 = vpaddlq_s32 ( q10s32 ) ;
d0s64 = vadd_s64 ( vget_low_s64 ( q0s64 ) , vget_high_s64 ( q0s64 ) ) ;
d1s64 = vadd_s64 ( vget_low_s64 ( q1s64 ) , vget_high_s64 ( q1s64 ) ) ;
q5s64 = vmull_s32 ( vreinterpret_s32_s64 ( d0s64 ) , vreinterpret_s32_s64 ( d0s64 ) ) ;
vst1_lane_u32 ( ( uint32_t * ) sse , vreinterpret_u32_s64 ( d1s64 ) , 0 ) ;
d10u32 = vshr_n_u32 ( vreinterpret_u32_s64 ( vget_low_s64 ( q5s64 ) ) , 6 ) ;
d0u32 = vsub_u32 ( vreinterpret_u32_s64 ( d1s64 ) , d10u32 ) ;
return vget_lane_u32 ( d0u32 , 0 ) ;
} |
-3,146,697,469,509,848,600 | debian | 3 | 0 | static void int_dsa_free ( EVP_PKEY * pkey ) {
DSA_free ( pkey -> pkey . dsa ) ;
} |
-5,511,323,081,862,746,000 | debian | 5 | 0 | int k12_dump_can_write_encap ( int encap ) {
if ( encap == WTAP_ENCAP_PER_PACKET ) return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED ;
if ( encap != WTAP_ENCAP_K12 ) return WTAP_ERR_UNWRITABLE_ENCAP ;
return 0 ;
} |
-4,635,544,075,321,012,000 | debian | 12 | 0 | static char * Curl_basename ( char * path ) {
char * s1 ;
char * s2 ;
s1 = strrchr ( path , '/' ) ;
s2 = strrchr ( path , '\\' ) ;
if ( s1 && s2 ) {
path = ( s1 > s2 ? s1 : s2 ) + 1 ;
}
else if ( s1 ) path = s1 + 1 ;
else if ( s2 ) path = s2 + 1 ;
return path ;
} |
7,607,805,321,589,710,000 | debian | 50 | 0 | static int zcvrs ( i_ctx_t * i_ctx_p ) {
os_ptr op = osp ;
int radix ;
check_type ( op [ - 1 ] , t_integer ) ;
if ( op [ - 1 ] . value . intval < 2 || op [ - 1 ] . value . intval > 36 ) return_error ( gs_error_rangecheck ) ;
radix = op [ - 1 ] . value . intval ;
check_write_type ( * op , t_string ) ;
if ( radix == 10 ) {
switch ( r_type ( op - 2 ) ) {
case t_integer : case t_real : {
int code = convert_to_string ( imemory , op - 2 , op ) ;
if ( code < 0 ) return code ;
pop ( 2 ) ;
return 0 ;
}
case t__invalid : return_error ( gs_error_stackunderflow ) ;
default : return_error ( gs_error_rangecheck ) ;
}
}
else {
uint ival ;
byte digits [ sizeof ( ulong ) * 8 ] ;
byte * endp = & digits [ countof ( digits ) ] ;
byte * dp = endp ;
switch ( r_type ( op - 2 ) ) {
case t_integer : ival = ( uint ) op [ - 2 ] . value . intval ;
break ;
case t_real : {
float fval = op [ - 2 ] . value . realval ;
if ( ! REAL_CAN_BE_INT ( fval ) ) return_error ( gs_error_rangecheck ) ;
ival = ( ulong ) ( long ) fval ;
}
break ;
case t__invalid : return_error ( gs_error_stackunderflow ) ;
default : return_error ( gs_error_rangecheck ) ;
}
do {
int dit = ival % radix ;
* -- dp = dit + ( dit < 10 ? '0' : ( 'A' - 10 ) ) ;
ival /= radix ;
}
while ( ival ) ;
if ( endp - dp > r_size ( op ) ) return_error ( gs_error_rangecheck ) ;
memcpy ( op -> value . bytes , dp , ( uint ) ( endp - dp ) ) ;
r_set_size ( op , endp - dp ) ;
}
op [ - 2 ] = * op ;
pop ( 2 ) ;
return 0 ;
} |
1,676,654,288,894,940,700 | debian | 6 | 0 | static krb5_error_code randkey_princ ( krb5_principal princ , krb5_boolean keepold , int n_ks , krb5_key_salt_tuple * ks ) {
if ( keepold || ks ) {
return kadm5_randkey_principal_3 ( handle , princ , keepold , n_ks , ks , NULL , NULL ) ;
}
else return kadm5_randkey_principal ( handle , princ , NULL , NULL ) ;
} |
8,801,969,307,247,113,000 | debian | 415 | 0 | const EVP_CIPHER * EVP_aes_ ## keylen ## _ ## mode ( void ) \ {
return & aes_ ## keylen ## _ ## mode ;
}
# endif # if defined ( OPENSSL_CPUID_OBJ ) && ( defined ( __arm__ ) || defined ( __arm ) || defined ( __aarch64__ ) ) # include "arm_arch.h" # if __ARM_MAX_ARCH__ >= 7 # if defined ( BSAES_ASM ) # define BSAES_CAPABLE ( OPENSSL_armcap_P & ARMV7_NEON ) # endif # if defined ( VPAES_ASM ) # define VPAES_CAPABLE ( OPENSSL_armcap_P & ARMV7_NEON ) # endif # define HWAES_CAPABLE ( OPENSSL_armcap_P & ARMV8_AES ) # define HWAES_set_encrypt_key aes_v8_set_encrypt_key # define HWAES_set_decrypt_key aes_v8_set_decrypt_key # define HWAES_encrypt aes_v8_encrypt # define HWAES_decrypt aes_v8_decrypt # define HWAES_cbc_encrypt aes_v8_cbc_encrypt # define HWAES_ctr32_encrypt_blocks aes_v8_ctr32_encrypt_blocks # endif # endif # if defined ( HWAES_CAPABLE ) int HWAES_set_encrypt_key ( const unsigned char * userKey , const int bits , AES_KEY * key ) ;
int HWAES_set_decrypt_key ( const unsigned char * userKey , const int bits , AES_KEY * key ) ;
void HWAES_encrypt ( const unsigned char * in , unsigned char * out , const AES_KEY * key ) ;
void HWAES_decrypt ( const unsigned char * in , unsigned char * out , const AES_KEY * key ) ;
void HWAES_cbc_encrypt ( const unsigned char * in , unsigned char * out , size_t length , const AES_KEY * key , unsigned char * ivec , const int enc ) ;
void HWAES_ctr32_encrypt_blocks ( const unsigned char * in , unsigned char * out , size_t len , const AES_KEY * key , const unsigned char ivec [ 16 ] ) ;
void HWAES_xts_encrypt ( const unsigned char * inp , unsigned char * out , size_t len , const AES_KEY * key1 , const AES_KEY * key2 , const unsigned char iv [ 16 ] ) ;
void HWAES_xts_decrypt ( const unsigned char * inp , unsigned char * out , size_t len , const AES_KEY * key1 , const AES_KEY * key2 , const unsigned char iv [ 16 ] ) ;
# endif # define BLOCK_CIPHER_generic_pack ( nid , keylen , flags ) \ BLOCK_CIPHER_generic ( nid , keylen , 16 , 16 , cbc , cbc , CBC , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 16 , 0 , ecb , ecb , ECB , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , ofb128 , ofb , OFB , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , cfb128 , cfb , CFB , flags | EVP_CIPH_FLAG_DEFAULT_ASN1 ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , cfb1 , cfb1 , CFB , flags ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , cfb8 , cfb8 , CFB , flags ) \ BLOCK_CIPHER_generic ( nid , keylen , 1 , 16 , ctr , ctr , CTR , flags ) static int aes_init_key ( EVP_CIPHER_CTX * ctx , const unsigned char * key , const unsigned char * iv , int enc ) {
int ret , mode ;
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
mode = EVP_CIPHER_CTX_mode ( ctx ) ;
if ( ( mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE ) && ! enc ) {
# ifdef HWAES_CAPABLE if ( HWAES_CAPABLE ) {
ret = HWAES_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) HWAES_decrypt ;
dat -> stream . cbc = NULL ;
# ifdef HWAES_cbc_encrypt if ( mode == EVP_CIPH_CBC_MODE ) dat -> stream . cbc = ( cbc128_f ) HWAES_cbc_encrypt ;
# endif }
else # endif # ifdef BSAES_CAPABLE if ( BSAES_CAPABLE && mode == EVP_CIPH_CBC_MODE ) {
ret = AES_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) AES_decrypt ;
dat -> stream . cbc = ( cbc128_f ) bsaes_cbc_encrypt ;
}
else # endif # ifdef VPAES_CAPABLE if ( VPAES_CAPABLE ) {
ret = vpaes_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) vpaes_decrypt ;
dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) vpaes_cbc_encrypt : NULL ;
}
else # endif {
ret = AES_set_decrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) AES_decrypt ;
dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) AES_cbc_encrypt : NULL ;
}
}
else # ifdef HWAES_CAPABLE if ( HWAES_CAPABLE ) {
ret = HWAES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) HWAES_encrypt ;
dat -> stream . cbc = NULL ;
# ifdef HWAES_cbc_encrypt if ( mode == EVP_CIPH_CBC_MODE ) dat -> stream . cbc = ( cbc128_f ) HWAES_cbc_encrypt ;
else # endif # ifdef HWAES_ctr32_encrypt_blocks if ( mode == EVP_CIPH_CTR_MODE ) dat -> stream . ctr = ( ctr128_f ) HWAES_ctr32_encrypt_blocks ;
else # endif ( void ) 0 ;
}
else # endif # ifdef BSAES_CAPABLE if ( BSAES_CAPABLE && mode == EVP_CIPH_CTR_MODE ) {
ret = AES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) AES_encrypt ;
dat -> stream . ctr = ( ctr128_f ) bsaes_ctr32_encrypt_blocks ;
}
else # endif # ifdef VPAES_CAPABLE if ( VPAES_CAPABLE ) {
ret = vpaes_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) vpaes_encrypt ;
dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) vpaes_cbc_encrypt : NULL ;
}
else # endif {
ret = AES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & dat -> ks . ks ) ;
dat -> block = ( block128_f ) AES_encrypt ;
dat -> stream . cbc = mode == EVP_CIPH_CBC_MODE ? ( cbc128_f ) AES_cbc_encrypt : NULL ;
# ifdef AES_CTR_ASM if ( mode == EVP_CIPH_CTR_MODE ) dat -> stream . ctr = ( ctr128_f ) AES_ctr32_encrypt ;
# endif }
if ( ret < 0 ) {
EVPerr ( EVP_F_AES_INIT_KEY , EVP_R_AES_KEY_SETUP_FAILED ) ;
return 0 ;
}
return 1 ;
}
static int aes_cbc_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
if ( dat -> stream . cbc ) ( * dat -> stream . cbc ) ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , EVP_CIPHER_CTX_encrypting ( ctx ) ) ;
else if ( EVP_CIPHER_CTX_encrypting ( ctx ) ) CRYPTO_cbc128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , dat -> block ) ;
else CRYPTO_cbc128_decrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , dat -> block ) ;
return 1 ;
}
static int aes_ecb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
size_t bl = EVP_CIPHER_CTX_block_size ( ctx ) ;
size_t i ;
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
if ( len < bl ) return 1 ;
for ( i = 0 , len -= bl ;
i <= len ;
i += bl ) ( * dat -> block ) ( in + i , out + i , & dat -> ks ) ;
return 1 ;
}
static int aes_ofb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
int num = EVP_CIPHER_CTX_num ( ctx ) ;
CRYPTO_ofb128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
return 1 ;
}
static int aes_cfb_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
int num = EVP_CIPHER_CTX_num ( ctx ) ;
CRYPTO_cfb128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
return 1 ;
}
static int aes_cfb8_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
int num = EVP_CIPHER_CTX_num ( ctx ) ;
CRYPTO_cfb128_8_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
return 1 ;
}
static int aes_cfb1_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
if ( EVP_CIPHER_CTX_test_flags ( ctx , EVP_CIPH_FLAG_LENGTH_BITS ) ) {
int num = EVP_CIPHER_CTX_num ( ctx ) ;
CRYPTO_cfb128_1_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
return 1 ;
}
while ( len >= MAXBITCHUNK ) {
int num = EVP_CIPHER_CTX_num ( ctx ) ;
CRYPTO_cfb128_1_encrypt ( in , out , MAXBITCHUNK * 8 , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
len -= MAXBITCHUNK ;
}
if ( len ) {
int num = EVP_CIPHER_CTX_num ( ctx ) ;
CRYPTO_cfb128_1_encrypt ( in , out , len * 8 , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , & num , EVP_CIPHER_CTX_encrypting ( ctx ) , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
}
return 1 ;
}
static int aes_ctr_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
unsigned int num = EVP_CIPHER_CTX_num ( ctx ) ;
EVP_AES_KEY * dat = EVP_C_DATA ( EVP_AES_KEY , ctx ) ;
if ( dat -> stream . ctr ) CRYPTO_ctr128_encrypt_ctr32 ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , EVP_CIPHER_CTX_buf_noconst ( ctx ) , & num , dat -> stream . ctr ) ;
else CRYPTO_ctr128_encrypt ( in , out , len , & dat -> ks , EVP_CIPHER_CTX_iv_noconst ( ctx ) , EVP_CIPHER_CTX_buf_noconst ( ctx ) , & num , dat -> block ) ;
EVP_CIPHER_CTX_set_num ( ctx , num ) ;
return 1 ;
}
BLOCK_CIPHER_generic_pack ( NID_aes , 128 , 0 ) BLOCK_CIPHER_generic_pack ( NID_aes , 192 , 0 ) BLOCK_CIPHER_generic_pack ( NID_aes , 256 , 0 ) static int aes_gcm_cleanup ( EVP_CIPHER_CTX * c ) {
EVP_AES_GCM_CTX * gctx = EVP_C_DATA ( EVP_AES_GCM_CTX , c ) ;
OPENSSL_cleanse ( & gctx -> gcm , sizeof ( gctx -> gcm ) ) ;
if ( gctx -> iv != EVP_CIPHER_CTX_iv_noconst ( c ) ) OPENSSL_free ( gctx -> iv ) ;
return 1 ;
}
static void ctr64_inc ( unsigned char * counter ) {
int n = 8 ;
unsigned char c ;
do {
-- n ;
c = counter [ n ] ;
++ c ;
counter [ n ] = c ;
if ( c ) return ;
}
while ( n ) ;
}
static int aes_gcm_ctrl ( EVP_CIPHER_CTX * c , int type , int arg , void * ptr ) {
EVP_AES_GCM_CTX * gctx = EVP_C_DATA ( EVP_AES_GCM_CTX , c ) ;
switch ( type ) {
case EVP_CTRL_INIT : gctx -> key_set = 0 ;
gctx -> iv_set = 0 ;
gctx -> ivlen = EVP_CIPHER_CTX_iv_length ( c ) ;
gctx -> iv = EVP_CIPHER_CTX_iv_noconst ( c ) ;
gctx -> taglen = - 1 ;
gctx -> iv_gen = 0 ;
gctx -> tls_aad_len = - 1 ;
return 1 ;
case EVP_CTRL_AEAD_SET_IVLEN : if ( arg <= 0 ) return 0 ;
if ( ( arg > EVP_MAX_IV_LENGTH ) && ( arg > gctx -> ivlen ) ) {
if ( gctx -> iv != EVP_CIPHER_CTX_iv_noconst ( c ) ) OPENSSL_free ( gctx -> iv ) ;
gctx -> iv = OPENSSL_malloc ( arg ) ;
if ( gctx -> iv == NULL ) return 0 ;
}
gctx -> ivlen = arg ;
return 1 ;
case EVP_CTRL_AEAD_SET_TAG : if ( arg <= 0 || arg > 16 || EVP_CIPHER_CTX_encrypting ( c ) ) return 0 ;
memcpy ( EVP_CIPHER_CTX_buf_noconst ( c ) , ptr , arg ) ;
gctx -> taglen = arg ;
return 1 ;
case EVP_CTRL_AEAD_GET_TAG : if ( arg <= 0 || arg > 16 || ! EVP_CIPHER_CTX_encrypting ( c ) || gctx -> taglen < 0 ) return 0 ;
memcpy ( ptr , EVP_CIPHER_CTX_buf_noconst ( c ) , arg ) ;
return 1 ;
case EVP_CTRL_GCM_SET_IV_FIXED : if ( arg == - 1 ) {
memcpy ( gctx -> iv , ptr , gctx -> ivlen ) ;
gctx -> iv_gen = 1 ;
return 1 ;
}
if ( ( arg < 4 ) || ( gctx -> ivlen - arg ) < 8 ) return 0 ;
if ( arg ) memcpy ( gctx -> iv , ptr , arg ) ;
if ( EVP_CIPHER_CTX_encrypting ( c ) && RAND_bytes ( gctx -> iv + arg , gctx -> ivlen - arg ) <= 0 ) return 0 ;
gctx -> iv_gen = 1 ;
return 1 ;
case EVP_CTRL_GCM_IV_GEN : if ( gctx -> iv_gen == 0 || gctx -> key_set == 0 ) return 0 ;
CRYPTO_gcm128_setiv ( & gctx -> gcm , gctx -> iv , gctx -> ivlen ) ;
if ( arg <= 0 || arg > gctx -> ivlen ) arg = gctx -> ivlen ;
memcpy ( ptr , gctx -> iv + gctx -> ivlen - arg , arg ) ;
ctr64_inc ( gctx -> iv + gctx -> ivlen - 8 ) ;
gctx -> iv_set = 1 ;
return 1 ;
case EVP_CTRL_GCM_SET_IV_INV : if ( gctx -> iv_gen == 0 || gctx -> key_set == 0 || EVP_CIPHER_CTX_encrypting ( c ) ) return 0 ;
memcpy ( gctx -> iv + gctx -> ivlen - arg , ptr , arg ) ;
CRYPTO_gcm128_setiv ( & gctx -> gcm , gctx -> iv , gctx -> ivlen ) ;
gctx -> iv_set = 1 ;
return 1 ;
case EVP_CTRL_AEAD_TLS1_AAD : if ( arg != EVP_AEAD_TLS1_AAD_LEN ) return 0 ;
memcpy ( EVP_CIPHER_CTX_buf_noconst ( c ) , ptr , arg ) ;
gctx -> tls_aad_len = arg ;
{
unsigned int len = EVP_CIPHER_CTX_buf_noconst ( c ) [ arg - 2 ] << 8 | EVP_CIPHER_CTX_buf_noconst ( c ) [ arg - 1 ] ;
if ( len < EVP_GCM_TLS_EXPLICIT_IV_LEN ) return 0 ;
len -= EVP_GCM_TLS_EXPLICIT_IV_LEN ;
if ( ! EVP_CIPHER_CTX_encrypting ( c ) ) {
if ( len < EVP_GCM_TLS_TAG_LEN ) return 0 ;
len -= EVP_GCM_TLS_TAG_LEN ;
}
EVP_CIPHER_CTX_buf_noconst ( c ) [ arg - 2 ] = len >> 8 ;
EVP_CIPHER_CTX_buf_noconst ( c ) [ arg - 1 ] = len & 0xff ;
}
return EVP_GCM_TLS_TAG_LEN ;
case EVP_CTRL_COPY : {
EVP_CIPHER_CTX * out = ptr ;
EVP_AES_GCM_CTX * gctx_out = EVP_C_DATA ( EVP_AES_GCM_CTX , out ) ;
if ( gctx -> gcm . key ) {
if ( gctx -> gcm . key != & gctx -> ks ) return 0 ;
gctx_out -> gcm . key = & gctx_out -> ks ;
}
if ( gctx -> iv == EVP_CIPHER_CTX_iv_noconst ( c ) ) gctx_out -> iv = EVP_CIPHER_CTX_iv_noconst ( out ) ;
else {
gctx_out -> iv = OPENSSL_malloc ( gctx -> ivlen ) ;
if ( gctx_out -> iv == NULL ) return 0 ;
memcpy ( gctx_out -> iv , gctx -> iv , gctx -> ivlen ) ;
}
return 1 ;
}
default : return - 1 ;
}
}
static int aes_gcm_init_key ( EVP_CIPHER_CTX * ctx , const unsigned char * key , const unsigned char * iv , int enc ) {
EVP_AES_GCM_CTX * gctx = EVP_C_DATA ( EVP_AES_GCM_CTX , ctx ) ;
if ( ! iv && ! key ) return 1 ;
if ( key ) {
do {
# ifdef HWAES_CAPABLE if ( HWAES_CAPABLE ) {
HWAES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & gctx -> ks . ks ) ;
CRYPTO_gcm128_init ( & gctx -> gcm , & gctx -> ks , ( block128_f ) HWAES_encrypt ) ;
# ifdef HWAES_ctr32_encrypt_blocks gctx -> ctr = ( ctr128_f ) HWAES_ctr32_encrypt_blocks ;
# else gctx -> ctr = NULL ;
# endif break ;
}
else # endif # ifdef BSAES_CAPABLE if ( BSAES_CAPABLE ) {
AES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & gctx -> ks . ks ) ;
CRYPTO_gcm128_init ( & gctx -> gcm , & gctx -> ks , ( block128_f ) AES_encrypt ) ;
gctx -> ctr = ( ctr128_f ) bsaes_ctr32_encrypt_blocks ;
break ;
}
else # endif # ifdef VPAES_CAPABLE if ( VPAES_CAPABLE ) {
vpaes_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & gctx -> ks . ks ) ;
CRYPTO_gcm128_init ( & gctx -> gcm , & gctx -> ks , ( block128_f ) vpaes_encrypt ) ;
gctx -> ctr = NULL ;
break ;
}
else # endif ( void ) 0 ;
AES_set_encrypt_key ( key , EVP_CIPHER_CTX_key_length ( ctx ) * 8 , & gctx -> ks . ks ) ;
CRYPTO_gcm128_init ( & gctx -> gcm , & gctx -> ks , ( block128_f ) AES_encrypt ) ;
# ifdef AES_CTR_ASM gctx -> ctr = ( ctr128_f ) AES_ctr32_encrypt ;
# else gctx -> ctr = NULL ;
# endif }
while ( 0 ) ;
if ( iv == NULL && gctx -> iv_set ) iv = gctx -> iv ;
if ( iv ) {
CRYPTO_gcm128_setiv ( & gctx -> gcm , iv , gctx -> ivlen ) ;
gctx -> iv_set = 1 ;
}
gctx -> key_set = 1 ;
}
else {
if ( gctx -> key_set ) CRYPTO_gcm128_setiv ( & gctx -> gcm , iv , gctx -> ivlen ) ;
else memcpy ( gctx -> iv , iv , gctx -> ivlen ) ;
gctx -> iv_set = 1 ;
gctx -> iv_gen = 0 ;
}
return 1 ;
}
static int aes_gcm_tls_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_GCM_CTX * gctx = EVP_C_DATA ( EVP_AES_GCM_CTX , ctx ) ;
int rv = - 1 ;
if ( out != in || len < ( EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN ) ) return - 1 ;
if ( EVP_CIPHER_CTX_ctrl ( ctx , EVP_CIPHER_CTX_encrypting ( ctx ) ? EVP_CTRL_GCM_IV_GEN : EVP_CTRL_GCM_SET_IV_INV , EVP_GCM_TLS_EXPLICIT_IV_LEN , out ) <= 0 ) goto err ;
if ( CRYPTO_gcm128_aad ( & gctx -> gcm , EVP_CIPHER_CTX_buf_noconst ( ctx ) , gctx -> tls_aad_len ) ) goto err ;
in += EVP_GCM_TLS_EXPLICIT_IV_LEN ;
out += EVP_GCM_TLS_EXPLICIT_IV_LEN ;
len -= EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN ;
if ( EVP_CIPHER_CTX_encrypting ( ctx ) ) {
if ( gctx -> ctr ) {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM ) if ( len >= 32 && AES_GCM_ASM ( gctx ) ) {
if ( CRYPTO_gcm128_encrypt ( & gctx -> gcm , NULL , NULL , 0 ) ) return - 1 ;
bulk = AES_gcm_encrypt ( in , out , len , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
}
# endif if ( CRYPTO_gcm128_encrypt_ctr32 ( & gctx -> gcm , in + bulk , out + bulk , len - bulk , gctx -> ctr ) ) goto err ;
}
else {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM2 ) if ( len >= 32 && AES_GCM_ASM2 ( gctx ) ) {
if ( CRYPTO_gcm128_encrypt ( & gctx -> gcm , NULL , NULL , 0 ) ) return - 1 ;
bulk = AES_gcm_encrypt ( in , out , len , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
}
# endif if ( CRYPTO_gcm128_encrypt ( & gctx -> gcm , in + bulk , out + bulk , len - bulk ) ) goto err ;
}
out += len ;
CRYPTO_gcm128_tag ( & gctx -> gcm , out , EVP_GCM_TLS_TAG_LEN ) ;
rv = len + EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN ;
}
else {
if ( gctx -> ctr ) {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM ) if ( len >= 16 && AES_GCM_ASM ( gctx ) ) {
if ( CRYPTO_gcm128_decrypt ( & gctx -> gcm , NULL , NULL , 0 ) ) return - 1 ;
bulk = AES_gcm_decrypt ( in , out , len , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
}
# endif if ( CRYPTO_gcm128_decrypt_ctr32 ( & gctx -> gcm , in + bulk , out + bulk , len - bulk , gctx -> ctr ) ) goto err ;
}
else {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM2 ) if ( len >= 16 && AES_GCM_ASM2 ( gctx ) ) {
if ( CRYPTO_gcm128_decrypt ( & gctx -> gcm , NULL , NULL , 0 ) ) return - 1 ;
bulk = AES_gcm_decrypt ( in , out , len , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
}
# endif if ( CRYPTO_gcm128_decrypt ( & gctx -> gcm , in + bulk , out + bulk , len - bulk ) ) goto err ;
}
CRYPTO_gcm128_tag ( & gctx -> gcm , EVP_CIPHER_CTX_buf_noconst ( ctx ) , EVP_GCM_TLS_TAG_LEN ) ;
if ( CRYPTO_memcmp ( EVP_CIPHER_CTX_buf_noconst ( ctx ) , in + len , EVP_GCM_TLS_TAG_LEN ) ) {
OPENSSL_cleanse ( out , len ) ;
goto err ;
}
rv = len ;
}
err : gctx -> iv_set = 0 ;
gctx -> tls_aad_len = - 1 ;
return rv ;
}
static int aes_gcm_cipher ( EVP_CIPHER_CTX * ctx , unsigned char * out , const unsigned char * in , size_t len ) {
EVP_AES_GCM_CTX * gctx = EVP_C_DATA ( EVP_AES_GCM_CTX , ctx ) ;
if ( ! gctx -> key_set ) return - 1 ;
if ( gctx -> tls_aad_len >= 0 ) return aes_gcm_tls_cipher ( ctx , out , in , len ) ;
if ( ! gctx -> iv_set ) return - 1 ;
if ( in ) {
if ( out == NULL ) {
if ( CRYPTO_gcm128_aad ( & gctx -> gcm , in , len ) ) return - 1 ;
}
else if ( EVP_CIPHER_CTX_encrypting ( ctx ) ) {
if ( gctx -> ctr ) {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM ) if ( len >= 32 && AES_GCM_ASM ( gctx ) ) {
size_t res = ( 16 - gctx -> gcm . mres ) % 16 ;
if ( CRYPTO_gcm128_encrypt ( & gctx -> gcm , in , out , res ) ) return - 1 ;
bulk = AES_gcm_encrypt ( in + res , out + res , len - res , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
bulk += res ;
}
# endif if ( CRYPTO_gcm128_encrypt_ctr32 ( & gctx -> gcm , in + bulk , out + bulk , len - bulk , gctx -> ctr ) ) return - 1 ;
}
else {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM2 ) if ( len >= 32 && AES_GCM_ASM2 ( gctx ) ) {
size_t res = ( 16 - gctx -> gcm . mres ) % 16 ;
if ( CRYPTO_gcm128_encrypt ( & gctx -> gcm , in , out , res ) ) return - 1 ;
bulk = AES_gcm_encrypt ( in + res , out + res , len - res , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
bulk += res ;
}
# endif if ( CRYPTO_gcm128_encrypt ( & gctx -> gcm , in + bulk , out + bulk , len - bulk ) ) return - 1 ;
}
}
else {
if ( gctx -> ctr ) {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM ) if ( len >= 16 && AES_GCM_ASM ( gctx ) ) {
size_t res = ( 16 - gctx -> gcm . mres ) % 16 ;
if ( CRYPTO_gcm128_decrypt ( & gctx -> gcm , in , out , res ) ) return - 1 ;
bulk = AES_gcm_decrypt ( in + res , out + res , len - res , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
bulk += res ;
}
# endif if ( CRYPTO_gcm128_decrypt_ctr32 ( & gctx -> gcm , in + bulk , out + bulk , len - bulk , gctx -> ctr ) ) return - 1 ;
}
else {
size_t bulk = 0 ;
# if defined ( AES_GCM_ASM2 ) if ( len >= 16 && AES_GCM_ASM2 ( gctx ) ) {
size_t res = ( 16 - gctx -> gcm . mres ) % 16 ;
if ( CRYPTO_gcm128_decrypt ( & gctx -> gcm , in , out , res ) ) return - 1 ;
bulk = AES_gcm_decrypt ( in + res , out + res , len - res , gctx -> gcm . key , gctx -> gcm . Yi . c , gctx -> gcm . Xi . u ) ;
gctx -> gcm . len . u [ 1 ] += bulk ;
bulk += res ;
}
# endif if ( CRYPTO_gcm128_decrypt ( & gctx -> gcm , in + bulk , out + bulk , len - bulk ) ) return - 1 ;
}
}
return len ;
}
else {
if ( ! EVP_CIPHER_CTX_encrypting ( ctx ) ) {
if ( gctx -> taglen < 0 ) return - 1 ;
if ( CRYPTO_gcm128_finish ( & gctx -> gcm , EVP_CIPHER_CTX_buf_noconst ( ctx ) , gctx -> taglen ) != 0 ) return - 1 ;
gctx -> iv_set = 0 ;
return 0 ;
}
CRYPTO_gcm128_tag ( & gctx -> gcm , EVP_CIPHER_CTX_buf_noconst ( ctx ) , 16 ) ;
gctx -> taglen = 16 ;
gctx -> iv_set = 0 ;
return 0 ;
}
}
# define CUSTOM_FLAGS ( EVP_CIPH_FLAG_DEFAULT_ASN1 \ | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT \ | EVP_CIPH_CUSTOM_COPY ) BLOCK_CIPHER_custom ( NID_aes , 128 , 1 , 12 , gcm , GCM , EVP_CIPH_FLAG_AEAD_CIPHER | CUSTOM_FLAGS ) BLOCK_CIPHER_custom ( NID_aes , 192 , 1 , 12 , gcm , GCM , EVP_CIPH_FLAG_AEAD_CIPHER | CUSTOM_FLAGS ) |
-6,552,851,419,396,579,000 | debian | 6 | 0 | static int SpoolssGeneric_r ( tvbuff_t * tvb , int offset , packet_info * pinfo , proto_tree * tree , dcerpc_info * di , guint8 * drep _U_ ) {
int len = tvb_reported_length ( tvb ) ;
proto_tree_add_expert ( tree , pinfo , & ei_unimplemented_dissector , tvb , offset , 0 ) ;
offset = dissect_doserror ( tvb , len - 4 , pinfo , tree , di , drep , hf_rc , NULL ) ;
return offset ;
} |
-4,239,386,405,881,995,300 | chrome | 25 | 0 | xmlHashTablePtr xmlHashCopy ( xmlHashTablePtr table , xmlHashCopier f ) {
int i ;
xmlHashEntryPtr iter ;
xmlHashEntryPtr next ;
xmlHashTablePtr ret ;
if ( table == NULL ) return ( NULL ) ;
if ( f == NULL ) return ( NULL ) ;
ret = xmlHashCreate ( table -> size ) ;
if ( ret == NULL ) return ( NULL ) ;
if ( table -> table ) {
for ( i = 0 ;
i < table -> size ;
i ++ ) {
if ( table -> table [ i ] . valid == 0 ) continue ;
iter = & ( table -> table [ i ] ) ;
while ( iter ) {
next = iter -> next ;
xmlHashAddEntry3 ( ret , iter -> name , iter -> name2 , iter -> name3 , f ( iter -> payload , iter -> name ) ) ;
iter = next ;
}
}
}
ret -> nbElems = table -> nbElems ;
return ( ret ) ;
} |
-8,884,965,407,551,054,000 | debian | 21 | 0 | static void DecoderPlaySpu ( decoder_t * p_dec , subpicture_t * p_subpic ) {
decoder_owner_sys_t * p_owner = p_dec -> p_owner ;
vout_thread_t * p_vout = p_owner -> p_spu_vout ;
if ( p_subpic -> i_start <= VLC_TS_INVALID ) {
msg_Warn ( p_dec , "non-dated spu buffer received" ) ;
subpicture_Delete ( p_subpic ) ;
return ;
}
vlc_mutex_lock ( & p_owner -> lock ) ;
if ( p_owner -> b_waiting ) {
p_owner -> b_has_data = true ;
vlc_cond_signal ( & p_owner -> wait_acknowledge ) ;
}
bool b_reject = DecoderWaitUnblock ( p_dec ) ;
DecoderFixTs ( p_dec , & p_subpic -> i_start , & p_subpic -> i_stop , NULL , NULL , INT64_MAX ) ;
if ( p_subpic -> i_start <= VLC_TS_INVALID ) b_reject = true ;
DecoderWaitDate ( p_dec , & b_reject , p_subpic -> i_start - SPU_MAX_PREPARE_TIME ) ;
vlc_mutex_unlock ( & p_owner -> lock ) ;
if ( ! b_reject ) vout_PutSubpicture ( p_vout , p_subpic ) ;
else subpicture_Delete ( p_subpic ) ;
} |
-769,658,847,024,738,700 | debian | 13 | 0 | static gpgme_error_t uiserver_cancel ( void * engine ) {
engine_uiserver_t uiserver = engine ;
if ( ! uiserver ) return gpg_error ( GPG_ERR_INV_VALUE ) ;
if ( uiserver -> status_cb . fd != - 1 ) _gpgme_io_close ( uiserver -> status_cb . fd ) ;
if ( uiserver -> input_cb . fd != - 1 ) _gpgme_io_close ( uiserver -> input_cb . fd ) ;
if ( uiserver -> output_cb . fd != - 1 ) _gpgme_io_close ( uiserver -> output_cb . fd ) ;
if ( uiserver -> message_cb . fd != - 1 ) _gpgme_io_close ( uiserver -> message_cb . fd ) ;
if ( uiserver -> assuan_ctx ) {
assuan_release ( uiserver -> assuan_ctx ) ;
uiserver -> assuan_ctx = NULL ;
}
return 0 ;
} |
-4,719,501,675,862,911,000 | debian | 7 | 0 | static void update_unicast_addr ( unicast_addr_t * req_addr , unicast_addr_t * ack_addr ) {
if ( ack_addr -> addr . type != AT_NONE && ack_addr -> port != 0 ) {
memcpy ( req_addr -> addr_buf , ack_addr -> addr_buf , sizeof ( req_addr -> addr_buf ) ) ;
SET_ADDRESS ( & req_addr -> addr , ack_addr -> addr . type , ack_addr -> addr . len , req_addr -> addr_buf ) ;
req_addr -> port = ack_addr -> port ;
}
} |
1,981,604,082,870,872,600 | chrome | 12 | 0 | static int32_t u_printf_char_handler ( const u_printf_stream_handler * handler , void * context , ULocaleBundle * formatBundle , const u_printf_spec_info * info , const ufmt_args * args ) {
( void ) formatBundle ;
UChar s [ U16_MAX_LENGTH + 1 ] ;
int32_t len = 1 , written ;
unsigned char arg = ( unsigned char ) ( args [ 0 ] . int64Value ) ;
ufmt_defaultCPToUnicode ( ( const char * ) & arg , 2 , s , UPRV_LENGTHOF ( s ) ) ;
if ( arg != 0 ) {
len = u_strlen ( s ) ;
}
written = handler -> pad_and_justify ( context , info , s , len ) ;
return written ;
} |
7,092,216,800,726,730,000 | debian | 5 | 0 | static int dissect_h245_T_h223_al_type_al2WithSequenceNumbers ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
# line 309 "../../asn1/h245/h245.cnf" if ( h223_lc_params_temp ) h223_lc_params_temp -> al_type = al2WithSequenceNumbers ;
offset = dissect_per_null ( tvb , offset , actx , tree , hf_index ) ;
return offset ;
} |
5,357,882,892,791,796,000 | debian | 3 | 0 | static void e1000e_set_dlen ( E1000ECore * core , int index , uint32_t val ) {
core -> mac [ index ] = val & E1000_XDLEN_MASK ;
} |
3,668,456,668,028,960,000 | debian | 16 | 0 | static void generate_json_float ( FBuffer * buffer , VALUE Vstate , JSON_Generator_State * state , VALUE obj ) {
double value = RFLOAT_VALUE ( obj ) ;
char allow_nan = state -> allow_nan ;
VALUE tmp = rb_funcall ( obj , i_to_s , 0 ) ;
if ( ! allow_nan ) {
if ( isinf ( value ) ) {
fbuffer_free ( buffer ) ;
rb_raise ( eGeneratorError , "%u: %" PRIsVALUE " not allowed in JSON" , __LINE__ , RB_OBJ_STRING ( tmp ) ) ;
}
else if ( isnan ( value ) ) {
fbuffer_free ( buffer ) ;
rb_raise ( eGeneratorError , "%u: %" PRIsVALUE " not allowed in JSON" , __LINE__ , RB_OBJ_STRING ( tmp ) ) ;
}
}
fbuffer_append_str ( buffer , tmp ) ;
} |
-8,721,757,784,652,752,000 | debian | 3 | 0 | static int jpc_calcssexp ( jpc_fix_t stepsize ) {
return jpc_firstone ( stepsize ) - JPC_FIX_FRACBITS ;
} |
7,092,216,800,726,730,000 | debian | 4 | 0 | static int dissect_h245_T_containedThreads ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_constrained_sequence_of ( tvb , offset , actx , tree , hf_index , ett_h245_T_containedThreads , T_containedThreads_sequence_of , 1 , 256 , FALSE ) ;
return offset ;
} |
5,366,785,327,268,799,000 | chrome | 3 | 0 | IN_PROC_BROWSER_TEST_F ( MimeHandlerViewTest , NonAsciiHeaders ) {
RunTest ( "testNonAsciiHeaders.csv" ) ;
} |
1,312,888,211,311,687,000 | debian | 8 | 0 | static int lbmpdm_get_segment_length ( tvbuff_t * tvb , int offset , int encoding , int * data_length ) {
guint32 datalen = 0 ;
int seglen = 0 ;
datalen = lbmpdm_fetch_uint32_encoded ( tvb , offset + O_LBMPDM_SEG_HDR_T_LEN , encoding ) ;
seglen = ( ( int ) datalen ) + L_LBMPDM_SEG_HDR_T ;
* data_length = ( int ) datalen ;
return ( seglen ) ;
} |
8,084,418,997,489,372,000 | chrome | 3 | 0 | static hb_codepoint_t hb_icu_unicode_mirroring ( hb_unicode_funcs_t * ufuncs HB_UNUSED , hb_codepoint_t unicode , void * user_data HB_UNUSED ) {
return u_charMirror ( unicode ) ;
} |
252,275,190,935,145,020 | debian | 93 | 0 | static const uint8_t * decode_tiles_mt ( VP9Decoder * pbi , const uint8_t * data , const uint8_t * data_end ) {
VP9_COMMON * const cm = & pbi -> common ;
const VP9WorkerInterface * const winterface = vp9_get_worker_interface ( ) ;
const uint8_t * bit_reader_end = NULL ;
const int aligned_mi_cols = mi_cols_aligned_to_sb ( cm -> mi_cols ) ;
const int tile_cols = 1 << cm -> log2_tile_cols ;
const int tile_rows = 1 << cm -> log2_tile_rows ;
const int num_workers = MIN ( pbi -> max_threads & ~ 1 , tile_cols ) ;
TileBuffer tile_buffers [ 1 ] [ 1 << 6 ] ;
int n ;
int final_worker = - 1 ;
assert ( tile_cols <= ( 1 << 6 ) ) ;
assert ( tile_rows == 1 ) ;
( void ) tile_rows ;
if ( pbi -> num_tile_workers == 0 ) {
const int num_threads = pbi -> max_threads & ~ 1 ;
int i ;
CHECK_MEM_ERROR ( cm , pbi -> tile_workers , vpx_malloc ( num_threads * sizeof ( * pbi -> tile_workers ) ) ) ;
for ( i = 0 ;
i < num_threads ;
++ i ) {
VP9Worker * const worker = & pbi -> tile_workers [ i ] ;
++ pbi -> num_tile_workers ;
winterface -> init ( worker ) ;
CHECK_MEM_ERROR ( cm , worker -> data1 , vpx_memalign ( 32 , sizeof ( TileWorkerData ) ) ) ;
CHECK_MEM_ERROR ( cm , worker -> data2 , vpx_malloc ( sizeof ( TileInfo ) ) ) ;
if ( i < num_threads - 1 && ! winterface -> reset ( worker ) ) {
vpx_internal_error ( & cm -> error , VPX_CODEC_ERROR , "Tile decoder thread creation failed" ) ;
}
}
}
for ( n = 0 ;
n < num_workers ;
++ n ) {
pbi -> tile_workers [ n ] . hook = ( VP9WorkerHook ) tile_worker_hook ;
}
vpx_memset ( cm -> above_context , 0 , sizeof ( * cm -> above_context ) * MAX_MB_PLANE * 2 * aligned_mi_cols ) ;
vpx_memset ( cm -> above_seg_context , 0 , sizeof ( * cm -> above_seg_context ) * aligned_mi_cols ) ;
get_tile_buffers ( pbi , data , data_end , tile_cols , tile_rows , tile_buffers ) ;
qsort ( tile_buffers [ 0 ] , tile_cols , sizeof ( tile_buffers [ 0 ] [ 0 ] ) , compare_tile_buffers ) ;
{
int group_start = 0 ;
while ( group_start < tile_cols ) {
const TileBuffer largest = tile_buffers [ 0 ] [ group_start ] ;
const int group_end = MIN ( group_start + num_workers , tile_cols ) - 1 ;
memmove ( tile_buffers [ 0 ] + group_start , tile_buffers [ 0 ] + group_start + 1 , ( group_end - group_start ) * sizeof ( tile_buffers [ 0 ] [ 0 ] ) ) ;
tile_buffers [ 0 ] [ group_end ] = largest ;
group_start = group_end + 1 ;
}
}
n = 0 ;
while ( n < tile_cols ) {
int i ;
for ( i = 0 ;
i < num_workers && n < tile_cols ;
++ i ) {
VP9Worker * const worker = & pbi -> tile_workers [ i ] ;
TileWorkerData * const tile_data = ( TileWorkerData * ) worker -> data1 ;
TileInfo * const tile = ( TileInfo * ) worker -> data2 ;
TileBuffer * const buf = & tile_buffers [ 0 ] [ n ] ;
tile_data -> cm = cm ;
tile_data -> xd = pbi -> mb ;
tile_data -> xd . corrupted = 0 ;
vp9_tile_init ( tile , tile_data -> cm , 0 , buf -> col ) ;
setup_token_decoder ( buf -> data , data_end , buf -> size , & cm -> error , & tile_data -> bit_reader , pbi -> decrypt_cb , pbi -> decrypt_state ) ;
init_macroblockd ( cm , & tile_data -> xd ) ;
vp9_zero ( tile_data -> xd . dqcoeff ) ;
worker -> had_error = 0 ;
if ( i == num_workers - 1 || n == tile_cols - 1 ) {
winterface -> execute ( worker ) ;
}
else {
winterface -> launch ( worker ) ;
}
if ( buf -> col == tile_cols - 1 ) {
final_worker = i ;
}
++ n ;
}
for ( ;
i > 0 ;
-- i ) {
VP9Worker * const worker = & pbi -> tile_workers [ i - 1 ] ;
pbi -> mb . corrupted |= ! winterface -> sync ( worker ) ;
}
if ( final_worker > - 1 ) {
TileWorkerData * const tile_data = ( TileWorkerData * ) pbi -> tile_workers [ final_worker ] . data1 ;
bit_reader_end = vp9_reader_find_end ( & tile_data -> bit_reader ) ;
final_worker = - 1 ;
}
}
return bit_reader_end ;
} |
4,489,017,523,191,997,000 | debian | 4 | 0 | static int dissect_h225_NonStandardProtocol ( tvbuff_t * tvb _U_ , int offset _U_ , asn1_ctx_t * actx _U_ , proto_tree * tree _U_ , int hf_index _U_ ) {
offset = dissect_per_sequence ( tvb , offset , actx , tree , hf_index , ett_h225_NonStandardProtocol , NonStandardProtocol_sequence ) ;
return offset ;
} |
6,336,384,260,629,386,000 | debian | 84 | 0 | void proto_register_zbee_zcl_power_config ( void ) {
static hf_register_info hf [ ] = {
{
& hf_zbee_zcl_power_config_attr_id , {
"Attribute" , "zbee_zcl_general.power_config.attr_id" , FT_UINT16 , BASE_HEX , VALS ( zbee_zcl_power_config_attr_names ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_type , {
"Battery Type" , "zbee_zcl_general.power_config.attr.batt_type" , FT_UINT8 , BASE_HEX , VALS ( zbee_zcl_power_config_batt_type_names ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_alarm_mask , {
"Mains Alarm Mask" , "zbee_zcl_general.power_config.attr.mains_alarm_mask" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_alarm_mask_low , {
"Mains Voltage too low" , "zbee_zcl_general.power_config.attr.mains_alarm_mask.mains_too_low" , FT_UINT8 , BASE_DEC , NULL , ZBEE_ZCL_POWER_CONF_MAINS_ALARM_LOW , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_alarm_mask_high , {
"Mains Voltage too high" , "zbee_zcl_general.power_config.attr.mains_alarm_mask.mains_too_high" , FT_UINT8 , BASE_DEC , NULL , ZBEE_ZCL_POWER_CONF_MAINS_ALARM_HIGH , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_alarm_mask_reserved , {
"Reserved" , "zbee_zcl_general.power_config.attr.mains_alarm_mask.reserved" , FT_UINT8 , BASE_DEC , NULL , ZBEE_ZCL_POWER_CONF_MAINS_ALARM_RESERVED , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_alarm_mask , {
"Battery Alarm Mask" , "zbee_zcl_general.power_config.attr.batt_alarm_mask" , FT_UINT8 , BASE_HEX , NULL , 0x0 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_alarm_mask_low , {
"Battery Voltage too low" , "zbee_zcl_general.power_config.batt_attr.alarm_mask.batt_too_low" , FT_UINT8 , BASE_DEC , NULL , ZBEE_ZCL_POWER_CONF_BATTERY_ALARM_LOW , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_alarm_mask_reserved , {
"Reserved" , "zbee_zcl_general.power_config.attr.batt_alarm_mask.reserved" , FT_UINT8 , BASE_DEC , NULL , ZBEE_ZCL_POWER_CONF_BATTERY_ALARM_RESERVED , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_voltage , {
"Measured Mains Voltage" , "zbee_zcl_general.power_config.attr.mains_voltage" , FT_UINT16 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_voltage ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_frequency , {
"Measured Mains Frequency" , "zbee_zcl_general.power_config.attr.mains_frequency" , FT_UINT8 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_frequency ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_voltage_min_thr , {
"Mains Voltage Minimum Threshold" , "zbee_zcl_general.power_config.attr.mains_volt_min" , FT_UINT16 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_voltage ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_voltage_max_thr , {
"Mains Voltage Maximum Threshold" , "zbee_zcl_general.power_config.attr.mains_volt_max" , FT_UINT16 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_voltage ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_voltage , {
"Measured Battey Voltage" , "zbee_zcl_general.power_config.attr.batt_voltage" , FT_UINT8 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_voltage ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_ah_rating , {
"Battery Capacity" , "zbee_zcl_general.power_config.attr.batt_AHr" , FT_UINT16 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_batt_AHr ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_rated_voltage , {
"Battery Rated Voltage" , "zbee_zcl_general.power_config.attr.batt_rated_voltage" , FT_UINT8 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_voltage ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_batt_voltage_min_thr , {
"Battery Voltage Minimum Threshold" , "zbee_zcl_general.power_config.attr.batt_voltage_min_thr" , FT_UINT8 , BASE_CUSTOM , CF_FUNC ( decode_power_conf_voltage ) , 0x00 , NULL , HFILL }
}
, {
& hf_zbee_zcl_power_config_mains_voltage_dwell_tp , {
"Mains Voltage Dwell Trip Point" , "zbee_zcl_general.power_config.attr.mains_dwell_tp" , FT_UINT16 , BASE_DEC , NULL , 0x00 , NULL , HFILL }
}
, }
;
static gint * ett [ ] = {
& ett_zbee_zcl_power_config , & ett_zbee_zcl_power_config_mains_alarm_mask , & ett_zbee_zcl_power_config_batt_alarm_mask }
;
proto_zbee_zcl_power_config = proto_register_protocol ( "ZigBee ZCL Power Configuration" , "ZCL Power Configuration" , ZBEE_PROTOABBREV_ZCL_POWER_CONFIG ) ;
proto_register_field_array ( proto_zbee_zcl_power_config , hf , array_length ( hf ) ) ;
proto_register_subtree_array ( ett , array_length ( ett ) ) ;
register_dissector ( ZBEE_PROTOABBREV_ZCL_POWER_CONFIG , dissect_zbee_zcl_power_config , proto_zbee_zcl_power_config ) ;
} |
Subsets and Splits