/bootable/bootloader/legacy/libc/ |
strlen.c | 31 int len = 0; local 32 while(*s++) len++; 33 return len;
|
memcmp.c | 29 int memcmp(void *_a, void *_b, unsigned len) 34 while(len-- > 0) {
|
memcpy.c | 29 void *memcpy(void *_dst, const void *_src, unsigned len) 33 while(len-- > 0) {
|
/system/wlan/ti/sta_dk_4_0_4_32/pform/linux/src/ |
proc_stat.c | 61 int len=0; local 68 len += (len<count)?sprintf(page+len,"-------------- STA Health Configuration ---------------\n"):0; 69 len += (len<count)?sprintf(page+len,"Full recovery enabled = %d\n",pHealthMonitor->bFullRecoveryEnable):0; 70 len += (len<count)?sprintf(page+len,"Timer interval = %d msec\n",pHealthMonitor->timerInterval):0 [all...] |
/external/dropbear/libtomcrypt/src/misc/ |
burn_stack.c | 20 @param len amount of stack to burn in bytes 22 void burn_stack(unsigned long len) 26 if (len > (unsigned long)sizeof(buf)) 27 burn_stack(len - sizeof(buf));
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/utf8/ |
der_length_utf8_string.c | 46 unsigned long x, len; local 51 len = 0; 56 len += der_utf8_charsize(in[x]); 59 if (len < 128) { 61 *outlen = 2 + len; 62 } else if (len < 256) { 64 *outlen = 3 + len; 65 } else if (len < 65536UL) { 67 *outlen = 4 + len; 68 } else if (len < 16777216UL) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_parse.c | 22 const u8 *pos, u16 len) 26 if (len != 1) { 28 len); 34 if (len != 1) { 36 "length %u", len); 42 if (len != WPS_NONCE_LEN) { 44 "length %u", len); 50 if (len != WPS_NONCE_LEN) { 52 "length %u", len); 58 if (len != WPS_UUID_LEN) 405 u16 type, len; local [all...] |
/external/dropbear/libtomcrypt/src/pk/asn1/der/short_integer/ |
der_length_short_integer.c | 28 unsigned long z, y, len; local 49 len = 1; 52 ++len; 55 len += z; 58 len += (num&(1UL<<((z<<3) - 1))) ? 1 : 0; 61 *outlen = len;
|
/external/dropbear/libtomcrypt/ |
parsenames.pl | 9 $len = length($b); 12 $len = $len + length($obj); 14 if ($len > 100) { 16 $len = length($obj);
|
/bionic/libc/stdio/ |
fgets.c | 47 size_t len; local 69 len = fp->_r; 78 if ((int)len > n) 79 len = n; 80 t = memchr((void *)p, '\n', len); 82 len = ++t - p; 83 fp->_r -= len; 85 (void)memcpy((void *)s, (void *)p, len); 86 s[len] = '\0'; 89 fp->_r -= len; [all...] |
/external/apache-http/src/org/apache/http/util/ |
ByteArrayBuffer.java | 46 private int len; field in class:ByteArrayBuffer 58 System.arraycopy(this.buffer, 0, newbuffer, 0, this.len); 62 public void append(final byte[] b, int off, int len) { 66 if ((off < 0) || (off > b.length) || (len < 0) || 67 ((off + len) < 0) || ((off + len) > b.length)) { 70 if (len == 0) { 73 int newlen = this.len + len; 77 System.arraycopy(b, off, this.buffer, this.len, len) 116 append(b.buffer(), off, len); local [all...] |
CharArrayBuffer.java | 48 private int len; field in class:CharArrayBuffer 60 System.arraycopy(this.buffer, 0, newbuffer, 0, this.len); 64 public void append(final char[] b, int off, int len) { 68 if ((off < 0) || (off > b.length) || (len < 0) || 69 ((off + len) < 0) || ((off + len) > b.length)) { 72 if (len == 0) { 75 int newlen = this.len + len; 79 System.arraycopy(b, off, this.buffer, this.len, len) 149 append(b.buffer(), off, len); local [all...] |
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_getiv.c | 23 @param len [in/out] The max size and resulting size of the initial vector 27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc) 30 LTC_ARGCHK(len != NULL); 32 if ((unsigned long)cbc->blocklen > *len) { 33 *len = cbc->blocklen; 37 *len = cbc->blocklen;
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_getiv.c | 23 @param len [in/out] The max size and resulting size of the initial vector 27 int cfb_getiv(unsigned char *IV, unsigned long *len, symmetric_CFB *cfb) 30 LTC_ARGCHK(len != NULL); 32 if ((unsigned long)cfb->blocklen > *len) { 33 *len = cfb->blocklen; 37 *len = cfb->blocklen;
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_getiv.c | 23 @param len [in/out] The max size and resulting size of the initial vector 27 int ctr_getiv(unsigned char *IV, unsigned long *len, symmetric_CTR *ctr) 30 LTC_ARGCHK(len != NULL); 32 if ((unsigned long)ctr->blocklen > *len) { 33 *len = ctr->blocklen; 37 *len = ctr->blocklen;
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_getiv.c | 23 @param len [in/out] The max size and resulting size of the initial vector 27 int f8_getiv(unsigned char *IV, unsigned long *len, symmetric_F8 *f8) 30 LTC_ARGCHK(len != NULL); 32 if ((unsigned long)f8->blocklen > *len) { 33 *len = f8->blocklen; 37 *len = f8->blocklen;
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_getiv.c | 23 @param len Length ... must be at least 16 :-) 27 int lrw_getiv(unsigned char *IV, unsigned long *len, symmetric_LRW *lrw) 30 LTC_ARGCHK(len != NULL); 32 if (*len < 16) { 33 *len = 16; 38 *len = 16;
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_getiv.c | 23 @param len [in/out] The max size and resulting size of the initial vector 27 int ofb_getiv(unsigned char *IV, unsigned long *len, symmetric_OFB *ofb) 30 LTC_ARGCHK(len != NULL); 32 if ((unsigned long)ofb->blocklen > *len) { 33 *len = ofb->blocklen; 37 *len = ofb->blocklen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
chap.c | 26 size_t len[3]; local 29 len[0] = 1; 31 len[1] = secret_len; 33 len[2] = challenge_len; 34 md5_vector(3, addr, len, response);
|