/external/oprofile/libop/ |
op_xml_out.c | 98 char tmp_buf[MAX_BUF_LEN]; local 100 if (max_len >= sizeof(tmp_buf)) 103 if (snprintf(tmp_buf, sizeof(tmp_buf), "<%s%s", tag_name, 108 strncat(buffer, tmp_buf, sizeof(tmp_buf)); 116 char tmp_buf[MAX_BUF_LEN]; local 118 if (max_len >= sizeof(tmp_buf)) 122 if (snprintf(tmp_buf, sizeof(tmp_buf), "%s\n", (has_nested ? ">" : "/>")) < 0) 139 char tmp_buf[MAX_BUF_LEN]; local 160 char tmp_buf[MAX_BUF_LEN]; local 219 char tmp_buf[MAX_BUF_LEN]; local [all...] |
/external/opencore/codecs_v2/audio/gsm_amr/amr_nb/common/src/ |
vad1.cpp | 618 Word16 tmp_buf[FRAME_LEN]; local 622 first_filter_stage(in, tmp_buf, st->a_data5[0], pOverflow); 626 filter5(&tmp_buf[4*i], &tmp_buf[4*i+2], st->a_data5[1], pOverflow); 627 filter5(&tmp_buf[4*i+1], &tmp_buf[4*i+3], st->a_data5[2], pOverflow); 631 filter3(&tmp_buf[8*i+0], &tmp_buf[8*i+4], &st->a_data3[0], pOverflow); 632 filter3(&tmp_buf[8*i+2], &tmp_buf[8*i+6], &st->a_data3[1], pOverflow) [all...] |
/external/openssl/crypto/x509/ |
x509_obj.c | 77 char tmp_buf[80]; local 109 i2t_ASN1_OBJECT(tmp_buf,sizeof(tmp_buf),ne->object); 110 s=tmp_buf;
|
/frameworks/base/media/libstagefright/codecs/amrnb/common/src/ |
vad1.cpp | 621 Word16 tmp_buf[FRAME_LEN]; local 625 first_filter_stage(in, tmp_buf, st->a_data5[0], pOverflow); 629 filter5(&tmp_buf[4*i], &tmp_buf[4*i+2], st->a_data5[1], pOverflow); 630 filter5(&tmp_buf[4*i+1], &tmp_buf[4*i+3], st->a_data5[2], pOverflow); 634 filter3(&tmp_buf[8*i+0], &tmp_buf[8*i+4], &st->a_data3[0], pOverflow); 635 filter3(&tmp_buf[8*i+2], &tmp_buf[8*i+6], &st->a_data3[1], pOverflow) [all...] |
/external/openssl/ssl/ |
d1_clnt.c | 796 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 814 tmp_buf[0]=s->client_version>>8; 815 tmp_buf[1]=s->client_version&0xff; 816 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) 819 s->session->master_key_length=sizeof tmp_buf; 825 n=RSA_public_encrypt(sizeof tmp_buf, 826 tmp_buf,p,rsa,RSA_PKCS1_PADDING); 829 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; 847 tmp_buf,sizeof tmp_buf) 862 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local [all...] |
s3_clnt.c | 1947 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 2013 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local [all...] |
/external/openssl/crypto/evp/ |
digest.c | 365 unsigned char *tmp_buf; local 382 tmp_buf = out->md_data; 385 else tmp_buf = NULL; 391 if (tmp_buf) 392 out->md_data = tmp_buf;
|
/hardware/broadcom/wlan/bcm4329/src/bcmsdio/sys/ |
bcmsdh.c | 321 uint8 *tmp_buf, *tmp_ptr; local 337 if ((tmp_buf = (uint8 *)MALLOC(bcmsdh->osh, length)) == NULL) { 341 bcopy(cis, tmp_buf, length); 342 for (tmp_ptr = tmp_buf, ptr = cis; ptr < (cis + length - 4); tmp_ptr++) { 344 if ((((tmp_ptr - tmp_buf) + 1) & 0xf) == 0) 347 MFREE(bcmsdh->osh, tmp_buf, length);
|
/external/qemu/ |
block.c | 622 uint8_t tmp_buf[SECTOR_SIZE]; local 633 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) 635 memcpy(buf, tmp_buf + (offset & (SECTOR_SIZE - 1)), len); 656 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) 658 memcpy(buf, tmp_buf, count); 666 uint8_t tmp_buf[SECTOR_SIZE]; local 677 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) 679 memcpy(tmp_buf + (offset & (SECTOR_SIZE - 1)), buf, len); 680 if (bdrv_write(bs, sector_num, tmp_buf, 1) < 0) 702 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0 [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/CUDK/CLI/ |
cu_cmd.c | 493 static char tmp_buf[MAX_SSID_LEN+1]; local 501 memcpy(tmp_buf, ssid->Ssid, MAX_SSID_LEN ); 502 tmp_buf[MAX_SSID_LEN] = 0; 503 return tmp_buf; [all...] |