/frameworks/base/libs/utils/ |
String16.cpp | 211 //printf("Char at %p: len=%d, utf-16=%p\n", src, length, (void*)result); 221 size_t len = utf8_char_len(*src); local 222 uint32_t codepoint = utf8_to_utf32((const uint8_t*)src, len); 235 src += len; 273 static char16_t* allocFromUTF8(const char* in, size_t len) 275 if (len == 0) return getEmptyString(); 278 const char* end = in+len; 295 utf8_to_utf16((const uint8_t*)p, len, str, bufSize); 320 String16::String16(const String16& o, size_t len, size_t begin) 323 setTo(o, len, begin) 328 size_t len = strlen16(o); local [all...] |
/external/wpa_supplicant/ |
pcsc_funcs.c | 36 * GET RESPONSE: C0 00 00 <len> 37 * RUN GSM ALG: 88 00 00 00 <RAND len = 10> 38 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN 41 * READ BINARY: B0 <offset high> <offset low> <len> 42 * READ RECORD: B2 <record number> <mode> <len> 236 unsigned char *data, size_t len, 268 "0x%02x len=%d", pos[0], pos[1]); 378 "template (len=%d rlen=%d)", 437 unsigned long len; local 464 ret = SCardListReaders(scard->ctx, NULL, NULL, &len); 711 size_t len, rlen; local 921 size_t len; local 1048 size_t len; local 1148 size_t len; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.c | 36 * GET RESPONSE: C0 00 00 <len> 37 * RUN GSM ALG: 88 00 00 00 <RAND len = 10> 38 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN 41 * READ BINARY: B0 <offset high> <offset low> <len> 42 * READ RECORD: B2 <record number> <mode> <len> 236 unsigned char *data, size_t len, 268 "0x%02x len=%d", pos[0], pos[1]); 378 "template (len=%d rlen=%d)", 437 unsigned long len; local 464 ret = SCardListReaders(scard->ctx, NULL, NULL, &len); 711 size_t len, rlen; local 921 size_t len; local 1048 size_t len; local 1148 size_t len; local [all...] |
/external/opencore/protocols/rtp/src/ |
rtcp_encoder.cpp | 255 if (output_buffer.len < size) 258 output_buffer.len = size; 304 output_buffer.len = outStream.tellg(); 329 if (output_buffer.len < size) 332 output_buffer.len = size; 383 output_buffer.len = outStream.tellg(); 403 uint8 reason_len = (uint8)(bye_packet.reason_string.len & 0xFF); 422 if (output_buffer.len < size) 425 output_buffer.len = size; 482 output_buffer.len = outStream.tellg() 499 uint8 len = (uint8)(item_ptr->content.len & 0xFF); \/\/ limit to 255 characters local 501 outStream << len; local 549 uint32 len = outStream.tellg() - pos; local [all...] |
rtcp_decoder.cpp | 76 int32 remaining_len = input_packet.len; 152 array_of_packets[filled_size++].len = (rtcpLength + 1) * 4; 239 input_packet.len == 0) 244 inStream.Attach(input_packet.ptr, input_packet.len); 322 input_packet.len == 0) 327 inStream.Attach(input_packet.ptr, input_packet.len); 418 input_packet.len == 0) 423 inStream.Attach(input_packet.ptr, input_packet.len); 471 chunk_frag.len = input_packet.len - inStream.tellg() 497 int32 len = chunk_data.len; local 689 int32 len = inStream.PositionInBlock(); local [all...] |
/external/openssl/crypto/camellia/ |
cmll_cbc.c | 69 unsigned long len = length; local 83 while (len >= CAMELLIA_BLOCK_SIZE) 93 len -= CAMELLIA_BLOCK_SIZE; 97 if (len) 99 for(n=0; n < len; ++n) 101 for(n=len; n < CAMELLIA_BLOCK_SIZE; ++n) 114 while (len >= CAMELLIA_BLOCK_SIZE) 124 len -= CAMELLIA_BLOCK_SIZE; 128 if (len) 136 for(n=0; n < len; ++n [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_frag.c | 96 size_t len; local 114 len = buf->l; 116 while (len > 0) { 119 if (len > max_datalen) 122 datalen = len; 140 fraghdr->len = htons(fraglen - sizeof(*hdr)); 143 if (len == datalen) 158 len -= datalen; 185 size_t len; local 199 * frag->len is the frag payload data plus the frag payload header 271 size_t len = 0; local 337 size_t len; local [all...] |
/external/openssl/crypto/asn1/ |
a_bitstr.c | 63 int ASN1_BIT_STRING_set(ASN1_BIT_STRING *x, unsigned char *d, int len) 64 { return M_ASN1_BIT_STRING_set(x, d, len); } 68 int ret,j,bits,len; local 73 len=a->length; 75 if (len > 0) 83 for ( ; len > 0; len--) 85 if (a->data[len-1]) break; 87 j=a->data[len-1]; 102 ret=1+len; [all...] |
a_d2i_fp.c | 91 int len; local 93 len = asn1_d2i_read_bio(in, &b); 94 if(len < 0) goto err; 97 ret=d2i(x,&p,len); 110 int len; local 112 len = asn1_d2i_read_bio(in, &b); 113 if(len < 0) goto err; 116 ret=ASN1_item_d2i(x,&p,len, it); 156 int len=0; local 168 if (want >= (len-off) [all...] |
/bionic/libc/string/ |
strndup.c | 34 int len = slen < n ? slen : n; local 35 char* copy = malloc(len+1); 38 memcpy( copy, s, len ); 39 copy[len] = 0;
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/ |
DerivationFunction.java | 15 public int generateBytes(byte[] out, int outOff, int len)
|
/dalvik/libcore/support/src/test/java/tests/support/ |
Support_ASimpleReader.java | 20 public int len; field in class:Support_ASimpleReader 37 len = buf.length; 52 return len > pos; 60 int available = len - pos;
|
/dalvik/libdex/ |
sha1.h | 17 unsigned long len);
|
/external/bluetooth/bluez/test/ |
test-telephony | 14 if len(sys.argv) < 2: 35 if len(sys.argv) < 3: 45 if len(sys.argv) < 3: 55 if len(sys.argv) < 3: 61 if len(sys.argv) > 3: 70 if len(sys.argv) < 3: 76 if len(sys.argv) > 3: 85 if len(sys.argv) < 3: 96 if len(sys.argv) < 3: 107 if len(sys.argv) > 2 [all...] |
/external/clearsilver/cs/ |
test_trak1.cs | 9 <?cs call:test_macro(len(faq)) ?>
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_setiv.c | 24 @param len The length of the vector (in octets) 28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc) 32 if (len != (unsigned long)cbc->blocklen) { 35 XMEMCPY(cbc->IV, IV, len);
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_setiv.c | 23 @param len The length of the vector (in octets) 27 int ctr_setiv(const unsigned char *IV, unsigned long len, symmetric_CTR *ctr) 39 if (len != (unsigned long)ctr->blocklen) { 44 XMEMCPY(ctr->ctr, IV, len);
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_decrypt.c | 24 @param len The length in octets, must be a multiple of 16 27 int lrw_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_LRW *lrw) 40 return cipher_descriptor[lrw->cipher].accel_lrw_decrypt(ct, pt, len, lrw->IV, lrw->tweak, &lrw->key); 43 return lrw_process(ct, pt, len, LRW_DECRYPT, lrw);
|
lrw_encrypt.c | 24 @param len The length in octets, must be a multiple of 16 27 int lrw_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_LRW *lrw) 40 return cipher_descriptor[lrw->cipher].accel_lrw_encrypt(pt, ct, len, lrw->IV, lrw->tweak, &lrw->key); 43 return lrw_process(pt, ct, len, LRW_ENCRYPT, lrw);
|
/external/dropbear/libtommath/ |
bn_mp_fwrite.c | 21 int err, len, x; local 23 if ((err = mp_radix_size(a, radix, &len)) != MP_OKAY) { 27 buf = OPT_CAST(char) XMALLOC (len); 37 for (x = 0; x < len; x++) {
|
/external/e2fsprogs/lib/et/ |
vfprintf.c | 32 int len; local 38 len = _doprnt(fmt, ap, iop); 45 len = _doprnt(fmt, ap, iop); 47 return (ferror(iop) ? EOF : len);
|
/external/elfutils/libebl/ |
eblcorenotetypename.c | 25 ebl_core_note_type_name (ebl, type, buf, len) 29 size_t len; 31 const char *res = ebl->core_note_type_name (type, buf, len); 61 snprintf (buf, len, "%s: %" PRIu32, gettext ("<unknown>"), type);
|
eblobjnotetypename.c | 25 ebl_object_note_type_name (ebl, type, buf, len) 29 size_t len; 31 const char *res = ebl->object_note_type_name (type, buf, len); 47 snprintf (buf, len, "%s: %" PRIu32, gettext ("<unknown>"), type);
|
libebl_mips.h | 28 extern const char *mips_reloc_type_name (int type, char *buf, size_t len); 31 extern const char *mips_segment_type_name (int type, char *buf, size_t len); 34 extern const char *mips_section_type_name (int type, char *buf, size_t len); 40 extern const char *mips_dynamic_tag_name (int64_t tag, char *buf, size_t len);
|
/external/icu4c/common/ |
ucat.c | 50 int32_t* len, UErrorCode* ec) { 61 len, ec); 70 if (len != NULL) { 71 *len = u_strlen(s);
|