/dalvik/vm/jdwp/ |
ExpandBuf.cpp | 32 int curLen; 47 newBuf->curLen = 0; 78 return pBuf->curLen; 90 if (pBuf->curLen + newCount <= pBuf->maxLen) 93 while (pBuf->curLen + newCount > pBuf->maxLen) 113 gapStart = pBuf->storage + pBuf->curLen; 115 pBuf->curLen += gapSize; 126 *(pBuf->storage + pBuf->curLen) = val; 127 pBuf->curLen++; 136 set2BE(pBuf->storage + pBuf->curLen, val) [all...] |
/external/webrtc/src/common_audio/vad/main/source/ |
vad_filterbank.c | 125 int curlen, filtno; local 137 curlen = frame_size; 139 &inst->lower_state[filtno], curlen); 146 curlen = WEBRTC_SPL_RSHIFT_W16(frame_size, 1); 149 &inst->lower_state[filtno], curlen); 152 curlen = WEBRTC_SPL_RSHIFT_W16(curlen, 1); 153 WebRtcVad_LogOfEnergy(vecHP2, &out_vector[5], &power, kOffsetVector[5], curlen); 156 WebRtcVad_LogOfEnergy(vecLP2, &out_vector[4], &power, kOffsetVector[4], curlen); 163 curlen = WEBRTC_SPL_RSHIFT_W16(frame_size, 1) [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_hash.h | 5 unsigned long curlen; member in struct:sha512_state 13 ulong32 state[8], curlen; member in struct:sha256_state 21 ulong32 state[5], curlen; member in struct:sha1_state 29 ulong32 state[4], curlen; member in struct:md5_state 37 ulong32 state[4], curlen; member in struct:md4_state 45 unsigned long curlen; member in struct:tiger_state 53 unsigned long curlen; member in struct:md2_state 61 ulong32 curlen, state[4]; member in struct:rmd128_state 69 ulong32 curlen, state[5]; member in struct:rmd160_state 77 ulong32 curlen, state[8] member in struct:rmd256_state 85 ulong32 curlen, state[10]; member in struct:rmd320_state 93 ulong32 curlen; member in struct:whirlpool_state 101 ulong32 curlen; member in struct:chc_state [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha256-internal.c | 23 u32 state[8], curlen; member in struct:sha256_state 142 md->curlen = 0; 167 if (md->curlen > sizeof(md->buf)) 171 if (md->curlen == 0 && inlen >= block_size) { 178 n = MIN(inlen, (block_size - md->curlen)); 179 os_memcpy(md->buf + md->curlen, in, n); 180 md->curlen += n; 183 if (md->curlen == block_size) { 187 md->curlen = 0; 206 if (md->curlen >= sizeof(md->buf) [all...] |
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory_multi.c | 35 unsigned long curlen; local 61 curlen = inlen; 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { 72 curlen = va_arg(args, unsigned long);
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_memory_multi.c | 42 unsigned long curlen; local 61 curlen = inlen; 64 if ((err = f9_process(f9, curptr, curlen)) != CRYPT_OK) { 72 curlen = va_arg(args, unsigned long);
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_memory_multi.c | 43 unsigned long curlen; local 62 curlen = inlen; 65 if ((err = hmac_process(hmac, curptr, curlen)) != CRYPT_OK) { 73 curlen = va_arg(args, unsigned long);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory_multi.c | 42 unsigned long curlen; local 61 curlen = inlen; 64 if ((err = omac_process(omac, curptr, curlen)) != CRYPT_OK) { 72 curlen = va_arg(args, unsigned long);
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_memory_multi.c | 42 unsigned long curlen; local 60 curlen = inlen; 63 if ((err = pmac_process(pmac, curptr, curlen)) != CRYPT_OK) { 71 curlen = va_arg(args, unsigned long);
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory_multi.c | 42 unsigned long curlen; local 61 curlen = inlen; 64 if ((err = xcbc_process(xcbc, curptr, curlen)) != CRYPT_OK) { 72 curlen = va_arg(args, unsigned long);
|
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 120 md->chc.curlen = 0; 208 if (md->chc.curlen >= sizeof(md->chc.buf)) { 213 md->chc.length += md->chc.curlen * 8; 216 md->chc.buf[md->chc.curlen++] = (unsigned char)0x80; 222 if (md->chc.curlen > (unsigned long)(cipher_blocksize - 8)) { 223 while (md->chc.curlen < (unsigned long)cipher_blocksize) { 224 md->chc.buf[md->chc.curlen++] = (unsigned char)0; 227 md->chc.curlen = 0; 231 while (md->chc.curlen < (unsigned long)(cipher_blocksize - 8)) { 232 md->chc.buf[md->chc.curlen++] = (unsigned char)0 [all...] |
/external/dropbear/libtomcrypt/src/hashes/ |
md2.c | 109 md->md2.curlen = 0; 125 if (md-> md2 .curlen > sizeof(md-> md2 .buf)) { 129 n = MIN(inlen, (16 - md->md2.curlen)); 130 XMEMCPY(md->md2.buf + md->md2.curlen, in, (size_t)n); 131 md->md2.curlen += n; 136 if (md->md2.curlen == 16) { 139 md->md2.curlen = 0; 158 if (md->md2.curlen >= sizeof(md->md2.buf)) { 164 k = 16 - md->md2.curlen; 165 for (i = md->md2.curlen; i < 16; i++) [all...] |
md4.c | 182 md->md4.curlen = 0; 208 if (md->md4.curlen >= sizeof(md->md4.buf)) { 213 md->md4.length += md->md4.curlen * 8; 216 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; 222 if (md->md4.curlen > 56) { 223 while (md->md4.curlen < 64) { 224 md->md4.buf[md->md4.curlen++] = (unsigned char)0; 227 md->md4.curlen = 0; 231 while (md->md4.curlen < 56) { 232 md->md4.buf[md->md4.curlen++] = (unsigned char)0 [all...] |
sha1.c | 173 md->sha1.curlen = 0; 200 if (md->sha1.curlen >= sizeof(md->sha1.buf)) { 205 md->sha1.length += md->sha1.curlen * 8; 208 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80; 214 if (md->sha1.curlen > 56) { 215 while (md->sha1.curlen < 64) { 216 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; 219 md->sha1.curlen = 0; 223 while (md->sha1.curlen < 56) { 224 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0 [all...] |
md5.c | 240 md->md5.curlen = 0; 267 if (md->md5.curlen >= sizeof(md->md5.buf)) { 273 md->md5.length += md->md5.curlen * 8; 276 md->md5.buf[md->md5.curlen++] = (unsigned char)0x80; 282 if (md->md5.curlen > 56) { 283 while (md->md5.curlen < 64) { 284 md->md5.buf[md->md5.curlen++] = (unsigned char)0; 287 md->md5.curlen = 0; 291 while (md->md5.curlen < 56) { 292 md->md5.buf[md->md5.curlen++] = (unsigned char)0 [all...] |
rmd128.c | 279 md->rmd128.curlen = 0; 306 if (md->rmd128.curlen >= sizeof(md->rmd128.buf)) { 312 md->rmd128.length += md->rmd128.curlen * 8; 315 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0x80; 321 if (md->rmd128.curlen > 56) { 322 while (md->rmd128.curlen < 64) { 323 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0; 326 md->rmd128.curlen = 0; 330 while (md->rmd128.curlen < 56) { 331 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0 [all...] |
rmd256.c | 292 md->rmd256.curlen = 0; 319 if (md->rmd256.curlen >= sizeof(md->rmd256.buf)) { 325 md->rmd256.length += md->rmd256.curlen * 8; 328 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0x80; 334 if (md->rmd256.curlen > 56) { 335 while (md->rmd256.curlen < 64) { 336 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0; 339 md->rmd256.curlen = 0; 343 while (md->rmd256.curlen < 56) { 344 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0 [all...] |
rmd160.c | 338 md->rmd160.curlen = 0; 365 if (md->rmd160.curlen >= sizeof(md->rmd160.buf)) { 371 md->rmd160.length += md->rmd160.curlen * 8; 374 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0x80; 380 if (md->rmd160.curlen > 56) { 381 while (md->rmd160.curlen < 64) { 382 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0; 385 md->rmd160.curlen = 0; 389 while (md->rmd160.curlen < 56) { 390 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0 [all...] |
rmd320.c | 356 md->rmd320.curlen = 0; 383 if (md->rmd320.curlen >= sizeof(md->rmd320.buf)) { 389 md->rmd320.length += md->rmd320.curlen * 8; 392 md->rmd320.buf[md->rmd320.curlen++] = (unsigned char)0x80; 398 if (md->rmd320.curlen > 56) { 399 while (md->rmd320.curlen < 64) { 400 md->rmd320.buf[md->rmd320.curlen++] = (unsigned char)0; 403 md->rmd320.curlen = 0; 407 while (md->rmd320.curlen < 56) { 408 md->rmd320.buf[md->rmd320.curlen++] = (unsigned char)0 [all...] |
/external/wpa_supplicant/ |
sha256.c | 161 u32 state[8], curlen; member in struct:sha256_state 276 md->curlen = 0; 301 if (md->curlen > sizeof(md->buf)) 305 if (md->curlen == 0 && inlen >= block_size) { 312 n = MIN(inlen, (block_size - md->curlen)); 313 memcpy(md->buf + md->curlen, in, n); 314 md->curlen += n; 317 if (md->curlen == block_size) { 321 md->curlen = 0; 340 if (md->curlen >= sizeof(md->buf) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 164 u32 state[8], curlen; member in struct:sha256_state 279 md->curlen = 0; 304 if (md->curlen > sizeof(md->buf)) 308 if (md->curlen == 0 && inlen >= block_size) { 315 n = MIN(inlen, (block_size - md->curlen)); 316 os_memcpy(md->buf + md->curlen, in, n); 317 md->curlen += n; 320 if (md->curlen == block_size) { 324 md->curlen = 0; 343 if (md->curlen >= sizeof(md->buf) [all...] |
/external/dropbear/libtomcrypt/src/hashes/sha2/ |
sha512.c | 178 md->sha512.curlen = 0; 213 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { 218 md->sha512.length += md->sha512.curlen * CONST64(8); 221 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80; 227 if (md->sha512.curlen > 112) { 228 while (md->sha512.curlen < 128) { 229 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; 232 md->sha512.curlen = 0; 239 while (md->sha512.curlen < 120) { 240 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0 [all...] |
sha384.c | 43 md->sha512.curlen = 0; 69 if (md->sha512.curlen >= sizeof(md->sha512.buf)) {
|
/dalvik/tools/hprof-conv/ |
HprofConv.c | 100 size_t curLen; 115 newBuf->curLen = 0; 148 return pBuf->curLen; 156 pBuf->curLen = 0; 166 if (pBuf->curLen + size > pBuf->maxLen) { 167 int newSize = pBuf->curLen + size + 128; /* oversize slightly */ 178 assert(pBuf->curLen + size <= pBuf->maxLen); 188 memcpy(pBuf->storage + pBuf->curLen, data, count); 189 pBuf->curLen += count; 209 pBuf->storage[pBuf->curLen++] = (unsigned char) ic [all...] |
/external/dropbear/libtomcrypt/src/hashes/whirl/ |
whirl.c | 157 if (md->whirlpool.curlen >= sizeof(md->whirlpool.buf)) { 162 md->whirlpool.length += md->whirlpool.curlen * 8; 165 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0x80; 171 if (md->whirlpool.curlen > 32) { 172 while (md->whirlpool.curlen < 64) { 173 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; 176 md->whirlpool.curlen = 0; 180 while (md->whirlpool.curlen < 56) { 181 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0;
|