HomeSort by relevance Sort by last modified time
    Searched full:curlen (Results 1 - 25 of 42) sorted by null

1 2

  /dalvik/vm/jdwp/
ExpandBuf.cpp 32 int curLen;
47 newBuf->curLen = 0;
78 return pBuf->curLen;
90 if (pBuf->curLen + newCount <= pBuf->maxLen)
93 while (pBuf->curLen + newCount > pBuf->maxLen)
113 gapStart = pBuf->storage + pBuf->curLen;
115 pBuf->curLen += gapSize;
126 *(pBuf->storage + pBuf->curLen) = val;
127 pBuf->curLen++;
136 set2BE(pBuf->storage + pBuf->curLen, val)
    [all...]
  /external/webrtc/src/common_audio/vad/main/source/
vad_filterbank.c 125 int curlen, filtno; local
137 curlen = frame_size;
139 &inst->lower_state[filtno], curlen);
146 curlen = WEBRTC_SPL_RSHIFT_W16(frame_size, 1);
149 &inst->lower_state[filtno], curlen);
152 curlen = WEBRTC_SPL_RSHIFT_W16(curlen, 1);
153 WebRtcVad_LogOfEnergy(vecHP2, &out_vector[5], &power, kOffsetVector[5], curlen);
156 WebRtcVad_LogOfEnergy(vecLP2, &out_vector[4], &power, kOffsetVector[4], curlen);
163 curlen = WEBRTC_SPL_RSHIFT_W16(frame_size, 1)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_hash.h 5 unsigned long curlen; member in struct:sha512_state
13 ulong32 state[8], curlen; member in struct:sha256_state
21 ulong32 state[5], curlen; member in struct:sha1_state
29 ulong32 state[4], curlen; member in struct:md5_state
37 ulong32 state[4], curlen; member in struct:md4_state
45 unsigned long curlen; member in struct:tiger_state
53 unsigned long curlen; member in struct:md2_state
61 ulong32 curlen, state[4]; member in struct:rmd128_state
69 ulong32 curlen, state[5]; member in struct:rmd160_state
77 ulong32 curlen, state[8] member in struct:rmd256_state
85 ulong32 curlen, state[10]; member in struct:rmd320_state
93 ulong32 curlen; member in struct:whirlpool_state
101 ulong32 curlen; member in struct:chc_state
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha256-internal.c 23 u32 state[8], curlen; member in struct:sha256_state
142 md->curlen = 0;
167 if (md->curlen > sizeof(md->buf))
171 if (md->curlen == 0 && inlen >= block_size) {
178 n = MIN(inlen, (block_size - md->curlen));
179 os_memcpy(md->buf + md->curlen, in, n);
180 md->curlen += n;
183 if (md->curlen == block_size) {
187 md->curlen = 0;
206 if (md->curlen >= sizeof(md->buf)
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/helper/
hash_memory_multi.c 35 unsigned long curlen; local
61 curlen = inlen;
64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) {
72 curlen = va_arg(args, unsigned long);
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_memory_multi.c 42 unsigned long curlen; local
61 curlen = inlen;
64 if ((err = f9_process(f9, curptr, curlen)) != CRYPT_OK) {
72 curlen = va_arg(args, unsigned long);
  /external/dropbear/libtomcrypt/src/mac/hmac/
hmac_memory_multi.c 43 unsigned long curlen; local
62 curlen = inlen;
65 if ((err = hmac_process(hmac, curptr, curlen)) != CRYPT_OK) {
73 curlen = va_arg(args, unsigned long);
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_memory_multi.c 42 unsigned long curlen; local
61 curlen = inlen;
64 if ((err = omac_process(omac, curptr, curlen)) != CRYPT_OK) {
72 curlen = va_arg(args, unsigned long);
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_memory_multi.c 42 unsigned long curlen; local
60 curlen = inlen;
63 if ((err = pmac_process(pmac, curptr, curlen)) != CRYPT_OK) {
71 curlen = va_arg(args, unsigned long);
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_memory_multi.c 42 unsigned long curlen; local
61 curlen = inlen;
64 if ((err = xcbc_process(xcbc, curptr, curlen)) != CRYPT_OK) {
72 curlen = va_arg(args, unsigned long);
  /external/dropbear/libtomcrypt/src/hashes/chc/
chc.c 120 md->chc.curlen = 0;
208 if (md->chc.curlen >= sizeof(md->chc.buf)) {
213 md->chc.length += md->chc.curlen * 8;
216 md->chc.buf[md->chc.curlen++] = (unsigned char)0x80;
222 if (md->chc.curlen > (unsigned long)(cipher_blocksize - 8)) {
223 while (md->chc.curlen < (unsigned long)cipher_blocksize) {
224 md->chc.buf[md->chc.curlen++] = (unsigned char)0;
227 md->chc.curlen = 0;
231 while (md->chc.curlen < (unsigned long)(cipher_blocksize - 8)) {
232 md->chc.buf[md->chc.curlen++] = (unsigned char)0
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/
md2.c 109 md->md2.curlen = 0;
125 if (md-> md2 .curlen > sizeof(md-> md2 .buf)) {
129 n = MIN(inlen, (16 - md->md2.curlen));
130 XMEMCPY(md->md2.buf + md->md2.curlen, in, (size_t)n);
131 md->md2.curlen += n;
136 if (md->md2.curlen == 16) {
139 md->md2.curlen = 0;
158 if (md->md2.curlen >= sizeof(md->md2.buf)) {
164 k = 16 - md->md2.curlen;
165 for (i = md->md2.curlen; i < 16; i++)
    [all...]
md4.c 182 md->md4.curlen = 0;
208 if (md->md4.curlen >= sizeof(md->md4.buf)) {
213 md->md4.length += md->md4.curlen * 8;
216 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80;
222 if (md->md4.curlen > 56) {
223 while (md->md4.curlen < 64) {
224 md->md4.buf[md->md4.curlen++] = (unsigned char)0;
227 md->md4.curlen = 0;
231 while (md->md4.curlen < 56) {
232 md->md4.buf[md->md4.curlen++] = (unsigned char)0
    [all...]
sha1.c 173 md->sha1.curlen = 0;
200 if (md->sha1.curlen >= sizeof(md->sha1.buf)) {
205 md->sha1.length += md->sha1.curlen * 8;
208 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80;
214 if (md->sha1.curlen > 56) {
215 while (md->sha1.curlen < 64) {
216 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0;
219 md->sha1.curlen = 0;
223 while (md->sha1.curlen < 56) {
224 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0
    [all...]
md5.c 240 md->md5.curlen = 0;
267 if (md->md5.curlen >= sizeof(md->md5.buf)) {
273 md->md5.length += md->md5.curlen * 8;
276 md->md5.buf[md->md5.curlen++] = (unsigned char)0x80;
282 if (md->md5.curlen > 56) {
283 while (md->md5.curlen < 64) {
284 md->md5.buf[md->md5.curlen++] = (unsigned char)0;
287 md->md5.curlen = 0;
291 while (md->md5.curlen < 56) {
292 md->md5.buf[md->md5.curlen++] = (unsigned char)0
    [all...]
rmd128.c 279 md->rmd128.curlen = 0;
306 if (md->rmd128.curlen >= sizeof(md->rmd128.buf)) {
312 md->rmd128.length += md->rmd128.curlen * 8;
315 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0x80;
321 if (md->rmd128.curlen > 56) {
322 while (md->rmd128.curlen < 64) {
323 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0;
326 md->rmd128.curlen = 0;
330 while (md->rmd128.curlen < 56) {
331 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0
    [all...]
rmd256.c 292 md->rmd256.curlen = 0;
319 if (md->rmd256.curlen >= sizeof(md->rmd256.buf)) {
325 md->rmd256.length += md->rmd256.curlen * 8;
328 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0x80;
334 if (md->rmd256.curlen > 56) {
335 while (md->rmd256.curlen < 64) {
336 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0;
339 md->rmd256.curlen = 0;
343 while (md->rmd256.curlen < 56) {
344 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0
    [all...]
rmd160.c 338 md->rmd160.curlen = 0;
365 if (md->rmd160.curlen >= sizeof(md->rmd160.buf)) {
371 md->rmd160.length += md->rmd160.curlen * 8;
374 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0x80;
380 if (md->rmd160.curlen > 56) {
381 while (md->rmd160.curlen < 64) {
382 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0;
385 md->rmd160.curlen = 0;
389 while (md->rmd160.curlen < 56) {
390 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0
    [all...]
rmd320.c 356 md->rmd320.curlen = 0;
383 if (md->rmd320.curlen >= sizeof(md->rmd320.buf)) {
389 md->rmd320.length += md->rmd320.curlen * 8;
392 md->rmd320.buf[md->rmd320.curlen++] = (unsigned char)0x80;
398 if (md->rmd320.curlen > 56) {
399 while (md->rmd320.curlen < 64) {
400 md->rmd320.buf[md->rmd320.curlen++] = (unsigned char)0;
403 md->rmd320.curlen = 0;
407 while (md->rmd320.curlen < 56) {
408 md->rmd320.buf[md->rmd320.curlen++] = (unsigned char)0
    [all...]
  /external/wpa_supplicant/
sha256.c 161 u32 state[8], curlen; member in struct:sha256_state
276 md->curlen = 0;
301 if (md->curlen > sizeof(md->buf))
305 if (md->curlen == 0 && inlen >= block_size) {
312 n = MIN(inlen, (block_size - md->curlen));
313 memcpy(md->buf + md->curlen, in, n);
314 md->curlen += n;
317 if (md->curlen == block_size) {
321 md->curlen = 0;
340 if (md->curlen >= sizeof(md->buf)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha256.c 164 u32 state[8], curlen; member in struct:sha256_state
279 md->curlen = 0;
304 if (md->curlen > sizeof(md->buf))
308 if (md->curlen == 0 && inlen >= block_size) {
315 n = MIN(inlen, (block_size - md->curlen));
316 os_memcpy(md->buf + md->curlen, in, n);
317 md->curlen += n;
320 if (md->curlen == block_size) {
324 md->curlen = 0;
343 if (md->curlen >= sizeof(md->buf)
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/sha2/
sha512.c 178 md->sha512.curlen = 0;
213 if (md->sha512.curlen >= sizeof(md->sha512.buf)) {
218 md->sha512.length += md->sha512.curlen * CONST64(8);
221 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80;
227 if (md->sha512.curlen > 112) {
228 while (md->sha512.curlen < 128) {
229 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0;
232 md->sha512.curlen = 0;
239 while (md->sha512.curlen < 120) {
240 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0
    [all...]
sha384.c 43 md->sha512.curlen = 0;
69 if (md->sha512.curlen >= sizeof(md->sha512.buf)) {
  /dalvik/tools/hprof-conv/
HprofConv.c 100 size_t curLen;
115 newBuf->curLen = 0;
148 return pBuf->curLen;
156 pBuf->curLen = 0;
166 if (pBuf->curLen + size > pBuf->maxLen) {
167 int newSize = pBuf->curLen + size + 128; /* oversize slightly */
178 assert(pBuf->curLen + size <= pBuf->maxLen);
188 memcpy(pBuf->storage + pBuf->curLen, data, count);
189 pBuf->curLen += count;
209 pBuf->storage[pBuf->curLen++] = (unsigned char) ic
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/whirl/
whirl.c 157 if (md->whirlpool.curlen >= sizeof(md->whirlpool.buf)) {
162 md->whirlpool.length += md->whirlpool.curlen * 8;
165 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0x80;
171 if (md->whirlpool.curlen > 32) {
172 while (md->whirlpool.curlen < 64) {
173 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0;
176 md->whirlpool.curlen = 0;
180 while (md->whirlpool.curlen < 56) {
181 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0;

Completed in 672 milliseconds

1 2