/frameworks/base/telephony/java/com/android/internal/telephony/ |
IccFileHandler.java | 350 recordSize[0] = data[RESPONSE_DATA_RECORD_LENGTH] & 0xFF; 351 recordSize[1] = ((data[RESPONSE_DATA_FILE_SIZE_1] & 0xff) << 8) 352 + (data[RESPONSE_DATA_FILE_SIZE_2] & 0xff); 387 lc.recordSize = data[RESPONSE_DATA_RECORD_LENGTH] & 0xFF; 389 size = ((data[RESPONSE_DATA_FILE_SIZE_1] & 0xff) << 8) 390 + (data[RESPONSE_DATA_FILE_SIZE_2] & 0xff); 433 size = ((data[RESPONSE_DATA_FILE_SIZE_1] & 0xff) << 8) 434 + (data[RESPONSE_DATA_FILE_SIZE_2] & 0xff);
|
/hardware/invensense/mlsdk/mllite/ |
mldl.c | 695 regs[1 + ii * 2] = (unsigned char)(offset[ii] >> 8) & 0xff; 696 regs[1 + ii * 2 + 1] = (unsigned char)(offset[ii] & 0xff); 837 memAddr &= 0xff; 899 memAddr &= 0xff; 946 mldlCfg.dmp_cfg2 = (config & 0xff); 954 inv_set_mpu_memory_one_bank(memAddr >> 8, memAddr & 0xff, toWrite, [all...] |
dmpDefaultMantis.c | 280 0x00, 0x65, 0x00, 0x54, 0xff, 0xef, 0x00, 0x00, 0xfa, 0x80, 0x00, 0x0b, 0x12, 0x82, 0x00, 0x01, 282 0x00, 0x28, 0x00, 0x00, 0xff, 0xff, 0x45, 0x81, 0xff, 0xff, 0xfa, 0x72, 0x00, 0x00, 0x00, 0x00, 283 0x00, 0x00, 0x03, 0xe8, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01, 0x7f, 0xff, 0xff, 0xfe, 0x80, 0x01, 287 0x41, 0xff, 0x00, 0x00, 0x00, 0x00, 0x0b, 0x2a, 0x00, 0x00, 0x16, 0x55, 0x00, 0x00, 0x21, 0x82, 294 0xff, 0xe6, 0x80, 0x79, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd0, 0xd6, 0x00, 0x00, 0x27, 0x10, 297 0x00, 0x00, 0xfa, 0x36, 0xff, 0xbc, 0x30, 0x8e, 0x00, 0x05, 0xfb, 0xf0, 0xff, 0xd9, 0x5b, 0xc8, [all...] |
/external/qemu/ |
console.c | 33 #define QEMU_RGB(r, g, b) QEMU_RGBA(r, g, b, 0xff) 244 r = (rgba >> 16) & 0xff; 245 g = (rgba >> 8) & 0xff; 246 b = (rgba) & 0xff; 253 r = (rgba >> 16) & 0xff; 254 g = (rgba >> 8) & 0xff; 255 b = (rgba) & 0xff; 259 r = (rgba >> 16) & 0xff; 260 g = (rgba >> 8) & 0xff; 261 b = (rgba) & 0xff; [all...] |
/bootable/recovery/ |
verifier.c | 67 if (footer[2] != 0xff || footer[3] != 0xff) {
|
/build/tools/signapk/ |
SignApk.java | 360 temp.write(signature_start & 0xff); 361 temp.write((signature_start >> 8) & 0xff); 362 // Why the 0xff bytes? In a zip file with no archive comment, 365 // two high bytes to be 0xff 0xff, the archive would have to 369 temp.write(0xff); 370 temp.write(0xff); 371 temp.write(total_size & 0xff); 372 temp.write((total_size >> 8) & 0xff); 388 outputStream.write(total_size & 0xff); [all...] |
/cts/tests/tests/graphics/src/android/graphics/drawable/cts/ |
NinePatchDrawableTest.java | 114 int ocean = Color.rgb(0, 0xFF, 0x80); 157 mNinePatchDrawable.setChangingConfigurations(0xff); 158 assertEquals(0xff, mNinePatchDrawable.getChangingConfigurations()); 163 assertEquals(0xff, constantState.getChangingConfigurations()); 167 assertEquals(0xff, constantState.getChangingConfigurations()); 203 assertEquals(0xff, mNinePatchDrawable.getPaint().getAlpha()); 209 assertEquals(0xff, mNinePatchDrawable.getPaint().getAlpha()); 371 mNinePatchDrawable.setChangingConfigurations(0xff); 375 assertEquals(0xff, constantState.getChangingConfigurations());
|
/external/blktrace/ |
blktrace.h | 95 if ((t->magic & 0xff) != SUPPORTED_VERSION) { 97 t->magic & 0xff);
|
/external/bouncycastle/src/main/java/org/bouncycastle/asn1/ |
DERApplicationSpecific.java | 198 int b = input[index++] & 0xff; 211 b = input[index++] & 0xff;
|
/external/chromium/base/ |
sha1_portable.cc | 98 ((*t & 0xff) << 24); 153 M[64-1] = (l & 0xff);
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_test.c | 103 { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 145 { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 190 { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 233 { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 256 0x55, 0x90, 0x9c, 0x5a, 0xff, 0x52, 0x69, 0xaa, 276 { 0x61, 0x9c, 0xc5, 0xae, 0xff, 0xfe, 0x0b, 0xfa, 295 0xff, 0x24, 0x4a, 0xfa, 0x9d, 0xc7, 0x2b, 0xcd, 314 0x46, 0x63, 0xfa, 0xff, 0x58, 0xa8, 0xb2, 0xd7,
|
/external/icu4c/test/perf/unisetperf/draft/ |
bitset.cpp | 39 uprv_memset(values, 0xff, sizeof(values)); 180 if((uint32_t)c<=0xff) {
|
/external/iproute2/testsuite/tests/ |
cls-testbed.t | 46 dsmark mask 0xff value 2
|
/external/llvm/test/MC/ARM/ |
neon-shiftaccum-encoding.s | 71 @ CHECK: vsli.32 d17, d16, #31 @ encoding: [0x30,0x15,0xff,0xf3] 73 @ CHECK: vsli.64 d17, d16, #63 @ encoding: [0xb0,0x15,0xff,0xf3] 79 @ CHECK: vsli.32 q9, q8, #31 @ encoding: [0x70,0x25,0xff,0xf3] 81 @ CHECK: vsli.64 q9, q8, #63 @ encoding: [0xf0,0x25,0xff,0xf3]
|
/external/openssl/crypto/bf/asm/ |
bf-586.pl | 106 &and( $tmp2, 0xff); # B 109 &and( $tmp4, 0xff); # D
|
/external/openssl/crypto/bio/ |
b_dump.c | 120 ch=((unsigned char)*(s+i*dump_width+j)) & 0xff; 131 ch=((unsigned char)*(s+i*dump_width+j)) & 0xff;
|
/external/quake/quake/src/WinQuake/ |
net_loop.cpp | 173 *buffer++ = data->cursize & 0xff; 207 *buffer++ = data->cursize & 0xff;
|
/external/srtp/test/ |
dtls_srtp_driver.c | 175 memset(key, 0xff, key_len); 206 * and the four octets following the packet are filled with 0xff 245 *buffer++ = 0xff;
|
/external/tcpdump/ |
print-ip6.c | 183 nh = enh & 0xff; 191 nh = enh & 0xff;
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
crypto-aes.js | 131 0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2, 171 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 182 for (var i=0; i<4; i++) counterBlock[i] = (nonce >>> i*8) & 0xff; 183 for (var i=0; i<4; i++) counterBlock[i+4] = (nonce/0x100000000 >>> i*8) & 0xff; 194 for (var c=0; c<4; c++) counterBlock[15-c] = (b >>> c*8) & 0xff; 235 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 254 for (var c=0; c<4; c++) counterBlock[15-c] = ((b-1) >>> c*8) & 0xff; 255 for (var c=0; c<4; c++) counterBlock[15-c-4] = ((b/0x100000000-1) >>> c*8) & 0xff; 331 o1 = bits>>16 & 0xff; 332 o2 = bits>>8 & 0xff; [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
crypto-aes.js | 131 0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2, 171 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 182 for (var i=0; i<4; i++) counterBlock[i] = (nonce >>> i*8) & 0xff; 183 for (var i=0; i<4; i++) counterBlock[i+4] = (nonce/0x100000000 >>> i*8) & 0xff; 194 for (var c=0; c<4; c++) counterBlock[15-c] = (b >>> c*8) & 0xff; 235 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 254 for (var c=0; c<4; c++) counterBlock[15-c] = ((b-1) >>> c*8) & 0xff; 255 for (var c=0; c<4; c++) counterBlock[15-c-4] = ((b/0x100000000-1) >>> c*8) & 0xff; 331 o1 = bits>>16 & 0xff; 332 o2 = bits>>8 & 0xff; [all...] |
/frameworks/base/core/java/com/google/android/mms/pdu/ |
PduPart.java | 199 buffer[0] = (byte) (0xff & '<'); 200 buffer[buffer.length - 1] = (byte) (0xff & '>');
|
/frameworks/base/media/libstagefright/ |
JPEGSource.cpp | 164 CHECK_EQ(marker, 0xff); 170 CHECK(marker != 0xff);
|
/frameworks/base/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/ |
UsimDataDownloadTest.java | 100 0x00, 0x00, (byte) 0xbf, (byte) 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 124 mCm.expectSendEnvelope(SMS_PP_ENVELOPE_3_1_1, 0x62, 0xff, "0123456789abcdef");
|
/libcore/luni/src/main/java/libcore/io/ |
Streams.java | 42 return (result != -1) ? buffer[0] & 0xff : -1; 52 buffer[0] = (byte) (b & 0xff);
|