/external/chromium_org/third_party/yasm/source/patched-yasm/tools/genperf/ |
perfect.h | 19 #define USE_SCRAMBLE 4096 /* use scramble if blen >= USE_SCRAMBLE */ 124 void findhash(bstuff **tabb, hstuff **tabh, ub4 *alen, ub4 *blen, ub4 *salt, 129 int inithex(key *keys, ub4 nkeys, ub4 alen, ub4 blen, ub4 smax, ub4 salt,
|
/external/chromium_org/third_party/icu/source/tools/makeconv/ |
gencnvex.c | 368 if(m->bLen>extData->maxInBytes) { 369 extData->maxInBytes=m->bLen; 375 ratio=(u16Length+(m->bLen-1))/m->bLen; 512 if(m->bLen==unitIndex+1) { 516 if(subStart<subLimit && mappings[map[subStart]].bLen==unitIndex+1) { 608 if(flag==0 || flag==1 || (flag==2 && m->bLen==1)) { 654 switch(m->bLen) { 664 /* the parser enforces m->bLen<=UCNV_EXT_MAX_BYTES */ 667 resultBytes=utm_allocN(extData->fromUBytes, m->bLen); [all...] |
/external/icu4c/tools/makeconv/ |
gencnvex.c | 369 if(m->bLen>extData->maxInBytes) { 370 extData->maxInBytes=m->bLen; 376 ratio=(u16Length+(m->bLen-1))/m->bLen; 513 if(m->bLen==unitIndex+1) { 517 if(subStart<subLimit && mappings[map[subStart]].bLen==unitIndex+1) { 609 if(flag==0 || flag==1 || (flag==2 && m->bLen==1) || flag==4) { 655 switch(m->bLen) { 665 /* the parser enforces m->bLen<=UCNV_EXT_MAX_BYTES */ 668 resultBytes=utm_allocN(extData->fromUBytes, m->bLen); [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
bss_mem.c | 172 int blen; local 188 blen=bm->length; 189 if (BUF_MEM_grow_clean(bm,blen+inl) != (blen+inl)) 191 memcpy(&(bm->data[blen]),in,inl);
|
/external/icu4c/tools/toolutil/ |
ucm.h | 41 * b if bLen<=4: up to 4 bytes 42 * else index to bLen bytes 44 * bLen number of words containing left-justified bytes 57 int8_t uLen, bLen, f, moveFlag; 115 (((m)->bLen<=4) ? (m)->b.bytes : (t)->bytes+(m)->b.idx)
|
/external/openssl/crypto/bio/ |
bss_mem.c | 172 int blen; local 188 blen=bm->length; 189 if (BUF_MEM_grow_clean(bm,blen+inl) != (blen+inl)) 191 memcpy(&(bm->data[blen]),in,inl);
|
/external/openssh/ |
auth2-pubkey.c | 74 u_int alen, blen, slen; local 86 pkblob = packet_get_string(&blen); 88 buffer_append(&b, pkblob, blen); 94 pkblob = packet_get_string(&blen); 103 key = key_from_blob(pkblob, blen); 136 buffer_put_string(&b, pkblob, blen); 163 packet_put_string(pkblob, blen);
|
monitor_wrap.c | 469 mm_newkeys_from_blob(u_char *blob, int blen) 478 debug3("%s: %p(%d)", __func__, blob, blen); 480 dump_base64(stderr, blob, blen); 483 buffer_append(&b, blob, blen); 1088 u_int blen; local 1107 blob = buffer_get_string(&m, &blen); 1108 if ((key = key_from_blob(blob, blen)) == NULL) 1124 u_int blen; local 1132 if (key_to_blob(key, &blob, &blen) == 0) 1137 buffer_put_string(&m, blob, blen); 1154 u_int blen; local [all...] |
ssh-keysign.c | 68 u_int blen, len; local 103 pkblob = buffer_get_string(&b, &blen); 108 else if ((key = key_from_blob(pkblob, blen)) == NULL)
|
authfd.c | 319 u_int blen; local 343 blob = buffer_get_string(&auth->identities, &blen); 345 key = key_from_blob(blob, blen); 424 u_int blen; local 428 if (key_to_blob(key, &blob, &blen) == 0) 436 buffer_put_string(&msg, blob, blen); 600 u_int blen; local 612 key_to_blob(key, &blob, &blen); 614 buffer_put_string(&msg, blob, blen);
|
ssh-agent.c | 230 u_int blen; local 231 key_to_blob(id->key, &blob, &blen); 232 buffer_put_string(&msg, blob, blen); 316 u_int blen, dlen, slen = 0; local 325 blob = buffer_get_string(&e->request, &blen); 333 key = key_from_blob(blob, blen); 362 u_int blen, bits; local 379 blob = buffer_get_string(&e->request, &blen); 380 key = key_from_blob(blob, blen); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.c | 403 size_t blen; local 406 blen = sizeof(*param) + key_len; 407 buf = os_zalloc(blen); 443 if (hostapd_ioctl(drv, param, blen)) { 459 size_t blen; local 462 blen = sizeof(*param) + 32; 463 buf = os_zalloc(blen); 475 if (hostapd_ioctl(drv, param, blen)) { 706 size_t blen, elem_len; local 709 blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN + elem_len [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
asn_mime.c | 103 static int mime_bound_check(char *line, int linelen, char *bound, int blen); 611 int len, blen; local 617 blen = strlen(bound); 624 state = mime_bound_check(linebuf, len, bound, blen); 921 static int mime_bound_check(char *line, int linelen, char *bound, int blen) 924 if(blen == -1) blen = strlen(bound); 926 if(blen + 2 > linelen) return 0; 928 if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) { 929 if(!strncmp(line + blen + 2, "--", 2)) return 2 [all...] |
/external/openssl/crypto/asn1/ |
asn_mime.c | 103 static int mime_bound_check(char *line, int linelen, char *bound, int blen); 611 int len, blen; local 617 blen = strlen(bound); 624 state = mime_bound_check(linebuf, len, bound, blen); 921 static int mime_bound_check(char *line, int linelen, char *bound, int blen) 924 if(blen == -1) blen = strlen(bound); 926 if(blen + 2 > linelen) return 0; 928 if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) { 929 if(!strncmp(line + blen + 2, "--", 2)) return 2 [all...] |
/bionic/libc/stdio/ |
fvwrite.c | 111 size_t blen = fp->_p - fp->_bf._base; local 119 } while (_size < (int)(blen + len)); 126 fp->_p = _base + blen;
|
/external/chromium_org/third_party/openssl/openssl/crypto/dh/ |
dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 178 blen=DH_size(b); 179 bbuf=(unsigned char *)OPENSSL_malloc(blen);
|
/external/openssl/crypto/dh/ |
dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 178 blen=DH_size(b); 179 bbuf=(unsigned char *)OPENSSL_malloc(blen);
|
/frameworks/compile/slang/ |
slang_rs_reflect_utils.cpp | 130 const char *buff, int blen, int seg_num, FILE *pfout) { 141 while (write_length < blen) { 146 || (write_length == blen)) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdh/ |
ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 226 blen=KDF1_SHA1_len; 227 bbuf=(unsigned char *)OPENSSL_malloc(blen); 228 bout=ECDH_compute_key(bbuf,blen,EC_KEY_get0_public_key(a),b,KDF1_SHA1);
|
/external/iproute2/lib/ |
utils.c | 636 char *hexstring_n2a(const __u8 *str, int len, char *buf, int blen) 642 if (blen < 3) 646 blen -= 2; 647 if (i != len-1 && blen > 1) { 649 blen--; 655 __u8* hexstring_a2n(const char *str, __u8 *buf, int blen) 680 if (cnt < blen) { 688 if (cnt < blen) 689 memset(buf+cnt, 0, blen-cnt);
|
/external/openssl/crypto/ecdh/ |
ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 226 blen=KDF1_SHA1_len; 227 bbuf=(unsigned char *)OPENSSL_malloc(blen); 228 bout=ECDH_compute_key(bbuf,blen,EC_KEY_get0_public_key(a),b,KDF1_SHA1);
|
/frameworks/base/core/jni/ |
android_util_XmlBlock.cpp | 43 jsize bLen = env->GetArrayLength(bArray); 44 if (off < 0 || off >= bLen || len < 0 || len > bLen || (off+len) > bLen) {
|
/external/grub/netboot/ |
sk_g16.h | 146 volatile short blen; /* Buffer Length (two's complement) */ member in struct:rmd 164 unsigned short blen; /* Buffer Length (two's complement) */ member in struct:tmd
|
/external/zlib/src/contrib/iostream/ |
zfstream.cpp | 192 int bl = blen(); 242 required = blen();
|
/external/svox/pico/lib/ |
picodata.h | 294 blenmax is the max length (in number of bytes) of buf; blen is 303 picoos_uint16 *blen); 306 blenmax is the max length (in number of bytes) of buf; blen is 315 picoos_uint16 *blen); 326 picoos_uint16 *blen); 366 content; blenmax is the max length (bytes) accessible in buf; blen 374 picoos_uint8 *buf, const picoos_uint16 blenmax, picoos_uint16 *blen);
|