/external/chromium_org/v8/test/mjsunit/regress/ |
regress-666721.js | 30 function len2(a) { return a.length; } function 43 assertEquals(0, len2({length:0})); 44 assertEquals(1, len2([1])); 45 assertEquals(2, len2({length:2})); 46 assertEquals(3, len2([1,2,3])); 47 assertEquals(4, len2('1234'));
|
/external/v8/test/mjsunit/regress/ |
regress-666721.js | 30 function len2(a) { return a.length; } function 43 assertEquals(0, len2({length:0})); 44 assertEquals(1, len2([1])); 45 assertEquals(2, len2({length:2})); 46 assertEquals(3, len2([1,2,3])); 47 assertEquals(4, len2('1234'));
|
/external/chromium_org/third_party/opus/src/silk/ |
resampler_down2.c | 43 opus_int32 k, len2 = silk_RSHIFT32( inLen, 1 ); local 50 for( k = 0; k < len2; k++ ) {
|
/external/dropbear/libtomcrypt/demos/ |
multi.c | 7 unsigned long len, len2; local 17 len2 = sizeof(buf[0]); 18 hash_memory_multi(find_hash("sha256"), buf[1], &len2, (unsigned char*)"hello", 5, NULL); 19 if (len != len2 || memcmp(buf[0], buf[1], len)) { 20 printf("Failed: %d %lu %lu\n", __LINE__, len, len2); 23 len2 = sizeof(buf[0]); 24 hash_memory_multi(find_hash("sha256"), buf[1], &len2, (unsigned char*)"he", 2UL, "llo", 3UL, NULL, 0); 25 if (len != len2 || memcmp(buf[0], buf[1], len)) { 26 printf("Failed: %d %lu %lu\n", __LINE__, len, len2); 29 len2 = sizeof(buf[0]) [all...] |
/external/dropbear/libtomcrypt/src/misc/base64/ |
base64_encode.c | 35 unsigned long i, len2, leven; local 43 len2 = 4 * ((inlen + 2) / 3); 44 if (*outlen < len2 + 1) { 45 *outlen = len2 + 1;
|
/external/linux-tools-perf/util/ |
levenshtein.c | 44 int len1 = strlen(string1), len2 = strlen(string2); local 45 int *row0 = malloc(sizeof(int) * (len2 + 1)); 46 int *row1 = malloc(sizeof(int) * (len2 + 1)); 47 int *row2 = malloc(sizeof(int) * (len2 + 1)); 50 for (j = 0; j <= len2; j++) 56 for (j = 0; j < len2; j++) { 78 i = row1[len2];
|
/bionic/libc/netbsd/net/ |
getservent.c | 76 int len2 = q[0]; local 77 total += 1 + len2; 78 q += 1 + len2; 107 int len2 = p[0]; local 109 memcpy( p2, p+1, len2 ); 110 p2[len2] = 0; 111 p2 += len2 + 1; 112 p += len2 + 1;
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
status.cc | 22 const uint32_t len2 = msg2.size(); local 23 const uint32_t size = len1 + (len2 ? (2 + len2) : 0); 28 if (len2) { 31 memcpy(result + 7 + len1, msg2.data(), len2);
|
/external/qemu/android/utils/ |
dll.c | 23 int len2 = strlen(str2); local 24 char* result = malloc(len1+len2+1); 28 memcpy(result + len1, str2, len2); 29 result[len1+len2] = '\0';
|
/hardware/libhardware/include/hardware/ |
qemud.h | 46 int len2; local 48 len2 = write(fd, buff, len); 49 } while (len2 < 0 && errno == EINTR); 50 return len2; 56 int len2; local 58 len2 = read(fd, buff, len); 59 } while (len2 < 0 && errno == EINTR); 60 return len2;
|
/system/core/adb/ |
test_track_devices.c | 21 int len2 = write(fd, buf, len); local 22 if (len2 < 0) { 27 result += len2; 28 len -= len2; 29 buf += len2; 39 int len2 = read(fd, buf, len); local 40 if (len2 < 0) { 45 result += len2; 46 len -= len2; 47 buf += len2; [all...] |
test_track_jdwp.c | 21 int len2 = write(fd, buf, len); local 22 if (len2 < 0) { 27 result += len2; 28 len -= len2; 29 buf += len2; 39 int len2 = read(fd, buf, len); local 40 if (len2 < 0) { 45 result += len2; 46 len -= len2; 47 buf += len2; [all...] |
/external/dropbear/libtomcrypt/testprof/ |
katja_test.c | 10 unsigned long kat_msgsize, len, len2, cnt; local 67 len2 = kat_msgsize; 72 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key)); 75 if (len2 != kat_msgsize) { 76 fprintf(stderr, "\nkatja_decrypt_key mismatch len %lu (first decrypt)", len2); 80 len2 = kat_msgsize; 81 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 86 if (len2 != kat_msgsize || memcmp(tmp, in, kat_msgsize)) { 88 fprintf(stderr, "\nkatja_decrypt_key mismatch, len %lu (second decrypt)\n", len2); 113 len2 = kat_msgsize [all...] |
rsa_test.c | 130 unsigned long rsa_msgsize, len, len2, cnt; local 190 len2 = rsa_msgsize; 195 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key)); 198 if (len2 != rsa_msgsize) { 199 fprintf(stderr, "\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2); 203 len2 = rsa_msgsize; 204 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 209 if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) { 211 fprintf(stderr, "\nrsa_decrypt_key mismatch, len %lu (second decrypt)\n", len2); 236 len2 = rsa_msgsize [all...] |
/external/valgrind/main/none/tests/s390x/ |
cu24.c | 17 uint64_t len2; member in struct:__anon30244 79 regs.len2 = source_len; 117 printf(" src len: %"PRId64"\n", result.len2);
|
cu24_1.c | 17 uint64_t len2; member in struct:__anon30245 79 regs.len2 = source_len; 117 printf(" src len: %"PRId64"\n", result.len2);
|
cu42.c | 14 uint64_t len2; member in struct:__anon30247 82 regs.len2 = source_len; 114 printf(" src len: %"PRId64"\n", result.len2);
|
/external/chromium_org/third_party/skia/src/ports/ |
SkXMLParser_expat.cpp | 121 size_t len2 = input.read(doc, len); local 122 SkASSERT(len2 == len); 124 return this->parse(doc, len2);
|
/external/chromium_org/third_party/skia/src/utils/ |
SkOSFile.cpp | 36 size_t len2 = 3 + (suffix ? strlen(suffix) : 0); local 37 uint16_t* dst = (uint16_t*)sk_malloc_throw((len + len2) * sizeof(uint16_t)); 52 SkASSERT(i + 1 <= len + len2);
|
/external/chromium_org/v8/test/cctest/ |
test-liveedit.cc | 68 len1(len1_param), len2(len2_param), next(NULL) {} 72 int len2; member in class:__anon17111::DiffChunkStruct 84 void AddChunk(int pos1, int pos2, int len1, int len2) { 85 current_chunk_ = new(zone_) DiffChunkStruct(pos1, pos2, len1, len2); 108 int len2 = StrLength(s2); local 126 ASSERT(pos2 + j < len2); 129 diff_parameter += chunk->len1 + chunk->len2; 131 pos2 = diff_pos2 + chunk->len2; 136 ASSERT_EQ(similar_part_length, len2 - pos2); 137 USE(len2); [all...] |
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_libc_test.cc | 62 uptr len2 = internal_strlen(str2); local 82 EXPECT_EQ(len2, internal_write(fd, str2, len2)); 89 EXPECT_EQ(len1 + len2, fsize); 113 EXPECT_EQ(len2, internal_read(fd, buf, len2)); 114 EXPECT_EQ(0, internal_memcmp(buf, str2, len2));
|
/external/qemu/ |
cbuffer.c | 83 int len2 = len; local 87 while (len2 > 0) { 104 if (avail > len2) 105 avail = len2; 110 len2 -= avail; 113 return len - len2; 119 int len2 = len; local 123 while (len2 > 0) { 137 if (avail > len2) 138 avail = len2; [all...] |
/external/skia/src/ports/ |
SkXMLParser_expat.cpp | 121 size_t len2 = input.read(doc, len); local 122 SkASSERT(len2 == len); 124 return this->parse(doc, len2);
|
/external/skia/src/utils/ |
SkOSFile.cpp | 36 size_t len2 = 3 + (suffix ? strlen(suffix) : 0); local 37 uint16_t* dst = (uint16_t*)sk_malloc_throw((len + len2) * sizeof(uint16_t)); 52 SkASSERT(i + 1 <= len + len2);
|
/external/v8/test/cctest/ |
test-liveedit.cc | 68 len1(len1_param), len2(len2_param), next(NULL) {} 72 int len2; member in class:__anon28812::DiffChunkStruct 83 void AddChunk(int pos1, int pos2, int len1, int len2) { 84 current_chunk_ = new DiffChunkStruct(pos1, pos2, len1, len2); 106 int len2 = StrLength(s2); local 124 ASSERT(pos2 + j < len2); 127 diff_parameter += chunk->len1 + chunk->len2; 129 pos2 = diff_pos2 + chunk->len2; 134 ASSERT_EQ(similar_part_length, len2 - pos2); 135 USE(len2); [all...] |