/external/chromium_org/third_party/ots/test/ |
validator-checker.cc | 151 const off_t orig_len = st.st_size; local 153 uint8_t *orig_font = new uint8_t[orig_len]; 154 if (::read(fd, orig_font, orig_len) != orig_len) { 162 uint8_t *trans_font = new uint8_t[orig_len + kBigPadLen]; 163 ots::MemoryStream output(trans_font, orig_len + kBigPadLen); 165 bool result = ots::Process(&output, orig_font, orig_len);
|
side-by-side.cc | 172 uint8_t *orig_font, size_t orig_len, 176 = FT_New_Memory_Face(library, orig_font, orig_len, 0, &orig_face); 242 const off_t orig_len = st.st_size; local 244 uint8_t *orig_font = new uint8_t[orig_len]; 245 if (::read(fd, orig_font, orig_len) != orig_len) { 259 error = FT_New_Memory_Face(library, orig_font, orig_len, 0, &dummy); 268 uint8_t *trans_font = new uint8_t[orig_len + kPadLen]; 269 ots::MemoryStream output(trans_font, orig_len + kPadLen); 271 bool result = ots::Process(&output, orig_font, orig_len); [all...] |
/external/qemu/ |
tcpdump.c | 118 uint32_t orig_len; member in struct:__anon27428 132 h.orig_len = (uint32_t) len;
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_pkt.c | 293 unsigned mac_size, orig_len; local 432 orig_len = rr->length+((unsigned int)rr->type>>8); 434 /* orig_len is the length of the record before any padding was 439 if (orig_len < mac_size || 442 orig_len < mac_size+1)) 457 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 462 /* In this case there's no padding, so |orig_len| [all...] |
d1_pkt.c | 382 unsigned int mac_size, orig_len; local 445 orig_len = rr->length+((unsigned int)rr->type>>8); 447 /* orig_len is the length of the record before any padding was 452 if (orig_len < mac_size || 455 orig_len < mac_size+1)) 470 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 475 /* In this case there's no padding, so |orig_len| [all...] |
s3_enc.c | 712 size_t md_size, orig_len; local 738 orig_len = rec->length+md_size+((unsigned int)rec->type>>8); 772 rec->length + md_size, orig_len,
|
t1_enc.c | 952 size_t md_size, orig_len; local 1000 orig_len = rec->length+md_size+((unsigned int)rec->type>>8); 1021 rec->length + md_size, orig_len, 1037 rec->length, orig_len); [all...] |
/external/openssl/ssl/ |
s3_pkt.c | 293 unsigned mac_size, orig_len; local 432 orig_len = rr->length+((unsigned int)rr->type>>8); 434 /* orig_len is the length of the record before any padding was 439 if (orig_len < mac_size || 442 orig_len < mac_size+1)) 457 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 462 /* In this case there's no padding, so |orig_len| [all...] |
d1_pkt.c | 382 unsigned int mac_size, orig_len; local 445 orig_len = rr->length+((unsigned int)rr->type>>8); 447 /* orig_len is the length of the record before any padding was 452 if (orig_len < mac_size || 455 orig_len < mac_size+1)) 470 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 475 /* In this case there's no padding, so |orig_len| [all...] |
s3_enc.c | 712 size_t md_size, orig_len; local 738 orig_len = rec->length+md_size+((unsigned int)rec->type>>8); 772 rec->length + md_size, orig_len,
|
t1_enc.c | 952 size_t md_size, orig_len; local 1000 orig_len = rec->length+md_size+((unsigned int)rec->type>>8); 1021 rec->length + md_size, orig_len, 1037 rec->length, orig_len); [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/ |
section.c | 1484 unsigned long orig_len; local [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_nss.cc | 1384 const unsigned int orig_len = len; local [all...] |
/external/clang/test/Analysis/ |
string.c | 378 size_t orig_len = strlen(x); local 385 clang_analyzer_eval((int)strlen(x) == (orig_len + strlen(y))); // expected-warning{{TRUE}} 566 size_t orig_len = strlen(x); local 573 clang_analyzer_eval(strlen(x) == (orig_len + strlen(y))); // expected-warning{{TRUE}}
|