/external/chromium_org/net/base/ |
upload_file_element_reader_unittest.cc | 157 std::vector<char> buf2(bytes_.size() / 2); 158 scoped_refptr<IOBuffer> wrapped_buffer2 = new WrappedIOBuffer(&buf2[0]); 162 wrapped_buffer2.get(), buf2.size(), read_callback2.callback())); 163 EXPECT_EQ(static_cast<int>(buf2.size()), read_callback2.WaitForResult()); 164 EXPECT_EQ(bytes_.size() - buf2.size(), reader_->BytesRemaining()); 165 EXPECT_EQ(std::vector<char>(bytes_.begin(), bytes_.begin() + buf2.size()), 166 buf2); local
|
/external/bison/lib/ |
localcharset.c | 191 char buf2[50+1]; local 211 if (fscanf (fp, "%50s %50s", buf1, buf2) < 2) 214 l2 = strlen (buf2); 234 strcpy (res_ptr + res_size - (l2 + 1), buf2);
|
/external/chromium_org/third_party/icu/source/tools/icuinfo/ |
icuinfo.cpp | 139 char buf2[100]; local 145 u_UCharsToChars(buf, buf2, len+1); 146 printf("Default TZ: %s\n", buf2);
|
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
dsa_gen.c | 140 unsigned char buf[SHA256_DIGEST_LENGTH],buf2[SHA256_DIGEST_LENGTH]; local 215 memcpy(buf2, seed, qsize); 227 if (!EVP_Digest(buf, qsize, buf2, NULL, evpmd, NULL)) 230 md[i]^=buf2[i];
|
/external/chromium_org/third_party/openssl/openssl/crypto/rc2/ |
rc2test.c | 146 unsigned char buf[8],buf2[8]; local 167 RC2_ecb_encrypt(buf,buf2,&key,RC2_DECRYPT); 168 if (memcmp(&(RC2plain[n][0]),buf2,8) != 0)
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_srvr.c | 923 unsigned char *p,*p2,*buf2; local 1070 buf2=OPENSSL_malloc((unsigned int)i); 1071 if (buf2 == NULL) 1076 p2=buf2; 1078 if (!EVP_VerifyUpdate(&ctx,buf2,(unsigned int)i)) 1080 OPENSSL_free(buf2); 1083 OPENSSL_free(buf2);
|
/external/e2fsprogs/e2fsck/ |
crc32.c | 541 unsigned char buf2[SIZE + 4]; local 551 random_garbage(buf2, i); 553 buf3[j] = buf1[j] ^ buf2[j]; 556 crc2 = test_step(INIT2, buf2, i); 557 /* Now check that CRC(buf1 ^ buf2) = CRC(buf1) ^ CRC(buf2) */
|
/external/e2fsprogs/intl/ |
localcharset.c | 146 char buf2[50+1]; local 169 if (fscanf (fp, "%50s %50s", buf1, buf2) < 2) 172 l2 = strlen (buf2); 190 strcpy (res_ptr + res_size - (l2 + 1), buf2);
|
/external/libselinux/src/ |
label_android_property.c | 88 char buf1[BUFSIZ], buf2[BUFSIZ]; local 89 char *buf_p, *prop = buf1, *context = buf2;
|
/external/openssl/crypto/dsa/ |
dsa_gen.c | 140 unsigned char buf[SHA256_DIGEST_LENGTH],buf2[SHA256_DIGEST_LENGTH]; local 215 memcpy(buf2, seed, qsize); 227 if (!EVP_Digest(buf, qsize, buf2, NULL, evpmd, NULL)) 230 md[i]^=buf2[i];
|
/external/openssl/crypto/rc2/ |
rc2test.c | 146 unsigned char buf[8],buf2[8]; local 167 RC2_ecb_encrypt(buf,buf2,&key,RC2_DECRYPT); 168 if (memcmp(&(RC2plain[n][0]),buf2,8) != 0)
|
/external/openssl/ssl/ |
s2_srvr.c | 923 unsigned char *p,*p2,*buf2; local 1070 buf2=OPENSSL_malloc((unsigned int)i); 1071 if (buf2 == NULL) 1076 p2=buf2; 1078 if (!EVP_VerifyUpdate(&ctx,buf2,(unsigned int)i)) 1080 OPENSSL_free(buf2); 1083 OPENSSL_free(buf2);
|
/external/srec/srec/clib/ |
voc_read.c | 278 void* buf2 = 0; local 311 buf2 = mmap(0, inflateSize(size2), PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0); 312 if (buf2 == (void*)-1) goto FAILED; 315 if (decompress_zipentry(ze, buf2, size2)) goto FAILED; 325 *buf = buf2; 333 if (buf2) munmap(buf2, inflateSize(size2));
|
/external/stlport/test/unit/ |
deque_test.cpp | 207 char buf2[1024]; local 208 StackAllocator<int> stack2(buf2, buf2 + sizeof(buf2));
|
list_test.cpp | 277 char buf2[1024]; local 278 StackAllocator<int> stack2(buf2, buf2 + sizeof(buf2));
|
/frameworks/base/core/jni/ |
android_util_Log.cpp | 87 char buf2[200]; local 88 snprintf(buf2, sizeof(buf2), "Log tag \"%s\" exceeds limit of %d characters\n", 91 jniThrowException(env, "java/lang/IllegalArgumentException", buf2);
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
localcharset.c | 161 char buf2[50+1]; local 181 if (fscanf (fp, "%50s %50s", buf1, buf2) < 2) 184 l2 = strlen (buf2); 205 strcpy (res_ptr + res_size - (l2 + 1), buf2);
|
/ndk/tests/device/test-gnustl-full/unit/ |
deque_test.cpp | 207 char buf2[1024]; local 208 StackAllocator<int> stack2(buf2, buf2 + sizeof(buf2));
|
list_test.cpp | 277 char buf2[1024]; local 278 StackAllocator<int> stack2(buf2, buf2 + sizeof(buf2));
|
/ndk/tests/device/test-stlport/unit/ |
deque_test.cpp | 207 char buf2[1024]; local 208 StackAllocator<int> stack2(buf2, buf2 + sizeof(buf2));
|
list_test.cpp | 277 char buf2[1024]; local 278 StackAllocator<int> stack2(buf2, buf2 + sizeof(buf2));
|
/external/blktrace/ |
blkrawverify.c | 93 char buf2[1024]; local 94 sprintf(buf2, "| %s ", traces[i].string); 95 strcat(buf, buf2);
|
/external/chromium/net/socket/ |
ssl_server_socket_nss.cc | 402 const char* buf2; local 404 memio_GetWriteParams(nss_bufs_, &buf1, &len1, &buf2, &len2); 411 memcpy(send_buffer->data() + len1, buf2, len2);
|
/external/chromium_org/sandbox/linux/services/ |
broker_process_unittest.cc | 283 char buf2[3]; local 284 memset(buf2, 1, sizeof(buf2)); 285 int read_len2 = read(cpuinfo_fd2, buf2, sizeof(buf2)); 292 ASSERT_EQ(memcmp(buf, buf2, read_len1), 0);
|
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
debug.c | 498 GLubyte *buf2; local 502 buf2 = (GLubyte *) malloc(w * h * 3); /* 3 bpp */ 512 buf2[i*3+0] = (buf[i] >> 24) & 0xff; 513 buf2[i*3+1] = (buf[i] >> 16) & 0xff; 514 buf2[i*3+2] = (buf[i] >> 8) & 0xff; 518 write_ppm(filename, buf2, w, h, 3, 0, 1, 2, GL_TRUE); 523 free(buf2); 534 GLubyte *buf2; local 538 buf2 = (GLubyte *) malloc(w * h * 3); /* 3 bpp */ 547 buf2[i*3+0] = buf[i] [all...] |