/packages/inputmethods/PinyinIME/jni/share/ |
utf16reader.cpp | 76 size_t ret_len = 0; 84 if (0 == ret_len) 86 read_buf[ret_len] = (char16)'\0'; 94 if (ret_len + i > 0 && read_buf[ret_len + i - 1] == (char16)'\r') { 95 read_buf[ret_len + i - 1] = (char16)'\0'; 97 read_buf[ret_len + i] = (char16)'\0'; 109 read_buf[ret_len + i] = buffer_[buffer_next_pos_ + i]; 113 ret_len += buffer_valid_len_;
|
userdict.cpp | 151 int ret_len = 0; local 154 ++ret_len; 162 ++ret_len; 175 return ret_len; [all...] |
/external/libmtp/src/ |
unicode.c | 138 int ret_len = ucs2_strlen((uint16_t*)unicstr)*sizeof(uint16_t)+2; local 139 uint16_t* ret = malloc(ret_len); 140 memcpy(ret,unicstr,(size_t)ret_len);
|
/external/wpa_supplicant_8/src/utils/ |
os_internal.c | 138 size_t len = 128, cwd_len, rel_len, ret_len; local 161 ret_len = cwd_len + 1 + rel_len + 1; 162 ret = os_malloc(ret_len); 167 ret[ret_len - 1] = '\0';
|
os_unix.c | 213 size_t len = 128, cwd_len, rel_len, ret_len; local 243 ret_len = cwd_len + 1 + rel_len + 1; 244 ret = os_malloc(ret_len); 249 ret[ret_len - 1] = '\0';
|
/external/bluetooth/bluedroid/btif/src/ |
btif_sock_util.c | 132 int ret_len = len; local 150 ret_len = -1; 162 return ret_len;
|
/external/harfbuzz_ng/util/ |
options.cc | 501 unsigned int ret_len; local 503 ret_len = text_len; 504 text += ret_len; 507 ret_len = p - ret; 508 text += ret_len + 1; 509 text_len -= ret_len + 1; 512 *len = ret_len;
|
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 693 int str_len = 0, bin_len = 0, ret_len = 0; local 752 ret_len = exsltCryptoHex2Bin (str, str_len, bin, bin_len); 755 ret = xmlMallocAtomic (ret_len); 763 PLATFORM_RC4_DECRYPT (ctxt, padkey, bin, ret_len, ret, ret_len);
|
/external/chromium_org/third_party/openssl/openssl/crypto/ec/ |
ec_mult.c | 193 static signed char *compute_wNAF(const BIGNUM *scalar, int w, size_t *ret_len) 211 *ret_len = 1; 237 * (*ret_len will be set to the actual length, i.e. at most 322 *ret_len = len;
|
/external/openssl/crypto/ec/ |
ec_mult.c | 193 static signed char *compute_wNAF(const BIGNUM *scalar, int w, size_t *ret_len) 211 *ret_len = 1; 237 * (*ret_len will be set to the actual length, i.e. at most 322 *ret_len = len;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ap.c | 750 int ret, ret_len = 0; local 757 ret_len = os_snprintf(buf, buflen, "%08d", rpin); 760 ret_len = os_snprintf(buf, buflen, "%s", pin); 766 return ret_len;
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
regexec.c | 51 Idx stop, bool ret_len) internal_function; 56 bool ret_len) internal_function; 377 Idx stop, bool ret_len) 409 ret_len); 416 If RET_LEN is true the length of the match is returned (re_match style); 424 bool ret_len) 498 if (ret_len) [all...] |
/external/bluetooth/bluedroid/stack/btm/ |
btm_sec.c | 1836 UINT8 ret_len = 0; local [all...] |