/external/grub/docs/ |
kernel.c.texi | 44 void cmain (unsigned long magic, unsigned long addr); 50 /* @r{Check if MAGIC is valid and print the Multiboot information structure 53 cmain (unsigned long magic, unsigned long addr) 61 if (magic != MULTIBOOT_BOOTLOADER_MAGIC) 63 printf ("Invalid magic number: 0x%x\n", (unsigned) magic);
|
/external/kernel-headers/original/linux/usb/ |
functionfs.h | 36 __le32 magic; member in struct:usb_functionfs_descs_head 47 * | 0 | magic | LE32 | FUNCTIONFS_{FS,HS}_DESCRIPTORS_MAGIC | 64 __le32 magic; member in struct:usb_functionfs_strings_head 75 * | 0 | magic | LE32 | FUNCTIONFS_STRINGS_MAGIC |
|
/external/mesa3d/src/glx/ |
glxhash.c | 117 unsigned long magic; member in struct:__glxHashTable 165 table->magic = HASH_MAGIC; 183 if (table->magic != HASH_MAGIC) 184 return -1; /* Bad magic */ 236 if (!table || table->magic != HASH_MAGIC) 237 return -1; /* Bad magic */ 253 if (table->magic != HASH_MAGIC) 254 return -1; /* Bad magic */ 279 if (table->magic != HASH_MAGIC) 280 return -1; /* Bad magic */ [all...] |
/external/qemu/ |
tcpdump.c | 47 uint32_t magic; member in struct:__anon25663 58 h.magic = PCAP_MAGIC;
|
/external/valgrind/main/memcheck/tests/ |
describe-block.stderr.exp | 4 Address 0x........ is 0 bytes inside a magic foople zone of size 4,096 client-defined
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/ |
user.h | 91 unsigned long int magic; member in struct:user 162 unsigned long int magic; member in struct:user
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/ |
user.h | 91 unsigned long int magic; member in struct:user 162 unsigned long int magic; member in struct:user
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/ |
user.h | 91 unsigned long int magic; member in struct:user 162 unsigned long int magic; member in struct:user
|
/external/bluetooth/bluedroid/gki/common/ |
gki_debug.c | 103 ** stack used by looking non magic num. Magic num is consider 173 UINT32 *magic; local 193 magic = (UINT32 *)((UINT8 *)hdr + BUFFER_HDR_SIZE + size); 194 print("%3d: 0x%02x %4d %10s\n", i, hdr->task_id, hdr->status, (*magic == MAGIC_NO)?"OK":"CORRUPTED"); 215 UINT32 *magic; local 232 magic = (UINT32 *)((UINT8 *)p_hdr + buf_size - sizeof(UINT32)); 242 (*magic == MAGIC_NO)? "OK" : "CORRUPTED",
|
/external/e2fsprogs/lib/ext2fs/ |
badblocks.c | 42 bb->magic = EXT2_ET_MAGIC_BADBLOCKS_LIST; 166 if (bb->magic != EXT2_ET_MAGIC_BADBLOCKS_LIST) 248 iter->magic = EXT2_ET_MAGIC_BADBLOCKS_ITERATE; 267 if (iter->magic != EXT2_ET_MAGIC_BADBLOCKS_ITERATE) 272 if (bb->magic != EXT2_ET_MAGIC_BADBLOCKS_LIST) 292 if (!iter || (iter->magic != EXT2_ET_MAGIC_BADBLOCKS_ITERATE))
|
/external/libnfc-nci/halimpl/bcm2079x/gki/common/ |
gki_debug.c | 102 ** stack used by looking non magic num. Magic num is consider 172 UINT32 *magic; local 192 magic = (UINT32 *)((UINT8 *)hdr + BUFFER_HDR_SIZE + size); 193 print("%3d: 0x%02x %4d %10s\n", i, hdr->task_id, hdr->status, (*magic == MAGIC_NO)?"OK":"CORRUPTED"); 214 UINT32 *magic; local 231 magic = (UINT32 *)((UINT8 *)p_hdr + buf_size - sizeof(UINT32)); 241 (*magic == MAGIC_NO)? "OK" : "CORRUPTED",
|
/external/libnfc-nci/src/gki/common/ |
gki_debug.c | 102 ** stack used by looking non magic num. Magic num is consider 172 UINT32 *magic; local 192 magic = (UINT32 *)((UINT8 *)hdr + BUFFER_HDR_SIZE + size); 193 print("%3d: 0x%02x %4d %10s\n", i, hdr->task_id, hdr->status, (*magic == MAGIC_NO)?"OK":"CORRUPTED"); 214 UINT32 *magic; local 231 magic = (UINT32 *)((UINT8 *)p_hdr + buf_size - sizeof(UINT32)); 241 (*magic == MAGIC_NO)? "OK" : "CORRUPTED",
|
/external/qemu/android/ |
snapshot.c | 41 /* "Magic" sequence of four bytes required by spec to be the first four bytes 265 /* read magic number and qcow version (2x4 bytes) */ 266 uint32_t magic, version; local 267 read_or_die(fd, &magic, sizeof(magic)); 269 be32_to_cpus(&magic); 272 if (magic != QCOW_MAGIC) { 273 derror("Not a valid Qcow snapshot file (expected magic value '%08x', got '%08x').", 274 QCOW_MAGIC, magic);
|
/system/extras/ext4_utils/ |
ext4fixup.c | 51 /* Magic numbers to indicate what state the update process is in */ 56 /* Internal state variables corresponding to the magic numbers */ 124 unsigned long long magic; local 132 len = read(fd, &magic, sizeof(magic)); 133 if (len != sizeof(magic)) { 137 switch (magic) { 155 unsigned long long magic; local 166 magic = MAGIC_STATE_MARKING_INUMS; 169 magic = MAGIC_STATE_UPDATING_INUMS [all...] |
/dalvik/libdex/ |
DexFile.cpp | 293 const u1* magic; local 310 magic = data; 311 if (memcmp(magic+4, DEX_OPT_MAGIC_VERS, 4) != 0) { 313 magic[4], magic[5], magic[6], magic[7]); 381 const int nonSum = sizeof(pHeader->magic) + sizeof(pHeader->checksum) + 485 const int nonSum = sizeof(pHeader->magic) + sizeof(pHeader->checksum);
|
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/egl/wayland/ |
native_drm.c | 131 drm_magic_t magic; local 152 drmGetMagic(drmdpy->fd, &magic); 153 wl_drm_authenticate(drmdpy->wl_drm, magic); 242 wayland_drm_display_authenticate(void *user_data, uint32_t magic) 250 wl_drm_authenticate(drmdpy->wl_drm, magic);
|
/external/emma/core/java12/com/vladium/jcd/parser/ |
ClassDefParser.java | 104 magic (); method 135 void magic () throws IOException method in class:ClassDefParser.classParser 137 final long magic = m_bytes.readU4 (); local 138 if (DEBUG) System.out.println ("magic: [" + Long.toHexString (magic) + ']'); 140 m_table.setMagic (magic);
|
/external/mesa3d/src/gallium/state_trackers/egl/wayland/ |
native_drm.c | 131 drm_magic_t magic; local 152 drmGetMagic(drmdpy->fd, &magic); 153 wl_drm_authenticate(drmdpy->wl_drm, magic); 242 wayland_drm_display_authenticate(void *user_data, uint32_t magic) 250 wl_drm_authenticate(drmdpy->wl_drm, magic);
|
/external/qemu/block/ |
vmdk.c | 91 uint32_t magic; local 95 magic = be32_to_cpu(*(uint32_t *)buf); 96 if (magic == VMDK3_MAGIC || 97 magic == VMDK4_MAGIC) 365 uint32_t magic; local 368 if (bdrv_pread(bs->file, 0, &magic, sizeof(magic)) != sizeof(magic)) 371 magic = be32_to_cpu(magic); 671 uint32_t tmp, magic, grains, gd_size, gt_size, gt_count; local [all...] |
/external/chromium_org/third_party/ots/src/ |
head.cc | 33 uint32_t magic; local 34 if (!table.ReadTag(&magic) || 35 std::memcmp(&magic, "\x5F\x0F\x3C\xF5", 4)) {
|
/external/libpcap/ |
savefile.c | 858 hdr.magic = TCPDUMP_MAGIC; 984 bpf_u_int32 magic; local 1009 magic = hdr.magic; 1010 if (magic != TCPDUMP_MAGIC && magic != KUZNETZOV_TCPDUMP_MAGIC) { 1011 magic = SWAPLONG(magic); 1012 if (magic != TCPDUMP_MAGIC && magic != KUZNETZOV_TCPDUMP_MAGIC) [all...] |
/external/llvm/lib/CodeGen/AsmPrinter/ |
DwarfAccelTable.h | 46 // where the header contains a magic number, version, type of hash function, 86 uint32_t magic; // 'HASH' magic value to allow endian detection member in struct:llvm::DwarfAccelTable::TableHeader 99 magic (MagicHash), version (1), hash_function (eHashFunctionDJB), 105 O << "Magic: " << format("0x%x", magic) << "\n"
|
/frameworks/base/services/common_time/ |
common_time_server_packets.h | 38 // magic number identifying the protocol 39 uint32_t magic; member in class:android::TimeServicePacketHeader 60 magic = kMagic; 68 return ((magic == kMagic) &&
|
/libcore/luni/src/main/java/java/util/zip/ |
GZIPInputStream.java | 57 * The magic header for the GZIP format. 99 short magic = Memory.peekShort(header, 0, ByteOrder.LITTLE_ENDIAN); local 100 if (magic != (short) GZIP_MAGIC) { 101 throw new IOException(String.format("unknown format (magic number %x)", magic));
|
/bootable/recovery/minadbd/ |
transport_usb.c | 35 p->msg.magic = H4(p->msg.magic);
|