/external/tinyxml/ |
tinystr.cpp | 53 TiXmlString& TiXmlString::assign(const char* str, size_type len) 56 if (len > cap || cap > 3*(len + 8)) 59 tmp.init(len); 60 memcpy(tmp.start(), str, len); 65 memmove(start(), str, len); local 66 set_size(len); 72 TiXmlString& TiXmlString::append(const char* str, size_type len) 74 size_type newsize = length() + len; 79 memmove(finish(), str, len); local [all...] |
/external/valgrind/main/VEX/priv/ |
guest_generic_bb_to_IR.h | 69 Int len; member in struct:__anon35309 107 DisResult.len field carries its size. If the returned
|
/external/valgrind/main/coregrind/m_ume/ |
script.c | 45 Bool VG_(match_script)(const void *hdr, Int len) 48 const HChar* end = script + len; 51 // len < 4: need '#', '!', plus at least a '/' and one more char 52 if (len < 4) return False; 83 Int len = 4096; local 92 res = VG_(pread)(fd, hdr, len, 0); 97 len = sr_Res(res); 102 end = hdr + len;
|
/external/valgrind/main/coregrind/ |
vg_preloaded.c | 124 Int len = strlen(varname); local 127 if (!(strncmp(varname, *from, len) == 0 && (*from)[len] == '=')) {
|
/external/valgrind/main/memcheck/tests/amd64/ |
insn-pcmpistri.c | 38 /* len = length of string including trailing null */ 39 const size_t len = strlen(s) + 1; local 40 const size_t roundup = ((len+15)/16)*16; 46 memcpy(space, s, len); 53 for (i=len ; i < roundup ; ++i) 58 assert(len > 0); 59 (void)VALGRIND_SET_VBITS(&s_copy[len-1], &ff, 1);
|
/external/valgrind/main/none/tests/s390x/ |
tre.c | 11 uint64_t len; member in struct:__anon36933 19 tre_regs tre(uint8_t *codepage, uint8_t *addr, uint64_t len, uint8_t test_byte) 27 register uint64_t l1 asm ("3") = len; 37 regs.len = l1; 45 void run_test(void *tran_table, void *srcaddr, uint64_t len, uint8_t test) 50 regs = tre(tran_table, srcaddr, len, test); 56 if ((uint64_t)srcaddr + (len - regs.len) != regs.addr) 60 for ( i = 0; i < len; i++) {
|
troo.c | 9 uint64_t len; member in struct:__anon36934 26 troo_regs tr(uint8_t *addr, uint8_t *codepage, uint8_t *dest, uint64_t len, 31 register uint64_t length asm("3") = len; 47 regs.len = length; 55 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, 61 assert(len <= sizeof src); 66 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 70 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 72 if ((uint64_t)desaddr + (len - regs.len) != regs.desaddr [all...] |
trot.c | 9 uint64_t len; member in struct:__anon36935 27 trot_regs tr(uint8_t *addr, uint16_t *codepage, uint16_t *dest, uint64_t len, 32 register uint64_t length asm("3") = len; 48 regs.len = length; 56 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, 62 assert(len <= sizeof src); 67 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 71 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 73 if ((uint64_t)desaddr + 2*(len - regs.len) != regs.desaddr [all...] |
trto.c | 9 uint64_t len; member in struct:__anon36936 26 trto_regs tr(uint16_t *addr, uint16_t *codepage, uint8_t *dest, uint64_t len, 31 register uint64_t length asm("3") = len; 47 regs.len = length; 55 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, 61 assert(len <= sizeof src); 66 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 70 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 72 if ((uint64_t)desaddr + ((len - regs.len)/2) != regs.desaddr [all...] |
trtt.c | 9 uint64_t len; member in struct:__anon36937 27 trtt_regs tr(uint16_t *addr, uint16_t *codepage, uint16_t *dest, uint64_t len, 32 register uint64_t length asm("3") = len; 48 regs.len = length; 57 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, 63 assert(len <= sizeof src); 68 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 72 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 74 if ((uint64_t)desaddr + (len - regs.len) != regs.desaddr [all...] |
/external/webrtc/src/common_audio/signal_processing/ |
cross_correlation.c | 45 int len, i_len; local 77 len = dim_seq + dim_cross_correlation - 1; 78 i_len = (len + 1) >> 1; 90 if(len % 2)
|
/external/wpa_supplicant_8/src/common/ |
common_module_tests.c | 18 size_t len; member in struct:ieee802_11_parse_test_data 64 res = ieee802_11_parse_elems(test->data, test->len, &elems, 1); 66 ieee802_11_ie_count(test->data, test->len) != test->count) { 86 size_t len; member in struct:rsn_ie_parse_test_data 150 if (wpa_parse_wpa_ie_rsn(test->data, test->len, &data) !=
|
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 22 size_t len[2]; local 26 len[0] = ssid_len; 28 len[1] = 4; 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
|
sha256-prf.c | 59 size_t len[4]; local 64 len[0] = 2; 66 len[1] = os_strlen(label); 68 len[2] = data_len; 70 len[3] = sizeof(length_le); 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 37 * data (variable len, optional) 42 u8 *buf, size_t len) 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 49 if (len < sizeof(int)) 55 if (buf + len - pos > 2) { 58 if (data_len > (size_t) (buf + len - pos)) { 90 DWORD len; local 93 if (ReadFile(drv->events_pipe, buf, sizeof(buf), &len, NULL)) 94 wpa_driver_ndis_event_process(drv, buf, len);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.c | 28 size_t len; local 40 len = be_to_host16(hdr->length); 41 if (len < sizeof(*hdr) + min_payload || len > wpabuf_len(msg)) { 71 size_t len; local 77 len = be_to_host16(hdr->length); 83 if (len < sizeof(*hdr) + 8) { 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 133 size_t len; local [all...] |
eap_pax_common.c | 24 * @output_len: Output len in bytes (W) 38 size_t len[3]; local 50 len[0] = os_strlen(identifier); 52 len[1] = entropy_len; 54 len[2] = 1; 60 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 94 size_t len[3]; local 102 len[0] = data1_len; 104 len[1] = data2_len; 106 len[2] = data3_len [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 36 size_t len, challenge_len, password_len; local 46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len); 47 if (pos == NULL || len == 0) { 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 49 pos, (unsigned long) len); 59 if (challenge_len == 0 || challenge_len > len - 1) { 61 "(challenge_len=%lu len=%lu)", 62 (unsigned long) challenge_len, (unsigned long) len);
|
eap_otp.c | 34 size_t password_len, len; local 37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len); 43 pos, len); 55 eap_sm_request_otp(sm, (const char *) pos, len);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 97 hdr->len = (pos - wpa_ie) - 2; 218 hdr->len = (pos - rsn_ie) - 2; 231 u8 *pos, *len; local 240 len = pos++; /* to be filled */ 275 *len = pos - len - 1; 327 wpa_printf(MSG_MSGDUMP, "Too short vendor specific IE ignored (len=%u)", 476 * @len: Key Data Length 480 int wpa_supplicant_parse_ies(const u8 *buf, size_t len, 487 for (pos = buf, end = pos + len; pos + 1 < end; pos += 2 + pos[1]) [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 21 u8 id, u8 len, const u8 *pos) 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", 24 id, len); 27 if (len != 1) { 29 "%u", len); 36 attr->authorized_macs_len = len; 39 if (len != 1) { 41 "Shareable length %u", len); 47 if (len != 1) { 49 "length %u", len); 553 u16 type, len; local [all...] |
wps_attr_process.c | 21 size_t len[2]; local 39 len[0] = wpabuf_len(wps->last_msg); 41 len[1] = wpabuf_len(msg) - 4 - WPS_AUTHENTICATOR_LEN; 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 58 size_t len; local 66 len = wpabuf_len(msg) - 4 - WPS_KWA_LEN; 67 if (head + len != key_wrap_auth - 4) { 73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash);
|
wps_module_tests.c | 273 size_t len; local 277 len = os_strlen(test->data) / 2; 278 buf = wpabuf_alloc(len); 281 if (hexstr2bin(test->data, wpabuf_put(buf, len), len) < 0) {
|
/external/zopfli/src/zopfli/ |
tree.c | 60 unsigned len = lengths[i]; local 61 if (len != 0) { 62 symbols[i] = next_code[len]; 63 next_code[len]++;
|
/frameworks/av/camera/camera2/ |
CaptureRequest.cpp | 56 size_t len; local 57 const char16_t* className = parcel->readString16Inplace(&len);
|