/external/openssl/crypto/bn/ |
bn_mpi.c | 93 long len; local 101 len=((long)d[0]<<24)|((long)d[1]<<16)|((int)d[2]<<8)|(int)d[3]; 102 if ((len+4) != n) 111 if (len == 0) 120 if (BN_bin2bn(d,(int)len,a) == NULL)
|
/external/oprofile/libop/ |
op_mangle.c | 41 size_t len; local 53 len = strlen(op_samples_current_dir) + strlen(dep_name) + 1 57 len += strlen(cg_image_name) + 1; 60 len += strlen(anon_name); 65 len += 256; 67 mangled = xmalloc(len);
|
/external/pdfium/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/ |
raw.h | 60 OPJ_UINT32 len; member in struct:opj_raw 92 @param len Length of the input buffer 94 void opj_raw_init_dec(opj_raw_t *raw, OPJ_BYTE *bp, OPJ_UINT32 len);
|
/external/ppp/pppd/plugins/pppoatm/ |
misc.c | 23 int ref_len,best_len,len; local 32 len = strlen(value); 33 if (*value != '!' && len <= ref_len && len > best_len && 34 !strncasecmp(*pos,value,len)) { 36 best_len = len;
|
/external/qemu/distrib/sdl-1.2.15/src/loadso/dlopen/ |
SDL_sysloadso.c | 49 size_t len = 1+SDL_strlen(name)+1; local 50 char *_name = SDL_stack_alloc(char, len); 52 SDL_strlcpy(&_name[1], name, len);
|
/external/qemu/include/sysemu/ |
dma.h | 20 hwaddr len; member in struct:__anon34519 32 hwaddr len);
|
/external/qemu/util/ |
unicode.c | 50 unsigned byte, mask, len, i; local 69 len = 0; 71 len++; 73 assert(len > 1 && len < 7); 75 for (i = 1; i < len; i++) { 92 } else if (cp < min_cp[len - 2] && !(cp == 0 && len == 2)) {
|
/external/skia/tests/ |
JpegTest.cpp | 421 size_t len = sizeof(goodJpegImage) / 2; local 427 static_cast<void *>(goodJpegImage), len, &bm8888);
|
SHA1Test.cpp | 37 size_t len = strlen(test.message); local 41 context.update(reinterpret_cast<const uint8_t*>(test.message), len); local
|
/external/skia/tools/lua/ |
lua_app.cpp | 25 size_t len = stream->getLength(); local 26 void* buffer = sk_malloc_throw(len); 27 stream->read(buffer, len); 28 return SkData::NewFromMalloc(buffer, len); 39 size_t len; local 43 len = strlen(argv[i + 1]); 48 len = data->size(); 50 if (!L.runCode(ptr, len)) {
|
/external/speex/libspeex/ |
filterbank.h | 48 int len; member in struct:__anon35592 52 FilterBank *filterbank_new(int banks, spx_word32_t sampling, int len, int type);
|
/external/srtp/crypto/test/ |
aes_calc.c | 37 int len; local 64 len = hex_string_to_octet_string((char *)&key, argv[1], AES_KEY_LEN*2); 66 if (len < AES_KEY_LEN*2) { 70 AES_KEY_LEN*2, len); 82 len = hex_string_to_octet_string((char *)(&data), argv[2], 16*2); 84 if (len < 16*2) { 88 16*2, len);
|
/external/tcpdump/ |
print-802_15_4.c | 52 int len = 0; local 62 len += 4; 65 len += 10; 75 len += 4; 78 len += 10; 83 if (len < 2) 85 len -= 2; 88 return len;
|
print-dtp.c | 51 int type, len; local 81 len = EXTRACT_16BITS(tptr+2); 84 if (type == 0 || len == 0) { 90 type, len); 109 tptr += len;
|
print-ppi.c | 25 u_int16_t len; local 29 len = EXTRACT_16BITS(&hdr->ppi_len); 33 ND_PRINT((ndo,", V.%d DLT %s (%d) len %d", hdr->ppi_ver, 35 len)); 51 u_int length = h->len; 85 * 'h->len' is the length of the packet off the wire, and 'h->caplen'
|
print-rt6.c | 49 int i, len; local 53 len = dp->ip6r_len; 60 printf("srcrt (len=%d", dp->ip6r_len); /*)*/ 81 if (len % 2 == 1) 83 len >>= 1; 85 for (i = 0; i < len; i++) {
|
/external/valgrind/main/none/tests/ |
mq.c | 22 int len; local 59 if ((len = mq_receive(mqdr, buffer, sizeof(buffer), &priority)) < 0) 67 if (len != 4 || memcmp(buffer, "PING", 4) != 0)
|
/external/wpa_supplicant_8/src/ap/ |
hs20.c | 44 u8 *len; local 51 len = eid++; /* to be filled */ 88 *len = eid - len - 1; 98 size_t len = 0; local 105 len = 1 + os_strlen(url); 106 if (5 + len > 255) { 113 buf = wpabuf_alloc(4 + 7 + len); 124 wpabuf_put_u8(buf, 5 + len); 128 wpabuf_put_u8(buf, len - 1) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes-ctr.c | 28 size_t j, len, left = data_len; local 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 42 for (j = 0; j < len; j++) 44 pos += len; 45 left -= len;
|
sha1-prf.c | 38 size_t len[3]; local 41 len[0] = label_len; 43 len[1] = data_len; 45 len[2] = 1; 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
sha1-tprf.c | 38 size_t len[5]; local 41 len[0] = 0; 43 len[1] = label_len + 1; 45 len[2] = seed_len; 47 len[3] = 2; 49 len[4] = 1; 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) 66 len[0] = SHA1_MAC_LEN;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 25 size_t len[5]; local 28 len[0] = 0; 30 len[1] = label_len; 32 len[2] = seed_len; 36 * PRF+(K, S, LEN) = T1 | T2 | ... | Tn 47 len[3] = 1; 49 len[4] = 2; 52 * PRF (K,S,LEN) = T1 | T2 | T3 | T4 | ... where: 53 * T1 = HMAC-SHA1(K, S | LEN | 0x01) 54 * T2 = HMAC-SHA1 (K, T1 | S | LEN | 0x02 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
nfc_pw_token.c | 20 size_t i, len; local 29 len = wpabuf_len(buf); 30 for (i = 0; i < len; i++)
|
/frameworks/av/media/libstagefright/foundation/ |
AStringUtils.cpp | 23 int AStringUtils::Compare(const char *a, const char *b, size_t len, bool ignoreCase) { 24 // this method relies on a trailing '\0' if a or b are shorter than len 25 return ignoreCase ? strncasecmp(a, b, len) : strncmp(a, b, len); 38 if (strLen < globIx || Compare(str, glob, globIx /* len */, ignoreCase)) { 50 size_t len = globIx - start; local 55 if (ix + len > strLen) { 58 const char *tail = str + strLen - len; 59 return !Compare(tail, pattern, len, ignoreCase); 62 while (ix + len <= strLen && Compare(str + ix, pattern, len, ignoreCase)) [all...] |
/frameworks/base/core/java/android/alsa/ |
LineTokenizer.java | 33 int len = line.length(); local 35 for (; offset < len; offset++) { 42 return offset < len ? offset : kTokenNotFound; 46 int len = line.length(); local 48 for (; offset < len; offset++) { 55 return offset < len ? offset : kTokenNotFound;
|