/external/e2fsprogs/ |
wordwrap.pl | 20 $len = length($word) + 1; 21 $linelen += $len; 24 $linelen = 1+$len;
|
/external/vboot_reference/utility/ |
dev_make_keypair | 51 openssl genrsa -F4 -out "${base}_${len}.pem" $len 53 openssl req -batch -new -x509 -key "${base}_${len}.pem" \ 54 -out "${base}_${len}.crt" 56 dumpRSAPublicKey -cert "${base}_${len}.crt" > "${base}_${len}.keyb" 61 --key "${base}_${len}.keyb" \ 68 --key "${base}_${len}.pem" \ 72 rm -f "${base}_${len}.pem" "${base}_${len}.crt" "${base}_${len}.keyb [all...] |
/external/syslinux/utils/ |
bin2hex.pl | 32 $len = 0; 37 $len += length($s); 38 if ( $len > 72 ) { 40 $len = 0; 43 $len++; 46 print "\n" if ( $len );
|
isohdpfxarray.pl | 41 my $len = 0; 48 printf("\t/* 0x%03x */ ", $len) if (!($len % 8)); 50 $len++; 52 print("\n") if (!($len % 8));
|
/external/syslinux/gpxe/src/util/ |
catrom.pl | 20 my $len = read ( ROM, my $romdata, MAX_ROM_LEN ) 29 die "$romfile has incorrect length field $checklen (should be $len)\n" 30 unless $len == $checklen; 34 if $pci >= $len;
|
swapdevids.pl | 35 $len = read(F, $data, 64*1024); 36 defined($len) or die "$file: $!\n"; 39 ($pci < $len and $pnp < $len) or die "$file: Not a PCI PnP ROM image\n";
|
/external/strace/tests/ |
pc.test | 41 [ -n "$len" ] && 42 pid="$(sed -r -n 's/^\[[[:xdigit:]]{'"$len"'}\] --- SIGCHLD \{si_signo=SIGCHLD, si_code=CLD_(KILLED|DUMPED), si_pid=([[:digit:]]+), .*/\2/p' "$LOG")" && 44 ip="$(sed -r -n 's/^\[pid +'"$pid"'\] \[([[:xdigit:]]{'"$len"'})] --- SIGSEGV \{.*\} ---$/\1/p' "$LOG")" && 52 \\[[[:xdigit:]]{$len}\\] munmap\\(0x[[:xdigit:]]+, 0\\) += -1 .* 54 \\[pid +$pid\\] \\[\\?{$len}\\] \\+\\+\\+ killed by SIGSEGV( \\(core dumped\\))? \\+\\+\\+ 55 \\[\\?{$len}\\] \\+\\+\\+ exited with 0 \\+\\+\\+
|
/external/strace/tests-m32/ |
pc.test | 41 [ -n "$len" ] && 42 pid="$(sed -r -n 's/^\[[[:xdigit:]]{'"$len"'}\] --- SIGCHLD \{si_signo=SIGCHLD, si_code=CLD_(KILLED|DUMPED), si_pid=([[:digit:]]+), .*/\2/p' "$LOG")" && 44 ip="$(sed -r -n 's/^\[pid +'"$pid"'\] \[([[:xdigit:]]{'"$len"'})] --- SIGSEGV \{.*\} ---$/\1/p' "$LOG")" && 52 \\[[[:xdigit:]]{$len}\\] munmap\\(0x[[:xdigit:]]+, 0\\) += -1 .* 54 \\[pid +$pid\\] \\[\\?{$len}\\] \\+\\+\\+ killed by SIGSEGV( \\(core dumped\\))? \\+\\+\\+ 55 \\[\\?{$len}\\] \\+\\+\\+ exited with 0 \\+\\+\\+
|
/external/strace/tests-mx32/ |
pc.test | 41 [ -n "$len" ] && 42 pid="$(sed -r -n 's/^\[[[:xdigit:]]{'"$len"'}\] --- SIGCHLD \{si_signo=SIGCHLD, si_code=CLD_(KILLED|DUMPED), si_pid=([[:digit:]]+), .*/\2/p' "$LOG")" && 44 ip="$(sed -r -n 's/^\[pid +'"$pid"'\] \[([[:xdigit:]]{'"$len"'})] --- SIGSEGV \{.*\} ---$/\1/p' "$LOG")" && 52 \\[[[:xdigit:]]{$len}\\] munmap\\(0x[[:xdigit:]]+, 0\\) += -1 .* 54 \\[pid +$pid\\] \\[\\?{$len}\\] \\+\\+\\+ killed by SIGSEGV( \\(core dumped\\))? \\+\\+\\+ 55 \\[\\?{$len}\\] \\+\\+\\+ exited with 0 \\+\\+\\+
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/files/ |
common.sh | 65 openssl genrsa -F4 -out "${base}_${len}.pem" $len 67 openssl req -batch -new -x509 -key "${base}_${len}.pem" \ 68 -out "${base}_${len}.crt" 70 dumpRSAPublicKey -cert "${base}_${len}.crt" > "${base}_${len}.keyb" 75 --key "${base}_${len}.keyb" \ 82 --key "${base}_${len}.pem" \ 86 rm -f "${base}_${len}.pem" "${base}_${len}.crt" "${base}_${len}.keyb [all...] |
/external/autotest/server/site_tests/firmware_UpdateKernelDataKeyVersion/files/ |
common.sh | 65 openssl genrsa -F4 -out "${base}_${len}.pem" $len 67 openssl req -batch -new -x509 -key "${base}_${len}.pem" \ 68 -out "${base}_${len}.crt" 70 dumpRSAPublicKey -cert "${base}_${len}.crt" > "${base}_${len}.keyb" 75 --key "${base}_${len}.keyb" \ 82 --key "${base}_${len}.pem" \ 86 rm -f "${base}_${len}.pem" "${base}_${len}.crt" "${base}_${len}.keyb [all...] |
/external/autotest/server/site_tests/firmware_UpdateKernelSubkeyVersion/files/ |
common.sh | 65 openssl genrsa -F4 -out "${base}_${len}.pem" $len 67 openssl req -batch -new -x509 -key "${base}_${len}.pem" \ 68 -out "${base}_${len}.crt" 70 dumpRSAPublicKey -cert "${base}_${len}.crt" > "${base}_${len}.keyb" 75 --key "${base}_${len}.keyb" \ 82 --key "${base}_${len}.pem" \ 86 rm -f "${base}_${len}.pem" "${base}_${len}.crt" "${base}_${len}.keyb [all...] |
/external/vboot_reference/scripts/keygeneration/ |
common.sh | 66 openssl genrsa -F4 -out "${base}_${len}.pem" $len 68 openssl req -batch -new -x509 -key "${base}_${len}.pem" \ 69 -out "${base}_${len}.crt" 71 dumpRSAPublicKey -cert "${base}_${len}.crt" > "${base}_${len}.keyb" 76 --key "${base}_${len}.keyb" \ 83 --key "${base}_${len}.pem" \ 87 rm -f "${base}_${len}.pem" "${base}_${len}.crt" "${base}_${len}.keyb [all...] |
/external/syslinux/diag/geodsp/ |
mk-lba-img.pl | 61 $len=0; 64 $len++; 66 $tail = (SECTOR_SIZE - ($len % SECTOR_SIZE)) % SECTOR_SIZE; 68 print("Len: $len\ttail: $tail\n"); 73 $st = ($len + $tail) / SECTOR_SIZE;
|
/frameworks/native/opengl/libs/tools/ |
glapigen | 53 my $len = scalar(@args); 54 for (my $num = 0; $num < $len; $num++) {
|
/external/boringssl/src/crypto/aes/asm/ |
aesni-x86.pl | 80 $len="eax"; 426 &mov ($len,&wparam(2)); 429 &and ($len,-16); 437 &cmp ($len,0x60); 447 &sub ($len,0x60); 471 &sub ($len,0x60); 481 &add ($len,0x60); 486 &cmp ($len,0x20); 491 &cmp ($len,0x40); 537 &cmp ($len,0x60) [all...] |
aesv8-armx.pl | 350 my ($inp,$out,$len,$key,$ivp)=map("x$_",(0..4)); my $enc="w5"; 376 subs $len,$len,#16 383 and $len,$len,#-16 443 subs $len,$len,#16 480 subs $len,$len,#16 511 subs $len,$len,#32 // bia [all...] |
aesp8-ppc.pl | 501 my ($inp,$out,$len,$key,$ivp,$enc,$rounds,$idx)=map("r$_",(3..10)); 509 ${UCMP}i $len,16 552 subi $len,$len,16 # len-=16 581 ${UCMP}i $len,16 594 ${UCMP}i $len,128 600 subi $len,$len,16 # len-=16 628 ${UCMP}i $len,16 724 subi $len,$len,128 # bia [all...] |
aesni-x86_64.pl | 218 $len="%rdx"; 612 and \$-16,$len # if ($len<16) 622 cmp \$0x80,$len # if ($len<8*16) 634 sub \$0x80,$len # $len-=8*16 (can be zero) 662 sub \$0x80,$len 663 jnc .Lecb_enc_loop8 # loop if $len-=8*16 didn't borrow 676 add \$0x80,$len # restore real remaining $le [all...] |
/external/boringssl/src/crypto/chacha/asm/ |
chacha-armv8.pl | 47 my ($out,$inp,$len,$key,$ctr) = map("x$_",(0..4)); 137 cbz $len,.Labort 139 cmp $len,#192 194 subs $len,$len,#64 275 add $len,$len,#64 278 add $inp,$inp,$len 279 add $out,$out,$len 280 add $ctr,sp,$len [all...] |
/external/shflags/src/ |
shflags_test_private.sh | 199 assertEquals 'missing argument' 0 ${len} 203 assertEquals 'empty argument' 0 ${len} 207 assertEquals 'single-word' 6 ${len} 211 assertEquals 'multi-word' 14 ${len}
|
/external/boringssl/src/crypto/modes/asm/ |
ghashp8-ppc.pl | 65 open STDOUT,"| $^X $xlate $flavour $output" || die "can't call $xlate: $!"; 66 67 my ($Xip,$Htbl,$inp,$len)=map("r$_",(3..6)); # argument block 283 ${UCMP}i $len,64 288 subic. $len,$len,16 296 add r9,$inp,$len # end of input 305 subic $len,$len,32 311 and r0,r0,$len 341 cmplwi $len,0 439 $SHRI $len,$len,4 # this allows to use sign bi [all...] |
/external/flatbuffers/php/ |
FlatbufferBuilder.php | 600 $len = strlen($bytes); 601 if ($len < 1) { 606 for ($j = 0, $i = 0; $i < $len; $i++) { 617 if ((($i+1) <= $len) && 626 if ((($i + 2) <= $len) && 636 if ((($i+2) <= $len) && 648 if ((($i+2) <= $len) && 658 if ((($i + 3) <= $len) && 670 if ((($i+3) <= $len) && 682 if ((($i+3) <= $len) & [all...] |
Table.php | 65 $len = $this->bb->getInt($offset); 67 return substr($this->bb->_buffer, $startPos, $len);
|
/toolchain/binutils/binutils-2.25/libiberty/ |
maint-tool | 274 $len = length("$obj $f"); 277 if ($len + length($d) > 70) { 279 $len = 8 + length($d); 282 $len += length($d) + 1;
|