/external/dropbear/libtomcrypt/demos/ |
H A D | multi.c | 19 if (len != len2 || memcmp(buf[0], buf[1], len)) { 25 if (len != len2 || memcmp(buf[0], buf[1], len)) { 31 if (len != len2 || memcmp(buf[0], buf[1], len)) { 41 if (len != len2 || memcmp(buf[0], buf[1], len)) { 47 if (len != len2 || memcmp(buf[0], buf[1], len)) { 53 if (len != len2 || memcmp(buf[0], buf[1], len)) { 63 if (len != len2 || memcmp(buf[0], buf[1], len)) { 69 if (len != len2 || memcmp(buf[0], buf[1], len)) { 75 if (len != len2 || memcmp(buf[0], buf[1], len)) { 85 if (len != len2 || memcmp(bu [all...] |
/external/valgrind/main/memcheck/tests/ |
H A D | memcmptest.stderr.exp | 2 at 0x........: memcmp (mc_replace_strmem.c:...)
|
H A D | memcmptest.c | 5 // An issue here is that in glibc memcmp() and bcmp() are aliases. Valgrind 7 // message, even though memcmp() was called. This is hard to avoid. 13 if (memcmp(s1, s2, 8) != 0)
|
/external/valgrind/tsan/ |
H A D | ts_valgrind_libc.cc | 53 extern "C" int memcmp(const void *a, const void *b, unsigned long c) { function 54 return VG_(memcmp)(a,b,c);
|
/external/clang/test/Analysis/ |
H A D | bstring.c | 11 // path, such as memcpy and __memcpy_chk, or memcmp and bcmp. If VARIANT is 321 // memcmp() 329 #define memcmp bcmp macro 333 #define memcmp BUILTIN(memcmp) macro 334 int memcmp(const void *s1, const void *s2, size_t n); 343 memcmp(a, b, 4); // no-warning 350 memcmp(a, b, 5); // expected-warning{{out-of-bound}} 357 memcmp(a, b, 4); // expected-warning{{out-of-bound}} 363 if (memcmp( [all...] |
/external/chromium/net/http/ |
H A D | des_unittest.cc | 29 EXPECT_EQ(0, memcmp(ciphertext, des_ecb_known_ciphertext, 8)); 47 EXPECT_EQ(0, memcmp(ciphertext, known_ciphertext, 8));
|
/external/tcpdump/ |
H A D | print-cip.c | 76 if (memcmp(rfcllc, p, sizeof(rfcllc))==0 && caplen < RFC1483LLC_LEN) { 84 if (memcmp(rfcllc, p, sizeof(rfcllc)) == 0) {
|
/external/wpa_supplicant/tests/ |
H A D | test_md4.c | 76 if (memcmp(hash, tests[i].hash, 16) != 0) { 88 if (memcmp(hash, tests[i].hash, 16) != 0) {
|
H A D | test_md5.c | 76 if (memcmp(hash, tests[i].hash, 16) != 0) { 88 if (memcmp(hash, tests[i].hash, 16) != 0) {
|
H A D | test_ms_funcs.c | 67 if (memcmp(challenge, buf, sizeof(challenge)) != 0) { 73 if (memcmp(password_hash, buf, sizeof(password_hash)) != 0) { 82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 88 if (memcmp(password_hash_hash, buf, sizeof(password_hash_hash)) != 0) { 97 if (memcmp(authenticator_response, buf, sizeof(authenticator_response)) 104 if (memcmp(master_key, buf, sizeof(master_key)) != 0) { 110 if (memcmp(send_start_key, buf, sizeof(send_start_key)) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_md4.c | 76 if (memcmp(hash, tests[i].hash, 16) != 0) { 88 if (memcmp(hash, tests[i].hash, 16) != 0) {
|
H A D | test_md5.c | 76 if (memcmp(hash, tests[i].hash, 16) != 0) { 88 if (memcmp(hash, tests[i].hash, 16) != 0) {
|
H A D | test_ms_funcs.c | 67 if (memcmp(challenge, buf, sizeof(challenge)) != 0) { 73 if (memcmp(password_hash, buf, sizeof(password_hash)) != 0) { 82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 88 if (memcmp(password_hash_hash, buf, sizeof(password_hash_hash)) != 0) { 97 if (memcmp(authenticator_response, buf, sizeof(authenticator_response)) 104 if (memcmp(master_key, buf, sizeof(master_key)) != 0) { 110 if (memcmp(send_start_key, buf, sizeof(send_start_key)) != 0) {
|
/external/dropbear/libtomcrypt/testprof/ |
H A D | modes_test.c | 45 if (l != 16 || memcmp(iv2, iv, 16)) { 55 if (memcmp(tmp, pt, 64) != 0) { 67 /* note we don't memcmp iv2/iv since cfb_start processes the IV for the first block */ 78 if (memcmp(tmp, pt, 64) != 0) { 90 if (l != 16 || memcmp(iv2, iv, 16)) { 100 if (memcmp(tmp, pt, 64) != 0) {
|
H A D | base64_test.c | 14 if (l2 != x || memcmp(tmp, in, x)) {
|
/external/skia/src/animator/ |
H A D | SkOperandIterpolator.cpp | 128 SkASSERT(memcmp(v, v1, sizeof(v)) == 0); 132 SkASSERT(memcmp(v, v1, sizeof(v)) == 0); 136 SkASSERT(memcmp(v, v1, sizeof(v)) == 0); 140 SkASSERT(memcmp(v, v2, sizeof(v)) == 0); 144 SkASSERT(memcmp(v, v2, sizeof(v)) == 0); 148 SkASSERT(memcmp(v, iset(vv, 60, 120, 180), sizeof(v)) == 0);
|
/external/chromium/net/base/ |
H A D | x509_cert_types.h | 33 return memcmp(data, other.data, sizeof(data)) == 0; 43 return memcmp(lhs.data, rhs.data, sizeof(lhs.data)) < 0; 131 (memcmp(oid1->Data, oid2->Data, oid1->Length) == 0);
|
H A D | ssl_false_start_blacklist.cc | 22 memcmp(&host[len - blacklist_entry_len], &kHashData[i + 1],
|
/external/clang/test/SemaCXX/ |
H A D | warn-bad-memaccess.cpp | 6 extern "C" void *memcmp(void *s1, const void *s2, unsigned n); 42 memcmp(&x1, 0, sizeof x1); // \ 43 // expected-warning{{first operand of this 'memcmp' call is a pointer to dynamic class 'struct X1'; vtable pointer will be compared}} \ 45 memcmp(0, &x1, sizeof x1); // \ 46 // expected-warning{{second operand of this 'memcmp' call is a pointer to dynamic class 'struct X1'; vtable pointer will be compared}} \
|
/external/e2fsprogs/lib/uuid/ |
H A D | compare.c | 53 return memcmp(uuid1.node, uuid2.node, 6);
|
/external/skia/tests/ |
H A D | StreamTest.cpp | 40 memcmp(storage + bytesRead, storage2, ss) == 0); 63 REPORTER_ASSERT(reporter, memcmp(s, copy, sizeof(s)) == 0); 82 REPORTER_ASSERT(reporter, memcmp(&dst[i * 26], s, 26) == 0); 84 REPORTER_ASSERT(reporter, memcmp(dst, ds.getStream(), 100*26) == 0);
|
/external/webkit/Source/WebCore/platform/text/ |
H A D | ParserUtilities.h | 33 if (memcmp(name, ptr, sizeof(UChar) * length))
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_custom.h | 46 #ifdef memcmp 49 #define XMEMCMP memcmp
|
/external/webkit/Source/WebCore/platform/image-decoders/ |
H A D | ImageDecoder.cpp | 60 return !memcmp(contents, "GIF8", 4); 65 return !memcmp(contents, "\x89\x50\x4E\x47", 4); 70 return !memcmp(contents, "\xFF\xD8\xFF", 3); 76 return !memcmp(contents, "RIFF", 4) && !memcmp(contents + 8, "WEBPVP", 6); 82 return !memcmp(contents, "BM", 2); 87 return !memcmp(contents, "\x00\x00\x01\x00", 4); 92 return !memcmp(contents, "\x00\x00\x02\x00", 4);
|
/external/chromium/net/websockets/ |
H A D | websocket_handshake_draft75.cc | 69 if (!memcmp(data, kServerHandshakeHeader, kServerHandshakeHeaderLength)) { 84 if (memcmp(p, kUpgradeHeader, kUpgradeHeaderLength)) { 93 if (memcmp(p, kConnectionHeader, kConnectionHeaderLength)) {
|