/external/dropbear/libtomcrypt/demos/ |
H A D | multi.c | 7 unsigned long len, len2; local 17 len2 = sizeof(buf[0]); 18 hash_memory_multi(find_hash("sha256"), buf[1], &len2, (unsigned char*)"hello", 5, NULL); 19 if (len != len2 || memcmp(buf[0], buf[1], len)) { 20 printf("Failed: %d %lu %lu\n", __LINE__, len, len2); 23 len2 = sizeof(buf[0]); 24 hash_memory_multi(find_hash("sha256"), buf[1], &len2, (unsigned char*)"he", 2UL, "llo", 3UL, NULL, 0); 25 if (len != len2 || memcmp(buf[0], buf[1], len)) { 26 printf("Failed: %d %lu %lu\n", __LINE__, len, len2); 29 len2 [all...] |
/external/chromium_org/v8/test/mjsunit/regress/ |
H A D | regress-666721.js | 30 function len2(a) { return a.length; } function 43 assertEquals(0, len2({length:0})); 44 assertEquals(1, len2([1])); 45 assertEquals(2, len2({length:2})); 46 assertEquals(3, len2([1,2,3])); 47 assertEquals(4, len2('1234'));
|
/external/v8/test/mjsunit/regress/ |
H A D | regress-666721.js | 30 function len2(a) { return a.length; } function 43 assertEquals(0, len2({length:0})); 44 assertEquals(1, len2([1])); 45 assertEquals(2, len2({length:2})); 46 assertEquals(3, len2([1,2,3])); 47 assertEquals(4, len2('1234'));
|
/external/linux-tools-perf/util/ |
H A D | levenshtein.c | 44 int len1 = strlen(string1), len2 = strlen(string2); local 45 int *row0 = malloc(sizeof(int) * (len2 + 1)); 46 int *row1 = malloc(sizeof(int) * (len2 + 1)); 47 int *row2 = malloc(sizeof(int) * (len2 + 1)); 50 for (j = 0; j <= len2; j++) 56 for (j = 0; j < len2; j++) { 78 i = row1[len2];
|
/external/dropbear/libtomcrypt/testprof/ |
H A D | katja_test.c | 10 unsigned long kat_msgsize, len, len2, cnt; local 67 len2 = kat_msgsize; 72 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key)); 75 if (len2 != kat_msgsize) { 76 fprintf(stderr, "\nkatja_decrypt_key mismatch len %lu (first decrypt)", len2); 80 len2 = kat_msgsize; 81 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 86 if (len2 != kat_msgsize || memcmp(tmp, in, kat_msgsize)) { 88 fprintf(stderr, "\nkatja_decrypt_key mismatch, len %lu (second decrypt)\n", len2); 113 len2 [all...] |
H A D | rsa_test.c | 130 unsigned long rsa_msgsize, len, len2, cnt; local 190 len2 = rsa_msgsize; 195 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key)); 198 if (len2 != rsa_msgsize) { 199 fprintf(stderr, "\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2); 203 len2 = rsa_msgsize; 204 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 209 if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) { 211 fprintf(stderr, "\nrsa_decrypt_key mismatch, len %lu (second decrypt)\n", len2); 236 len2 [all...] |
/external/chromium_org/third_party/leveldatabase/src/util/ |
H A D | status.cc | 22 const uint32_t len2 = msg2.size(); local 23 const uint32_t size = len1 + (len2 ? (2 + len2) : 0); 28 if (len2) { 31 memcpy(result + 7 + len1, msg2.data(), len2);
|
/external/zlib/src/ |
H A D | adler32.c | 12 local uLong adler32_combine_ OF((uLong adler1, uLong adler2, z_off64_t len2)); 136 local uLong adler32_combine_(adler1, adler2, len2) 139 z_off64_t len2; 146 if (len2 < 0) 150 MOD63(len2); /* assumes len2 >= 0 */ 151 rem = (unsigned)len2; 165 uLong ZEXPORT adler32_combine(adler1, adler2, len2) 168 z_off_t len2; 170 return adler32_combine_(adler1, adler2, len2); [all...] |
H A D | crc32.c | 53 local uLong crc32_combine_ OF((uLong crc1, uLong crc2, z_off64_t len2)); 355 local uLong crc32_combine_(crc1, crc2, len2) 358 z_off64_t len2; 366 if (len2 <= 0) 383 /* apply len2 zeros to crc1 (first square will put the operator for one 386 /* apply zeros operator for this bit of len2 */ 388 if (len2 & 1) 390 len2 >>= 1; 393 if (len2 == 0) 398 if (len2 [all...] |
/external/qemu/ |
H A D | tcpdump.c | 123 int len2 = len; local 125 if (len2 > PCAP_SNAPLEN) 126 len2 = PCAP_SNAPLEN; 131 h.incl_len = (uint32_t) len2; 135 fwrite( base, 1, len2, capture_file ); 138 capture_size += len2;
|
H A D | cbuffer.c | 83 int len2 = len; local 87 while (len2 > 0) { 104 if (avail > len2) 105 avail = len2; 110 len2 -= avail; 113 return len - len2; 119 int len2 = len; local 123 while (len2 > 0) { 137 if (avail > len2) 138 avail = len2; [all...] |
/external/chromium_org/v8/test/cctest/ |
H A D | test-liveedit.cc | 68 len1(len1_param), len2(len2_param), next(NULL) {} 72 int len2; member in class:__anon15642::DiffChunkStruct 84 void AddChunk(int pos1, int pos2, int len1, int len2) { argument 85 current_chunk_ = new(zone_) DiffChunkStruct(pos1, pos2, len1, len2); 108 int len2 = StrLength(s2); local 126 ASSERT(pos2 + j < len2); 129 diff_parameter += chunk->len1 + chunk->len2; 131 pos2 = diff_pos2 + chunk->len2; 136 ASSERT_EQ(similar_part_length, len2 - pos2); 137 USE(len2); [all...] |
/external/v8/test/cctest/ |
H A D | test-liveedit.cc | 68 len1(len1_param), len2(len2_param), next(NULL) {} 72 int len2; member in class:__anon27341::DiffChunkStruct 83 void AddChunk(int pos1, int pos2, int len1, int len2) { argument 84 current_chunk_ = new DiffChunkStruct(pos1, pos2, len1, len2); 106 int len2 = StrLength(s2); local 124 ASSERT(pos2 + j < len2); 127 diff_parameter += chunk->len1 + chunk->len2; 129 pos2 = diff_pos2 + chunk->len2; 134 ASSERT_EQ(similar_part_length, len2 - pos2); 135 USE(len2); [all...] |
/external/dropbear/libtomcrypt/src/misc/base64/ |
H A D | base64_encode.c | 35 unsigned long i, len2, leven; local 43 len2 = 4 * ((inlen + 2) / 3); 44 if (*outlen < len2 + 1) { 45 *outlen = len2 + 1;
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
H A D | sanitizer_libc_test.cc | 62 uptr len2 = internal_strlen(str2); local 82 EXPECT_EQ(len2, internal_write(fd, str2, len2)); 89 EXPECT_EQ(len1 + len2, fsize); 113 EXPECT_EQ(len2, internal_read(fd, buf, len2)); 114 EXPECT_EQ(0, internal_memcmp(buf, str2, len2));
|
/external/chromium_org/third_party/zlib/ |
H A D | adler32.c | 12 local uLong adler32_combine_(uLong adler1, uLong adler2, z_off64_t len2); 131 local uLong adler32_combine_(adler1, adler2, len2) 134 z_off64_t len2; 141 rem = (unsigned)(len2 % BASE); 155 uLong ZEXPORT adler32_combine(adler1, adler2, len2) 158 z_off_t len2; 160 return adler32_combine_(adler1, adler2, len2); 163 uLong ZEXPORT adler32_combine64(adler1, adler2, len2) 166 z_off64_t len2; 168 return adler32_combine_(adler1, adler2, len2); [all...] |
H A D | crc32.c | 71 local uLong crc32_combine_(uLong crc1, uLong crc2, z_off64_t len2); 372 local uLong crc32_combine_(crc1, crc2, len2) 375 z_off64_t len2; 383 if (len2 <= 0) 400 /* apply len2 zeros to crc1 (first square will put the operator for one 403 /* apply zeros operator for this bit of len2 */ 405 if (len2 & 1) 407 len2 >>= 1; 410 if (len2 == 0) 415 if (len2 [all...] |
/external/chromium_org/third_party/opus/src/silk/ |
H A D | resampler_down2.c | 43 opus_int32 k, len2 = silk_RSHIFT32( inLen, 1 ); local 50 for( k = 0; k < len2; k++ ) {
|
/external/chromium/net/base/ |
H A D | nss_memio.h | 72 * |buf1|, |len1| and |buf2|, |len2|. 76 const char **buf2, unsigned int *len2);
|
/external/valgrind/main/VEX/priv/ |
H A D | main_util.c | 337 Int fwidth, nout, len1, len2, len3; local 387 len2 = vex_strlen(str); 388 if (fwidth > len2) { len1 = ljustify ? 0 : fwidth-len2; 389 len3 = ljustify ? fwidth-len2 : 0; } 399 len2 = vex_strlen(str); 400 if (fwidth > len2) { len1 = ljustify ? 0 : fwidth-len2; 401 len3 = ljustify ? fwidth-len2 : 0; } 415 len2 [all...] |
/external/valgrind/main/none/tests/s390x/ |
H A D | clcl.c | 13 uint32_t len2; member in struct:__anon28769 63 result.len2 = regs.r2p1 & 0xFFFFFF; 74 void *addr2, uint32_t len2, uint32_t pad) 83 assert((len2 & 0xFFFFFF) == len2); 89 r2p1 = len2 | (pad << 24); 130 if (result1.len2 != result2.len2) 131 printf("FAIL: len2 result is different\n"); 141 run_test(void *addr1, uint32_t len1, void *addr2, uint32_t len2, uint32_ argument 73 clcl(void *addr1, uint32_t len1, void *addr2, uint32_t len2, uint32_t pad) argument [all...] |
/external/chromium_org/net/base/ |
H A D | nss_memio.h | 83 * |buf1|, |len1| and |buf2|, |len2|. 87 const char **buf2, unsigned int *len2);
|
/external/qemu/android/utils/ |
H A D | dll.c | 23 int len2 = strlen(str2); local 24 char* result = malloc(len1+len2+1); 28 memcpy(result + len1, str2, len2); 29 result[len1+len2] = '\0';
|
/external/qemu/distrib/zlib-1.2.3/ |
H A D | crc32.c | 370 uLong ZEXPORT crc32_combine(crc1, crc2, len2) 373 z_off_t len2; 381 if (len2 == 0) 398 /* apply len2 zeros to crc1 (first square will put the operator for one 401 /* apply zeros operator for this bit of len2 */ 403 if (len2 & 1) 405 len2 >>= 1; 408 if (len2 == 0) 413 if (len2 & 1) 415 len2 >> [all...] |
/external/qemu/audio/ |
H A D | fmodaudio.c | 97 unsigned int len1 = 0, len2 = 0; local 106 &len2 114 if ((len1 & hw->info.align) || (len2 & hw->info.align)) { 116 len1, len2, hw->info.align + 1); 120 if ((len1 + len2) - (hw->samples << hw->info.shift)) { 122 len1 + len2, hw->samples << hw->info.shift); 129 status = FSOUND_Sample_Unlock (fmd->fmod_sample, p1, p2, len1, len2); 233 unsigned int len1 = 0, len2 = 0; local 280 len2 = blen2 >> hw->info.shift; 281 ldebug ("%p %p %d %d %d %d\n", p1, p2, len1, len2, blen 457 unsigned int len1, len2; local [all...] |