/external/javasqlite/src/main/java/SQLite/ |
H A D | Blob.java | 128 * @param len length to be read 132 public int read(byte b[], int off, int len) throws IOException { argument 133 if (off + len > b.length) { 134 len = b.length - off; 136 if (len < 0) { 139 if (len == 0) { 142 int n = blob.read(b, off, pos, len); 222 * @param len length of data to be written 225 public void write(byte[] b, int off, int len) throws IOException { argument 227 if (off + len > 295 write(byte[] b, int off, int pos, int len) argument 306 read(byte[] b, int off, int pos, int len) argument [all...] |
/external/libxml2/include/libxml/ |
H A D | xmlstring.h | 44 int len); 47 int len); 53 int len); 69 int len); 76 int len); 92 int len); 96 int len); 99 int len, 104 int len, 110 int *len); [all...] |
/external/toybox/toys/posix/ |
H A D | date.c | 58 int len; local 60 len = 0; 62 &tm->tm_min, &len); 63 if (len != 8) return 1; 64 str += len; 72 len = 0; 73 sscanf(str, "%u%n", &year, &len); 74 if (len == 4) year -= 1900; 75 else if (len != 2) return 1; 76 str += len; [all...] |
/external/boringssl/src/crypto/bytestring/ |
H A D | cbs.c | 25 void CBS_init(CBS *cbs, const uint8_t *data, size_t len) { argument 27 cbs->len = len; 31 if (cbs->len < n) { 37 cbs->len -= n; 41 int CBS_skip(CBS *cbs, size_t len) { argument 43 return cbs_get(cbs, &dummy, len); 51 return cbs->len; 59 if (cbs->len == 0) { 62 *out_ptr = BUF_memdup(cbs->data, cbs->len); 82 CBS_mem_equal(const CBS *cbs, const uint8_t *data, size_t len) argument 89 cbs_get_u(CBS *cbs, uint32_t *out, size_t len) argument 131 CBS_get_bytes(CBS *cbs, CBS *out, size_t len) argument 141 uint32_t len; local 184 size_t len; local 285 size_t i, len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 19 u8 attr_id, u8 len, const u8 *data) 26 if (len != EAP_SAKE_RAND_LEN) { 28 "invalid payload length %d", len); 35 if (len != EAP_SAKE_RAND_LEN) { 37 "invalid payload length %d", len); 44 if (len != EAP_SAKE_MIC_LEN) { 46 "invalid payload length %d", len); 53 if (len != EAP_SAKE_MIC_LEN) { 55 "invalid payload length %d", len); 63 attr->serverid_len = len; 18 eap_sake_parse_add_attr(struct eap_sake_parse_attr *attr, u8 attr_id, u8 len, const u8 *data) argument 160 eap_sake_parse_attributes(const u8 *buf, size_t len, struct eap_sake_parse_attr *attr) argument 218 size_t len[4]; local 378 eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, size_t len) argument 386 os_memset(wpabuf_put(buf, len), 0, len); local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.c | 19 u8 attr_id, u8 len, const u8 *data) 26 if (len != EAP_SAKE_RAND_LEN) { 28 "invalid payload length %d", len); 35 if (len != EAP_SAKE_RAND_LEN) { 37 "invalid payload length %d", len); 44 if (len != EAP_SAKE_MIC_LEN) { 46 "invalid payload length %d", len); 53 if (len != EAP_SAKE_MIC_LEN) { 55 "invalid payload length %d", len); 63 attr->serverid_len = len; 18 eap_sake_parse_add_attr(struct eap_sake_parse_attr *attr, u8 attr_id, u8 len, const u8 *data) argument 160 eap_sake_parse_attributes(const u8 *buf, size_t len, struct eap_sake_parse_attr *attr) argument 218 size_t len[4]; local 378 eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, size_t len) argument 386 os_memset(wpabuf_put(buf, len), 0, len); local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 19 u8 attr_id, u8 len, const u8 *data) 26 if (len != EAP_SAKE_RAND_LEN) { 28 "invalid payload length %d", len); 35 if (len != EAP_SAKE_RAND_LEN) { 37 "invalid payload length %d", len); 44 if (len != EAP_SAKE_MIC_LEN) { 46 "invalid payload length %d", len); 53 if (len != EAP_SAKE_MIC_LEN) { 55 "invalid payload length %d", len); 63 attr->serverid_len = len; 18 eap_sake_parse_add_attr(struct eap_sake_parse_attr *attr, u8 attr_id, u8 len, const u8 *data) argument 160 eap_sake_parse_attributes(const u8 *buf, size_t len, struct eap_sake_parse_attr *attr) argument 218 size_t len[4]; local 378 eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, size_t len) argument 386 os_memset(wpabuf_put(buf, len), 0, len); local [all...] |
/external/boringssl/src/crypto/buf/ |
H A D | buf.c | 91 static size_t buf_mem_grow(BUF_MEM *buf, size_t len, char clean) { argument 95 if (buf->length >= len) { 96 buf->length = len; 97 return len; 99 if (buf->max >= len) { 100 memset(&buf->data[buf->length], 0, len - buf->length); 101 buf->length = len; 102 return len; 105 n = len + 3; 106 if (n < len) { 142 BUF_MEM_grow(BUF_MEM *buf, size_t len) argument 146 BUF_MEM_grow_clean(BUF_MEM *buf, size_t len) argument [all...] |
/external/boringssl/src/crypto/modes/ |
H A D | ctr.c | 85 void CRYPTO_ctr128_encrypt(const uint8_t *in, uint8_t *out, size_t len, argument 92 assert(len == 0 || (in && out)); 98 while (n && len) { 100 --len; 107 while (l < len) { 122 while (len >= 16) { 128 len -= 16; 133 if (len) { 136 while (len--) { 161 size_t len, cons 160 CRYPTO_ctr128_encrypt_ctr32(const uint8_t *in, uint8_t *out, size_t len, const void *key, uint8_t ivec[16], uint8_t ecount_buf[16], unsigned int *num, ctr128_f func) argument [all...] |
/external/jmonkeyengine/engine/src/desktop/jme3tools/navigation/ |
H A D | StringUtil.java | 38 int len = totalLen - numStr.length();
40 for (int i = 0; i < len; i++) {
55 int len = totalLen - numStr.length();
57 for (int i = 0; i < len; i++) {
72 int len = totalLen - numStr.length();
74 for (int i = 0; i < len; i++) {
89 int len = totalLen - numStr.length();
91 for (int i = 0; i < len; i++) {
108 int len = wholeLen - dpLoc;
110 for (int i = 0; i < len; [all...] |
/external/libvncserver/libvncserver/ |
H A D | websockets.c | 69 typedef int (*wsEncodeFunc)(rfbClientPtr cl, const char *src, int len, char **dst); 70 typedef int (*wsDecodeFunc)(rfbClientPtr cl, char *dst, int len); 157 static int webSocketsEncodeHybi(rfbClientPtr cl, const char *src, int len, char **dst); 158 static int webSocketsEncodeHixie(rfbClientPtr cl, const char *src, int len, char **dst); 159 static int webSocketsDecodeHybi(rfbClientPtr cl, char *dst, int len); 160 static int webSocketsDecodeHixie(rfbClientPtr cl, char *dst, int len); 238 int n, linestart = 0, len = 0, llen, base64 = TRUE; local 259 while (len < WEBSOCKETS_MAX_HANDSHAKE_LEN-1) { 260 if ((n = rfbReadExactTimeout(cl, buf+len, 1, 274 len 474 webSocketsEncodeHixie(rfbClientPtr cl, const char *src, int len, char **dst) argument 492 ws_read(rfbClientPtr cl, char *buf, int len) argument 504 ws_peek(rfbClientPtr cl, char *buf, int len) argument 519 webSocketsDecodeHixie(rfbClientPtr cl, char *dst, int len) argument 614 webSocketsDecodeHybi(rfbClientPtr cl, char *dst, int len) argument 758 webSocketsEncodeHybi(rfbClientPtr cl, const char *src, int len, char **dst) argument 821 webSocketsEncode(rfbClientPtr cl, const char *src, int len, char **dst) argument 827 webSocketsDecode(rfbClientPtr cl, char *dst, int len) argument [all...] |
/external/valgrind/helgrind/tests/ |
H A D | shmem_abits.c | 18 /* Check that [p, p+len[ has access access. 20 static void check (int testline, void *p, int len, unsigned char access, int heap) argument 25 assert (len < 1000000); // Do not exceed the shadow array 27 if (len == 0 && p == NULL) 32 r = VALGRIND_HG_GET_ABITS (p, shadow, len); 33 V (r == VALGRIND_HG_GET_ABITS (p, NULL, len), testline); 34 V (access == 0xff ? r == len : r == 0, testline); 35 for (i = 0; i < len; i++) 39 r = VALGRIND_HG_GET_ABITS (p-1, shadow, len+1); 40 V (r == VALGRIND_HG_GET_ABITS (p-1, NULL, len [all...] |
/external/compiler-rt/lib/tsan/benchmarks/ |
H A D | mini_bench_shared.cc | 7 int len; variable 13 for (int i = 0, n = len; i < n; i++) 30 len = 1000000; 34 len = atoi(argv[2]); 36 printf("%s: n_threads=%d len=%d iter=%d\n", 37 __FILE__, n_threads, len, kNumIter); 38 a = new int[len]; 39 for (int i = 0, n = len; i < n; i++)
|
/external/google-breakpad/src/client/linux/minidump_writer/ |
H A D | line_reader.h | 58 // len: (output) the length of the line (not inc the NUL byte) 64 bool GetNextLine(const char **line, unsigned *len) { argument 72 *len = i; 91 *len = buf_used_; 113 void PopLine(unsigned len) { argument 114 // len doesn't include the NUL byte at the end. 116 assert(buf_used_ >= len + 1); 117 buf_used_ -= len + 1; 118 my_memmove(buf_, buf_ + len + 1, buf_used_);
|
/external/icu/icu4c/source/common/unicode/ |
H A D | stringpiece.h | 80 * @param len the length of the string; must be non-negative 83 StringPiece(const char* offset, int32_t len) : ptr_(offset), length_(len) { } argument 95 * @param len length of the substring; 99 StringPiece(const StringPiece& x, int32_t pos, int32_t len); 140 * @param len the length of the new data 143 void set(const char* xdata, int32_t len) { ptr_ = xdata; length_ = len; } argument 191 * @param len length of the substring; 196 StringPiece substr(int32_t pos, int32_t len [all...] |
/external/libxml2/doc/examples/ |
H A D | io1.c | 79 * @len: number of bytes to read 86 sqlRead(void * context, char * buffer, int len) { argument 89 if ((context == NULL) || (buffer == NULL) || (len < 0)) 92 if (len > rlen) len = rlen; 93 memcpy(buffer, ptr, len); 94 rlen -= len; 95 return(len);
|
/external/regex-re2/re2/ |
H A D | make_unicode_groups.py | 72 n16 += len(range16) 73 n32 += len(range32) 76 # if len(code16) > 0: 78 # ugroup += ", %s_code16, %d" % (name, len(code16)) 81 if len(range16) > 0: 83 ugroup += ", %s_range16, %d" % (name, len(range16)) 86 if len(range32) > 0: 88 ugroup += ", %s_range32, %d" % (name, len(range32)) 107 print "int num_unicode_groups = %d;" % (len(ugroups),)
|
/external/srtp/crypto/rng/ |
H A D | rand_source.c | 100 rand_source_get_octet_string(void *dest, uint32_t len) { argument 103 * read len octets from /dev/random to dest, and 108 if (read(dev_random_fdes, dest, len) != len) 112 while (len) 121 len--; 127 while (len) 134 len--;
|
/external/srtp/crypto/test/ |
H A D | aes_calc.c | 37 int len; local 64 len = hex_string_to_octet_string((char *)&key, argv[1], AES_KEY_LEN*2); 66 if (len < AES_KEY_LEN*2) { 70 AES_KEY_LEN*2, len); 82 len = hex_string_to_octet_string((char *)(&data), argv[2], 16*2); 84 if (len < 16*2) { 88 16*2, len);
|
/external/toybox/toys/other/ |
H A D | shred.c | 51 off_t pos = 0, len = TT.size; local 65 if (!len) len = fdlength(fd); 66 if (len<1) { 76 if (pos >= len) { 97 if (len-pos < throw) throw = len-pos;
|
/external/toybox/toys/pending/ |
H A D | iconv.c | 37 int len = 1; local 43 len = read(fd, in, 2048-inleft); 45 if (len < 0) { 49 inleft += len; 53 && (errno == EILSEQ || (in == toybuf+inleft-len && errno == EINVAL))) 64 } while (len < 1 && inleft); 65 } while (len > 0);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-kdf.c | 36 size_t len[4]; local 40 len[0] = SHA256_MAC_LEN; 42 len[1] = os_strlen(label) + 1; 44 len[2] = seed_len; 46 len[3] = 1; 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha256-prf.c | 59 size_t len[4]; local 64 len[0] = 2; 66 len[1] = os_strlen(label); 68 len[2] = data_len; 70 len[3] = sizeof(length_le); 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-kdf.c | 36 size_t len[4]; local 40 len[0] = SHA256_MAC_LEN; 42 len[1] = os_strlen(label) + 1; 44 len[2] = seed_len; 46 len[3] = 1; 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha256-prf.c | 59 size_t len[4]; local 64 len[0] = 2; 66 len[1] = os_strlen(label); 68 len[2] = data_len; 70 len[3] = sizeof(length_le); 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|