/external/zxing/core/ |
H A D | core.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/oned/ ... |
/external/xmp_toolkit/XMPCore/src/com/adobe/xmp/impl/ |
H A D | ByteBuffer.java | 56 * @param length the length of valid bytes in the array 101 * @param length the length of valid bytes in the array 116 * @return Returns a byte stream that is limited to the valid amount of bytes. 125 * @return Returns the length, that means the number of valid bytes, of the buffer; 192 * @param bytes a byte array 196 public void append(byte[] bytes, int offset, int len) argument 199 System.arraycopy(bytes, offset, buffer, length, len); 206 * @param bytes a byte array 208 public void append(byte[] bytes) argument 210 append(bytes, [all...] |
/external/zlib/src/contrib/untgz/ |
H A D | untgz.c | 529 unsigned int bytes = (remaining > BLOCKSIZE) ? BLOCKSIZE : remaining; local 533 if (fwrite(&buffer,sizeof(char),bytes,outfile) != bytes) 542 remaining -= bytes;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 274 u64 bytes; local 309 bytes = data.rx_bytes; 311 bytes = ((u64) sta->last_rx_bytes_hi << 32) | 315 (u32) bytes)) { 321 (u32) (bytes >> 32))) { 326 bytes = data.tx_bytes; 328 bytes = ((u64) sta->last_tx_bytes_hi << 32) | 332 (u32) bytes)) { 338 (u32) (bytes >> 32))) {
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | random.c | 118 * length (32) and return 16 bytes from instead of only half. 157 u8 *bytes = buf; local 178 *bytes++ ^= tmp[i]; 184 bytes = buf; 191 "for generating strong random bytes"); 198 *bytes++ ^= tmp[i]; 248 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 261 wpa_printf(MSG_INFO, "random: Only %u/%u bytes of strong " 320 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random",
|
H A D | tls_openssl_ocsp.c | 493 ResponseBytes *bytes; local 540 bytes = resp->responseBytes; 542 if (!bytes || 543 OBJ_obj2nid(bytes->responseType) != NID_id_pkix_OCSP_basic) { 549 basic_data = ASN1_STRING_data(bytes->response); 550 basic_len = ASN1_STRING_length(bytes->response);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_wext.c | 123 * @ssid: Buffer for the SSID; must be at least 32 bytes long 250 int bytes; local 255 bytes = strspn(spos, "0123456789abcdefABCDEF"); 256 if (!bytes || (bytes & 1)) 258 bytes /= 2; 260 req_ies = os_malloc(bytes); 262 hexstr2bin(spos, req_ies, bytes) < 0) 265 data.assoc_info.req_ies_len = bytes; 267 spos += bytes * 1377 int bytes; local 1392 int bytes; local 1407 int bytes; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | accounting.c | 274 u64 bytes; local 309 bytes = data.rx_bytes; 311 bytes = ((u64) sta->last_rx_bytes_hi << 32) | 315 (u32) bytes)) { 321 (u32) (bytes >> 32))) { 326 bytes = data.tx_bytes; 328 bytes = ((u64) sta->last_tx_bytes_hi << 32) | 332 (u32) bytes)) { 338 (u32) (bytes >> 32))) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | random.c | 118 * length (32) and return 16 bytes from instead of only half. 157 u8 *bytes = buf; local 178 *bytes++ ^= tmp[i]; 184 bytes = buf; 191 "for generating strong random bytes"); 198 *bytes++ ^= tmp[i]; 248 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 261 wpa_printf(MSG_INFO, "random: Only %u/%u bytes of strong " 320 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random",
|
H A D | tls_openssl_ocsp.c | 493 ResponseBytes *bytes; local 540 bytes = resp->responseBytes; 542 if (!bytes || 543 OBJ_obj2nid(bytes->responseType) != NID_id_pkix_OCSP_basic) { 549 basic_data = ASN1_STRING_data(bytes->response); 550 basic_len = ASN1_STRING_length(bytes->response);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_wext.c | 123 * @ssid: Buffer for the SSID; must be at least 32 bytes long 250 int bytes; local 255 bytes = strspn(spos, "0123456789abcdefABCDEF"); 256 if (!bytes || (bytes & 1)) 258 bytes /= 2; 260 req_ies = os_malloc(bytes); 262 hexstr2bin(spos, req_ies, bytes) < 0) 265 data.assoc_info.req_ies_len = bytes; 267 spos += bytes * 1377 int bytes; local 1392 int bytes; local 1407 int bytes; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface_named_pipe.c | 89 static VOID WINAPI ctrl_iface_read_completed(DWORD err, DWORD bytes, 96 static VOID WINAPI global_iface_read_completed(DWORD err, DWORD bytes, 254 static VOID WINAPI ctrl_iface_write_completed(DWORD err, DWORD bytes, argument 259 "err=%d bytes=%d", dst, (int) err, (int) bytes); 346 static VOID WINAPI ctrl_iface_read_completed(DWORD err, DWORD bytes, argument 351 "bytes=%d", dst, (int) err, (int) bytes); 352 if (err == 0 && bytes > 0) 353 wpa_supplicant_ctrl_iface_rx(dst, bytes); 361 DWORD bytes; local 686 global_iface_write_completed(DWORD err, DWORD bytes, LPOVERLAPPED overlap) argument 763 global_iface_read_completed(DWORD err, DWORD bytes, LPOVERLAPPED overlap) argument 779 DWORD bytes; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | accounting.c | 274 u64 bytes; local 309 bytes = data.rx_bytes; 311 bytes = ((u64) sta->last_rx_bytes_hi << 32) | 315 (u32) bytes)) { 321 (u32) (bytes >> 32))) { 326 bytes = data.tx_bytes; 328 bytes = ((u64) sta->last_tx_bytes_hi << 32) | 332 (u32) bytes)) { 338 (u32) (bytes >> 32))) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | random.c | 118 * length (32) and return 16 bytes from instead of only half. 157 u8 *bytes = buf; local 178 *bytes++ ^= tmp[i]; 184 bytes = buf; 191 "for generating strong random bytes"); 198 *bytes++ ^= tmp[i]; 248 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 261 wpa_printf(MSG_INFO, "random: Only %u/%u bytes of strong " 320 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random",
|
H A D | tls_openssl_ocsp.c | 493 ResponseBytes *bytes; local 540 bytes = resp->responseBytes; 542 if (!bytes || 543 OBJ_obj2nid(bytes->responseType) != NID_id_pkix_OCSP_basic) { 549 basic_data = ASN1_STRING_data(bytes->response); 550 basic_len = ASN1_STRING_length(bytes->response);
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_wext.c | 123 * @ssid: Buffer for the SSID; must be at least 32 bytes long 250 int bytes; local 255 bytes = strspn(spos, "0123456789abcdefABCDEF"); 256 if (!bytes || (bytes & 1)) 258 bytes /= 2; 260 req_ies = os_malloc(bytes); 262 hexstr2bin(spos, req_ies, bytes) < 0) 265 data.assoc_info.req_ies_len = bytes; 267 spos += bytes * 1377 int bytes; local 1392 int bytes; local 1407 int bytes; local [all...] |
/external/webrtc/talk/app/webrtc/java/jni/ |
H A D | androidvideocapturer_jni.cc | 203 jbyte* bytes = jni->GetByteArrayElements(j_frame, &is_copy); local 205 ->OnMemoryBufferFrame(bytes, length, width, height, rotation, timestamp); 206 jni->ReleaseByteArrayElements(j_frame, bytes, JNI_ABORT);
|
H A D | peerconnection_jni.cc | 883 jbyte* bytes = jni->GetByteArrayElements(data, NULL); local 885 rtc::Buffer(bytes, jni->GetArrayLength(data)), 887 jni->ReleaseByteArrayElements(data, bytes, JNI_ABORT);
|
/external/webrtc/talk/media/base/ |
H A D | fakenetworkinterface.h | 72 int bytes = 0; local 74 bytes += static_cast<int>(rtp_packets_[i].size()); 76 return bytes; 81 int bytes = 0; local 82 GetNumRtpBytesAndPackets(ssrc, &bytes, NULL); 83 return bytes; 201 void GetNumRtpBytesAndPackets(uint32_t ssrc, int* bytes, int* packets) { argument 202 if (bytes) { 203 *bytes = 0; 215 if (bytes) { [all...] |
H A D | videoframe_unittest.h | 261 int r_pos, g_pos, b_pos, bytes; local 262 if (!GetRgbPacking(fourcc, &r_pos, &g_pos, &b_pos, &bytes)) { 268 if (!ms->ReserveSize(width * height * bytes)) { 278 ms->Write(rgb, bytes, NULL, NULL); 331 int r_pos, g_pos, b_pos, bytes; local 332 if (!GetRgbPacking(fourcc, &r_pos, &g_pos, &b_pos, &bytes)) { 335 int pitch = width * bytes; 350 rgb[0] = start + y * pitch + x * bytes; 351 rgb[1] = rgb[0] + ((x + 1) < width ? bytes : 0); 353 rgb[3] = rgb[2] + ((x + 1) < width ? bytes 404 GetRgbPacking(uint32_t fourcc, int* r_pos, int* g_pos, int* b_pos, int* bytes) argument [all...] |
/external/webrtc/webrtc/base/ |
H A D | bitbuffer_unittest.cc | 20 const uint8_t bytes[64] = {0}; local 21 BitBuffer buffer(bytes, 32); 42 const uint8_t bytes[] = {0x0A, 0xBC, 0xDE, 0xF1, 0x23, 0x45, 0x67, 0x89}; local 46 BitBuffer buffer(bytes, 8); 58 const uint8_t bytes[] = {0x0A, 0xBC, 0xDE, 0xF1, 0x23, local 63 BitBuffer buffer(bytes, 9); 91 // The bytes. It almost looks like counting down by two at a time, except the 93 const uint8_t bytes[] = {0x1F, 0xDB, 0x97, 0x53, 0x0E, 0xCA, 0x86, 0x42}; local 98 BitBuffer buffer(bytes, 8); 115 const uint8_t bytes[] local 141 uint8_t bytes[4] = {0}; local 230 const uint8_t bytes[] = {0x00, 0xFF, 0xFF}; local 248 uint8_t bytes[16] = {0}; local 280 uint8_t bytes[16] = {0}; local 303 uint8_t bytes[64] = {0}; local 318 uint8_t bytes[] = {0xFF, 0xFF}; local [all...] |
H A D | bufferqueue.cc | 35 bool BufferQueue::ReadFront(void* buffer, size_t bytes, size_t* bytes_read) { argument 45 bytes = std::min(bytes, packet->size()); 46 memcpy(buffer, packet->data(), bytes); 48 *bytes_read = bytes; 57 bool BufferQueue::WriteBack(const void* buffer, size_t bytes, argument 70 packet = new Buffer(bytes, default_size_); 73 packet->SetData(static_cast<const uint8_t*>(buffer), bytes); local 75 *bytes_written = bytes;
|
H A D | bufferqueue_unittest.cc | 20 size_t bytes; local 26 EXPECT_FALSE(queue1.ReadFront(out, kSize, &bytes)); 29 EXPECT_TRUE(queue1.WriteBack(in, kSize, &bytes)); 30 EXPECT_EQ(kSize, bytes); 34 EXPECT_FALSE(queue1.WriteBack(in, kSize, &bytes)); 38 EXPECT_TRUE(queue1.ReadFront(out, kSize, &bytes)); 39 EXPECT_EQ(kSize, bytes); 43 EXPECT_FALSE(queue1.ReadFront(out, kSize, &bytes)); 47 EXPECT_TRUE(queue1.WriteBack(in, kSize, &bytes)); 48 EXPECT_EQ(kSize, bytes); [all...] |
H A D | bytebuffer.cc | 33 ByteBuffer::ByteBuffer(const char* bytes, size_t len) { argument 34 Construct(bytes, len, ORDER_NETWORK); 37 ByteBuffer::ByteBuffer(const char* bytes, size_t len, ByteOrder byte_order) { argument 38 Construct(bytes, len, byte_order); 41 ByteBuffer::ByteBuffer(const char* bytes) { argument 42 Construct(bytes, strlen(bytes), ORDER_NETWORK); 49 void ByteBuffer::Construct(const char* bytes, size_t len, argument 57 if (bytes) { 59 memcpy(bytes_, bytes, end [all...] |
H A D | fileutils_unittest.cc | 32 size_t bytes; local 36 EXPECT_EQ(SR_SUCCESS, fs->Write("test", 4, &bytes, NULL)); 37 EXPECT_EQ(4U, bytes); 44 EXPECT_EQ(SR_SUCCESS, fs->Read(buf, sizeof(buf), &bytes, NULL)); 45 EXPECT_EQ(4U, bytes);
|