Lines Matching refs:peek_le
58 elf_int = (endian==2) ? peek_be : peek_le;
247 (int)peek_le(s, 2), (int)peek_le(s+8, 2));
331 int format = le ? peek_le(s+20,2) : peek_be(s+20,2);
332 int channels = le ? peek_le(s+22,2) : peek_be(s+22,2);
333 int hz = le ? peek_le(s+24,4) : peek_be(s+24,4);
334 int bits = le ? peek_le(s+34,2) : peek_be(s+34,2);
371 (magic=peek_le(s+0x3c,4))<len-4 && !memcmp(s+magic, "\x50\x45\0\0", 4)) {
372 xprintf("MS PE32%s executable %s", (peek_le(s+magic+24, 2)==0x20b)?"+":"",
373 (peek_le(s+magic+22, 2)&0x2000)?"(DLL) ":"");
374 if (peek_le(s+magic+20, 2)>70) {
377 int type = peek_le(s+magic+92, 2);
382 xprintf("%s\n", (peek_le(s+magic+4, 2)==0x14c)?"x86":"x86-64");
386 int w = peek_le(s+0x12,4), h = peek_le(s+0x16,4), bpp = peek_le(s+0x1c,2);
395 } else if (len>28 && peek_le(s, 4) == 0xed26ff3a) {
397 (int) peek_le(s+4, 2), (int) peek_le(s+6, 2), (int) peek_le(s+16, 4),
398 (int) peek_le(s+12, 4), (int) peek_le(s+20, 4));
402 xprintf("Android boot image v%d\n", (int) peek_le(s+40, 4));