/third_party/skia/third_party/externals/freetype/src/pfr/ |
H A D | pfrsbit.c | 287 FT_Byte* buff; in pfr_lookup_bitmap_data() local 360 buff = base + mid * char_len; in pfr_lookup_bitmap_data() 363 code = PFR_NEXT_USHORT( buff ); in pfr_lookup_bitmap_data() 365 code = PFR_NEXT_BYTE( buff ); in pfr_lookup_bitmap_data() 383 *found_size = PFR_NEXT_USHORT( buff ); in pfr_lookup_bitmap_data() 385 *found_size = PFR_NEXT_BYTE( buff ); in pfr_lookup_bitmap_data() 388 *found_offset = PFR_NEXT_ULONG( buff ); in pfr_lookup_bitmap_data() 390 *found_offset = PFR_NEXT_USHORT( buff ); in pfr_lookup_bitmap_data()
|
/third_party/skia/third_party/externals/oboe/samples/parselib/src/main/cpp/stream/ |
H A D | FileInputStream.h | 32 virtual int32_t read(void *buff, int32_t numBytes);
34 virtual int32_t peek(void *buff, int32_t numBytes);
|
H A D | InputStream.h | 36 virtual int32_t read(void *buff, int32_t numBytes) = 0;
43 virtual int32_t peek(void *buff, int32_t numBytes) = 0;
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ecx_meth.c | 1031 unsigned char x_dst[32], buff[SHA512_DIGEST_LENGTH]; in s390x_pkey_ecd_keygen25519() local 1059 rv = EVP_Digest(privkey, 32, buff, &sz, md, NULL); in s390x_pkey_ecd_keygen25519() 1064 buff[0] &= 248; in s390x_pkey_ecd_keygen25519() 1065 buff[31] &= 63; in s390x_pkey_ecd_keygen25519() 1066 buff[31] |= 64; in s390x_pkey_ecd_keygen25519() 1069 generator_x, generator_y, buff) != 1) in s390x_pkey_ecd_keygen25519() 1097 unsigned char x_dst[57], buff[114]; in s390x_pkey_ecd_keygen448() local 1136 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_pkey_ecd_keygen448() 1139 buff[ in s390x_pkey_ecd_keygen448() 1194 unsigned long long buff[512]; s390x_pkey_ecd_digestsign25519() member 1239 unsigned long long buff[512]; s390x_pkey_ecd_digestsign448() member 1287 unsigned long long buff[512]; s390x_pkey_ecd_digestverify25519() member 1319 unsigned long long buff[512]; s390x_pkey_ecd_digestverify448() member [all...] |
H A D | ecx_s390x.c | 87 unsigned long long buff[512]; in s390x_x25519_mul() member 120 unsigned long long buff[512]; in s390x_x448_mul() member 160 unsigned long long buff[512]; in s390x_ed25519_mul() member 194 unsigned long long buff[512]; in s390x_ed448_mul() member
|
/third_party/openssl/crypto/ec/ |
H A D | ecx_meth.c | 1031 unsigned char x_dst[32], buff[SHA512_DIGEST_LENGTH]; in s390x_pkey_ecd_keygen25519() local 1059 rv = EVP_Digest(privkey, 32, buff, &sz, md, NULL); in s390x_pkey_ecd_keygen25519() 1064 buff[0] &= 248; in s390x_pkey_ecd_keygen25519() 1065 buff[31] &= 63; in s390x_pkey_ecd_keygen25519() 1066 buff[31] |= 64; in s390x_pkey_ecd_keygen25519() 1069 generator_x, generator_y, buff) != 1) in s390x_pkey_ecd_keygen25519() 1097 unsigned char x_dst[57], buff[114]; in s390x_pkey_ecd_keygen448() local 1136 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_pkey_ecd_keygen448() 1139 buff[ in s390x_pkey_ecd_keygen448() 1194 unsigned long long buff[512]; s390x_pkey_ecd_digestsign25519() member 1239 unsigned long long buff[512]; s390x_pkey_ecd_digestsign448() member 1287 unsigned long long buff[512]; s390x_pkey_ecd_digestverify25519() member 1319 unsigned long long buff[512]; s390x_pkey_ecd_digestverify448() member [all...] |
H A D | ecx_s390x.c | 87 unsigned long long buff[512]; in s390x_x25519_mul() member 120 unsigned long long buff[512]; in s390x_x448_mul() member 160 unsigned long long buff[512]; in s390x_ed25519_mul() member 194 unsigned long long buff[512]; in s390x_ed448_mul() member
|
/base/security/device_security_level/baselib/utils/include/ |
H A D | utils_tlv.h | 37 uint32_t Serialize(const TlvCommon *tlv, uint32_t tlvCount, uint8_t *buff, uint32_t maxBuffSize, uint32_t *buffSize); 39 uint32_t Deserialize(const uint8_t *buff, uint32_t buffSize, TlvCommon *tlv, uint32_t maxTlvCount, uint32_t *tlvCount);
|
/third_party/node/benchmark/blob/ |
H A D | file.js | 16 const buff = Buffer.allocUnsafe(bytes); 17 const source = new File(buff, 'dummy.txt', options);
|
H A D | blob.js | 12 const buff = Buffer.allocUnsafe(bytes); 13 const source = new Blob(buff);
|
/base/telephony/sms_mms/services/sms/cdma/ |
H A D | cdma_sms_message.cpp | 327 unsigned char buff[MAX_MSG_TEXT_LEN + 1] = { 0 }; in AnalsisUserData() local 331 buff, MAX_MSG_TEXT_LEN, (unsigned char *)&userData.userData, userData.userData.length, langinfo); in AnalsisUserData() 337 buff, MAX_MSG_TEXT_LEN, (unsigned char *)&userData.userData, userData.userData.length); in AnalsisUserData() 345 if (memcpy_s(buff, sizeof(buff), userData.userData.data, userData.userData.length) != EOK) { in AnalsisUserData() 350 buff[dataSize] = '\0'; in AnalsisUserData() 355 buff, MAX_MSG_TEXT_LEN, (unsigned char *)&userData.userData.data, userData.userData.length); in AnalsisUserData() 360 buff, MAX_MSG_TEXT_LEN, (unsigned char *)&userData.userData.data, userData.userData.length); in AnalsisUserData() 364 visibleMessageBody_.insert(0, reinterpret_cast<char *>(buff), dataSize); in AnalsisUserData()
|
/base/hiviewdfx/hiview/base/event_store/store/ |
H A D | sys_event_repeat_guard.cpp | 46 char buff[buffLen] = {0};
in GetShaStr() local 48 eventData + eventInfo.dataPos, eventInfo.dataSize - eventInfo.dataPos, buff, buffLen) != 0) {
in GetShaStr() 52 hashStr = buff;
in GetShaStr()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | dlp_permission_set_parser.cpp | 108 char buff[MAX_BUFFER_SIZE] = { 0 }; in ReadCfgFile() local 110 while ((readLen = read(fd, buff, MAX_BUFFER_SIZE)) > 0) { in ReadCfgFile() 111 dlpPermsRawData.append(buff, readLen); in ReadCfgFile()
|
/base/security/access_token/frameworks/common/src/ |
H A D | json_parser.cpp | 104 char buff[BUFFER_SIZE] = { 0 }; in ReadCfgFile() local 106 while ((readLen = read(fd, buff, BUFFER_SIZE)) > 0) { in ReadCfgFile() 107 rawData.append(buff, readLen); in ReadCfgFile()
|
/base/telephony/ril_adapter/services/hril/src/ |
H A D | hril_timer_callback.cpp | 34 int8_t buff[READ_FD_BUFF_SIZE]; in FdTriggerCallback() local 37 ret = read(triggerReadFd_, &buff, sizeof(buff)); in FdTriggerCallback()
|
/third_party/benchmark/src/ |
H A D | colorprint.cc | 107 std::unique_ptr<char[]> buff(new char[size]); in FormatString() 108 ret = vsnprintf(buff.get(), size, msg, args); in FormatString() 110 return buff.get(); in FormatString()
|
/third_party/icu/tools/colprobe/ |
H A D | line.h | 50 Line(const char *buff, int32_t buffLen, UErrorCode &status); 60 int32_t write(char *buff, int32_t buffLen, UErrorCode &status); 61 void initFromString(const char *buff, int32_t buffLen, UErrorCode &status);
|
/third_party/jerryscript/targets/esp8266/user/ |
H A D | jerry_extapi.c | 85 char buff[50]; in DELCARE_HANDLER() local 86 sprintf(buff, "%.10f", number); in DELCARE_HANDLER() 87 printf("%s", buff); in DELCARE_HANDLER()
|
/third_party/node/test/parallel/ |
H A D | test-buffer-read.js | 8 function read(buff, funx, args, expected) { 9 assert.strictEqual(buff[funx](...args), expected); 11 () => buff[funx](-1, args[1]),
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | evp_key.c | 56 char buff[BUFSIZ]; in EVP_read_pw_string_min() local 67 && UI_add_verify_string(ui, prompt, 0, buff, min, in EVP_read_pw_string_min() 72 OPENSSL_cleanse(buff, BUFSIZ); in EVP_read_pw_string_min()
|
/third_party/openssl/crypto/evp/ |
H A D | evp_key.c | 56 char buff[BUFSIZ]; in EVP_read_pw_string_min() local 67 && UI_add_verify_string(ui, prompt, 0, buff, min, in EVP_read_pw_string_min() 72 OPENSSL_cleanse(buff, BUFSIZ); in EVP_read_pw_string_min()
|
/third_party/node/lib/ |
H A D | tls.js | 125 const buff = Buffer.allocUnsafe(ArrayPrototypeReduce(protocols, (p, c, i) => { 137 buff[offset++] = lens[i]; 138 buff.write(protocols[i], offset); 142 return buff;
|
/third_party/libexif/libexif/huawei/ |
H A D | mnote-huawei-entry.c | 86 mnote_huawei_entry_rational_timestamp_process(char *buff, const int buff_size, const char *v, int strlen, in mnote_huawei_entry_rational_timestamp_process() argument 116 exif_set_rational((unsigned char*)buff + offset, order, r); in mnote_huawei_entry_rational_timestamp_process() 132 mnote_huawei_entry_string_process(char *buff, const int buff_size, const char *v, int strlen, in mnote_huawei_entry_string_process() argument 136 *components = snprintf(buff, buff_size, _("%s"), v); in mnote_huawei_entry_string_process() 146 mnote_huawei_entry_value_process(char *buff, const int buff_size, const char *v, int strlen, in mnote_huawei_entry_value_process() argument 169 *(buff + offset) = value; in mnote_huawei_entry_value_process() 171 exif_set_slong((unsigned char*)(buff + offset), order, value); in mnote_huawei_entry_value_process()
|
/base/powermgr/battery_manager/charger/src/ |
H A D | power_supply_provider.cpp | 91 char buff[PATH_MAX] = {0}; in FormatPath() local 92 if (strcpy_s(buff, PATH_MAX, path.c_str()) != EOK) { in FormatPath() 97 if (snprintf_s(buff, PATH_MAX, size - 1, format, basePath, name) == -1) { in FormatPath() 101 path.assign(buff, strlen(buff)); in FormatPath()
|
/third_party/python/Modules/ |
H A D | _zoneinfo.c | 1595 char buff = *ptr; in parse_abbr() local 1602 while ((buff = *ptr) != '>') { in parse_abbr() 1613 if (!isalpha(buff) && !isdigit(buff) && buff != '+' && in parse_abbr() 1614 buff != '-') { in parse_abbr() 1666 char buff = *ptr; in parse_tz_delta() local 1667 if (buff == '-' || buff == '+') { in parse_tz_delta() 1673 if (buff in parse_tz_delta() 1886 uint8_t buff = 0; parse_transition_time() local 2079 int64_t offset_0, offset_1, buff; ts_to_local() local [all...] |