Searched refs:pat (Results 1 – 3 of 3) sorted by relevance
/lk-master/app/tests/ |
A D | mem_tests.c | 33 printf("\tpattern 0x%08x\n", pat); in do_pattern_test() 35 vbuf32[i] = pat; in do_pattern_test() 39 if (vbuf32[i] != pat) { in do_pattern_test() 52 printf("\tpattern 0x%08x\n", pat); in do_moving_inversion_test() 56 vbuf32[i] = pat; in do_moving_inversion_test() 62 if (vbuf32[i] != pat) { in do_moving_inversion_test() 67 vbuf32[i] = ~pat; in do_moving_inversion_test() 73 if (vbuf32[i-1] != ~pat) { in do_moving_inversion_test() 78 vbuf32[i-1] = pat; in do_moving_inversion_test() 84 if (vbuf32[i] != pat) { in do_moving_inversion_test() [all …]
|
/lk-master/tools/ |
A D | liblkboot.c | 108 const unsigned char pat[] = { 0xff, 0xff, 0xff, 0xff, 0xaa, 0x99, 0x55, 0x66 }; in trim_fpga_image() local 109 unsigned char buf[sizeof(pat)]; in trim_fpga_image() 121 if (memcmp(pat, buf, sizeof(pat)) == 0) { in trim_fpga_image() 123 lseek(fd, -sizeof(pat), SEEK_CUR); in trim_fpga_image() 124 return len - (i + 1 - sizeof(pat)); in trim_fpga_image()
|
A D | bootimage.c | 197 static const unsigned char pat[] = { 0xff, 0xff, 0xff, 0xff, 0xaa, 0x99, 0x55, 0x66 }; in bootimage_add_file() local 200 if (len < sizeof(pat)) { in bootimage_add_file() 206 for (i = 0; i < len - sizeof(pat); i++) { in bootimage_add_file() 207 if (!memcmp(data + i, pat, sizeof(pat))) { in bootimage_add_file()
|
Completed in 3 milliseconds