Searched defs:pos (Results 276 - 300 of 1594) sorted by relevance

<<11121314151617181920>>

/external/webkit/Source/WebCore/platform/chromium/
H A DMIMETypeRegistryChromium.cpp78 int pos = path.reverseFind('.'); local
79 if (pos < 0)
81 String extension = path.substring(pos + 1);
/external/webkit/Source/WebCore/platform/graphics/android/
H A DGradientAndroid.cpp81 SkScalar* pos = (SkScalar*)(colors + count); local
85 pos[i] = SkFloatToScalar(iter->stop);
97 colors, pos, count, mode);
99 s = SkGradientShader::CreateLinear(pts, colors, pos, count, mode);
/external/webkit/Source/WebCore/platform/graphics/ca/
H A DPlatformCALayer.h124 void setPosition(const FloatPoint& pos) { setPosition(FloatPoint3D(pos.x(), pos.y(), 0)); } argument
/external/webkit/Source/WebCore/rendering/
H A Dbreak_lines.cpp161 int nextBreakablePosition(LazyLineBreakIterator& lazyBreakIterator, int pos, bool treatNoBreakSpaceAsBreak) argument
167 UChar lastCh = pos > 0 ? str[pos - 1] : 0;
168 for (int i = pos; i < len; i++) {
/external/wpa_supplicant/
H A Dbase64.c38 unsigned char *out, *pos; local
52 pos = out;
55 *pos++ = base64_table[in[0] >> 2];
56 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
57 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
58 *pos++ = base64_table[in[2] & 0x3f];
62 *pos++ = '\n';
68 *pos++ = base64_table[in[0] >> 2];
70 *pos++ = base64_table[(in[0] & 0x03) << 4];
71 *pos
104 unsigned char dtable[256], *out, *pos, in[4], block[4], tmp; local
[all...]
H A Deap_gtc.c57 const u8 *pos, *password, *identity; local
62 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC,
64 if (pos == NULL) {
70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
72 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) {
96 eap_sm_request_otp(sm, (const char *) pos, len);
H A Deap_md5.c43 const u8 *pos, *challenge, *password; local
57 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5,
59 if (pos == NULL || len == 0) {
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
61 pos, (unsigned long) len);
71 challenge_len = *pos++;
80 challenge = pos;
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
H A Dscan_helpers.c24 const u8 *end, *pos; local
26 pos = (const u8 *) (res + 1);
27 end = pos + res->ie_len;
29 while (pos + 1 < end) {
30 if (pos + 2 + pos[1] > end)
32 if (pos[0] == ie)
33 return pos;
34 pos += 2 + pos[
44 const u8 *end, *pos; local
66 const u8 *end, *pos; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_ikev2_common.c86 const u8 *pos, const u8 *end)
101 if (end - pos < (int) icv_len) {
84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_gtc.c56 const u8 *pos, *password, *identity; local
61 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, reqData, &len);
62 if (pos == NULL) {
68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
70 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) {
93 eap_sm_request_otp(sm, (const char *) pos, len);
H A Deap_vendor_test.c76 const u8 *pos; local
79 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len);
80 if (pos == NULL || len < 1) {
85 if (data->state == INIT && *pos != 1) {
87 "%d in INIT state", *pos);
92 if (data->state == CONFIRM && *pos != 3) {
94 "%d in CONFIRM state", *pos);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_identity.c91 const u8 *pos; local
94 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
96 if (pos == NULL) {
109 const u8 *pos; local
122 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
124 if (pos == NULL)
127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
135 os_memcpy(sm->identity, pos, len);
H A Deap_md5.c84 const u8 *pos; local
87 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len);
88 if (pos == NULL || len < 1) {
92 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) {
95 *pos, (unsigned long) len);
107 const u8 *pos; local
119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
123 pos
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/utils/
H A Dbase64.c38 unsigned char *out, *pos; local
54 pos = out;
57 *pos++ = base64_table[in[0] >> 2];
58 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
59 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
60 *pos++ = base64_table[in[2] & 0x3f];
64 *pos++ = '\n';
70 *pos++ = base64_table[in[0] >> 2];
72 *pos++ = base64_table[(in[0] & 0x03) << 4];
73 *pos
106 unsigned char dtable[256], *out, *pos, in[4], block[4], tmp; local
[all...]
H A Dwpabuf.h110 u8 *pos = wpabuf_put(buf, 1); local
111 *pos = data;
116 u8 *pos = wpabuf_put(buf, 2); local
117 WPA_PUT_BE16(pos, data);
122 u8 *pos = wpabuf_put(buf, 3); local
123 WPA_PUT_BE24(pos, data);
128 u8 *pos = wpabuf_put(buf, 4); local
129 WPA_PUT_BE32(pos, data);
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
H A Dscanresults.cpp86 int pos = (*it).indexOf('=') + 1; local
87 if (pos < 1)
91 bssid = (*it).mid(pos);
93 freq = (*it).mid(pos);
95 signal = (*it).mid(pos);
97 flags = (*it).mid(pos);
99 ssid = (*it).mid(pos);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11_ht.c31 u8 *pos = eid; local
37 *pos++ = WLAN_EID_HT_CAP;
38 *pos++ = sizeof(*cap);
40 cap = (struct ieee80211_ht_capabilities *) pos;
51 pos += sizeof(*cap);
53 return pos;
60 u8 *pos = eid; local
65 *pos++ = WLAN_EID_HT_OPERATION;
66 *pos++ = sizeof(*oper);
68 oper = (struct ieee80211_ht_operation *) pos;
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dieee802_11_common.c22 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, argument
40 oui = WPA_GET_BE24(pos);
45 switch (pos[3]) {
49 elems->wpa_ie = pos;
61 switch (pos[4]) {
70 elems->wmm = pos;
74 elems->wmm_tspec = pos;
81 pos[4], (unsigned long) elen);
87 elems->wps_ie = pos;
94 pos[
155 const u8 *pos = start; local
286 const u8 *pos, *end; local
309 const u8 *end, *pos, *ie; local
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-pbkdf2.c84 unsigned char *pos = buf; local
94 os_memcpy(pos, digest, plen);
95 pos += plen;
H A Dsha1.c131 size_t pos, plen; local
144 pos = 0;
145 while (pos < buf_len) {
146 plen = buf_len - pos;
149 &buf[pos]))
151 pos += SHA1_MAC_LEN;
156 os_memcpy(&buf[pos], hash, plen);
H A Dsha256.c126 size_t pos, plen; local
142 pos = 0;
143 while (pos < buf_len) {
144 plen = buf_len - pos;
148 &buf[pos]);
149 pos += SHA256_MAC_LEN;
152 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Dlinux_ioctl.c186 char path[128], brlink[128], *pos; local
192 pos = os_strrchr(brlink, '/');
193 if (pos == NULL)
195 pos++;
196 os_strlcpy(brname, pos, IFNAMSIZ);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_ikev2_common.c86 const u8 *pos, const u8 *end)
101 if (end - pos < (int) icv_len) {
84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gtc.c56 const u8 *pos, *password, *identity; local
61 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, reqData, &len);
62 if (pos == NULL) {
68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
70 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) {
93 eap_sm_request_otp(sm, (const char *) pos, len);
H A Deap_vendor_test.c76 const u8 *pos; local
79 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len);
80 if (pos == NULL || len < 1) {
85 if (data->state == INIT && *pos != 1) {
87 "%d in INIT state", *pos);
92 if (data->state == CONFIRM && *pos != 3) {
94 "%d in CONFIRM state", *pos);

Completed in 291 milliseconds

<<11121314151617181920>>