/external/webkit/Source/WebCore/platform/chromium/ |
H A D | MIMETypeRegistryChromium.cpp | 78 int pos = path.reverseFind('.'); local 79 if (pos < 0) 81 String extension = path.substring(pos + 1);
|
/external/webkit/Source/WebCore/platform/graphics/android/ |
H A D | GradientAndroid.cpp | 81 SkScalar* pos = (SkScalar*)(colors + count); local 85 pos[i] = SkFloatToScalar(iter->stop); 97 colors, pos, count, mode); 99 s = SkGradientShader::CreateLinear(pts, colors, pos, count, mode);
|
/external/webkit/Source/WebCore/platform/graphics/ca/ |
H A D | PlatformCALayer.h | 124 void setPosition(const FloatPoint& pos) { setPosition(FloatPoint3D(pos.x(), pos.y(), 0)); } argument
|
/external/webkit/Source/WebCore/rendering/ |
H A D | break_lines.cpp | 161 int nextBreakablePosition(LazyLineBreakIterator& lazyBreakIterator, int pos, bool treatNoBreakSpaceAsBreak) argument 167 UChar lastCh = pos > 0 ? str[pos - 1] : 0; 168 for (int i = pos; i < len; i++) {
|
/external/wpa_supplicant/ |
H A D | base64.c | 38 unsigned char *out, *pos; local 52 pos = out; 55 *pos++ = base64_table[in[0] >> 2]; 56 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)]; 57 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)]; 58 *pos++ = base64_table[in[2] & 0x3f]; 62 *pos++ = '\n'; 68 *pos++ = base64_table[in[0] >> 2]; 70 *pos++ = base64_table[(in[0] & 0x03) << 4]; 71 *pos 104 unsigned char dtable[256], *out, *pos, in[4], block[4], tmp; local [all...] |
H A D | eap_gtc.c | 57 const u8 *pos, *password, *identity; local 62 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, 64 if (pos == NULL) { 70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 72 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) { 96 eap_sm_request_otp(sm, (const char *) pos, len);
|
H A D | eap_md5.c | 43 const u8 *pos, *challenge, *password; local 57 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, 59 if (pos == NULL || len == 0) { 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 61 pos, (unsigned long) len); 71 challenge_len = *pos++; 80 challenge = pos;
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | scan_helpers.c | 24 const u8 *end, *pos; local 26 pos = (const u8 *) (res + 1); 27 end = pos + res->ie_len; 29 while (pos + 1 < end) { 30 if (pos + 2 + pos[1] > end) 32 if (pos[0] == ie) 33 return pos; 34 pos += 2 + pos[ 44 const u8 *end, *pos; local 66 const u8 *end, *pos; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 86 const u8 *pos, const u8 *end) 101 if (end - pos < (int) icv_len) { 84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 56 const u8 *pos, *password, *identity; local 61 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, reqData, &len); 62 if (pos == NULL) { 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 70 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) { 93 eap_sm_request_otp(sm, (const char *) pos, len);
|
H A D | eap_vendor_test.c | 76 const u8 *pos; local 79 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len); 80 if (pos == NULL || len < 1) { 85 if (data->state == INIT && *pos != 1) { 87 "%d in INIT state", *pos); 92 if (data->state == CONFIRM && *pos != 3) { 94 "%d in CONFIRM state", *pos);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_identity.c | 91 const u8 *pos; local 94 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, 96 if (pos == NULL) { 109 const u8 *pos; local 122 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, 124 if (pos == NULL) 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 135 os_memcpy(sm->identity, pos, len);
|
H A D | eap_md5.c | 84 const u8 *pos; local 87 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len); 88 if (pos == NULL || len < 1) { 92 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) { 95 *pos, (unsigned long) len); 107 const u8 *pos; local 119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN) 123 pos [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | base64.c | 38 unsigned char *out, *pos; local 54 pos = out; 57 *pos++ = base64_table[in[0] >> 2]; 58 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)]; 59 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)]; 60 *pos++ = base64_table[in[2] & 0x3f]; 64 *pos++ = '\n'; 70 *pos++ = base64_table[in[0] >> 2]; 72 *pos++ = base64_table[(in[0] & 0x03) << 4]; 73 *pos 106 unsigned char dtable[256], *out, *pos, in[4], block[4], tmp; local [all...] |
H A D | wpabuf.h | 110 u8 *pos = wpabuf_put(buf, 1); local 111 *pos = data; 116 u8 *pos = wpabuf_put(buf, 2); local 117 WPA_PUT_BE16(pos, data); 122 u8 *pos = wpabuf_put(buf, 3); local 123 WPA_PUT_BE24(pos, data); 128 u8 *pos = wpabuf_put(buf, 4); local 129 WPA_PUT_BE32(pos, data);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
H A D | scanresults.cpp | 86 int pos = (*it).indexOf('=') + 1; local 87 if (pos < 1) 91 bssid = (*it).mid(pos); 93 freq = (*it).mid(pos); 95 signal = (*it).mid(pos); 97 flags = (*it).mid(pos); 99 ssid = (*it).mid(pos);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_ht.c | 31 u8 *pos = eid; local 37 *pos++ = WLAN_EID_HT_CAP; 38 *pos++ = sizeof(*cap); 40 cap = (struct ieee80211_ht_capabilities *) pos; 51 pos += sizeof(*cap); 53 return pos; 60 u8 *pos = eid; local 65 *pos++ = WLAN_EID_HT_OPERATION; 66 *pos++ = sizeof(*oper); 68 oper = (struct ieee80211_ht_operation *) pos; [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_common.c | 22 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, argument 40 oui = WPA_GET_BE24(pos); 45 switch (pos[3]) { 49 elems->wpa_ie = pos; 61 switch (pos[4]) { 70 elems->wmm = pos; 74 elems->wmm_tspec = pos; 81 pos[4], (unsigned long) elen); 87 elems->wps_ie = pos; 94 pos[ 155 const u8 *pos = start; local 286 const u8 *pos, *end; local 309 const u8 *end, *pos, *ie; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-pbkdf2.c | 84 unsigned char *pos = buf; local 94 os_memcpy(pos, digest, plen); 95 pos += plen;
|
H A D | sha1.c | 131 size_t pos, plen; local 144 pos = 0; 145 while (pos < buf_len) { 146 plen = buf_len - pos; 149 &buf[pos])) 151 pos += SHA1_MAC_LEN; 156 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256.c | 126 size_t pos, plen; local 142 pos = 0; 143 while (pos < buf_len) { 144 plen = buf_len - pos; 148 &buf[pos]); 149 pos += SHA256_MAC_LEN; 152 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | linux_ioctl.c | 186 char path[128], brlink[128], *pos; local 192 pos = os_strrchr(brlink, '/'); 193 if (pos == NULL) 195 pos++; 196 os_strlcpy(brname, pos, IFNAMSIZ);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.c | 86 const u8 *pos, const u8 *end) 101 if (end - pos < (int) icv_len) { 84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 56 const u8 *pos, *password, *identity; local 61 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, reqData, &len); 62 if (pos == NULL) { 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 70 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) { 93 eap_sm_request_otp(sm, (const char *) pos, len);
|
H A D | eap_vendor_test.c | 76 const u8 *pos; local 79 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len); 80 if (pos == NULL || len < 1) { 85 if (data->state == INIT && *pos != 1) { 87 "%d in INIT state", *pos); 92 if (data->state == CONFIRM && *pos != 3) { 94 "%d in CONFIRM state", *pos);
|