/external/antlr/antlr-3.4/runtime/JavaScript/tests/functional/ |
H A D | rhino-python.extensions | 162 // compute cpos as the char pos of next non-WS token in line 163 var cpos = t.getCharPositionInLine(); // column dictates indent/dedent 165 cpos = -1; // pretend EOF always happens at left edge 168 cpos = t.getText().length; 173 if ( cpos > lastIndent ) { // they indented; track and gen INDENT 174 this.push(cpos); 180 else if ( cpos < lastIndent ) { // they dedented 182 var prevIndex = this.findPreviousIndent(cpos);
|
/external/qemu/audio/ |
H A D | dsoundaudio.c | 766 DWORD cpos, rpos; local 785 &cpos, 802 if (cpos & hw->info.align) { 804 cpos, hw->info.align); 806 cpos >>= hwshift; 808 len = audio_ring_dist (cpos, hw->wpos, hw->samples);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_psk.c | 226 const u8 *cpos; local 233 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, 235 if (cpos == NULL || left < sizeof(*resp)) { 239 resp = (const struct eap_psk_hdr_2 *) cpos; 240 cpos = (const u8 *) (resp + 1); 250 os_memcpy(data->id_p, cpos, left);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 223 const u8 *cpos; local 230 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, 232 if (cpos == NULL || left < sizeof(*resp)) { 236 resp = (const struct eap_psk_hdr_2 *) cpos; 237 cpos = (const u8 *) (resp + 1); 247 os_memcpy(data->id_p, cpos, left);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 223 const u8 *cpos; local 230 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, 232 if (cpos == NULL || left < sizeof(*resp)) { 236 resp = (const struct eap_psk_hdr_2 *) cpos; 237 cpos = (const u8 *) (resp + 1); 247 os_memcpy(data->id_p, cpos, left);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 223 const u8 *cpos; local 230 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, 232 if (cpos == NULL || left < sizeof(*resp)) { 236 resp = (const struct eap_psk_hdr_2 *) cpos; 237 cpos = (const u8 *) (resp + 1); 247 os_memcpy(data->id_p, cpos, left);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 96 const u8 *cpos; local 100 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); 101 hdr1 = (const struct eap_psk_hdr_1 *) cpos; 102 if (cpos == NULL || len < sizeof(*hdr1)) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 91 const u8 *cpos; local 95 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); 96 hdr1 = (const struct eap_psk_hdr_1 *) cpos; 97 if (cpos == NULL || len < sizeof(*hdr1)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 91 const u8 *cpos; local 95 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); 96 hdr1 = (const struct eap_psk_hdr_1 *) cpos; 97 if (cpos == NULL || len < sizeof(*hdr1)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 91 const u8 *cpos; local 95 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); 96 hdr1 = (const struct eap_psk_hdr_1 *) cpos; 97 if (cpos == NULL || len < sizeof(*hdr1)) {
|
/external/openssl/crypto/modes/asm/ |
H A D | ghash-parisc.pl | 691 my $cpos=63-$3; 692 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode sa 709 my $cpos=63-$2; 711 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode pos
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 1338 const u8 *cpos; local 1358 cpos = buf; 1359 cpos += 1 /* pkt_type */ + 1 /* Category */ + 1 /* Action */; 1362 dtoken = *cpos++; /* dialog token */ 1380 peer->capability = WPA_GET_LE16(cpos); 1381 cpos += 2; 1383 ielen = len - (cpos - buf); /* start of IE in buf */ 1384 if (wpa_supplicant_parse_ies(cpos, ielen, &kde) < 0) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 1338 const u8 *cpos; local 1358 cpos = buf; 1359 cpos += 1 /* pkt_type */ + 1 /* Category */ + 1 /* Action */; 1362 dtoken = *cpos++; /* dialog token */ 1380 peer->capability = WPA_GET_LE16(cpos); 1381 cpos += 2; 1383 ielen = len - (cpos - buf); /* start of IE in buf */ 1384 if (wpa_supplicant_parse_ies(cpos, ielen, &kde) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 1338 const u8 *cpos; local 1358 cpos = buf; 1359 cpos += 1 /* pkt_type */ + 1 /* Category */ + 1 /* Action */; 1362 dtoken = *cpos++; /* dialog token */ 1380 peer->capability = WPA_GET_LE16(cpos); 1381 cpos += 2; 1383 ielen = len - (cpos - buf); /* start of IE in buf */ 1384 if (wpa_supplicant_parse_ies(cpos, ielen, &kde) < 0) {
|
/external/openssl/crypto/sha/asm/ |
H A D | sha512-parisc.pl | 745 my $cpos=63-$3; 746 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode sa
|
/external/openssl/crypto/bn/asm/ |
H A D | parisc-mont.pl | 965 my $cpos=63-$3; 966 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode sa
|
/external/expat/lib/ |
H A D | xmlparse.c | 6248 XML_Content *cpos; local 6258 cpos = &ret[1]; 6260 build_node(parser, 0, ret, &cpos, &str);
|