Searched defs:pos (Results 251 - 275 of 2350) sorted by relevance

<<11121314151617181920>>

/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_ndis_.c44 u8 *pos, *data = NULL; local
52 pos = buf + sizeof(int);
55 if (buf + len - pos > 2) {
56 data_len = (int) *pos++ << 8;
57 data_len += *pos++;
58 if (data_len > (size_t) (buf + len - pos)) {
62 data = pos;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
68 pos = 0;
69 while (pos < buf_len) {
71 plen = buf_len - pos;
75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN);
76 pos += SHA1_MAC_LEN;
78 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len);
47 if (pos == NULL || len == 0) {
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
49 pos, (unsigned long) len);
58 challenge_len = *pos++;
67 challenge = pos;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dasn1.c16 const u8 *pos, *end; local
20 pos = buf;
23 hdr->identifier = *pos++;
30 if (pos >= end) {
35 tmp = *pos++;
43 tmp = *pos++;
57 if (pos >= end) {
62 hdr->length = (hdr->length << 8) | *pos++;
69 if (end < pos || hdr->length > (unsigned int) (end - pos)) {
81 const u8 *pos, *end; local
145 char *pos = buf; local
186 const u8 *pos = buf; local
[all...]
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dbase64.c32 unsigned char *out, *pos; local
48 pos = out;
51 *pos++ = base64_table[in[0] >> 2];
52 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
53 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
54 *pos++ = base64_table[in[2] & 0x3f];
58 *pos++ = '\n';
64 *pos++ = base64_table[in[0] >> 2];
66 *pos++ = base64_table[(in[0] & 0x03) << 4];
67 *pos
100 unsigned char dtable[256], *out, *pos, block[4], tmp; local
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_attr_parse.c21 u8 id, u8 len, const u8 *pos)
32 attr->version2 = pos;
35 attr->authorized_macs = pos;
44 attr->network_key_shareable = pos;
52 attr->request_to_enroll = pos;
60 attr->settings_delay_time = pos;
72 static int wps_parse_vendor_ext_wfa(struct wps_parse_attr *attr, const u8 *pos, argument
75 const u8 *end = pos + len;
78 while (pos + 2 < end) {
79 id = *pos
20 wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, u8 id, u8 len, const u8 *pos) argument
92 wps_parse_vendor_ext(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument
133 wps_set_attr(struct wps_parse_attr *attr, u16 type, const u8 *pos, u16 len) argument
565 const u8 *pos, *end; local
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Daes-omac1.c47 const u8 *pos, *end; local
61 pos = addr[0];
62 end = pos + len[0];
66 cbc[i] ^= *pos++;
67 if (pos >= end) {
69 pos = addr[e];
70 end = pos + len[e];
84 cbc[i] ^= *pos++;
85 if (pos >= end) {
87 pos
[all...]
H A Dsha256-prf.c56 size_t pos, plen; local
73 pos = 0;
74 while (pos < buf_len) {
75 plen = buf_len - pos;
79 &buf[pos]);
80 pos += SHA256_MAC_LEN;
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
96 buf[pos - 1] &= mask;
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_ndis_.c44 u8 *pos, *data = NULL; local
52 pos = buf + sizeof(int);
55 if (buf + len - pos > 2) {
56 data_len = (int) *pos++ << 8;
57 data_len += *pos++;
58 if (data_len > (size_t) (buf + len - pos)) {
62 data = pos;
/external/wpa_supplicant_8/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
68 pos = 0;
69 while (pos < buf_len) {
71 plen = buf_len - pos;
75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN);
76 pos += SHA1_MAC_LEN;
78 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len);
47 if (pos == NULL || len == 0) {
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
49 pos, (unsigned long) len);
58 challenge_len = *pos++;
67 challenge = pos;
/external/wpa_supplicant_8/src/tls/
H A Dasn1.c16 const u8 *pos, *end; local
20 pos = buf;
23 hdr->identifier = *pos++;
30 if (pos >= end) {
35 tmp = *pos++;
43 tmp = *pos++;
57 if (pos >= end) {
62 hdr->length = (hdr->length << 8) | *pos++;
69 if (end < pos || hdr->length > (unsigned int) (end - pos)) {
81 const u8 *pos, *end; local
145 char *pos = buf; local
186 const u8 *pos = buf; local
[all...]
/external/wpa_supplicant_8/src/utils/
H A Dbase64.c32 unsigned char *out, *pos; local
48 pos = out;
51 *pos++ = base64_table[in[0] >> 2];
52 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
53 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
54 *pos++ = base64_table[in[2] & 0x3f];
58 *pos++ = '\n';
64 *pos++ = base64_table[in[0] >> 2];
66 *pos++ = base64_table[(in[0] & 0x03) << 4];
67 *pos
100 unsigned char dtable[256], *out, *pos, block[4], tmp; local
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_attr_parse.c21 u8 id, u8 len, const u8 *pos)
32 attr->version2 = pos;
35 attr->authorized_macs = pos;
44 attr->network_key_shareable = pos;
52 attr->request_to_enroll = pos;
60 attr->settings_delay_time = pos;
72 static int wps_parse_vendor_ext_wfa(struct wps_parse_attr *attr, const u8 *pos, argument
75 const u8 *end = pos + len;
78 while (pos + 2 < end) {
79 id = *pos
20 wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, u8 id, u8 len, const u8 *pos) argument
92 wps_parse_vendor_ext(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument
133 wps_set_attr(struct wps_parse_attr *attr, u16 type, const u8 *pos, u16 len) argument
565 const u8 *pos, *end; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-omac1.c47 const u8 *pos, *end; local
61 pos = addr[0];
62 end = pos + len[0];
66 cbc[i] ^= *pos++;
67 if (pos >= end) {
69 pos = addr[e];
70 end = pos + len[e];
84 cbc[i] ^= *pos++;
85 if (pos >= end) {
87 pos
[all...]
H A Dsha256-prf.c56 size_t pos, plen; local
73 pos = 0;
74 while (pos < buf_len) {
75 plen = buf_len - pos;
79 &buf[pos]);
80 pos += SHA256_MAC_LEN;
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
96 buf[pos - 1] &= mask;
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_ndis_.c44 u8 *pos, *data = NULL; local
52 pos = buf + sizeof(int);
55 if (buf + len - pos > 2) {
56 data_len = (int) *pos++ << 8;
57 data_len += *pos++;
58 if (data_len > (size_t) (buf + len - pos)) {
62 data = pos;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
68 pos = 0;
69 while (pos < buf_len) {
71 plen = buf_len - pos;
75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN);
76 pos += SHA1_MAC_LEN;
78 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len);
47 if (pos == NULL || len == 0) {
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
49 pos, (unsigned long) len);
58 challenge_len = *pos++;
67 challenge = pos;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dasn1.c16 const u8 *pos, *end; local
20 pos = buf;
23 hdr->identifier = *pos++;
30 if (pos >= end) {
35 tmp = *pos++;
43 tmp = *pos++;
57 if (pos >= end) {
62 hdr->length = (hdr->length << 8) | *pos++;
69 if (end < pos || hdr->length > (unsigned int) (end - pos)) {
81 const u8 *pos, *end; local
145 char *pos = buf; local
186 const u8 *pos = buf; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dbase64.c32 unsigned char *out, *pos; local
48 pos = out;
51 *pos++ = base64_table[in[0] >> 2];
52 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
53 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
54 *pos++ = base64_table[in[2] & 0x3f];
58 *pos++ = '\n';
64 *pos++ = base64_table[in[0] >> 2];
66 *pos++ = base64_table[(in[0] & 0x03) << 4];
67 *pos
100 unsigned char dtable[256], *out, *pos, block[4], tmp; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_attr_parse.c21 u8 id, u8 len, const u8 *pos)
32 attr->version2 = pos;
35 attr->authorized_macs = pos;
44 attr->network_key_shareable = pos;
52 attr->request_to_enroll = pos;
60 attr->settings_delay_time = pos;
72 static int wps_parse_vendor_ext_wfa(struct wps_parse_attr *attr, const u8 *pos, argument
75 const u8 *end = pos + len;
78 while (pos + 2 < end) {
79 id = *pos
20 wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, u8 id, u8 len, const u8 *pos) argument
92 wps_parse_vendor_ext(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument
133 wps_set_attr(struct wps_parse_attr *attr, u16 type, const u8 *pos, u16 len) argument
565 const u8 *pos, *end; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwifi_display.c193 char *pos; local
198 pos = os_strchr(cmd, ' ');
199 if (pos == NULL)
201 *pos++ = '\0';
206 len = os_strlen(pos);
220 if (hexstr2bin(pos, wpabuf_put(e, len), len) < 0) {
/external/android-clat/
H A Dipv6.c37 int icmp6_packet(clat_packet out, int pos, const struct icmp6_hdr *icmp6, size_t len) { argument
49 return icmp6_to_icmp(out, pos, icmp6, payload, payload_size);
77 int ipv6_packet(clat_packet out, int pos, const char *packet, size_t len) { argument
79 struct iphdr *ip_targ = (struct iphdr *) out[pos].iov_base;
122 out[pos].iov_len = sizeof(struct iphdr);
155 iov_len = generic_packet(out, pos + 2, next_header, len_left);
157 iov_len = icmp6_packet(out, pos + 2, (const struct icmp6_hdr *) next_header, len_left);
159 iov_len = tcp_packet(out, pos + 2, (const struct tcphdr *) next_header, old_sum, new_sum,
162 iov_len = udp_packet(out, pos + 2, (const struct udphdr *) next_header, old_sum, new_sum,
165 iov_len = generic_packet(out, pos
[all...]
/external/apache-http/src/org/apache/http/impl/io/
H A DChunkedInputStream.java82 private int pos; field in class:ChunkedInputStream
101 this.pos = 0;
124 if (this.pos >= this.chunkSize) {
130 pos++;
154 if (pos >= chunkSize) {
160 len = Math.min(len, chunkSize - pos);
162 pos += count;
188 pos = 0;

Completed in 1163 milliseconds

<<11121314151617181920>>