/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 647 char *rpos, *rend; local 663 rpos = resp; 664 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi); 665 if (ret < 0 || ret >= rend - rpos) 667 rpos += ret; 676 *rpos++ = ' '; 677 rpos += wpa_snprintf_hex(rpos, rend - rpos, k 719 char *pos, *rpos, *rend; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 308 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 311 NULL, 0, NULL, 0, rpos); [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 339 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 343 wpabuf_head(resp), wpabuf_len(resp), rpos, 344 rpos)) {
|
H A D | eap_gpsk.c | 322 u8 *rpos, *start; local 399 rpos = wpabuf_put(resp, miclen); 401 data->specifier, start, rpos - start, rpos) < 634 u8 *rpos, *start; local 652 rpos = wpabuf_put(resp, mlen); 654 data->specifier, start, rpos - start, rpos) <
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 308 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 311 NULL, 0, NULL, 0, rpos); [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 339 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 343 wpabuf_head(resp), wpabuf_len(resp), rpos, 344 rpos)) {
|
H A D | eap_gpsk.c | 322 u8 *rpos, *start; local 399 rpos = wpabuf_put(resp, miclen); 401 data->specifier, start, rpos - start, rpos) < 634 u8 *rpos, *start; local 652 rpos = wpabuf_put(resp, mlen); 654 data->specifier, start, rpos - start, rpos) <
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 308 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 311 NULL, 0, NULL, 0, rpos); [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 339 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 343 wpabuf_head(resp), wpabuf_len(resp), rpos, 344 rpos)) {
|
H A D | eap_gpsk.c | 322 u8 *rpos, *start; local 399 rpos = wpabuf_put(resp, miclen); 401 data->specifier, start, rpos - start, rpos) < 634 u8 *rpos, *start; local 652 rpos = wpabuf_put(resp, mlen); 654 data->specifier, start, rpos - start, rpos) <
|
/external/llvm/utils/ |
H A D | wciia.py | 88 rpos = -1 90 rpos = path.find(fpath) 91 if rpos == 0:
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 1260 u8 *start, *end, *rpos, *rend; local 1280 rpos = start + 2; 1281 rend = rpos + start[1]; 1284 rpos += 2 + 4; 1286 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1288 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1290 if (rpos == rend) { 1292 os_memmove(rpos [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 1260 u8 *start, *end, *rpos, *rend; local 1280 rpos = start + 2; 1281 rend = rpos + start[1]; 1284 rpos += 2 + 4; 1286 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1288 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1290 if (rpos == rend) { 1292 os_memmove(rpos [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 1260 u8 *start, *end, *rpos, *rend; local 1280 rpos = start + 2; 1281 rend = rpos + start[1]; 1284 rpos += 2 + 4; 1286 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1288 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1290 if (rpos == rend) { 1292 os_memmove(rpos [all...] |
/external/lldb/source/Target/ |
H A D | SectionLoadList.cpp | 229 addr_to_sect_collection::const_reverse_iterator rpos = m_addr_to_sect.rbegin(); local 230 if (load_addr >= rpos->first) 232 addr_t offset = load_addr - rpos->first; 233 if (offset < rpos->second->GetByteSize()) 237 return rpos->second->ResolveContainedAddress (offset, so_addr);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 606 const u8 *rpos, *start; local 611 rpos = ric; 612 while (rpos + sizeof(*rdie) < ric + ric_len) { 613 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 614 rpos + 2 + rpos[1] > ric + ric_len) 616 rdie = (const struct rsn_rdie *) (rpos + 2); 617 rpos += 2 + rpos[ [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 606 const u8 *rpos, *start; local 611 rpos = ric; 612 while (rpos + sizeof(*rdie) < ric + ric_len) { 613 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 614 rpos + 2 + rpos[1] > ric + ric_len) 616 rdie = (const struct rsn_rdie *) (rpos + 2); 617 rpos += 2 + rpos[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 606 const u8 *rpos, *start; local 611 rpos = ric; 612 while (rpos + sizeof(*rdie) < ric + ric_len) { 613 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 614 rpos + 2 + rpos[1] > ric + ric_len) 616 rdie = (const struct rsn_rdie *) (rpos + 2); 617 rpos += 2 + rpos[ [all...] |
/external/freetype/src/base/ |
H A D | ftrfork.c | 161 FT_Long tag_internal, rpos; local 181 FT_READ_USHORT( rpos ) ) 190 subcnt, rpos )); 195 rpos += map_offset; 197 error = FT_Stream_Seek( stream, (FT_ULong)rpos );
|