/external/libmicrohttpd/src/microhttpd/ |
H A D | internal.c | 134 char *rpos = val; local 140 while ('\0' != *rpos) 142 switch (*rpos) 145 if ( ('\0' == rpos[1]) || 146 ('\0' == rpos[2]) ) 151 buf3[0] = rpos[1]; 152 buf3[1] = rpos[2]; 159 rpos += 3; 164 *wpos = *rpos; 166 rpos [all...] |
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 593 char *rpos, *rend; local 609 rpos = resp; 610 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi); 611 if (ret < 0 || ret >= rend - rpos) 613 rpos += ret; 622 *rpos++ = ' '; 623 rpos += wpa_snprintf_hex(rpos, rend - rpos, k 665 char *pos, *rpos, *rend; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 308 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 311 NULL, 0, NULL, 0, rpos) < [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 339 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 343 wpabuf_head(resp), wpabuf_len(resp), rpos, 344 rpos)) {
|
H A D | eap_gpsk.c | 322 u8 *rpos, *start; local 399 rpos = wpabuf_put(resp, miclen); 401 data->specifier, start, rpos - start, rpos) < 634 u8 *rpos, *start; local 652 rpos = wpabuf_put(resp, mlen); 654 data->specifier, start, rpos - start, rpos) <
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 308 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 311 NULL, 0, NULL, 0, rpos) < [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 339 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 343 wpabuf_head(resp), wpabuf_len(resp), rpos, 344 rpos)) {
|
H A D | eap_gpsk.c | 322 u8 *rpos, *start; local 399 rpos = wpabuf_put(resp, miclen); 401 data->specifier, start, rpos - start, rpos) < 634 u8 *rpos, *start; local 652 rpos = wpabuf_put(resp, mlen); 654 data->specifier, start, rpos - start, rpos) <
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 308 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 311 NULL, 0, NULL, 0, rpos) < [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 339 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 343 wpabuf_head(resp), wpabuf_len(resp), rpos, 344 rpos)) {
|
H A D | eap_gpsk.c | 322 u8 *rpos, *start; local 399 rpos = wpabuf_put(resp, miclen); 401 data->specifier, start, rpos - start, rpos) < 634 u8 *rpos, *start; local 652 rpos = wpabuf_put(resp, mlen); 654 data->specifier, start, rpos - start, rpos) <
|
/external/llvm/utils/ |
H A D | wciia.py | 88 rpos = -1 90 rpos = path.find(fpath) 91 if rpos == 0:
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 1287 u8 *start, *end, *rpos, *rend; local 1307 rpos = start + 2; 1308 rend = rpos + start[1]; 1311 rpos += 2 + 4; 1313 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1315 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1317 if (rpos == rend) { 1319 os_memmove(rpos [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 1287 u8 *start, *end, *rpos, *rend; local 1307 rpos = start + 2; 1308 rend = rpos + start[1]; 1311 rpos += 2 + 4; 1313 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1315 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1317 if (rpos == rend) { 1319 os_memmove(rpos [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 1287 u8 *start, *end, *rpos, *rend; local 1307 rpos = start + 2; 1308 rend = rpos + start[1]; 1311 rpos += 2 + 4; 1313 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1315 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1317 if (rpos == rend) { 1319 os_memmove(rpos [all...] |
/external/libgdx/extensions/gdx-bullet/jni/src/bullet/BulletSoftBody/ |
H A D | btSoftBody.h | 423 btVector3 angularVelocity(const btVector3& rpos) const 425 if(m_rigid) return(btCross(m_rigid->getAngularVelocity(),rpos)); 426 if(m_soft) return(btCross(m_soft->m_av,rpos)); 435 btVector3 velocity(const btVector3& rpos) const 437 return(linearVelocity()+angularVelocity(rpos)); 439 void applyVImpulse(const btVector3& impulse,const btVector3& rpos) const 441 if(m_rigid) m_rigid->applyImpulse(impulse,rpos); 442 if(m_soft) btSoftBody::clusterVImpulse(m_soft,rpos,impulse); 444 void applyDImpulse(const btVector3& impulse,const btVector3& rpos) const 446 if(m_rigid) m_rigid->applyImpulse(impulse,rpos); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 606 const u8 *rpos, *start; local 611 rpos = ric; 612 while (rpos + sizeof(*rdie) < ric + ric_len) { 613 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 614 rpos + 2 + rpos[1] > ric + ric_len) 616 rdie = (const struct rsn_rdie *) (rpos + 2); 617 rpos += 2 + rpos[ [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 606 const u8 *rpos, *start; local 611 rpos = ric; 612 while (rpos + sizeof(*rdie) < ric + ric_len) { 613 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 614 rpos + 2 + rpos[1] > ric + ric_len) 616 rdie = (const struct rsn_rdie *) (rpos + 2); 617 rpos += 2 + rpos[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 606 const u8 *rpos, *start; local 611 rpos = ric; 612 while (rpos + sizeof(*rdie) < ric + ric_len) { 613 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 614 rpos + 2 + rpos[1] > ric + ric_len) 616 rdie = (const struct rsn_rdie *) (rpos + 2); 617 rpos += 2 + rpos[ [all...] |