/external/libmicrohttpd/src/microhttpd/ |
H A D | internal.c | 134 char *rpos = val; local 140 while ('\0' != *rpos) 142 switch (*rpos) 145 if ( ('\0' == rpos[1]) || 146 ('\0' == rpos[2]) ) 151 buf3[0] = rpos[1]; 152 buf3[1] = rpos[2]; 159 rpos += 3; 164 *wpos = *rpos; 166 rpos [all...] |
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 593 char *rpos, *rend; local 609 rpos = resp; 610 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi); 611 if (ret < 0 || ret >= rend - rpos) 613 rpos += ret; 622 *rpos++ = ' '; 623 rpos += wpa_snprintf_hex(rpos, rend - rpos, k 665 char *pos, *rpos, *rend; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 315 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 318 NULL, 0, NULL, 0, rpos) < [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 348 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 352 wpabuf_head(resp), wpabuf_len(resp), rpos, 353 rpos)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 315 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 318 NULL, 0, NULL, 0, rpos) < [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 348 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 352 wpabuf_head(resp), wpabuf_len(resp), rpos, 353 rpos)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_md5.c | 35 u8 *rpos, id; local 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 90 rpos)) { 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 123 u8 *rpos; local 207 rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 211 (u8 *) data->cid, data->cid_len, rpos); 213 rpos, EAP_PAX_MAC_LEN); 217 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 220 NULL, 0, NULL, 0, rpos); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 238 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 315 rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 318 NULL, 0, NULL, 0, rpos) < [all...] |
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; local 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 124 rpos, LEAP_RESPONSE_LEN);
|
H A D | eap_sake.c | 193 u8 *rpos; local 266 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 270 wpabuf_head(resp), wpabuf_len(resp), rpos, 271 rpos)) { 294 u8 *rpos; local 348 rpos = wpabuf_put(resp, EAP_SAKE_MIC_LEN); 352 wpabuf_head(resp), wpabuf_len(resp), rpos, 353 rpos)) {
|
/external/llvm/utils/ |
H A D | wciia.py | 88 rpos = -1 90 rpos = path.find(fpath) 91 if rpos == 0:
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 1569 u8 *start, *end, *rpos, *rend; local 1589 rpos = start + 2; 1590 rend = rpos + start[1]; 1593 rpos += 2 + 4; 1595 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1597 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1599 if (rpos == rend) { 1601 os_memmove(rpos [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 1569 u8 *start, *end, *rpos, *rend; local 1589 rpos = start + 2; 1590 rend = rpos + start[1]; 1593 rpos += 2 + 4; 1595 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1597 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1599 if (rpos == rend) { 1601 os_memmove(rpos [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 1569 u8 *start, *end, *rpos, *rend; local 1589 rpos = start + 2; 1590 rend = rpos + start[1]; 1593 rpos += 2 + 4; 1595 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1597 rpos += 2 + WPA_GET_LE16(rpos) * RSN_SELECTOR_LEN; 1599 if (rpos == rend) { 1601 os_memmove(rpos [all...] |
/external/libcups/cups/ |
H A D | testipp.c | 37 size_t rpos, /* Read position */ member in struct:_ippdata_t 372 data.rpos = 0; 383 printf("FAIL - %d bytes read.\n", (int)data.rpos); 386 else if (data.rpos != data.wused) 388 printf("FAIL - read %d bytes, expected %d bytes!\n", (int)data.rpos, 600 data.rpos = 0; 614 printf("FAIL - %d bytes read.\n", (int)data.rpos); 617 else if (data.rpos != sizeof(mixed)) 619 printf("FAIL - read %d bytes, expected %d bytes!\n", (int)data.rpos, 1007 if ((count = data->wsize - data->rpos) > byte [all...] |
/external/syslinux/com32/mboot/ |
H A D | initvesa.c | 141 (mi->memory_layout == 6 && mi->rpos == 16 && mi->gpos == 8 && 146 (mi->memory_layout == 6 && mi->rpos == 16 && mi->gpos == 8 && 151 (mi->memory_layout == 6 && mi->rpos == 11 && mi->gpos == 5 && 156 (mi->memory_layout == 6 && mi->rpos == 10 && mi->gpos == 5 &&
|
H A D | vesa.h | 77 uint8_t rpos; member in struct:vesa_mode_info
|
/external/syslinux/efi/ |
H A D | vesa.c | 162 mi->rpos = 0; 178 mi->rpos = 16; 194 &mi->rpos, &lfb_rsize); 204 dprintf("RPos %d Rsize %d GPos %d Gsize %d\n", mi->rpos, lfb_rsize, mi->gpos, lfb_gsize);
|
/external/syslinux/com32/lib/sys/vesa/ |
H A D | vesa.h | 78 uint8_t rpos; member in struct:vesa_mode_info
|
/external/syslinux/com32/modules/ |
H A D | vesainfo.c | 54 "Mode attrib h_res v_res bpp layout rpos gpos bpos\n", 80 mi->memory_layout, mi->rpos, mi->gpos, mi->bpos);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 623 const u8 *rpos, *start; local 628 rpos = ric; 629 while (rpos + sizeof(*rdie) < ric + ric_len) { 630 if (rpos[0] != WLAN_EID_RIC_DATA || rpos[1] < sizeof(*rdie) || 631 rpos + 2 + rpos[1] > ric + ric_len) 633 rdie = (const struct rsn_rdie *) (rpos + 2); 634 rpos += 2 + rpos[ [all...] |