/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-kdf.c | 40 size_t pos, clen; local 59 pos = 0; 61 clen = outlen - pos; 64 os_memcpy(out + pos, T, clen); 65 pos += clen; 67 if (pos == outlen)
|
H A D | sha256-tlsprf.c | 35 size_t pos; local 55 pos = 0; 56 while (pos < outlen) { 60 clen = outlen - pos; 63 os_memcpy(out + pos, P, clen); 64 pos += clen;
|
H A D | sha384-kdf.c | 40 size_t pos, clen; local 59 pos = 0; 61 clen = outlen - pos; 64 os_memcpy(out + pos, T, clen); 65 pos += clen; 67 if (pos == outlen)
|
H A D | sha512-kdf.c | 40 size_t pos, clen; local 59 pos = 0; 61 clen = outlen - pos; 64 os_memcpy(out + pos, T, clen); 65 pos += clen; 67 if (pos == outlen)
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len); 38 if (pos == NULL) { 43 pos, len); 55 eap_sm_request_otp(sm, (const char *) pos, len);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs8.c | 22 const u8 *pos, *end; local 37 pos = hdr.payload; 38 end = pos + hdr.length; 41 if (asn1_get_next(pos, end - pos, &hdr) < 0 || 58 pos = hdr.payload + hdr.length; 71 if (asn1_get_next(pos, len, &hdr) < 0 || 81 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 103 pos = hdr.payload + hdr.length; 106 if (asn1_get_next(pos, en 125 const u8 *pos, *end, *enc_alg; local [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password_test.c | 47 char *pos, *pos2; local 52 pos = data->params; 53 if (pos == NULL) 57 while (pos && *pos) { 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { 60 pos += nlen + 1; 61 pos2 = pos; 64 buf = ext_password_alloc(pos2 - pos); [all...] |
H A D | uuid.c | 17 const char *pos; local 20 pos = str; 23 if (hexstr2bin(pos, opos, 4)) 25 pos += 8; 28 if (*pos++ != '-' || hexstr2bin(pos, opos, 2)) 30 pos += 4; 33 if (*pos++ != '-' || hexstr2bin(pos, opos, 2)) 35 pos [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | autoscan_exponential.c | 27 const char *pos; local 34 pos = os_strchr(params, ':'); 35 if (pos == NULL) 38 pos++; 39 data->limit = atoi(pos);
|
H A D | nfc_pw_token.c | 21 const u8 *pos; local 28 pos = wpabuf_head(buf); 31 printf("%02X", *pos++);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-cbc.c | 28 u8 *pos = data; local 42 cbc[j] ^= pos[j]; 44 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 45 pos += AES_BLOCK_SIZE; 64 u8 *pos = data; local 77 os_memcpy(tmp, pos, AES_BLOCK_SIZE); 78 aes_decrypt(ctx, pos, pos); 80 pos[j] ^= cbc[j]; 82 pos [all...] |
H A D | aes-ctr.c | 31 u8 *pos = data; local 44 pos[j] ^= buf[j]; 45 pos += len;
|
H A D | rc4.c | 20 u8 S[256], *pos; local 45 pos = data; 50 *pos++ ^= S[(S[i] + S[j]) & 0xff];
|
H A D | sha1-prf.c | 34 size_t pos, plen; local 47 pos = 0; 48 while (pos < buf_len) { 49 plen = buf_len - pos; 52 &buf[pos])) 54 pos += SHA1_MAC_LEN; 59 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-tprf.c | 33 size_t pos, plen; local 53 pos = 0; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); 61 pos += SHA1_MAC_LEN; 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256-kdf.c | 40 size_t pos, clen; local 59 pos = 0; 61 clen = outlen - pos; 64 os_memcpy(out + pos, T, clen); 65 pos += clen; 67 if (pos == outlen)
|
H A D | sha256-tlsprf.c | 35 size_t pos; local 55 pos = 0; 56 while (pos < outlen) { 60 clen = outlen - pos; 63 os_memcpy(out + pos, P, clen); 64 pos += clen;
|
H A D | sha384-kdf.c | 40 size_t pos, clen; local 59 pos = 0; 61 clen = outlen - pos; 64 os_memcpy(out + pos, T, clen); 65 pos += clen; 67 if (pos == outlen)
|
H A D | sha512-kdf.c | 40 size_t pos, clen; local 59 pos = 0; 61 clen = outlen - pos; 64 os_memcpy(out + pos, T, clen); 65 pos += clen; 67 if (pos == outlen)
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len); 38 if (pos == NULL) { 43 pos, len); 55 eap_sm_request_otp(sm, (const char *) pos, len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs8.c | 22 const u8 *pos, *end; local 37 pos = hdr.payload; 38 end = pos + hdr.length; 41 if (asn1_get_next(pos, end - pos, &hdr) < 0 || 58 pos = hdr.payload + hdr.length; 71 if (asn1_get_next(pos, len, &hdr) < 0 || 81 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 103 pos = hdr.payload + hdr.length; 106 if (asn1_get_next(pos, en 125 const u8 *pos, *end, *enc_alg; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password_test.c | 47 char *pos, *pos2; local 52 pos = data->params; 53 if (pos == NULL) 57 while (pos && *pos) { 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { 60 pos += nlen + 1; 61 pos2 = pos; 64 buf = ext_password_alloc(pos2 - pos); [all...] |
H A D | uuid.c | 17 const char *pos; local 20 pos = str; 23 if (hexstr2bin(pos, opos, 4)) 25 pos += 8; 28 if (*pos++ != '-' || hexstr2bin(pos, opos, 2)) 30 pos += 4; 33 if (*pos++ != '-' || hexstr2bin(pos, opos, 2)) 35 pos [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | userdatarequest.cpp | 39 char *tmp, *pos, *pos2; local 44 pos = strchr(tmp, '-'); 45 if (pos == NULL) { 49 *pos++ = '\0'; 51 pos2 = strchr(pos, ':'); 58 networkid = atoi(pos);
|
/external/zopfli/src/zopfli/ |
H A D | hash.c | 91 void ZopfliUpdateHash(const unsigned char* array, size_t pos, size_t end, argument 93 unsigned short hpos = pos & ZOPFLI_WINDOW_MASK; 98 UpdateHashValue(h, pos + ZOPFLI_MIN_MATCH <= end ? 99 array[pos + ZOPFLI_MIN_MATCH - 1] : 0); 109 if (h->same[(pos - 1) & ZOPFLI_WINDOW_MASK] > 1) { 110 amount = h->same[(pos - 1) & ZOPFLI_WINDOW_MASK] - 1; 112 while (pos + amount + 1 < end && 113 array[pos] == array[pos + amount + 1] && amount < (unsigned short)(-1)) { 130 void ZopfliWarmupHash(const unsigned char* array, size_t pos, size_ argument [all...] |