Searched refs:cpos (Results 1 – 12 of 12) sorted by relevance
/external/antlr/antlr-3.4/runtime/JavaScript/tests/functional/ |
D | rhino-python.extensions | 162 // compute cpos as the char pos of next non-WS token in line 163 var cpos = t.getCharPositionInLine(); // column dictates indent/dedent 165 cpos = -1; // pretend EOF always happens at left edge 168 cpos = t.getText().length; 173 if ( cpos > lastIndent ) { // they indented; track and gen INDENT 174 this.push(cpos); 180 else if ( cpos < lastIndent ) { // they dedented 182 var prevIndex = this.findPreviousIndent(cpos);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_psk.c | 226 const u8 *cpos; in eap_psk_process_2() local 233 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, in eap_psk_process_2() 235 if (cpos == NULL || left < sizeof(*resp)) { in eap_psk_process_2() 239 resp = (const struct eap_psk_hdr_2 *) cpos; in eap_psk_process_2() 240 cpos = (const u8 *) (resp + 1); in eap_psk_process_2() 250 os_memcpy(data->id_p, cpos, left); in eap_psk_process_2()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 223 const u8 *cpos; in eap_psk_process_2() local 230 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, in eap_psk_process_2() 232 if (cpos == NULL || left < sizeof(*resp)) { in eap_psk_process_2() 236 resp = (const struct eap_psk_hdr_2 *) cpos; in eap_psk_process_2() 237 cpos = (const u8 *) (resp + 1); in eap_psk_process_2() 247 os_memcpy(data->id_p, cpos, left); in eap_psk_process_2()
|
/external/qemu/audio/ |
D | dsoundaudio.c | 766 DWORD cpos, rpos; in dsound_run_in() local 785 &cpos, in dsound_run_in() 802 if (cpos & hw->info.align) { in dsound_run_in() 804 cpos, hw->info.align); in dsound_run_in() 806 cpos >>= hwshift; in dsound_run_in() 808 len = audio_ring_dist (cpos, hw->wpos, hw->samples); in dsound_run_in()
|
/external/openssl/crypto/modes/asm/ |
D | ghash-parisc.pl | 686 my $cpos=63-$3; 687 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode sa 704 my $cpos=63-$2; 706 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode pos
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_psk.c | 96 const u8 *cpos; in eap_psk_process_1() local 100 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); in eap_psk_process_1() 101 hdr1 = (const struct eap_psk_hdr_1 *) cpos; in eap_psk_process_1() 102 if (cpos == NULL || len < sizeof(*hdr1)) { in eap_psk_process_1()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_psk.c | 91 const u8 *cpos; in eap_psk_process_1() local 95 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); in eap_psk_process_1() 96 hdr1 = (const struct eap_psk_hdr_1 *) cpos; in eap_psk_process_1() 97 if (cpos == NULL || len < sizeof(*hdr1)) { in eap_psk_process_1()
|
/external/mksh/src/ |
D | dot.mkshrc | 78 local -i isnoglob=0 fl=0 fv=0 fn=0 cpos=0 110 if (( fn && (cpos += dwidth + 1) >= 79 && \ 113 (( cpos = dwidth + 1 ))
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 1338 const u8 *cpos; in wpa_tdls_process_tpk_m1() local 1358 cpos = buf; in wpa_tdls_process_tpk_m1() 1359 cpos += 1 /* pkt_type */ + 1 /* Category */ + 1 /* Action */; in wpa_tdls_process_tpk_m1() 1362 dtoken = *cpos++; /* dialog token */ in wpa_tdls_process_tpk_m1() 1380 peer->capability = WPA_GET_LE16(cpos); in wpa_tdls_process_tpk_m1() 1381 cpos += 2; in wpa_tdls_process_tpk_m1() 1383 ielen = len - (cpos - buf); /* start of IE in buf */ in wpa_tdls_process_tpk_m1() 1384 if (wpa_supplicant_parse_ies(cpos, ielen, &kde) < 0) { in wpa_tdls_process_tpk_m1()
|
/external/openssl/crypto/sha/asm/ |
D | sha512-parisc.pl | 745 my $cpos=63-$3; 746 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode sa
|
/external/openssl/crypto/bn/asm/ |
D | parisc-mont.pl | 956 my $cpos=63-$3; 957 $opcode |= (($cpos&0x20)<<6)|(($cpos&0x1f)<<5); # encode sa
|
/external/expat/lib/ |
D | xmlparse.c | 6364 XML_Content *cpos; in build_model() local 6374 cpos = &ret[1]; in build_model() 6376 build_node(parser, 0, ret, &cpos, &str); in build_model()
|