/external/webrtc/src/modules/audio_processing/test/android/apmtest/jni/ |
H A D | main.c | 182 static void engine_handle_cmd(struct android_app* app, int32_t cmd) { argument 184 switch (cmd) {
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | ctrl_iface.c | 41 char *cmd) 46 value = os_strchr(cmd, ' '); 51 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value); 52 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) { 55 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) { 58 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) { 61 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) { 64 } else if (os_strcasecmp(cmd, "dot11RSNAConfigPMKLifetime") == 0) { 68 } else if (os_strcasecmp(cmd, "dot11RSNAConfigPMKReauthThreshold") == 73 } else if (os_strcasecmp(cmd, "dot11RSNAConfigSATimeou 40 wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s, char *cmd) argument 147 wpa_supplicant_ctrl_iface_wps_pbc(struct wpa_supplicant *wpa_s, char *cmd) argument 165 wpa_supplicant_ctrl_iface_wps_pin(struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument 207 wpa_supplicant_ctrl_iface_wps_reg(struct wpa_supplicant *wpa_s, char *cmd) argument 393 wpa_supplicant_ctrl_iface_bssid(struct wpa_supplicant *wpa_s, char *cmd) argument 427 wpa_supplicant_ctrl_iface_scan_interval( struct wpa_supplicant *wpa_s, char *cmd) argument 438 wpa_supplicant_ctrl_iface_blacklist( struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument 492 wpa_supplicant_ctrl_iface_log_level( struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument 855 wpa_supplicant_ctrl_iface_select_network( struct wpa_supplicant *wpa_s, char *cmd) argument 901 wpa_supplicant_ctrl_iface_enable_network( struct wpa_supplicant *wpa_s, char *cmd) argument 953 wpa_supplicant_ctrl_iface_disable_network( struct wpa_supplicant *wpa_s, char *cmd) argument 1020 wpa_supplicant_ctrl_iface_remove_network( struct wpa_supplicant *wpa_s, char *cmd) argument 1068 wpa_supplicant_ctrl_iface_set_network( struct wpa_supplicant *wpa_s, char *cmd) argument 1126 wpa_supplicant_ctrl_iface_get_network( struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument 1501 wpa_supplicant_ctrl_iface_bss(struct wpa_supplicant *wpa_s, const char *cmd, char *buf, size_t buflen) argument 1607 wpa_supplicant_ctrl_iface_ap_scan( struct wpa_supplicant *wpa_s, char *cmd) argument 1626 wpa_supplicant_driver_cmd(struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument 1846 wpa_supplicant_global_iface_add(struct wpa_global *global, char *cmd) argument 1923 wpa_supplicant_global_iface_remove(struct wpa_global *global, char *cmd) argument [all...] |
H A D | wpa_cli.c | 201 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd, int print) argument 212 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, 215 printf("'%s' command timed out.\n", cmd); 218 printf("'%s' command failed.\n", cmd); 229 static int wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd) argument 231 return _wpa_ctrl_command(ctrl, cmd, 1); 303 char cmd[256]; local 317 res = os_snprintf(cmd, sizeof(cmd), "SE 348 char cmd[256]; local 368 char cmd[256]; local 388 char cmd[256]; local 408 char cmd[256]; local 428 char cmd[256]; local 448 char cmd[256]; local 481 char cmd[256]; local 502 char cmd[256]; local 521 char cmd[256], *pos, *end; local 554 char cmd[256], *pos, *end; local 588 char cmd[256], *pos, *end; local 621 char cmd[256], *pos, *end; local 653 char cmd[256], *pos, *end; local 687 char cmd[256], *pos, *end; local 720 char cmd[256], *pos, *end; local 754 char cmd[256]; local 773 char cmd[256], *pos, *end; local 799 char cmd[256], *pos, *end; local 834 char cmd[32]; local 855 char cmd[32]; local 876 char cmd[32]; local 904 char cmd[32]; local 946 char cmd[256]; local 973 char cmd[256]; local 1033 char cmd[64]; local 1054 char cmd[64]; local 1130 char cmd[256]; local 1161 char cmd[128]; local 1188 char cmd[32]; local 1211 const char *cmd; member in struct:wpa_cli_cmd 1392 print_cmd_help(struct wpa_cli_cmd *cmd, const char *pad) argument 1417 cmd_has_sensitive_data(const char *cmd) argument 1441 struct wpa_cli_cmd *cmd, *match = NULL; local 1496 char *cmd; local 1647 const char *cmd; local 1681 char cmdbuf[256], *cmd, *argv[max_args], *pos; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wireless_copy.h | 348 #define IW_IOCTL_IDX(cmd) ((cmd) - SIOCIWFIRST) 351 #define IW_IS_SET(cmd) (!((cmd) & 0x1)) 352 #define IW_IS_GET(cmd) ((cmd) & 0x1) 393 #define IW_EVENT_IDX(cmd) ((cmd) - IWEVFIRST) 647 #define IW_EVENT_CAPA_BASE(cmd) ((cmd > 854 __u16 cmd; /* IW_MLME_* */ member in struct:iw_mlme 868 __u32 cmd; /* IW_PMKSA_* */ member in struct:iw_pmksa 1083 __u32 cmd; /* Number of the ioctl to issue */ member in struct:iw_priv_args 1102 __u16 cmd; /* Wireless IOCTL */ member in struct:iw_event 1128 __u16 cmd; /* Wireless IOCTL */ member in struct:__compat_iw_event [all...] |
H A D | wpa_ctrl.c | 288 int wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, argument 311 os_memcpy(pos, cmd, cmd_len); 315 _cmd = cmd; 505 int wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, argument 512 if (!WriteFile(ctrl->pipe, cmd, cmd_len, &written, NULL))
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_atmel.c | 63 /* ATMEL_WPA_IOCTL ioctl() cmd: */ 71 /* ATMEL_WPA_IOCTL_PARAM ioctl() cmd: */ 82 int cmd; member in struct:atmel_param 157 param->cmd = ATMEL_SET_GENERIC_ELEMENT; 240 param->cmd = SET_WPA_ENCRYPTION; 286 static int wpa_driver_atmel_mlme(void *priv, const u8 *addr, int cmd, argument 296 param.cmd = cmd; 313 param.cmd = SET_CIPHER_SUITES;
|
H A D | driver_broadcom.c | 86 static int broadcom_ioctl(struct wpa_driver_broadcom_data *drv, int cmd, argument 94 drv->ifname, cmd, len, buf); 97 ioc.cmd = cmd; 103 if (cmd != WLC_GET_MAGIC) 105 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d", 106 cmd, ret);
|
H A D | driver_hostap.c | 70 param->cmd = PRISM2_HOSTAPD_SET_GENERIC_ELEMENT; 192 param->cmd = PRISM2_SET_ENCRYPTION; 265 const u8 *addr, int cmd, int reason_code) 275 param.cmd = PRISM2_HOSTAPD_MLME; 277 param.u.mlme.cmd = cmd; 386 param.cmd = PRISM2_HOSTAPD_SCAN_REQ; 264 wpa_driver_hostap_mlme(struct wpa_driver_hostap_data *drv, const u8 *addr, int cmd, int reason_code) argument
|
H A D | driver_hostap.h | 66 /* PRISM2_IOCTL_HOSTAPD ioctl() cmd: */ 97 u32 cmd; member in struct:prism2_hostapd_param 133 u16 cmd; member in struct:prism2_hostapd_param::__anon15818::__anon15825
|
H A D | driver_ipw.c | 65 u32 cmd; member in struct:ipw_param 159 param->cmd = IPW_CMD_SET_WPA_IE; 176 param.cmd = IPW_CMD_SET_WPA_PARAM; 185 int cmd, int reason) 191 param.cmd = IPW_CMD_MLME; 192 param.u.mlme.command = cmd; 258 param->cmd = IPW_CMD_SET_ENCRYPTION; 184 ipw_mlme(struct wpa_driver_ipw_data *drv, const u8 *addr, int cmd, int reason) argument
|
H A D | driver_nl80211.c | 638 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 639 iwe->cmd, iwe->len); 645 (iwe->cmd == IWEVMICHAELMICFAILURE || 646 iwe->cmd == IWEVCUSTOM || 647 iwe->cmd == IWEVASSOCREQIE || 648 iwe->cmd == IWEVASSOCRESPIE || 649 iwe->cmd == IWEVPMKIDCAND)) { 660 switch (iwe->cmd) { 977 wpa_printf(MSG_DEBUG, "nl80211: Ignored event (cmd=%d)" 979 gnlh->cmd, ifinde 1990 wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv, const u8 *addr, int cmd, int reason_code) argument 2308 wpa_driver_nl80211_pmksa(struct wpa_driver_nl80211_data *drv, u32 cmd, const u8 *bssid, const u8 *pmkid) argument [all...] |
H A D | driver_privsep.c | 36 static int wpa_priv_reg_cmd(struct wpa_driver_privsep_data *drv, int cmd) argument 40 res = sendto(drv->priv_socket, &cmd, sizeof(cmd), 0, 49 static int wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, argument 56 io[0].iov_base = &cmd; 57 io[0].iov_len = sizeof(cmd); 96 "for reply (cmd=%d)", cmd); 205 struct privsep_cmd_set_key cmd; local 210 os_memset(&cmd, [all...] |
H A D | driver_test.c | 112 char cmd[512], *pos, *end; local 119 end = cmd + sizeof(cmd); 120 pos = cmd; 144 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0, 281 char cmd[200], *pos, *end; local 283 end = cmd + sizeof(cmd); 284 pos = cmd; 1175 wpa_driver_test_driver_cmd( void *priv, char *cmd, char *buf, size_t buf_len ) argument [all...] |
H A D | driver_wext.c | 504 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 505 iwe->cmd, iwe->len); 511 (iwe->cmd == IWEVMICHAELMICFAILURE || 512 iwe->cmd == IWEVCUSTOM || 513 iwe->cmd == IWEVASSOCREQIE || 514 iwe->cmd == IWEVASSOCRESPIE || 515 iwe->cmd == IWEVPMKIDCAND)) { 526 switch (iwe->cmd) { 1535 static int wext_19_iw_point(struct wpa_driver_wext_data *drv, u16 cmd) argument 1538 (cmd 2043 wpa_driver_wext_mlme(struct wpa_driver_wext_data *drv, const u8 *addr, int cmd, int reason_code) argument 2423 wpa_driver_wext_pmksa(struct wpa_driver_wext_data *drv, u32 cmd, const u8 *bssid, const u8 *pmkid) argument 2523 wpa_driver_wext_set_cscan_params(char *buf, size_t buf_len, char *cmd) argument 2673 wpa_driver_priv_driver_cmd( void *priv, char *cmd, char *buf, size_t buf_len ) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.c | 281 char buf[1000], *pos, *cmd, *imsi; local 301 /* <cmd> <IMSI> ... */ 303 cmd = buf; 304 pos = os_strchr(cmd, ' '); 314 cmd, imsi); 316 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) 318 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) 322 "'%s'", cmd);
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
H A D | l2_packet_privsep.c | 35 static int wpa_priv_cmd(struct l2_packet_data *l2, int cmd, argument 41 io[0].iov_base = &cmd; 42 io[0].iov_len = sizeof(cmd); 53 perror("L2: sendmsg(cmd)"); 73 int cmd = PRIVSEP_CMD_L2_SEND; local 75 io[0].iov_base = &cmd; 76 io[0].iov_len = sizeof(cmd);
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 708 unsigned char cmd[50] = { SIM_CMD_SELECT }; local 714 cmd[0] = USIM_CLA; 715 cmd[3] = 0x04; 723 if (5 + aidlen > sizeof(cmd)) 725 cmd[2] = 0x04; /* Select by AID */ 726 cmd[4] = aidlen; /* len */ 727 os_memcpy(cmd + 5, aid, aidlen); 730 cmd[5] = file_id >> 8; 731 cmd[6] = file_id & 0xff; 735 ret = scard_transmit(scard, cmd, cmdle 794 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ }; local 829 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ }; local 875 unsigned char cmd[5] = { SIM_CMD_READ_BIN /* , len */ }; local 920 unsigned char cmd[5 + 8] = { SIM_CMD_VERIFY_CHV1 }; local 1044 unsigned char cmd[5 + 1 + 16] = { SIM_CMD_RUN_GSM_ALG }; local 1144 unsigned char cmd[5 + 1 + AKA_RAND_LEN + 1 + AKA_AUTN_LEN] = local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
H A D | networkconfig.ui.h | 100 char reply[10], cmd[256]; local 207 snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %d", id); 209 wpagui->ctrlRequest(cmd, reply, &reply_len); 230 char reply[10], cmd[256]; local 232 snprintf(cmd, sizeof(cmd), "SET_NETWORK %d %s %s%s%s", 235 wpagui->ctrlRequest(cmd, reply, &reply_len); 309 char reply[1024], cmd[256], *pos; local 312 snprintf(cmd, sizeo 504 char reply[10], cmd[256]; local [all...] |
H A D | userdatarequest.ui.h | 67 QString cmd = QString(WPA_CTRL_RSP) + field + '-' + local 70 wpagui->ctrlRequest(cmd.ascii(), reply, &reply_len);
|
H A D | wpagui.ui.h | 266 int WpaGui::ctrlRequest(const char *cmd, char *buf, size_t *buflen) argument 272 ret = wpa_ctrl_request(ctrl_conn, cmd, strlen(cmd), buf, buflen, 275 printf("'%s' command timed out.\n", cmd); 277 printf("'%s' command failed.\n", cmd); 668 QString cmd(sel); 672 int pos = cmd.find(':'); 674 printf("Invalid selectNetwork '%s'\n", cmd.ascii()); 677 cmd.truncate(pos); 678 cmd [all...] |
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
H A D | addinterface.cpp | 196 char buf[20], cmd[256]; local 203 snprintf(cmd, sizeof(cmd), 209 cmd[sizeof(cmd) - 1] = '\0'; 216 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL);
|
H A D | networkconfig.cpp | 184 char reply[10], cmd[256]; local 390 snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %d", id); 392 wpagui->ctrlRequest(cmd, reply, &reply_len); 415 char reply[10], cmd[256]; local 417 snprintf(cmd, sizeof(cmd), "SET_NETWORK %d %s %s%s%s", 420 wpagui->ctrlRequest(cmd, reply, &reply_len); 495 char reply[1024], cmd[256], *pos; local 498 snprintf(cmd, sizeo 761 char reply[10], cmd[256]; local [all...] |
H A D | scanresults.cpp | 62 char cmd[20]; local 68 snprintf(cmd, sizeof(cmd), "BSS %d", index++); 73 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
|
H A D | userdatarequest.cpp | 95 QString cmd = QString(WPA_CTRL_RSP) + field + '-' + local 98 wpagui->ctrlRequest(cmd.toAscii().constData(), reply, &reply_len);
|
H A D | wpagui.cpp | 446 int WpaGui::ctrlRequest(const char *cmd, char *buf, size_t *buflen) argument 452 ret = wpa_ctrl_request(ctrl_conn, cmd, strlen(cmd), buf, buflen, 455 printf("'%s' command timed out.\n", cmd); 457 printf("'%s' command failed.\n", cmd); 950 QString cmd(sel); 954 if (cmd.startsWith("Select any")) { 955 cmd = "any"; 957 int pos = cmd.indexOf(':'); 960 cmd [all...] |