Searched defs:cmd (Results 1 - 25 of 425) sorted by last modified time

1234567891011>>

/external/webrtc/src/modules/audio_processing/test/android/apmtest/jni/
H A Dmain.c182 static void engine_handle_cmd(struct android_app* app, int32_t cmd) { argument
184 switch (cmd) {
/external/wpa_supplicant_6/wpa_supplicant/
H A Dctrl_iface.c41 char *cmd)
46 value = os_strchr(cmd, ' ');
51 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value);
52 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
55 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
58 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
61 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
64 } else if (os_strcasecmp(cmd, "dot11RSNAConfigPMKLifetime") == 0) {
68 } else if (os_strcasecmp(cmd, "dot11RSNAConfigPMKReauthThreshold") ==
73 } else if (os_strcasecmp(cmd, "dot11RSNAConfigSATimeou
40 wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s, char *cmd) argument
147 wpa_supplicant_ctrl_iface_wps_pbc(struct wpa_supplicant *wpa_s, char *cmd) argument
165 wpa_supplicant_ctrl_iface_wps_pin(struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument
207 wpa_supplicant_ctrl_iface_wps_reg(struct wpa_supplicant *wpa_s, char *cmd) argument
393 wpa_supplicant_ctrl_iface_bssid(struct wpa_supplicant *wpa_s, char *cmd) argument
427 wpa_supplicant_ctrl_iface_scan_interval( struct wpa_supplicant *wpa_s, char *cmd) argument
438 wpa_supplicant_ctrl_iface_blacklist( struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument
492 wpa_supplicant_ctrl_iface_log_level( struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument
855 wpa_supplicant_ctrl_iface_select_network( struct wpa_supplicant *wpa_s, char *cmd) argument
901 wpa_supplicant_ctrl_iface_enable_network( struct wpa_supplicant *wpa_s, char *cmd) argument
953 wpa_supplicant_ctrl_iface_disable_network( struct wpa_supplicant *wpa_s, char *cmd) argument
1020 wpa_supplicant_ctrl_iface_remove_network( struct wpa_supplicant *wpa_s, char *cmd) argument
1068 wpa_supplicant_ctrl_iface_set_network( struct wpa_supplicant *wpa_s, char *cmd) argument
1126 wpa_supplicant_ctrl_iface_get_network( struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument
1501 wpa_supplicant_ctrl_iface_bss(struct wpa_supplicant *wpa_s, const char *cmd, char *buf, size_t buflen) argument
1607 wpa_supplicant_ctrl_iface_ap_scan( struct wpa_supplicant *wpa_s, char *cmd) argument
1626 wpa_supplicant_driver_cmd(struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) argument
1846 wpa_supplicant_global_iface_add(struct wpa_global *global, char *cmd) argument
1923 wpa_supplicant_global_iface_remove(struct wpa_global *global, char *cmd) argument
[all...]
H A Dwpa_cli.c201 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd, int print) argument
212 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len,
215 printf("'%s' command timed out.\n", cmd);
218 printf("'%s' command failed.\n", cmd);
229 static int wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd) argument
231 return _wpa_ctrl_command(ctrl, cmd, 1);
303 char cmd[256]; local
317 res = os_snprintf(cmd, sizeof(cmd), "SE
348 char cmd[256]; local
368 char cmd[256]; local
388 char cmd[256]; local
408 char cmd[256]; local
428 char cmd[256]; local
448 char cmd[256]; local
481 char cmd[256]; local
502 char cmd[256]; local
521 char cmd[256], *pos, *end; local
554 char cmd[256], *pos, *end; local
588 char cmd[256], *pos, *end; local
621 char cmd[256], *pos, *end; local
653 char cmd[256], *pos, *end; local
687 char cmd[256], *pos, *end; local
720 char cmd[256], *pos, *end; local
754 char cmd[256]; local
773 char cmd[256], *pos, *end; local
799 char cmd[256], *pos, *end; local
834 char cmd[32]; local
855 char cmd[32]; local
876 char cmd[32]; local
904 char cmd[32]; local
946 char cmd[256]; local
973 char cmd[256]; local
1033 char cmd[64]; local
1054 char cmd[64]; local
1130 char cmd[256]; local
1161 char cmd[128]; local
1188 char cmd[32]; local
1211 const char *cmd; member in struct:wpa_cli_cmd
1392 print_cmd_help(struct wpa_cli_cmd *cmd, const char *pad) argument
1417 cmd_has_sensitive_data(const char *cmd) argument
1441 struct wpa_cli_cmd *cmd, *match = NULL; local
1496 char *cmd; local
1647 const char *cmd; local
1681 char cmdbuf[256], *cmd, *argv[max_args], *pos; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/common/
H A Dwireless_copy.h348 #define IW_IOCTL_IDX(cmd) ((cmd) - SIOCIWFIRST)
351 #define IW_IS_SET(cmd) (!((cmd) & 0x1))
352 #define IW_IS_GET(cmd) ((cmd) & 0x1)
393 #define IW_EVENT_IDX(cmd) ((cmd) - IWEVFIRST)
647 #define IW_EVENT_CAPA_BASE(cmd) ((cmd >
854 __u16 cmd; /* IW_MLME_* */ member in struct:iw_mlme
868 __u32 cmd; /* IW_PMKSA_* */ member in struct:iw_pmksa
1083 __u32 cmd; /* Number of the ioctl to issue */ member in struct:iw_priv_args
1102 __u16 cmd; /* Wireless IOCTL */ member in struct:iw_event
1128 __u16 cmd; /* Wireless IOCTL */ member in struct:__compat_iw_event
[all...]
H A Dwpa_ctrl.c288 int wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, argument
311 os_memcpy(pos, cmd, cmd_len);
315 _cmd = cmd;
505 int wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, argument
512 if (!WriteFile(ctrl->pipe, cmd, cmd_len, &written, NULL))
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
H A Ddriver_atmel.c63 /* ATMEL_WPA_IOCTL ioctl() cmd: */
71 /* ATMEL_WPA_IOCTL_PARAM ioctl() cmd: */
82 int cmd; member in struct:atmel_param
157 param->cmd = ATMEL_SET_GENERIC_ELEMENT;
240 param->cmd = SET_WPA_ENCRYPTION;
286 static int wpa_driver_atmel_mlme(void *priv, const u8 *addr, int cmd, argument
296 param.cmd = cmd;
313 param.cmd = SET_CIPHER_SUITES;
H A Ddriver_broadcom.c86 static int broadcom_ioctl(struct wpa_driver_broadcom_data *drv, int cmd, argument
94 drv->ifname, cmd, len, buf);
97 ioc.cmd = cmd;
103 if (cmd != WLC_GET_MAGIC)
105 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d",
106 cmd, ret);
H A Ddriver_hostap.c70 param->cmd = PRISM2_HOSTAPD_SET_GENERIC_ELEMENT;
192 param->cmd = PRISM2_SET_ENCRYPTION;
265 const u8 *addr, int cmd, int reason_code)
275 param.cmd = PRISM2_HOSTAPD_MLME;
277 param.u.mlme.cmd = cmd;
386 param.cmd = PRISM2_HOSTAPD_SCAN_REQ;
264 wpa_driver_hostap_mlme(struct wpa_driver_hostap_data *drv, const u8 *addr, int cmd, int reason_code) argument
H A Ddriver_hostap.h66 /* PRISM2_IOCTL_HOSTAPD ioctl() cmd: */
97 u32 cmd; member in struct:prism2_hostapd_param
133 u16 cmd; member in struct:prism2_hostapd_param::__anon15818::__anon15825
H A Ddriver_ipw.c65 u32 cmd; member in struct:ipw_param
159 param->cmd = IPW_CMD_SET_WPA_IE;
176 param.cmd = IPW_CMD_SET_WPA_PARAM;
185 int cmd, int reason)
191 param.cmd = IPW_CMD_MLME;
192 param.u.mlme.command = cmd;
258 param->cmd = IPW_CMD_SET_ENCRYPTION;
184 ipw_mlme(struct wpa_driver_ipw_data *drv, const u8 *addr, int cmd, int reason) argument
H A Ddriver_nl80211.c638 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
639 iwe->cmd, iwe->len);
645 (iwe->cmd == IWEVMICHAELMICFAILURE ||
646 iwe->cmd == IWEVCUSTOM ||
647 iwe->cmd == IWEVASSOCREQIE ||
648 iwe->cmd == IWEVASSOCRESPIE ||
649 iwe->cmd == IWEVPMKIDCAND)) {
660 switch (iwe->cmd) {
977 wpa_printf(MSG_DEBUG, "nl80211: Ignored event (cmd=%d)"
979 gnlh->cmd, ifinde
1990 wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv, const u8 *addr, int cmd, int reason_code) argument
2308 wpa_driver_nl80211_pmksa(struct wpa_driver_nl80211_data *drv, u32 cmd, const u8 *bssid, const u8 *pmkid) argument
[all...]
H A Ddriver_privsep.c36 static int wpa_priv_reg_cmd(struct wpa_driver_privsep_data *drv, int cmd) argument
40 res = sendto(drv->priv_socket, &cmd, sizeof(cmd), 0,
49 static int wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, argument
56 io[0].iov_base = &cmd;
57 io[0].iov_len = sizeof(cmd);
96 "for reply (cmd=%d)", cmd);
205 struct privsep_cmd_set_key cmd; local
210 os_memset(&cmd,
[all...]
H A Ddriver_test.c112 char cmd[512], *pos, *end; local
119 end = cmd + sizeof(cmd);
120 pos = cmd;
144 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0,
281 char cmd[200], *pos, *end; local
283 end = cmd + sizeof(cmd);
284 pos = cmd;
1175 wpa_driver_test_driver_cmd( void *priv, char *cmd, char *buf, size_t buf_len ) argument
[all...]
H A Ddriver_wext.c504 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
505 iwe->cmd, iwe->len);
511 (iwe->cmd == IWEVMICHAELMICFAILURE ||
512 iwe->cmd == IWEVCUSTOM ||
513 iwe->cmd == IWEVASSOCREQIE ||
514 iwe->cmd == IWEVASSOCRESPIE ||
515 iwe->cmd == IWEVPMKIDCAND)) {
526 switch (iwe->cmd) {
1535 static int wext_19_iw_point(struct wpa_driver_wext_data *drv, u16 cmd) argument
1538 (cmd
2043 wpa_driver_wext_mlme(struct wpa_driver_wext_data *drv, const u8 *addr, int cmd, int reason_code) argument
2423 wpa_driver_wext_pmksa(struct wpa_driver_wext_data *drv, u32 cmd, const u8 *bssid, const u8 *pmkid) argument
2523 wpa_driver_wext_set_cscan_params(char *buf, size_t buf_len, char *cmd) argument
2673 wpa_driver_priv_driver_cmd( void *priv, char *cmd, char *buf, size_t buf_len ) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sim_db.c281 char buf[1000], *pos, *cmd, *imsi; local
301 /* <cmd> <IMSI> ... */
303 cmd = buf;
304 pos = os_strchr(cmd, ' ');
314 cmd, imsi);
316 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0)
318 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0)
322 "'%s'", cmd);
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/
H A Dl2_packet_privsep.c35 static int wpa_priv_cmd(struct l2_packet_data *l2, int cmd, argument
41 io[0].iov_base = &cmd;
42 io[0].iov_len = sizeof(cmd);
53 perror("L2: sendmsg(cmd)");
73 int cmd = PRIVSEP_CMD_L2_SEND; local
75 io[0].iov_base = &cmd;
76 io[0].iov_len = sizeof(cmd);
/external/wpa_supplicant_6/wpa_supplicant/src/utils/
H A Dpcsc_funcs.c708 unsigned char cmd[50] = { SIM_CMD_SELECT }; local
714 cmd[0] = USIM_CLA;
715 cmd[3] = 0x04;
723 if (5 + aidlen > sizeof(cmd))
725 cmd[2] = 0x04; /* Select by AID */
726 cmd[4] = aidlen; /* len */
727 os_memcpy(cmd + 5, aid, aidlen);
730 cmd[5] = file_id >> 8;
731 cmd[6] = file_id & 0xff;
735 ret = scard_transmit(scard, cmd, cmdle
794 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ }; local
829 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ }; local
875 unsigned char cmd[5] = { SIM_CMD_READ_BIN /* , len */ }; local
920 unsigned char cmd[5 + 8] = { SIM_CMD_VERIFY_CHV1 }; local
1044 unsigned char cmd[5 + 1 + 16] = { SIM_CMD_RUN_GSM_ALG }; local
1144 unsigned char cmd[5 + 1 + AKA_RAND_LEN + 1 + AKA_AUTN_LEN] = local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
H A Dnetworkconfig.ui.h100 char reply[10], cmd[256]; local
207 snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %d", id);
209 wpagui->ctrlRequest(cmd, reply, &reply_len);
230 char reply[10], cmd[256]; local
232 snprintf(cmd, sizeof(cmd), "SET_NETWORK %d %s %s%s%s",
235 wpagui->ctrlRequest(cmd, reply, &reply_len);
309 char reply[1024], cmd[256], *pos; local
312 snprintf(cmd, sizeo
504 char reply[10], cmd[256]; local
[all...]
H A Duserdatarequest.ui.h67 QString cmd = QString(WPA_CTRL_RSP) + field + '-' + local
70 wpagui->ctrlRequest(cmd.ascii(), reply, &reply_len);
H A Dwpagui.ui.h266 int WpaGui::ctrlRequest(const char *cmd, char *buf, size_t *buflen) argument
272 ret = wpa_ctrl_request(ctrl_conn, cmd, strlen(cmd), buf, buflen,
275 printf("'%s' command timed out.\n", cmd);
277 printf("'%s' command failed.\n", cmd);
668 QString cmd(sel);
672 int pos = cmd.find(':');
674 printf("Invalid selectNetwork '%s'\n", cmd.ascii());
677 cmd.truncate(pos);
678 cmd
[all...]
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
H A Daddinterface.cpp196 char buf[20], cmd[256]; local
203 snprintf(cmd, sizeof(cmd),
209 cmd[sizeof(cmd) - 1] = '\0';
216 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL);
H A Dnetworkconfig.cpp184 char reply[10], cmd[256]; local
390 snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %d", id);
392 wpagui->ctrlRequest(cmd, reply, &reply_len);
415 char reply[10], cmd[256]; local
417 snprintf(cmd, sizeof(cmd), "SET_NETWORK %d %s %s%s%s",
420 wpagui->ctrlRequest(cmd, reply, &reply_len);
495 char reply[1024], cmd[256], *pos; local
498 snprintf(cmd, sizeo
761 char reply[10], cmd[256]; local
[all...]
H A Dscanresults.cpp62 char cmd[20]; local
68 snprintf(cmd, sizeof(cmd), "BSS %d", index++);
73 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
H A Duserdatarequest.cpp95 QString cmd = QString(WPA_CTRL_RSP) + field + '-' + local
98 wpagui->ctrlRequest(cmd.toAscii().constData(), reply, &reply_len);
H A Dwpagui.cpp446 int WpaGui::ctrlRequest(const char *cmd, char *buf, size_t *buflen) argument
452 ret = wpa_ctrl_request(ctrl_conn, cmd, strlen(cmd), buf, buflen,
455 printf("'%s' command timed out.\n", cmd);
457 printf("'%s' command failed.\n", cmd);
950 QString cmd(sel);
954 if (cmd.startsWith("Select any")) {
955 cmd = "any";
957 int pos = cmd.indexOf(':');
960 cmd
[all...]

Completed in 693 milliseconds

1234567891011>>