/external/webrtc/src/modules/audio_processing/test/ |
H A D | process_test.cc | 166 bool verbose = true; local 360 verbose = false; 378 if (verbose) { 555 if (verbose) { 733 if (verbose) { 887 if (verbose) {
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | ctrl_iface.c | 320 int res, verbose, ret; local 322 verbose = os_strcmp(params, "-VERBOSE") == 0; 361 pos += wpa_sm_get_status(wpa_s->wpa, pos, end - pos, verbose); 380 verbose); 385 res = rsn_preauth_get_status(wpa_s->wpa, pos, end - pos, verbose);
|
H A D | wpa_cli.c | 237 int verbose = argc > 0 && os_strcmp(argv[0], "verbose") == 0; local 238 return wpa_ctrl_command(ctrl, verbose ? "STATUS-VERBOSE" : "STATUS"); 1220 "[verbose] = get current WPA/EAPOL/EAP status" },
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1346 * @verbose: Whether to include verbose status information 1354 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, int verbose) argument 1390 verbose); 1394 if (verbose) {
|
H A D | eap_fast.c | 1622 size_t buflen, int verbose) 1627 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1621 eap_fast_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_peap.c | 1203 size_t buflen, int verbose) 1208 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1202 eap_peap_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls.c | 212 size_t buflen, int verbose) 215 return eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 211 eap_tls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls_common.c | 699 * @verbose: Whether to include verbose status information 703 char *buf, size_t buflen, int verbose) 702 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_ttls.c | 1891 size_t buflen, int verbose) 1896 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1890 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1016 * @verbose: Whether to include verbose status information 1025 int verbose) 1039 if (verbose) { 1058 len += eap_sm_get_status(sm->eap, buf + len, buflen - len, verbose); 1024 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | eapol_supp_sm.h | 228 int verbose); 266 size_t buflen, int verbose) 265 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | preauth.c | 490 * @verbose: Whether to include verbose status information 498 int verbose) 510 pos, end - pos, verbose); 497 rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | preauth.h | 32 int verbose); 66 size_t buflen, int verbose) 65 rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | wpa.c | 2226 * @verbose: Whether to include verbose status information 2234 int verbose) 2233 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | wpa.h | 119 int verbose); 229 size_t buflen, int verbose) 228 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1549 * @verbose: Whether to include verbose status information 1557 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, int verbose) argument 1593 verbose); 1597 if (verbose) {
|
H A D | eap_fast.c | 1621 size_t buflen, int verbose) 1626 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1620 eap_fast_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_peap.c | 1199 size_t buflen, int verbose) 1204 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1198 eap_peap_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls.c | 240 size_t buflen, int verbose) 243 return eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 239 eap_tls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls_common.c | 722 * @verbose: Whether to include verbose status information 726 char *buf, size_t buflen, int verbose) 725 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_ttls.c | 1547 size_t buflen, int verbose) 1552 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1546 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1031 * @verbose: Whether to include verbose status information 1040 int verbose) 1054 if (verbose) { 1073 len += eap_sm_get_status(sm->eap, buf + len, buflen - len, verbose); 1039 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | eapol_supp_sm.h | 261 int verbose); 303 size_t buflen, int verbose) 302 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | preauth.c | 472 * @verbose: Whether to include verbose status information 480 int verbose) 492 pos, end - pos, verbose); 479 rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | preauth.h | 27 int verbose); 67 size_t buflen, int verbose) 66 rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|