/external/webrtc/src/modules/audio_processing/aec/ |
H A D | echo_cancellation.c | 869 WebRtc_Word32 WebRtcAec_get_version(WebRtc_Word8 *versionStr, WebRtc_Word16 len) argument 878 if (versionLen > len) {
|
/external/webrtc/src/modules/audio_processing/aecm/ |
H A D | echo_control_mobile.c | 705 WebRtc_Word32 WebRtcAecm_get_version(WebRtc_Word8 *versionStr, WebRtc_Word16 len) argument 715 if (versionLen > len)
|
/external/webrtc/src/system_wrappers/source/android/ |
H A D | cpu-features.c | 73 int fd, len; local 80 len = read(fd, buffer, buffsize); 81 } while (len < 0 && errno == EINTR); 85 return len; 100 int len, ignore; local 131 len = q-p; 132 result = malloc(len+1); 136 memcpy(result, p, len); 137 result[len] = '\0';
|
/external/webrtc/src/system_wrappers/source/ |
H A D | trace_impl.cc | 610 WebRtc_Word32 len = 0; local 613 len = AddLevel(meassagePtr, level); 614 if(len == -1) 618 meassagePtr += len; 619 ackLen += len; 621 len = AddTime(meassagePtr, level); 622 if(len == -1) 626 meassagePtr += len; 627 ackLen += len; 629 len [all...] |
H A D | trace_posix.cc | 109 WebRtc_Word32 len = static_cast<WebRtc_Word32>(strlen(traceMessage)); local 111 if ('\n' == traceMessage[len - 1]) 113 traceMessage[len - 1] = '\0'; 114 --len; 118 return len + 1;
|
/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 552 size_t len; local 584 len = os_strlen(pos); 585 if (len & 1) 587 len /= 2; 588 attr->val = wpabuf_alloc(len); 591 if (hexstr2bin(pos, wpabuf_put(attr->val, len), len) < 0) { 726 size_t len = os_strlen(val); local 732 if (len < 2 || val[len 1161 size_t len = os_strlen(pos); local 1328 size_t i, j, len; local 1817 size_t len; local 2132 int len = os_strlen(pos); local 2157 int len = os_strlen(pos); local 2244 int len = os_strlen(pos); local 3112 size_t len = os_strlen(pos); local [all...] |
H A D | ctrl_iface.c | 52 const char *buf, size_t len); 216 size_t len; local 222 for (pos = cmd, len = 0; *pos != '\0'; pos++) { 225 pin[len++] = *pos; 226 if (len == 9) { 231 if (len != 4 && len != 8) { 232 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len); 235 pin[len] = '\0'; 237 if (len 261 size_t len; local 403 size_t len; local 1227 size_t len; local 1579 size_t len; local 1597 hostapd_ctrl_iface_msg_cb(void *ctx, int level, int global, const char *txt, size_t len) argument 1881 size_t len; local 2038 hostapd_ctrl_iface_send(struct hostapd_data *hapd, int level, const char *buf, size_t len) argument [all...] |
H A D | hostapd_cli.c | 167 static void hostapd_cli_msg_cb(char *msg, size_t len) argument 176 size_t len; local 183 len = sizeof(buf) - 1; 184 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, 194 buf[len] = '\0'; 242 size_t len; local 245 len = os_strlen(arg1) + os_strlen(arg2) + 2; 246 arg = os_malloc(len); 249 os_snprintf(arg, len, "%s %s", arg1, arg2); 257 static void hostapd_cli_action_process(char *msg, size_t len) argument 636 size_t len; local 1057 size_t len = sizeof(buf) - 1; local 1186 size_t len; local [all...] |
H A D | main.c | 44 int level, const char *txt, size_t len) 52 maxlen = len + 100; 43 hostapd_logger_cb(void *ctx, const u8 *addr, unsigned int module, int level, const char *txt, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 39 size_t len; local 82 val = ieee802_1x_get_identity(sta->eapol_sm, &len); 87 len = os_strlen(sta->identity); 96 len = os_strlen(buf); 100 len)) { 112 val = ieee802_1x_get_radius_class(sta->eapol_sm, &len, 118 val, len)) {
|
H A D | ap_config.c | 210 int line = 0, ret = 0, len, ok; local 268 len = os_strlen(pos); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 271 else if (len >= 8 && len < 64) { 391 bin_clear_free(keys->key[i], keys->len[i]); 899 if (bss->ssid.wep.len[0] >= 13)
|
H A D | ap_config.h | 38 size_t len[NUM_WEP_KEYS]; member in struct:hostapd_wep_keys 155 u8 len; member in struct:hostapd_roaming_consortium
|
H A D | ap_drv_ops.c | 336 u16 seq, u16 status, const u8 *ie, size_t len) 341 seq, status, ie, len); 346 int reassoc, u16 status, const u8 *ie, size_t len) 351 reassoc, status, ie, len); 414 int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len) argument 418 return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len); 422 int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len) argument 426 return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len); 700 const void *msg, size_t len, int noack) 704 return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noac 335 hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, u16 seq, u16 status, const u8 *ie, size_t len) argument 345 hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, int reassoc, u16 status, const u8 *ie, size_t len) argument 699 hostapd_drv_send_mlme(struct hostapd_data *hapd, const void *msg, size_t len, int noack) argument 738 hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq, unsigned int wait, const u8 *dst, const u8 *data, size_t len) argument [all...] |
H A D | beacon.c | 35 static u8 * hostapd_eid_bss_load(struct hostapd_data *hapd, u8 *eid, size_t len) argument 39 if (2 + 5 > len) 254 static u8 * hostapd_eid_wpa(struct hostapd_data *hapd, u8 *eid, size_t len) argument 260 if (ie == NULL || ielen > len) 504 const struct ieee80211_mgmt *mgmt, size_t len, 517 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)) 519 ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)); 503 handle_probe_req(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ssi_signal) argument
|
H A D | ctrl_iface_ap.c | 87 int len, res, ret, i; local 92 len = 0; 93 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", 95 if (ret < 0 || (size_t) ret >= buflen - len) 96 return len; 97 len += ret; 99 ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); 101 return len; 395 int len = 0, ret; local [all...] |
H A D | drv_callbacks.c | 771 size_t len, u16 stype, int ok) 775 hapd = get_hapd_bssid(hapd->iface, get_hdr_bssid(hdr, len)); 778 ieee802_11_mgmt_cb(hapd, buf, len, stype, ok); 770 hostapd_mgmt_tx_cb(struct hostapd_data *hapd, const u8 *buf, size_t len, u16 stype, int ok) argument
|
H A D | eap_user_db.c | 105 size_t len; local 117 len = os_strlen(argv[id]); 118 if (len <= user->identity_len && 119 os_memcmp(argv[id], user->identity, len) == 0 && 120 (user->password == NULL || len > user->password_len)) {
|
H A D | gas_serv.c | 143 u8 *len; local 145 len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); 165 gas_anqp_set_element_len(buf, len); 173 u8 *len; local 175 len = gas_anqp_add_element(buf, ANQP_CAPABILITY_LIST); 194 gas_anqp_set_element_len(buf, len); 201 u8 *len; local 203 len = gas_anqp_add_element(buf, ANQP_VENUE_NAME); 213 gas_anqp_set_element_len(buf, len); 234 u8 *len; local 395 u8 *len; local 454 u8 *len; local 478 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 493 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 509 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 525 u8 *len, *len2, *count; local 603 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 634 u8 *len; local 693 size_t len; local 1018 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1127 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1211 gas_serv_rx_public_action(void *ctx, const u8 *buf, size_t len, int freq) argument [all...] |
H A D | hs20.c | 44 u8 *len; local 51 len = eid++; /* to be filled */ 88 *len = eid - len - 1; 98 size_t len = 0; local 105 len = 1 + os_strlen(url); 106 if (5 + len > 255) { 113 buf = wpabuf_alloc(4 + 7 + len); 124 wpabuf_put_u8(buf, 5 + len); 128 wpabuf_put_u8(buf, len [all...] |
H A D | iapp.c | 91 be16 len; /* 6 */ member in struct:iapp_layer2_update 223 msg.len = host_to_be16(6); 266 struct iapp_hdr *hdr, int len) 271 if (len != sizeof(*add)) { 273 len, (unsigned long) sizeof(*add)); 310 int len, hlen; local 319 len = recvfrom(iapp->udp_sock, buf, sizeof(buf), 0, 321 if (len < 0) { 333 len, inet_ntoa(from.sin_addr), 334 len < (in 264 iapp_process_add_notify(struct iapp_data *iapp, struct sockaddr_in *from, struct iapp_hdr *hdr, int len) argument [all...] |
H A D | ieee802_11.c | 289 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 444 const struct ieee80211_mgmt *mgmt, size_t len, 466 ((const u8 *) mgmt) + len - 505 ((u8 *) mgmt) + len - 544 const struct ieee80211_mgmt *mgmt, size_t len) 560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) { 561 wpa_printf(MSG_INFO, "handle_auth - too short payload (len=%lu)", 562 (unsigned long) len); 581 if (len >= IEEE80211_HDRLEN + sizeof(mgmt->u.auth) + 631 res = hostapd_allowed_address(hapd, mgmt->sa, (u8 *) mgmt, len, 443 handle_auth_sae(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *mgmt, size_t len, u8 auth_transaction) argument 543 handle_auth(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1274 handle_assoc(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int reassoc) argument 1456 handle_disassoc(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1504 handle_deauth(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1541 handle_beacon(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, struct hostapd_frame_info *fi) argument 1564 hostapd_sa_query_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1593 handle_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1731 ieee802_11_mgmt(struct hostapd_data *hapd, const u8 *buf, size_t len, struct hostapd_frame_info *fi) argument 1822 handle_auth_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ok) argument 1887 handle_assoc_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int reassoc, int ok) argument 2026 handle_deauth_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ok) argument 2050 handle_disassoc_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ok) argument 2083 ieee802_11_mgmt_cb(struct hostapd_data *hapd, const u8 *buf, size_t len, u16 stype, int ok) argument 2146 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument 2176 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument [all...] |
H A D | ieee802_11_auth.c | 220 * @len: Length of msg in octets 233 const u8 *msg, size_t len, u32 *session_timeout, 317 query->auth_msg = os_malloc(len); 324 os_memcpy(query->auth_msg, msg, len); 325 query->auth_msg_len = len; 523 size_t len; local 548 &buf, &len, NULL) == 0) { 549 cache->identity = os_zalloc(len + 1); 551 os_memcpy(cache->identity, buf, len); 555 &buf, &len, NUL 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument [all...] |
H A D | ieee802_11_ht.c | 207 const struct ieee80211_mgmt *mgmt, size_t len) 223 if (len < IEEE80211_HDRLEN + 1) 206 hostapd_2040_coex_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument
|
H A D | ieee802_11_shared.c | 220 u8 len = 0, i; local 223 len = 5; 224 if (len < 4 && hapd->conf->interworking) 225 len = 4; 226 if (len < 3 && hapd->conf->wnm_sleep_mode) 227 len = 3; 228 if (len < 1 && hapd->iconf->obss_interval) 229 len = 1; 230 if (len < 7 && hapd->conf->ssid.utf8_ssid) 231 len 270 u8 len = hapd->conf->qos_map_set_len; local 288 u8 *len; local 347 u8 *len; local 412 size_t len; local [all...] |
H A D | ieee802_1x.c | 47 size_t len; local 50 len = sizeof(*xhdr) + datalen; 51 buf = os_zalloc(len); 54 "ieee802_1x_send(len=%lu)", 55 (unsigned long) len); 70 rsn_preauth_send(hapd, sta, buf, len); 73 hapd, sta->addr, buf, len, 122 size_t len, ekey_len; local 128 len = sizeof(*key) + key_len; 129 buf = os_zalloc(sizeof(*hdr) + len); 279 ieee802_1x_learn_identity(struct hostapd_data *hapd, struct eapol_state_machine *sm, const u8 *eap, size_t len) argument 536 ieee802_1x_encapsulate_radius(struct hostapd_data *hapd, struct sta_info *sta, const u8 *eap, size_t len) argument 668 handle_eap_response(struct hostapd_data *hapd, struct sta_info *sta, struct eap_hdr *eap, size_t len) argument 701 handle_eap(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument 776 ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf, size_t len) argument 1201 size_t len = keys->send_len + keys->recv_len; local 1288 size_t len; local 1322 size_t len; local 1342 ieee802_1x_hs20_sub_rem(struct sta_info *sta, u8 *pos, size_t len) argument 1366 ieee802_1x_hs20_deauth_req(struct hostapd_data *hapd, struct sta_info *sta, u8 *pos, size_t len) argument 1387 ieee802_1x_hs20_session_info(struct hostapd_data *hapd, struct sta_info *sta, u8 *pos, size_t len, int session_timeout) argument 1438 size_t len; local 2068 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument 2095 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument 2149 ieee802_1x_get_identity(struct eapol_state_machine *sm, size_t *len) argument 2159 ieee802_1x_get_radius_class(struct eapol_state_machine *sm, size_t *len, int idx) argument 2179 ieee802_1x_get_key(struct eapol_state_machine *sm, size_t *len) argument 2237 int len = 0, ret; local 2399 size_t len; local [all...] |