/external/zlib/src/ |
H A D | deflate.c | 123 } config; typedef in typeref:struct:config_s 126 local const config configuration_table[2] = { 131 local const config configuration_table[10] = {
|
/external/webrtc/src/modules/audio_processing/aec/ |
H A D | echo_cancellation.c | 604 WebRtc_Word32 WebRtcAec_set_config(void *aecInst, AecConfig config) argument 617 if (config.skewMode != kAecFalse && config.skewMode != kAecTrue) { 621 aecpc->skewMode = config.skewMode; 623 if (config.nlpMode != kAecNlpConservative && config.nlpMode != 624 kAecNlpModerate && config.nlpMode != kAecNlpAggressive) { 628 aecpc->nlpMode = config.nlpMode; 632 if (config.metricsMode != kAecFalse && config 653 WebRtcAec_get_config(void *aecInst, AecConfig *config) argument [all...] |
/external/webrtc/src/modules/audio_processing/aecm/ |
H A D | echo_control_mobile.c | 534 WebRtc_Word32 WebRtcAecm_set_config(void *aecmInst, AecmConfig config) argument 549 if (config.cngMode != AecmFalse && config.cngMode != AecmTrue) 554 aecm->aecmCore->cngMode = config.cngMode; 556 if (config.echoMode < 0 || config.echoMode > 4) 561 aecm->echoMode = config.echoMode; 616 WebRtc_Word32 WebRtcAecm_get_config(void *aecmInst, AecmConfig *config) argument 625 if (config == NULL) 637 config [all...] |
/external/webrtc/src/modules/audio_processing/agc/ |
H A D | analog_agc.c | 44 /* Default settings if config is not used */ 1444 /* Store the config in a WebRtcAgc_config_t */ 1452 int WebRtcAgc_get_config(void *agcInst, WebRtcAgc_config_t *config) argument 1462 if (config == NULL) 1474 config->limiterEnable = stt->usedConfig.limiterEnable; 1475 config->targetLevelDbfs = stt->usedConfig.targetLevelDbfs; 1476 config->compressionGaindB = stt->usedConfig.compressionGaindB; 1666 // Default config settings.
|
/external/webrtc/src/modules/audio_processing/ |
H A D | echo_cancellation_impl.cc | 365 AecConfig config; local 366 config.metricsMode = metrics_enabled_; 367 config.nlpMode = MapSetting(suppression_level_); 368 config.skewMode = drift_compensation_enabled_; 369 config.delay_logging = delay_logging_enabled_; 371 return WebRtcAec_set_config(static_cast<Handle*>(handle), config);
|
H A D | echo_control_mobile_impl.cc | 293 AecmConfig config; local 294 config.cngMode = comfort_noise_enabled_; 295 config.echoMode = MapSetting(routing_mode_); 297 return WebRtcAecm_set_config(static_cast<Handle*>(handle), config);
|
H A D | gain_control_impl.cc | 368 WebRtcAgc_config_t config; local 372 //config.targetLevelDbfs = static_cast<WebRtc_Word16>(-target_level_dbfs_); 373 config.targetLevelDbfs = static_cast<WebRtc_Word16>(target_level_dbfs_); 374 config.compressionGaindB = 376 config.limiterEnable = limiter_enabled_; 378 return WebRtcAgc_set_config(static_cast<Handle*>(handle), config);
|
/external/webrtc/src/modules/audio_processing/test/android/apmtest/jni/ |
H A D | main.c | 80 EGLConfig config; local 91 eglChooseConfig(display, attribs, &config, 1, &numConfigs); 97 eglGetConfigAttrib(display, config, EGL_NATIVE_VISUAL_ID, &format); 101 surface = eglCreateWindowSurface(display, config, engine->app->window, NULL); 102 context = eglCreateContext(display, config, NULL, NULL);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 129 struct eap_peer_config *config = eap_get_config(sm); local 133 if (config == NULL || config->eap_methods == NULL) 136 m = config->eap_methods; 319 struct eap_peer_config *config = eap_get_config(sm); local 327 if (sm->reqMethod == EAP_TYPE_TLS && config && 328 (config->pending_req_pin || 329 config->pending_req_passphrase)) { 1137 struct eap_peer_config *config = eap_get_config(sm); local 1142 if (config 1664 struct eap_peer_config *config; local 1842 struct eap_peer_config *config = eap_get_config(sm); local 1907 eap_get_phase2_types(struct eap_peer_config *config, size_t *count) argument 1988 struct eap_peer_config *config = eap_get_config(sm); local 1996 eap_get_ext_password(struct eap_sm *sm, struct eap_peer_config *config) argument 2025 struct eap_peer_config *config = eap_get_config(sm); local 2052 struct eap_peer_config *config = eap_get_config(sm); local 2080 struct eap_peer_config *config = eap_get_config(sm); local 2096 struct eap_peer_config *config = eap_get_config(sm); local 2114 struct eap_peer_config *config = eap_get_config(sm); local 2131 struct eap_peer_config *config = eap_get_config(sm); local 2145 struct eap_peer_config *config = eap_get_config(sm); local 2154 struct eap_peer_config *config = eap_get_config(sm); local [all...] |
H A D | eap_aka.c | 91 struct eap_peer_config *config = eap_get_config(sm); local 104 if (config && config->anonymous_identity) { 105 data->pseudonym = os_malloc(config->anonymous_identity_len); 107 os_memcpy(data->pseudonym, config->anonymous_identity, 108 config->anonymous_identity_len); 109 data->pseudonym_len = config->anonymous_identity_len;
|
H A D | eap_fast.c | 150 struct eap_peer_config *config = eap_get_config(sm); local 152 if (config == NULL) 161 if (config->phase1 && eap_fast_parse_phase1(data, config->phase1) < 0) { 166 if (eap_peer_select_phase2_methods(config, "auth=", 176 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { 201 if (!config->pac_file) { 208 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) { 215 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0) { 420 struct eap_peer_config *config local 1029 struct eap_peer_config *config = eap_get_config(sm); local [all...] |
H A D | eap_mschapv2.c | 300 struct eap_peer_config *config = eap_get_config(sm); local 301 if (config && config->new_password) { 306 bin_clear_free(config->password, config->password_len); 307 if (config->flags & EAP_CONFIG_FLAGS_EXT_PASSWORD) { 309 } else if (config->flags & EAP_CONFIG_FLAGS_PASSWORD_NTHASH) { 310 config->password = os_malloc(16); 311 config->password_len = 16; 312 if (config 405 struct eap_peer_config *config = eap_get_config(sm); local 671 struct eap_peer_config *config = eap_get_config(sm); local 767 struct eap_peer_config *config = eap_get_config(sm); local [all...] |
H A D | eap_peap.c | 136 struct eap_peer_config *config = eap_get_config(sm); local 147 if (config && config->phase1 && 148 eap_peap_parse_phase1(data, config->phase1) < 0) { 153 if (eap_peer_select_phase2_methods(config, "auth=", 163 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 599 struct eap_peer_config *config = eap_get_config(sm); local 724 (config->pending_req_identity || config->pending_req_password || 725 config [all...] |
H A D | eap_proxy_dummy.c | 74 struct eap_peer_config *config) 73 eap_proxy_notify_config(struct eap_proxy_sm *sm, struct eap_peer_config *config) argument
|
H A D | eap_sim.c | 83 struct eap_peer_config *config = eap_get_config(sm); local 97 if (config && config->phase1) { 98 char *pos = os_strstr(config->phase1, "sim_min_num_chal="); 114 data->result_ind = os_strstr(config->phase1, "result_ind=1") != 118 if (config && config->anonymous_identity) { 119 data->pseudonym = os_malloc(config->anonymous_identity_len); 121 os_memcpy(data->pseudonym, config->anonymous_identity, 122 config [all...] |
H A D | eap_tls.c | 34 struct eap_peer_config *config = eap_get_config(sm); local 35 if (config == NULL || 36 ((sm->init_phase2 ? config->private_key2 : config->private_key) 38 (sm->init_phase2 ? config->engine2 : config->engine) == 0)) { 50 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TLS)) { 53 if (config->engine) { 58 } else if (config->private_key && !config 78 struct eap_peer_config *config = eap_get_config(sm); local 105 struct eap_peer_config *config = eap_get_config(sm); local 160 struct eap_peer_config *config = eap_get_config(sm); local [all...] |
H A D | eap_tls_common.c | 83 struct eap_peer_config *config) 85 params->ca_cert = (char *) config->ca_cert; 86 params->ca_path = (char *) config->ca_path; 87 params->client_cert = (char *) config->client_cert; 88 params->private_key = (char *) config->private_key; 89 params->private_key_passwd = (char *) config->private_key_passwd; 90 params->dh_file = (char *) config->dh_file; 91 params->subject_match = (char *) config->subject_match; 92 params->altsubject_match = (char *) config->altsubject_match; 93 params->suffix_match = config 82 eap_tls_params_from_conf1(struct tls_connection_params *params, struct eap_peer_config *config) argument 104 eap_tls_params_from_conf2(struct tls_connection_params *params, struct eap_peer_config *config) argument 126 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument 174 eap_tls_init_connection(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, struct tls_connection_params *params) argument 237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 1024 eap_peer_select_phase2_methods(struct eap_peer_config *config, const char *prefix, struct eap_method_type **types, size_t *num_types) argument [all...] |
H A D | eap_ttls.c | 72 struct eap_peer_config *config = eap_get_config(sm); local 82 if (config && config->phase2) { 83 if (os_strstr(config->phase2, "autheap=")) { 86 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 89 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 92 } else if (os_strstr(config->phase2, "auth=PAP")) { 95 } else if (os_strstr(config->phase2, "auth=CHAP")) { 103 if (eap_peer_select_phase2_methods(config, "autheap=", 115 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTL 387 struct eap_peer_config *config = eap_get_config(sm); local 1160 struct eap_peer_config *config = eap_get_config(sm); local 1247 struct eap_peer_config *config = eap_get_config(sm); local [all...] |
H A D | tncc.c | 1070 char *config, *end, *pos, *line_end; local 1076 config = os_readfile(TNC_CONFIG_FILE, &config_len); 1077 if (config == NULL) { 1083 end = config + config_len; 1084 for (pos = config; pos < end; pos = line_end + 1) { 1096 os_free(config); 1109 os_free(config);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 694 * @config: Configuration data (e.g., file name) 700 eap_sim_db_init(const char *config, argument 714 data->fname = os_strdup(config);
|
H A D | tncs.c | 1021 char *config, *end, *pos, *line_end; local 1028 config = os_readfile(TNC_CONFIG_FILE, &config_len); 1029 if (config == NULL) { 1035 end = config + config_len; 1036 for (pos = config; pos < end; pos = line_end + 1) { 1059 os_free(config);
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 124 struct eap_peer_config *config; member in struct:eapol_sm 1468 * @config: Pointer to current network EAP configuration 1471 * Notify EAPOL state machine that configuration has changed. config will be 1478 struct eap_peer_config *config, 1484 sm->config = config; 1486 sm->use_eap_proxy = eap_proxy_notify_config(sm->eap_proxy, config) > 0; 1787 return sm ? sm->config : NULL; 1477 eapol_sm_notify_config(struct eapol_sm *sm, struct eap_peer_config *config, const struct eapol_config *conf) argument
|
H A D | eapol_supp_sm.h | 290 struct eap_peer_config *config, 360 struct eap_peer_config *config, 359 eapol_sm_notify_config(struct eapol_sm *sm, struct eap_peer_config *config, struct eapol_config *conf) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_group.c | 47 struct p2p_group_config *config) 65 group->cfg = config; 46 p2p_group_init(struct p2p_data *p2p, struct p2p_group_config *config) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 2258 * @config: Pointer to current network configuration 2260 * Notify WPA state machine that configuration has changed. config will be 2264 void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config) argument 2269 if (config) { 2270 sm->network_ctx = config->network_ctx; 2271 sm->peerkey_enabled = config->peerkey_enabled; 2272 sm->allowed_pairwise_cipher = config->allowed_pairwise_cipher; 2273 sm->proactive_key_caching = config->proactive_key_caching; 2274 sm->eap_workaround = config->eap_workaround; 2275 sm->eap_conf_ctx = config [all...] |