/external/zlib/src/ |
H A D | zutil.c | 120 # ifndef verbose 121 # define verbose 0 macro 123 int ZLIB_INTERNAL z_verbose = verbose;
|
/external/zopfli/src/zopfli/ |
H A D | zopfli.h | 35 int verbose; member in struct:ZopfliOptions
|
/external/zopfli/src/zopflipng/ |
H A D | zopflipng_lib.cc | 341 bool verbose, 368 if (verbose) { 408 if (verbose) { 339 ZopfliPNGOptimize(const std::vector<unsigned char>& origpng, const ZopfliPNGOptions& png_options, bool verbose, std::vector<unsigned char>* resultpng) argument
|
/external/webrtc/src/modules/audio_processing/test/ |
H A D | process_test.cc | 166 bool verbose = true; local 360 verbose = false; 378 if (verbose) { 555 if (verbose) { 733 if (verbose) { 887 if (verbose) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1592 * @verbose: Whether to include verbose status information 1600 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, int verbose) argument 1636 verbose); 1640 if (verbose) {
|
H A D | eap_fast.c | 1659 size_t buflen, int verbose) 1664 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1658 eap_fast_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_peap.c | 1148 size_t buflen, int verbose) 1153 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1147 eap_peap_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_proxy_dummy.c | 60 int verbose) 59 eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls.c | 291 size_t buflen, int verbose) 294 return eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 290 eap_tls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls_common.c | 786 * @verbose: Whether to include verbose status information 790 char *buf, size_t buflen, int verbose) 789 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_ttls.c | 1561 size_t buflen, int verbose) 1566 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1560 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1082 * @verbose: Whether to include verbose status information 1091 int verbose) 1105 if (verbose) { 1128 verbose); 1131 len += eap_sm_get_status(sm->eap, buf + len, buflen - len, verbose); 1090 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | eapol_supp_sm.h | 278 int verbose); 322 size_t buflen, int verbose) 321 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | preauth.c | 474 * @verbose: Whether to include verbose status information 482 int verbose) 494 pos, end - pos, verbose); 481 rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | preauth.h | 27 int verbose); 67 size_t buflen, int verbose) 66 rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | wpa.c | 2407 * @verbose: Whether to include verbose status information 2415 int verbose) 2414 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | wpa.h | 128 int verbose); 242 size_t buflen, int verbose) 241 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 1592 * @verbose: Whether to include verbose status information 1600 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, int verbose) argument 1636 verbose); 1640 if (verbose) {
|
H A D | eap_fast.c | 1659 size_t buflen, int verbose) 1664 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1658 eap_fast_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_peap.c | 1148 size_t buflen, int verbose) 1153 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1147 eap_peap_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_proxy_dummy.c | 60 int verbose) 59 eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls.c | 291 size_t buflen, int verbose) 294 return eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 290 eap_tls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_tls_common.c | 786 * @verbose: Whether to include verbose status information 790 char *buf, size_t buflen, int verbose) 789 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument
|
H A D | eap_ttls.c | 1561 size_t buflen, int verbose) 1566 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1560 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1082 * @verbose: Whether to include verbose status information 1091 int verbose) 1105 if (verbose) { 1128 verbose); 1131 len += eap_sm_get_status(sm->eap, buf + len, buflen - len, verbose); 1090 eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, int verbose) argument
|