search for: e_buf

Displaying 13 results from an estimated 13 matches for "e_buf".

Did you mean: _buf
2005 Oct 11
2
echo cancellation
...s so they are in sync quite good. the bit rate I am using is 8000Hz, buffer length is 256 samples and filter length is 800 samples. speex initialization: st = speex_echo_state_init (NN, 800); den = speex_preprocess_state_init (NN, 8000); echo cancellation: speex_echo_cancel (st, ptr, echo1[0], e_buf, noise); speex_preprocess (den, e_buf, noise); where ptr is a buffer that was recorded from microphone, echo1[0] is a buffer that was played on loudspeakers. the delay between ptr and echo1 is 2 buffers (512 samples). with this configuration I can still hear the echo signal (althought the si...
2005 Oct 11
2
R: echo cancellation
...! Roberto -----Messaggio originale----- Da: speex-dev-bounces@xiph.org [mailto:speex-dev-bounces@xiph.org] Per conto di hs Inviato: marted? 11 ottobre 2005 10.25 A: speex-dev@xiph.org Oggetto: Re: [Speex-dev] echo cancellation > echo cancellation: > speex_echo_cancel (st, ptr, echo1[0], e_buf, noise); speex_preprocess > (den, e_buf, noise); > > where ptr is a buffer that was recorded from microphone, echo1[0] is a > buffer that was played on loudspeakers. the delay between ptr and > echo1 is 2 buffers (512 samples). > with this configuration I can still hear the ech...
2005 Oct 11
0
R: echo cancellation
...---- > Da: speex-dev-bounces@xiph.org [mailto:speex-dev-bounces@xiph.org] Per conto > di hs > Inviato: marted? 11 ottobre 2005 10.25 > A: speex-dev@xiph.org > Oggetto: Re: [Speex-dev] echo cancellation > > > echo cancellation: > > speex_echo_cancel (st, ptr, echo1[0], e_buf, noise); speex_preprocess > > (den, e_buf, noise); > > > > where ptr is a buffer that was recorded from microphone, echo1[0] is a > > buffer that was played on loudspeakers. the delay between ptr and > > echo1 is 2 buffers (512 samples). > > with this configur...
2005 Dec 20
2
回复: Re: echo canceller
I have tested the AEC by file model,but found it doesn't work!The output file I got still had echo. And I have found several version of mdf.c,could you tell me which version I should use? Now I'm using version 1.11.1.1 and under windows there have some bugs. --- Jean-Marc Valin <jean-marc.valin@usherbrooke.ca>??: > > > haven't got the chance to sit down and look into
2005 Dec 20
1
testecho fix
...============================================= --- libspeex/testecho.c (revision 10661) +++ libspeex/testecho.c (working copy) @@ -17,7 +17,7 @@ int main(int argc, char **argv) { int echo_fd, ref_fd, e_fd; - float noise[NN+1]; + spx_int32_t noise[NN+1]; short echo_buf[NN], ref_buf[NN], e_buf[NN]; SpeexEchoState *st; SpeexPreprocessState *den;
2009 Feb 13
0
Why speex echo cancellation is not work
...T_SAMPLING_RATE, &tmp); speex_preprocess_ctl(den, SPEEX_PREPROCESS_SET_ECHO_SUPPRESS_ACTIVE, st); //int tmp1 = 1; //speex_preprocess_ctl(den, SPEEX_PREPROCESS_SET_AGC, &tmp1); } //FILE *echo_fd, *ref_fd, *e_fd; short echo_buf[SPEEX_NN], ref_buf[SPEEX_NN], e_buf[SPEEX_NN]; SpeexEchoState *st; SpeexPreprocessState *den; char* inputBuf; ~AECHandler(void){ speex_echo_state_destroy(this->st); speex_preprocess_state_destroy(this->den); } void HookComingSound(char* buf){ speex_echo_playback(this->st,(s...
2020 Jun 16
0
[PATCH v5 2/2] mm, treewide: Rename kzfree() to kfree_sensitive()
...9c91d60401..1223ac70aea2 100644 --- a/drivers/crypto/ccp/ccp-crypto-rsa.c +++ b/drivers/crypto/ccp/ccp-crypto-rsa.c @@ -112,13 +112,13 @@ static int ccp_check_key_length(unsigned int len) static void ccp_rsa_free_key_bufs(struct ccp_ctx *ctx) { /* Clean up old key data */ - kzfree(ctx->u.rsa.e_buf); + kfree_sensitive(ctx->u.rsa.e_buf); ctx->u.rsa.e_buf = NULL; ctx->u.rsa.e_len = 0; - kzfree(ctx->u.rsa.n_buf); + kfree_sensitive(ctx->u.rsa.n_buf); ctx->u.rsa.n_buf = NULL; ctx->u.rsa.n_len = 0; - kzfree(ctx->u.rsa.d_buf); + kfree_sensitive(ctx->u.rsa.d_buf);...
2020 Apr 13
0
[PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
...9c91d60401..1223ac70aea2 100644 --- a/drivers/crypto/ccp/ccp-crypto-rsa.c +++ b/drivers/crypto/ccp/ccp-crypto-rsa.c @@ -112,13 +112,13 @@ static int ccp_check_key_length(unsigned int len) static void ccp_rsa_free_key_bufs(struct ccp_ctx *ctx) { /* Clean up old key data */ - kzfree(ctx->u.rsa.e_buf); + kfree_sensitive(ctx->u.rsa.e_buf); ctx->u.rsa.e_buf = NULL; ctx->u.rsa.e_len = 0; - kzfree(ctx->u.rsa.n_buf); + kfree_sensitive(ctx->u.rsa.n_buf); ctx->u.rsa.n_buf = NULL; ctx->u.rsa.n_len = 0; - kzfree(ctx->u.rsa.d_buf); + kfree_sensitive(ctx->u.rsa.d_buf);...
2020 Jun 16
0
[PATCH v4 2/3] mm, treewide: Rename kzfree() to kfree_sensitive()
...9c91d60401..1223ac70aea2 100644 --- a/drivers/crypto/ccp/ccp-crypto-rsa.c +++ b/drivers/crypto/ccp/ccp-crypto-rsa.c @@ -112,13 +112,13 @@ static int ccp_check_key_length(unsigned int len) static void ccp_rsa_free_key_bufs(struct ccp_ctx *ctx) { /* Clean up old key data */ - kzfree(ctx->u.rsa.e_buf); + kfree_sensitive(ctx->u.rsa.e_buf); ctx->u.rsa.e_buf = NULL; ctx->u.rsa.e_len = 0; - kzfree(ctx->u.rsa.n_buf); + kfree_sensitive(ctx->u.rsa.n_buf); ctx->u.rsa.n_buf = NULL; ctx->u.rsa.n_len = 0; - kzfree(ctx->u.rsa.d_buf); + kfree_sensitive(ctx->u.rsa.d_buf);...
2020 Jun 16
3
[PATCH v5 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
v5: - Break the btrfs patch out as a separate patch to be processed independently. - Update the commit log of patch 1 to make it less scary. - Add a kzfree backward compatibility macro in patch 2. v4: - Break out the memzero_explicit() change as suggested by Dan Carpenter so that it can be backported to stable. - Drop the "crypto: Remove unnecessary
2020 Jun 16
14
[PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
v4: - Break out the memzero_explicit() change as suggested by Dan Carpenter so that it can be backported to stable. - Drop the "crypto: Remove unnecessary memzero_explicit()" patch for now as there can be a bit more discussion on what is best. It will be introduced as a separate patch later on after this one is merged. This patchset makes a global rename of the kzfree()
2020 Jun 16
14
[PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
v4: - Break out the memzero_explicit() change as suggested by Dan Carpenter so that it can be backported to stable. - Drop the "crypto: Remove unnecessary memzero_explicit()" patch for now as there can be a bit more discussion on what is best. It will be introduced as a separate patch later on after this one is merged. This patchset makes a global rename of the kzfree()
2020 Apr 13
10
[PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
This patchset makes a global rename of the kzfree() to kfree_sensitive() to highlight the fact buffer clearing is only needed if the data objects contain sensitive information like encrpytion key. The fact that kzfree() uses memset() to do the clearing isn't totally safe either as compiler may compile out the clearing in their optimizer. Instead, the new kfree_sensitive() uses