Home
last modified time | relevance | path

Searched refs:reply_len (Results 1 – 25 of 28) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp188 size_t reply_len; in addNetwork() local
226 reply_len = sizeof(reply) - 1; in addNetwork()
229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); in addNetwork()
405 reply_len = sizeof(reply); in addNetwork()
406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork()
415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); in addNetwork()
431 size_t reply_len; in setNetworkParam() local
434 reply_len = sizeof(reply); in setNetworkParam()
435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam()
496 static int key_value_isset(const char *reply, size_t reply_len) in key_value_isset() argument
[all …]
Dpeers.cpp322 size_t reply_len; in enter_pin() local
334 reply_len = sizeof(reply) - 1; in enter_pin()
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin()
353 size_t reply_len; in ctx_p2p_start() local
354 reply_len = sizeof(reply) - 1; in ctx_p2p_start()
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || in ctx_p2p_start()
368 size_t reply_len; in ctx_p2p_stop() local
369 reply_len = sizeof(reply) - 1; in ctx_p2p_stop()
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); in ctx_p2p_stop()
377 size_t reply_len; in ctx_p2p_listen() local
[all …]
Dscanresults.cpp57 size_t reply_len; in updateResults() local
69 reply_len = sizeof(reply) - 1; in updateResults()
70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) in updateResults()
72 reply[reply_len] = '\0'; in updateResults()
117 size_t reply_len = sizeof(reply); in scanRequest() local
122 wpagui->ctrlRequest("SCAN", reply, &reply_len); in scanRequest()
Dwpagui.cpp772 size_t reply_len = sizeof(reply); in disconnect() local
773 ctrlRequest("DISCONNECT", reply, &reply_len); in disconnect()
869 size_t reply_len = sizeof(reply); in signalMeterUpdate() local
873 ctrlRequest("SIGNAL_POLL", reply, &reply_len); in signalMeterUpdate()
1055 size_t reply_len = sizeof(reply); in connectB() local
1056 ctrlRequest("REASSOCIATE", reply, &reply_len); in connectB()
1064 size_t reply_len = sizeof(reply); in selectNetwork() local
1071 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in selectNetwork()
1081 size_t reply_len = sizeof(reply); in enableNetwork() local
1091 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in enableNetwork()
[all …]
Duserdatarequest.cpp82 size_t reply_len = sizeof(reply); in sendReply() local
92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in sendReply()
/external/nos/host/generic/libnos_transport/test/
Dtest.cpp125 status->reply_len = 0; in ACTION()
132 status->reply_len = 0; in ACTION()
144 status->reply_len = 0; in ACTION()
156 status->reply_len = 0; in ACTION()
164 ACTION_P(ReadStatusV0_DoneWithData, reply_len) { in ACTION_P() argument
168 status->reply_len = reply_len; in ACTION_P()
171 ACTION_P2(ReadStatusV1_DoneWithData, reply, reply_len) { in ACTION_P2() argument
175 status->reply_len = reply_len; in ACTION_P2()
179 status->reply_crc = crc16(reply, reply_len); in ACTION_P2()
188 status->reply_len = 0; in ACTION()
[all …]
/external/nos/host/generic/libnos_transport/
Dtransport.c89 uint32_t *reply_len; member
171 out->reply_len = le16toh(st.status.reply_len); in get_status()
230 ctx->app_id, status.status, status.reply_len, status.version, status.flags); in make_ready()
257 ctx->app_id, status.status, status.reply_len, status.flags); in make_ready()
317 .reply_len_hint = ctx->reply_len ? htole16(*ctx->reply_len) : 0, in send_command()
372 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done()
375 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done()
381 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done()
410 NLOGD("Read app %d reply data (%d bytes)", ctx->app_id, status->reply_len); in receive_reply()
414 uint16_t left = MIN(*ctx->reply_len, status->reply_len); in receive_reply()
[all …]
/external/wpa_supplicant_8/hostapd/
Dctrl_iface.c2920 int reply_len, res; in hostapd_ctrl_iface_receive_process() local
2923 reply_len = 3; in hostapd_ctrl_iface_receive_process()
2927 reply_len = 5; in hostapd_ctrl_iface_receive_process()
2930 reply_len = -1; in hostapd_ctrl_iface_receive_process()
2934 reply_len = hostapd_ctrl_iface_status(hapd, reply, in hostapd_ctrl_iface_receive_process()
2937 reply_len = hostapd_drv_status(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process()
2939 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process()
2940 if (reply_len >= 0) { in hostapd_ctrl_iface_receive_process()
2941 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, in hostapd_ctrl_iface_receive_process()
2942 reply_size - reply_len); in hostapd_ctrl_iface_receive_process()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dctrl_iface_udp.c199 size_t *reply_len) argument
204 *reply_len = 1;
212 *reply_len = 7 + 2 * COOKIE_LEN;
234 size_t reply_len = 0; local
271 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len);
307 reply_len = 1;
310 reply_len = 2;
315 reply_len = 1;
317 reply_len = 2;
321 reply_len = 1;
[all …]
Dctrl_iface.c8269 char *reply, int reply_size, int *reply_len) in wpas_ctrl_scan() argument
8285 *reply_len = -1; in wpas_ctrl_scan()
8292 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan()
8300 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan()
8314 *reply_len = -1; in wpas_ctrl_scan()
8334 *reply_len = -1; in wpas_ctrl_scan()
8345 *reply_len = -1; in wpas_ctrl_scan()
8368 *reply_len = -1; in wpas_ctrl_scan()
8380 *reply_len = -1; in wpas_ctrl_scan()
8435 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan()
[all …]
Dctrl_iface_unix.c139 size_t reply_len = 0; in wpa_supplicant_ctrl_iface_receive() local
154 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
157 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
162 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
164 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
168 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
170 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
173 &reply_len); in wpa_supplicant_ctrl_iface_receive()
184 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive()
186 reply_len = 5; in wpa_supplicant_ctrl_iface_receive()
[all …]
Dctrl_iface_named_pipe.c283 size_t reply_len = 0, send_len; in wpa_supplicant_ctrl_iface_rx() local
296 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
300 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
304 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
307 &reply_len); in wpa_supplicant_ctrl_iface_rx()
312 send_len = reply_len; in wpa_supplicant_ctrl_iface_rx()
313 } else if (reply_len == 2) { in wpa_supplicant_ctrl_iface_rx()
718 size_t reply_len = 0, send_len; in wpa_supplicant_global_iface_rx() local
727 &reply_len); in wpa_supplicant_global_iface_rx()
730 send_len = reply_len; in wpa_supplicant_global_iface_rx()
[all …]
Dap.c1507 size_t reply_len = 0, i; in wpas_ap_pmksa_cache_list() local
1514 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list()
1515 return reply_len; in wpas_ap_pmksa_cache_list()
1516 os_memcpy(&buf[reply_len], ap_delimiter, dlen); in wpas_ap_pmksa_cache_list()
1517 reply_len += dlen; in wpas_ap_pmksa_cache_list()
1520 reply_len += hostapd_ctrl_iface_pmksa_list( in wpas_ap_pmksa_cache_list()
1522 &buf[reply_len], len - reply_len); in wpas_ap_pmksa_cache_list()
1528 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list()
1529 return reply_len; in wpas_ap_pmksa_cache_list()
1530 os_memcpy(&buf[reply_len], mesh_delimiter, dlen); in wpas_ap_pmksa_cache_list()
[all …]
/external/e2fsprogs/misc/
Duuidd.c150 int32_t reply_len = 0; in call_daemon() local
197 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in call_daemon()
204 if (reply_len < 0 || reply_len > buflen) { in call_daemon()
210 ret = read_all(s, (char *) buf, reply_len); in call_daemon()
213 if (reply_len >= (int) (16+sizeof(int))) in call_daemon()
236 int32_t reply_len = 0; in server_loop() local
370 reply_len = strlen(reply_buf)+1; in server_loop()
374 reply_len = strlen(reply_buf)+1; in server_loop()
384 reply_len = sizeof(uu); in server_loop()
394 reply_len = sizeof(uu); in server_loop()
[all …]
/external/wpa_supplicant_8/src/common/
Dwpa_ctrl.c487 char *reply, size_t *reply_len, in wpa_ctrl_request() argument
558 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request()
570 if ((size_t) res == *reply_len) in wpa_ctrl_request()
571 res = (*reply_len) - 1; in wpa_ctrl_request()
577 *reply_len = res; in wpa_ctrl_request()
618 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument
622 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv()
625 *reply_len = res; in wpa_ctrl_recv()
727 char *reply, size_t *reply_len, in wpa_ctrl_request() argument
731 DWORD readlen = *reply_len; in wpa_ctrl_request()
[all …]
Dwpa_ctrl.h491 char *reply, size_t *reply_len,
534 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
/external/wpa_supplicant_8/src/drivers/
Ddriver_privsep.c45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument
83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd()
89 *reply_len = res; in wpa_priv_cmd()
135 size_t reply_len = 60000; in wpa_driver_privsep_get_scan_results2() local
139 buf = os_malloc(reply_len); in wpa_driver_privsep_get_scan_results2()
143 NULL, 0, buf, &reply_len); in wpa_driver_privsep_get_scan_results2()
150 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2()
151 if (reply_len < sizeof(int)) { in wpa_driver_privsep_get_scan_results2()
153 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2()
159 end = buf + reply_len; in wpa_driver_privsep_get_scan_results2()
/external/libchrome/base/posix/
Dunix_domain_socket.h86 unsigned reply_len,
94 unsigned reply_len,
Dunix_domain_socket.cc268 const ssize_t reply_len = RecvMsgWithFlags( in SendRecvMsgWithFlags() local
271 if (reply_len == -1) in SendRecvMsgWithFlags()
284 return reply_len; in SendRecvMsgWithFlags()
/external/e2fsprogs/lib/uuid/
Dgen_uuid.c505 int32_t reply_len = 0, expected = 16; in get_uuid_via_daemon() local
553 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in get_uuid_via_daemon()
557 if (reply_len != expected) in get_uuid_via_daemon()
560 ret = read_all(s, op_buf, reply_len); in get_uuid_via_daemon()
/external/syzkaller/pkg/report/testdata/linux/report/
D13714 [ 45.793029] program syz-executor0 not setting count and/or reply_len properly
17 [ 45.793029] program syz-executor0 not setting count and/or reply_len properly
/external/nos/host/generic/nugget/include/
Dapplication.h227 uint16_t reply_len; /* length of available response data */ member
300 void app_reply(struct app_transport *st, uint32_t status, uint16_t reply_len);
/external/nos/test/system-test-harness/src/
Dtransport_tests.cc167 uint8_t* reply, uint16_t reply_len) { in StatusMatches() argument
172 ok &= arg.reply_len == reply_len; in StatusMatches()
193 ok &= arg.reply_crc == crc16(reply, reply_len); in StatusMatches()
437 ASSERT_EQ(status.reply_len, sizeof(data)); in TEST_F()
465 ASSERT_EQ(status.reply_len, reply_len_hint); in TEST_F()
493 ASSERT_EQ(status.reply_len, sizeof(data)); in TEST_F()
/external/wpa_supplicant_8/src/fst/
Dfst_ctrl_iface.c465 size_t reply_len; member
479 c->reply_len += ret; in list_session_enum_cb()
497 ctx.reply_len = 0; in list_sessions()
501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n"); in list_sessions()
503 return ctx.reply_len; in list_sessions()
/external/wpa_supplicant_8/wpa_supplicant/wpa_client_include/libwpa_client/
Dwpa_ctrl.h491 char *reply, size_t *reply_len,
534 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);

12