/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 188 size_t reply_len; in addNetwork() local 226 reply_len = sizeof(reply) - 1; in addNetwork() 229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); in addNetwork() 405 reply_len = sizeof(reply); in addNetwork() 406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork() 415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); in addNetwork() 431 size_t reply_len; in setNetworkParam() local 434 reply_len = sizeof(reply); in setNetworkParam() 435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam() 496 static int key_value_isset(const char *reply, size_t reply_len) in key_value_isset() argument [all …]
|
D | peers.cpp | 322 size_t reply_len; in enter_pin() local 334 reply_len = sizeof(reply) - 1; in enter_pin() 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin() 353 size_t reply_len; in ctx_p2p_start() local 354 reply_len = sizeof(reply) - 1; in ctx_p2p_start() 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || in ctx_p2p_start() 368 size_t reply_len; in ctx_p2p_stop() local 369 reply_len = sizeof(reply) - 1; in ctx_p2p_stop() 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); in ctx_p2p_stop() 377 size_t reply_len; in ctx_p2p_listen() local [all …]
|
D | scanresults.cpp | 57 size_t reply_len; in updateResults() local 69 reply_len = sizeof(reply) - 1; in updateResults() 70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) in updateResults() 72 reply[reply_len] = '\0'; in updateResults() 117 size_t reply_len = sizeof(reply); in scanRequest() local 122 wpagui->ctrlRequest("SCAN", reply, &reply_len); in scanRequest()
|
D | wpagui.cpp | 772 size_t reply_len = sizeof(reply); in disconnect() local 773 ctrlRequest("DISCONNECT", reply, &reply_len); in disconnect() 869 size_t reply_len = sizeof(reply); in signalMeterUpdate() local 873 ctrlRequest("SIGNAL_POLL", reply, &reply_len); in signalMeterUpdate() 1055 size_t reply_len = sizeof(reply); in connectB() local 1056 ctrlRequest("REASSOCIATE", reply, &reply_len); in connectB() 1064 size_t reply_len = sizeof(reply); in selectNetwork() local 1071 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in selectNetwork() 1081 size_t reply_len = sizeof(reply); in enableNetwork() local 1091 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in enableNetwork() [all …]
|
D | userdatarequest.cpp | 82 size_t reply_len = sizeof(reply); in sendReply() local 92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in sendReply()
|
/external/nos/host/generic/libnos_transport/test/ |
D | test.cpp | 125 status->reply_len = 0; in ACTION() 132 status->reply_len = 0; in ACTION() 144 status->reply_len = 0; in ACTION() 156 status->reply_len = 0; in ACTION() 164 ACTION_P(ReadStatusV0_DoneWithData, reply_len) { in ACTION_P() argument 168 status->reply_len = reply_len; in ACTION_P() 171 ACTION_P2(ReadStatusV1_DoneWithData, reply, reply_len) { in ACTION_P2() argument 175 status->reply_len = reply_len; in ACTION_P2() 179 status->reply_crc = crc16(reply, reply_len); in ACTION_P2() 188 status->reply_len = 0; in ACTION() [all …]
|
/external/nos/host/generic/libnos_transport/ |
D | transport.c | 89 uint32_t *reply_len; member 171 out->reply_len = le16toh(st.status.reply_len); in get_status() 230 ctx->app_id, status.status, status.reply_len, status.version, status.flags); in make_ready() 257 ctx->app_id, status.status, status.reply_len, status.flags); in make_ready() 317 .reply_len_hint = ctx->reply_len ? htole16(*ctx->reply_len) : 0, in send_command() 372 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done() 375 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done() 381 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done() 410 NLOGD("Read app %d reply data (%d bytes)", ctx->app_id, status->reply_len); in receive_reply() 414 uint16_t left = MIN(*ctx->reply_len, status->reply_len); in receive_reply() [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | ctrl_iface.c | 2920 int reply_len, res; in hostapd_ctrl_iface_receive_process() local 2923 reply_len = 3; in hostapd_ctrl_iface_receive_process() 2927 reply_len = 5; in hostapd_ctrl_iface_receive_process() 2930 reply_len = -1; in hostapd_ctrl_iface_receive_process() 2934 reply_len = hostapd_ctrl_iface_status(hapd, reply, in hostapd_ctrl_iface_receive_process() 2937 reply_len = hostapd_drv_status(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process() 2939 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process() 2940 if (reply_len >= 0) { in hostapd_ctrl_iface_receive_process() 2941 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, in hostapd_ctrl_iface_receive_process() 2942 reply_size - reply_len); in hostapd_ctrl_iface_receive_process() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ctrl_iface_udp.c | 199 size_t *reply_len) argument 204 *reply_len = 1; 212 *reply_len = 7 + 2 * COOKIE_LEN; 234 size_t reply_len = 0; local 271 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 307 reply_len = 1; 310 reply_len = 2; 315 reply_len = 1; 317 reply_len = 2; 321 reply_len = 1; [all …]
|
D | ctrl_iface.c | 8269 char *reply, int reply_size, int *reply_len) in wpas_ctrl_scan() argument 8285 *reply_len = -1; in wpas_ctrl_scan() 8292 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan() 8300 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan() 8314 *reply_len = -1; in wpas_ctrl_scan() 8334 *reply_len = -1; in wpas_ctrl_scan() 8345 *reply_len = -1; in wpas_ctrl_scan() 8368 *reply_len = -1; in wpas_ctrl_scan() 8380 *reply_len = -1; in wpas_ctrl_scan() 8435 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan() [all …]
|
D | ctrl_iface_unix.c | 139 size_t reply_len = 0; in wpa_supplicant_ctrl_iface_receive() local 154 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 157 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 162 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 164 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 168 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 170 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 173 &reply_len); in wpa_supplicant_ctrl_iface_receive() 184 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive() 186 reply_len = 5; in wpa_supplicant_ctrl_iface_receive() [all …]
|
D | ctrl_iface_named_pipe.c | 283 size_t reply_len = 0, send_len; in wpa_supplicant_ctrl_iface_rx() local 296 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 300 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 304 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 307 &reply_len); in wpa_supplicant_ctrl_iface_rx() 312 send_len = reply_len; in wpa_supplicant_ctrl_iface_rx() 313 } else if (reply_len == 2) { in wpa_supplicant_ctrl_iface_rx() 718 size_t reply_len = 0, send_len; in wpa_supplicant_global_iface_rx() local 727 &reply_len); in wpa_supplicant_global_iface_rx() 730 send_len = reply_len; in wpa_supplicant_global_iface_rx() [all …]
|
D | ap.c | 1507 size_t reply_len = 0, i; in wpas_ap_pmksa_cache_list() local 1514 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list() 1515 return reply_len; in wpas_ap_pmksa_cache_list() 1516 os_memcpy(&buf[reply_len], ap_delimiter, dlen); in wpas_ap_pmksa_cache_list() 1517 reply_len += dlen; in wpas_ap_pmksa_cache_list() 1520 reply_len += hostapd_ctrl_iface_pmksa_list( in wpas_ap_pmksa_cache_list() 1522 &buf[reply_len], len - reply_len); in wpas_ap_pmksa_cache_list() 1528 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list() 1529 return reply_len; in wpas_ap_pmksa_cache_list() 1530 os_memcpy(&buf[reply_len], mesh_delimiter, dlen); in wpas_ap_pmksa_cache_list() [all …]
|
/external/e2fsprogs/misc/ |
D | uuidd.c | 150 int32_t reply_len = 0; in call_daemon() local 197 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in call_daemon() 204 if (reply_len < 0 || reply_len > buflen) { in call_daemon() 210 ret = read_all(s, (char *) buf, reply_len); in call_daemon() 213 if (reply_len >= (int) (16+sizeof(int))) in call_daemon() 236 int32_t reply_len = 0; in server_loop() local 370 reply_len = strlen(reply_buf)+1; in server_loop() 374 reply_len = strlen(reply_buf)+1; in server_loop() 384 reply_len = sizeof(uu); in server_loop() 394 reply_len = sizeof(uu); in server_loop() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_ctrl.c | 487 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 558 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request() 570 if ((size_t) res == *reply_len) in wpa_ctrl_request() 571 res = (*reply_len) - 1; in wpa_ctrl_request() 577 *reply_len = res; in wpa_ctrl_request() 618 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument 622 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv() 625 *reply_len = res; in wpa_ctrl_recv() 727 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 731 DWORD readlen = *reply_len; in wpa_ctrl_request() [all …]
|
D | wpa_ctrl.h | 491 char *reply, size_t *reply_len, 534 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_privsep.c | 45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd() 89 *reply_len = res; in wpa_priv_cmd() 135 size_t reply_len = 60000; in wpa_driver_privsep_get_scan_results2() local 139 buf = os_malloc(reply_len); in wpa_driver_privsep_get_scan_results2() 143 NULL, 0, buf, &reply_len); in wpa_driver_privsep_get_scan_results2() 150 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2() 151 if (reply_len < sizeof(int)) { in wpa_driver_privsep_get_scan_results2() 153 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2() 159 end = buf + reply_len; in wpa_driver_privsep_get_scan_results2()
|
/external/libchrome/base/posix/ |
D | unix_domain_socket.h | 86 unsigned reply_len, 94 unsigned reply_len,
|
D | unix_domain_socket.cc | 268 const ssize_t reply_len = RecvMsgWithFlags( in SendRecvMsgWithFlags() local 271 if (reply_len == -1) in SendRecvMsgWithFlags() 284 return reply_len; in SendRecvMsgWithFlags()
|
/external/e2fsprogs/lib/uuid/ |
D | gen_uuid.c | 505 int32_t reply_len = 0, expected = 16; in get_uuid_via_daemon() local 553 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in get_uuid_via_daemon() 557 if (reply_len != expected) in get_uuid_via_daemon() 560 ret = read_all(s, op_buf, reply_len); in get_uuid_via_daemon()
|
/external/syzkaller/pkg/report/testdata/linux/report/ |
D | 137 | 14 [ 45.793029] program syz-executor0 not setting count and/or reply_len properly 17 [ 45.793029] program syz-executor0 not setting count and/or reply_len properly
|
/external/nos/host/generic/nugget/include/ |
D | application.h | 227 uint16_t reply_len; /* length of available response data */ member 300 void app_reply(struct app_transport *st, uint32_t status, uint16_t reply_len);
|
/external/nos/test/system-test-harness/src/ |
D | transport_tests.cc | 167 uint8_t* reply, uint16_t reply_len) { in StatusMatches() argument 172 ok &= arg.reply_len == reply_len; in StatusMatches() 193 ok &= arg.reply_crc == crc16(reply, reply_len); in StatusMatches() 437 ASSERT_EQ(status.reply_len, sizeof(data)); in TEST_F() 465 ASSERT_EQ(status.reply_len, reply_len_hint); in TEST_F() 493 ASSERT_EQ(status.reply_len, sizeof(data)); in TEST_F()
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 465 size_t reply_len; member 479 c->reply_len += ret; in list_session_enum_cb() 497 ctx.reply_len = 0; in list_sessions() 501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n"); in list_sessions() 503 return ctx.reply_len; in list_sessions()
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_client_include/libwpa_client/ |
D | wpa_ctrl.h | 491 char *reply, size_t *reply_len, 534 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
|