/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 188 size_t reply_len; in addNetwork() local 226 reply_len = sizeof(reply) - 1; in addNetwork() 229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); in addNetwork() 405 reply_len = sizeof(reply); in addNetwork() 406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork() 415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); in addNetwork() 431 size_t reply_len; in setNetworkParam() local 434 reply_len = sizeof(reply); in setNetworkParam() 435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam() 496 static int key_value_isset(const char *reply, size_t reply_len) in key_value_isset() argument [all …]
|
D | peers.cpp | 322 size_t reply_len; in enter_pin() local 334 reply_len = sizeof(reply) - 1; in enter_pin() 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin() 353 size_t reply_len; in ctx_p2p_start() local 354 reply_len = sizeof(reply) - 1; in ctx_p2p_start() 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || in ctx_p2p_start() 368 size_t reply_len; in ctx_p2p_stop() local 369 reply_len = sizeof(reply) - 1; in ctx_p2p_stop() 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); in ctx_p2p_stop() 377 size_t reply_len; in ctx_p2p_listen() local [all …]
|
D | scanresults.cpp | 57 size_t reply_len; in updateResults() local 69 reply_len = sizeof(reply) - 1; in updateResults() 70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) in updateResults() 72 reply[reply_len] = '\0'; in updateResults() 117 size_t reply_len = sizeof(reply); in scanRequest() local 122 wpagui->ctrlRequest("SCAN", reply, &reply_len); in scanRequest()
|
D | wpagui.cpp | 787 size_t reply_len = sizeof(reply); in disconnect() local 788 ctrlRequest("DISCONNECT", reply, &reply_len); in disconnect() 884 size_t reply_len = sizeof(reply); in signalMeterUpdate() local 888 ctrlRequest("SIGNAL_POLL", reply, &reply_len); in signalMeterUpdate() 1070 size_t reply_len = sizeof(reply); in connectB() local 1071 ctrlRequest("REASSOCIATE", reply, &reply_len); in connectB() 1079 size_t reply_len = sizeof(reply); in selectNetwork() local 1086 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in selectNetwork() 1096 size_t reply_len = sizeof(reply); in enableNetwork() local 1106 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in enableNetwork() [all …]
|
D | userdatarequest.cpp | 82 size_t reply_len = sizeof(reply); in sendReply() local 92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in sendReply()
|
/external/nos/host/generic/libnos_transport/test/ |
D | test.cpp | 125 status->reply_len = 0; in ACTION() 132 status->reply_len = 0; in ACTION() 144 status->reply_len = 0; in ACTION() 156 status->reply_len = 0; in ACTION() 164 ACTION_P(ReadStatusV0_DoneWithData, reply_len) { in ACTION_P() argument 168 status->reply_len = reply_len; in ACTION_P() 171 ACTION_P2(ReadStatusV1_DoneWithData, reply, reply_len) { in ACTION_P2() argument 175 status->reply_len = reply_len; in ACTION_P2() 179 status->reply_crc = crc16(reply, reply_len); in ACTION_P2() 188 status->reply_len = 0; in ACTION() [all …]
|
/external/nos/host/generic/libnos_transport/ |
D | transport.c | 89 uint32_t *reply_len; member 171 out->reply_len = le16toh(st.status.reply_len); in get_status() 230 ctx->app_id, status.status, status.reply_len, status.version, status.flags); in make_ready() 257 ctx->app_id, status.status, status.reply_len, status.flags); in make_ready() 317 .reply_len_hint = ctx->reply_len ? htole16(*ctx->reply_len) : 0, in send_command() 372 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done() 375 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done() 381 ctx->app_id, poll_count, status->status, status->reply_len, status->flags); in poll_until_done() 410 NLOGD("Read app %d reply data (%d bytes)", ctx->app_id, status->reply_len); in receive_reply() 414 uint16_t left = MIN(*ctx->reply_len, status->reply_len); in receive_reply() [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | ctrl_iface.c | 3274 int reply_len, res; in hostapd_ctrl_iface_receive_process() local 3277 reply_len = 3; in hostapd_ctrl_iface_receive_process() 3281 reply_len = 5; in hostapd_ctrl_iface_receive_process() 3284 reply_len = -1; in hostapd_ctrl_iface_receive_process() 3288 reply_len = hostapd_ctrl_iface_status(hapd, reply, in hostapd_ctrl_iface_receive_process() 3291 reply_len = hostapd_drv_status(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process() 3293 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process() 3294 if (reply_len >= 0) { in hostapd_ctrl_iface_receive_process() 3295 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, in hostapd_ctrl_iface_receive_process() 3296 reply_size - reply_len); in hostapd_ctrl_iface_receive_process() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ctrl_iface_udp.c | 199 size_t *reply_len) argument 204 *reply_len = 1; 212 *reply_len = 7 + 2 * COOKIE_LEN; 234 size_t reply_len = 0; local 283 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 322 reply_len = 1; 325 reply_len = 2; 330 reply_len = 1; 332 reply_len = 2; 336 reply_len = 1; [all …]
|
D | ctrl_iface.c | 8655 char *reply, int reply_size, int *reply_len) in wpas_ctrl_scan() argument 8671 *reply_len = -1; in wpas_ctrl_scan() 8678 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan() 8686 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan() 8700 *reply_len = -1; in wpas_ctrl_scan() 8720 *reply_len = -1; in wpas_ctrl_scan() 8731 *reply_len = -1; in wpas_ctrl_scan() 8757 *reply_len = -1; in wpas_ctrl_scan() 8769 *reply_len = -1; in wpas_ctrl_scan() 8824 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan() [all …]
|
D | ctrl_iface_unix.c | 139 size_t reply_len = 0; in wpa_supplicant_ctrl_iface_receive() local 163 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 166 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 171 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 173 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 177 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 179 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 182 &reply_len); in wpa_supplicant_ctrl_iface_receive() 193 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive() 195 reply_len = 5; in wpa_supplicant_ctrl_iface_receive() [all …]
|
D | ctrl_iface_named_pipe.c | 283 size_t reply_len = 0, send_len; in wpa_supplicant_ctrl_iface_rx() local 296 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 300 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 304 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 307 &reply_len); in wpa_supplicant_ctrl_iface_rx() 312 send_len = reply_len; in wpa_supplicant_ctrl_iface_rx() 313 } else if (reply_len == 2) { in wpa_supplicant_ctrl_iface_rx() 721 size_t reply_len = 0, send_len; in wpa_supplicant_global_iface_rx() local 730 &reply_len); in wpa_supplicant_global_iface_rx() 733 send_len = reply_len; in wpa_supplicant_global_iface_rx() [all …]
|
D | ap.c | 1581 size_t reply_len = 0, i; in wpas_ap_pmksa_cache_list() local 1588 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list() 1589 return reply_len; in wpas_ap_pmksa_cache_list() 1590 os_memcpy(&buf[reply_len], ap_delimiter, dlen); in wpas_ap_pmksa_cache_list() 1591 reply_len += dlen; in wpas_ap_pmksa_cache_list() 1594 reply_len += hostapd_ctrl_iface_pmksa_list( in wpas_ap_pmksa_cache_list() 1596 &buf[reply_len], len - reply_len); in wpas_ap_pmksa_cache_list() 1602 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list() 1603 return reply_len; in wpas_ap_pmksa_cache_list() 1604 os_memcpy(&buf[reply_len], mesh_delimiter, dlen); in wpas_ap_pmksa_cache_list() [all …]
|
/external/e2fsprogs/misc/ |
D | uuidd.c | 150 int32_t reply_len = 0; in call_daemon() local 197 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in call_daemon() 204 if (reply_len < 0 || reply_len > buflen) { in call_daemon() 210 ret = read_all(s, (char *) buf, reply_len); in call_daemon() 213 if (reply_len >= (int) (16+sizeof(int))) in call_daemon() 236 int32_t reply_len = 0; in server_loop() local 370 reply_len = strlen(reply_buf)+1; in server_loop() 374 reply_len = strlen(reply_buf)+1; in server_loop() 384 reply_len = sizeof(uu); in server_loop() 394 reply_len = sizeof(uu); in server_loop() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_ctrl.c | 486 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 557 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request() 569 if ((size_t) res == *reply_len) in wpa_ctrl_request() 570 res = (*reply_len) - 1; in wpa_ctrl_request() 576 *reply_len = res; in wpa_ctrl_request() 617 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument 621 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv() 624 *reply_len = res; in wpa_ctrl_recv() 726 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 730 DWORD readlen = *reply_len; in wpa_ctrl_request() [all …]
|
D | wpa_ctrl.h | 511 char *reply, size_t *reply_len, 554 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
|
/external/libchrome/base/posix/ |
D | unix_domain_socket.h | 86 unsigned reply_len, 94 unsigned reply_len,
|
D | unix_domain_socket.cc | 268 const ssize_t reply_len = RecvMsgWithFlags( in SendRecvMsgWithFlags() local 271 if (reply_len == -1) in SendRecvMsgWithFlags() 284 return reply_len; in SendRecvMsgWithFlags()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_privsep.c | 45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd() 89 *reply_len = res; in wpa_priv_cmd() 135 size_t reply_len = 60000; in wpa_driver_privsep_get_scan_results2() local 139 buf = os_malloc(reply_len); in wpa_driver_privsep_get_scan_results2() 143 NULL, 0, buf, &reply_len); in wpa_driver_privsep_get_scan_results2() 150 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2() 151 if (reply_len < sizeof(int)) { in wpa_driver_privsep_get_scan_results2() 153 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2() 159 end = buf + reply_len; in wpa_driver_privsep_get_scan_results2()
|
/external/e2fsprogs/lib/uuid/ |
D | gen_uuid.c | 505 int32_t reply_len = 0, expected = 16; in get_uuid_via_daemon() local 553 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in get_uuid_via_daemon() 557 if (reply_len != expected) in get_uuid_via_daemon() 560 ret = read_all(s, op_buf, reply_len); in get_uuid_via_daemon()
|
/external/nos/host/generic/nugget/include/ |
D | application.h | 230 uint16_t reply_len; /* length of available response data */ member 303 void app_reply(struct app_transport *st, uint32_t status, uint16_t reply_len);
|
/external/nos/host/generic/libnos_transport/include/nos/ |
D | transport.h | 31 uint8_t *reply, uint32_t *reply_len);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_client_include/libwpa_client/ |
D | wpa_ctrl.h | 511 char *reply, size_t *reply_len, 554 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 465 size_t reply_len; member 479 c->reply_len += ret; in list_session_enum_cb() 497 ctx.reply_len = 0; in list_sessions() 501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n"); in list_sessions() 503 return ctx.reply_len; in list_sessions()
|
/external/kernel-headers/original/scsi/ |
D | sg.h | 226 int reply_len; /* [i] max length of expected reply (inc. sg_header) */ member
|