Home
last modified time | relevance | path

Searched refs:reply_len (Results 1 – 20 of 20) sorted by relevance

/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp188 size_t reply_len; in addNetwork() local
226 reply_len = sizeof(reply) - 1; in addNetwork()
229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); in addNetwork()
405 reply_len = sizeof(reply); in addNetwork()
406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork()
415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); in addNetwork()
431 size_t reply_len; in setNetworkParam() local
434 reply_len = sizeof(reply); in setNetworkParam()
435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam()
496 static int key_value_isset(const char *reply, size_t reply_len) in key_value_isset() argument
[all …]
Dpeers.cpp322 size_t reply_len; in enter_pin() local
334 reply_len = sizeof(reply) - 1; in enter_pin()
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin()
353 size_t reply_len; in ctx_p2p_start() local
354 reply_len = sizeof(reply) - 1; in ctx_p2p_start()
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || in ctx_p2p_start()
368 size_t reply_len; in ctx_p2p_stop() local
369 reply_len = sizeof(reply) - 1; in ctx_p2p_stop()
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); in ctx_p2p_stop()
377 size_t reply_len; in ctx_p2p_listen() local
[all …]
Dscanresults.cpp57 size_t reply_len; in updateResults() local
69 reply_len = sizeof(reply) - 1; in updateResults()
70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) in updateResults()
72 reply[reply_len] = '\0'; in updateResults()
117 size_t reply_len = sizeof(reply); in scanRequest() local
122 wpagui->ctrlRequest("SCAN", reply, &reply_len); in scanRequest()
Dwpagui.cpp772 size_t reply_len = sizeof(reply); in disconnect() local
773 ctrlRequest("DISCONNECT", reply, &reply_len); in disconnect()
869 size_t reply_len = sizeof(reply); in signalMeterUpdate() local
873 ctrlRequest("SIGNAL_POLL", reply, &reply_len); in signalMeterUpdate()
1055 size_t reply_len = sizeof(reply); in connectB() local
1056 ctrlRequest("REASSOCIATE", reply, &reply_len); in connectB()
1064 size_t reply_len = sizeof(reply); in selectNetwork() local
1071 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in selectNetwork()
1081 size_t reply_len = sizeof(reply); in enableNetwork() local
1091 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in enableNetwork()
[all …]
Duserdatarequest.cpp82 size_t reply_len = sizeof(reply); in sendReply() local
92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in sendReply()
/external/wpa_supplicant_8/wpa_supplicant/
Dctrl_iface_udp.c199 size_t *reply_len) argument
204 *reply_len = 1;
212 *reply_len = 7 + 2 * COOKIE_LEN;
234 size_t reply_len = 0; local
271 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len);
307 reply_len = 1;
310 reply_len = 2;
315 reply_len = 1;
317 reply_len = 2;
321 reply_len = 1;
[all …]
Dctrl_iface.c7384 char *reply, int reply_size, int *reply_len) in wpas_ctrl_scan() argument
7400 *reply_len = -1; in wpas_ctrl_scan()
7407 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan()
7415 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan()
7429 *reply_len = -1; in wpas_ctrl_scan()
7449 *reply_len = -1; in wpas_ctrl_scan()
7470 *reply_len = -1; in wpas_ctrl_scan()
7482 *reply_len = -1; in wpas_ctrl_scan()
7537 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan()
7557 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan()
[all …]
Dctrl_iface_unix.c139 size_t reply_len = 0; in wpa_supplicant_ctrl_iface_receive() local
154 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
157 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
162 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
164 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
168 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
170 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
173 &reply_len); in wpa_supplicant_ctrl_iface_receive()
184 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive()
186 reply_len = 5; in wpa_supplicant_ctrl_iface_receive()
[all …]
Dctrl_iface_named_pipe.c283 size_t reply_len = 0, send_len; in wpa_supplicant_ctrl_iface_rx() local
296 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
300 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
304 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
307 &reply_len); in wpa_supplicant_ctrl_iface_rx()
312 send_len = reply_len; in wpa_supplicant_ctrl_iface_rx()
313 } else if (reply_len == 2) { in wpa_supplicant_ctrl_iface_rx()
719 size_t reply_len = 0, send_len; in wpa_supplicant_global_iface_rx() local
728 &reply_len); in wpa_supplicant_global_iface_rx()
731 send_len = reply_len; in wpa_supplicant_global_iface_rx()
[all …]
Dap.c1372 size_t reply_len = 0, i; in wpas_ap_pmksa_cache_list() local
1379 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list()
1380 return reply_len; in wpas_ap_pmksa_cache_list()
1381 os_memcpy(&buf[reply_len], ap_delimiter, dlen); in wpas_ap_pmksa_cache_list()
1382 reply_len += dlen; in wpas_ap_pmksa_cache_list()
1385 reply_len += hostapd_ctrl_iface_pmksa_list( in wpas_ap_pmksa_cache_list()
1387 &buf[reply_len], len - reply_len); in wpas_ap_pmksa_cache_list()
1393 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list()
1394 return reply_len; in wpas_ap_pmksa_cache_list()
1395 os_memcpy(&buf[reply_len], mesh_delimiter, dlen); in wpas_ap_pmksa_cache_list()
[all …]
/external/wpa_supplicant_8/hostapd/
Dctrl_iface.c2080 int reply_len, res; in hostapd_ctrl_iface_receive_process() local
2083 reply_len = 3; in hostapd_ctrl_iface_receive_process()
2087 reply_len = 5; in hostapd_ctrl_iface_receive_process()
2090 reply_len = -1; in hostapd_ctrl_iface_receive_process()
2092 reply_len = hostapd_ctrl_iface_status(hapd, reply, in hostapd_ctrl_iface_receive_process()
2095 reply_len = hostapd_drv_status(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process()
2097 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process()
2098 if (reply_len >= 0) { in hostapd_ctrl_iface_receive_process()
2099 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, in hostapd_ctrl_iface_receive_process()
2100 reply_size - reply_len); in hostapd_ctrl_iface_receive_process()
[all …]
/external/e2fsprogs/misc/
Duuidd.c148 int32_t reply_len = 0; in call_daemon() local
195 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in call_daemon()
202 if (reply_len < 0 || reply_len > buflen) { in call_daemon()
208 ret = read_all(s, (char *) buf, reply_len); in call_daemon()
211 if (reply_len >= (int) (16+sizeof(int))) in call_daemon()
234 int32_t reply_len = 0; in server_loop() local
368 reply_len = strlen(reply_buf)+1; in server_loop()
372 reply_len = strlen(reply_buf)+1; in server_loop()
382 reply_len = sizeof(uu); in server_loop()
392 reply_len = sizeof(uu); in server_loop()
[all …]
/external/wpa_supplicant_8/src/common/
Dwpa_ctrl.c469 char *reply, size_t *reply_len, in wpa_ctrl_request() argument
540 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request()
551 if ((size_t) res == *reply_len) in wpa_ctrl_request()
552 res = (*reply_len) - 1; in wpa_ctrl_request()
558 *reply_len = res; in wpa_ctrl_request()
599 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument
603 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv()
606 *reply_len = res; in wpa_ctrl_recv()
708 char *reply, size_t *reply_len, in wpa_ctrl_request() argument
712 DWORD readlen = *reply_len; in wpa_ctrl_request()
[all …]
Dwpa_ctrl.h391 char *reply, size_t *reply_len,
434 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
/external/libchrome/base/posix/
Dunix_domain_socket_linux.h79 unsigned reply_len,
87 unsigned reply_len,
Dunix_domain_socket_linux.cc227 const ssize_t reply_len = RecvMsgWithFlags( in SendRecvMsgWithFlags() local
230 if (reply_len == -1) in SendRecvMsgWithFlags()
243 return reply_len; in SendRecvMsgWithFlags()
/external/wpa_supplicant_8/src/drivers/
Ddriver_privsep.c45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument
83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd()
89 *reply_len = res; in wpa_priv_cmd()
119 size_t reply_len = 60000; in wpa_driver_privsep_get_scan_results2() local
123 buf = os_malloc(reply_len); in wpa_driver_privsep_get_scan_results2()
127 NULL, 0, buf, &reply_len); in wpa_driver_privsep_get_scan_results2()
134 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2()
135 if (reply_len < sizeof(int)) { in wpa_driver_privsep_get_scan_results2()
137 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2()
143 end = buf + reply_len; in wpa_driver_privsep_get_scan_results2()
/external/e2fsprogs/lib/uuid/
Dgen_uuid.c487 int32_t reply_len = 0, expected = 16; in get_uuid_via_daemon() local
535 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in get_uuid_via_daemon()
539 if (reply_len != expected) in get_uuid_via_daemon()
542 ret = read_all(s, op_buf, reply_len); in get_uuid_via_daemon()
/external/wpa_supplicant_8/src/fst/
Dfst_ctrl_iface.c465 size_t reply_len; member
479 c->reply_len += ret; in list_session_enum_cb()
497 ctx.reply_len = 0; in list_sessions()
501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n"); in list_sessions()
503 return ctx.reply_len; in list_sessions()
/external/kernel-headers/original/scsi/
Dsg.h223 int reply_len; /* [i] max length of expected reply (inc. sg_header) */ member