/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 536 struct wpabuf *reply) 538 /* Note: reply includes null termination after the buffer data */ 539 const char *tmp, *data = wpabuf_head(reply); 543 wpabuf_head(reply), wpabuf_len(reply)); 613 struct wpabuf *reply; local 618 reply = http_client_get_body(c); 619 if (reply == NULL) 621 wps_er_parse_device_description(ap, reply); 1640 struct wpabuf *reply; local 535 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument 1817 struct wpabuf *reply; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | peers.cpp | 321 char reply[100]; local 334 reply_len = sizeof(reply) - 1; 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { 352 char reply[20]; local 354 reply_len = sizeof(reply) - 1; 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || 356 memcmp(reply, "FAIL", 4) == 0) { 367 char reply[20]; local 369 reply_len = sizeof(reply) - 1; 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, 376 char reply[20]; local 391 char reply[20]; local 456 char reply[2048]; local 487 char reply[2048]; local 574 char reply[2048]; local 677 char reply[100]; local 769 char reply[20]; local 1061 char reply[100]; local 1350 char reply[100]; local 1384 char reply[100]; local 1408 char reply[100]; local 1431 char reply[100]; local 1452 char reply[100]; local 1480 char reply[100]; local 1515 char reply[100]; local 1535 char reply[100]; local 1553 char reply[20]; local 1710 char reply[100]; local 1749 char reply[100]; local 1797 char reply[64]; local 1822 char reply[100]; local 1845 char reply[100]; local [all...] |
H A D | wpagui.cpp | 728 char reply[10]; local 729 size_t reply_len = sizeof(reply); 730 ctrlRequest("DISCONNECT", reply, &reply_len); 964 char reply[10]; local 965 size_t reply_len = sizeof(reply); 966 ctrlRequest("REASSOCIATE", reply, &reply_len); 973 char reply[10]; local 974 size_t reply_len = sizeof(reply); 981 ctrlRequest(cmd.toAscii().constData(), reply, &reply_len); 990 char reply[1 local 1009 char reply[10]; local 1099 char reply[10]; local 1165 char reply[10]; local 1496 char reply[20]; local 1518 char reply[20]; local 1556 char reply[20]; local [all...] |
/external/chromium/net/base/ |
H A D | host_resolver_impl.cc | 697 Task* reply = NewRunnableMethod(this, &IPv6ProbeJob::OnProbeComplete, local 705 origin_loop_->PostTask(FROM_HERE, reply); 710 // We didn't post, so delete the reply. 711 delete reply;
|
/external/chromium_org/content/browser/renderer_host/ |
H A D | render_message_filter.cc | 107 // issuing your callback. When done, write your reply parameters into 638 void RenderMessageFilter::SendLoadFontReply(IPC::Message* reply, argument 649 reply, result->font_data_size, handle, result->font_id); 650 Send(reply);
|
H A D | render_process_host_impl.cc | 1271 // hang waiting for a reply. 1272 IPC::Message* reply = IPC::SyncMessage::GenerateReply(&msg); local 1273 reply->set_reply_error(); 1274 Send(reply);
|
H A D | render_widget_host_unittest.cc | 394 void set_update_msg_should_reply(bool reply) { argument 395 update_msg_should_reply_ = reply; 414 // message reply. False implies timeout. 449 // Construct a fake update reply. 1076 // Allowing the renderer to reply in time should give is a backing store.
|
/external/chromium_org/ipc/ |
H A D | ipc_sync_channel_unittest.cc | 136 // the normal version while other want the delayed reply, we 429 // Use the DELAY_REPLY macro so that we can force the reply to be sent 699 // Server1 sends a sync msg to client1, which blocks the reply until 751 VLOG(1) << __FUNCTION__ << " Sending reply: " << reply_text_; 788 VLOG(1) << __FUNCTION__ << " Received reply: " << response; 836 // message the reply to the original messages comes, it is queued up correctly 873 // the receiver is waiting for a sync reply does not overflow the PostMessage 920 // Don't reply. 990 // Sleep a bit so that we wake up after the reply has been received. 1014 // bug, the reply messag 1310 OnPingTTL(int ping, IPC::Message* reply) argument 1774 OnReentrant1(Message* reply) argument 1781 Message* reply = reply_; local [all...] |
/external/chromium_org/third_party/mesa/src/src/glx/ |
H A D | glxcmds.c | 581 xGLXIsDirectReply reply; local 593 xcb_glx_is_direct_reply_t *reply = xcb_glx_is_direct_reply(c, local 598 const Bool is_direct = (reply != NULL && reply->is_direct) ? True : False; 605 free(reply); 615 _XReply(dpy, (xReply *) & reply, 0, False); 619 return reply.isDirect; 1422 xGLXQueryContextReply reply; local 1488 _XReply(dpy, (xReply *) & reply, 0, False); 1490 if (reply [all...] |
/external/chromium_org/webkit/browser/quota/ |
H A D | quota_manager.cc | 1551 const base::Callback<void(bool)>& reply) { 1559 reply); 1548 PostTaskAndReplyWithResultForDBThread( const tracked_objects::Location& from_here, const base::Callback<bool(QuotaDatabase*)>& task, const base::Callback<void(bool)>& reply) argument
|
/external/grub/netboot/ |
H A D | etherboot.h | 434 reply; member in union:rpc_t::__anon17823 460 /* Block size used for NFS read accesses. A RPC reply packet (including all
|
/external/mesa3d/src/glx/ |
H A D | glxcmds.c | 581 xGLXIsDirectReply reply; local 593 xcb_glx_is_direct_reply_t *reply = xcb_glx_is_direct_reply(c, local 598 const Bool is_direct = (reply != NULL && reply->is_direct) ? True : False; 605 free(reply); 615 _XReply(dpy, (xReply *) & reply, 0, False); 619 return reply.isDirect; 1422 xGLXQueryContextReply reply; local 1488 _XReply(dpy, (xReply *) & reply, 0, False); 1490 if (reply [all...] |
/external/openssh/ |
H A D | clientloop.c | 550 packet_put_char(1); /* boolean: want reply */ 1925 int exitval, id, reply, success = 0; local 1930 reply = packet_get_char(); 1932 debug("client_input_channel_req: channel %d rtype %s reply %d", 1933 id, rtype, reply); 1959 if (reply && c != NULL) { 2020 /* XXX wait for reply */ 2106 /* global request reply messages */
|
H A D | sshconnect2.c | 383 char *reply = packet_get_string(NULL); local 384 debug2("service_accept: %s", reply); 385 xfree(reply); 455 debug2("we sent a %s packet, wait for reply", method->name); 1628 error("ssh_keysign: no reply");
|
/external/ppp/pppd/ |
H A D | auth.c | 560 * incoming events (reply, timeout, etc.). 1476 struct pam_response *reply = NULL; local 1480 reply = malloc(sizeof(struct pam_response) * num_msg); 1481 if (!reply) return PAM_CONV_ERR; 1486 reply[replies].resp_retcode = PAM_SUCCESS; 1487 reply[replies].resp = COPY_STRING(PAM_username); 1491 reply[replies].resp_retcode = PAM_SUCCESS; 1492 reply[replies].resp = COPY_STRING(PAM_password); 1499 reply[replies].resp_retcode = PAM_SUCCESS; 1500 reply[replie [all...] |
H A D | sys-solaris.c | 585 } reply; local 723 dlpi_get_reply(ifd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0) { 2230 } reply; local 2252 || dlpi_get_reply(iffd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0 2254 || dlpi_get_reply(iffd, &reply.prim, DL_INFO_ACK, sizeof(reply)) < 0) { 2259 adrlen = reply.prim.info_ack.dl_addr_length; 2260 adrp = (unsigned char *)&reply [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 88 struct wpa_eapol_key *reply; local 106 sizeof(*reply), &rlen, (void *) &reply); 110 reply->type = sm->proto == WPA_PROTO_RSN ? 119 WPA_PUT_BE16(reply->key_info, key_info); 120 WPA_PUT_BE16(reply->key_length, 0); 121 os_memcpy(reply->replay_counter, sm->request_counter, 125 WPA_PUT_BE16(reply->key_data_length, 0); 133 reply->key_mic : NULL); 277 struct wpa_eapol_key *reply; local 997 struct wpa_eapol_key *reply; local 1276 struct wpa_eapol_key *reply; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 88 struct wpa_eapol_key *reply; local 106 sizeof(*reply), &rlen, (void *) &reply); 110 reply->type = sm->proto == WPA_PROTO_RSN ? 119 WPA_PUT_BE16(reply->key_info, key_info); 120 WPA_PUT_BE16(reply->key_length, 0); 121 os_memcpy(reply->replay_counter, sm->request_counter, 125 WPA_PUT_BE16(reply->key_data_length, 0); 133 reply->key_mic : NULL); 277 struct wpa_eapol_key *reply; local 997 struct wpa_eapol_key *reply; local 1276 struct wpa_eapol_key *reply; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 110 DBusMessage *reply; local 112 reply = dbus_message_new_error(message, WPAS_DBUS_ERROR_INVALID_ARGS, 116 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, 119 return reply; 309 "%s: error constructing reply", __func__); 530 DBusMessage *reply = NULL; local 583 reply = dbus_message_new_error(message, 598 reply = dbus_message_new_method_return(message); 599 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH, 602 reply 637 DBusMessage *reply = NULL; local 667 DBusMessage *reply = NULL; local 964 wpas_dbus_get_scan_type(DBusMessage *message, DBusMessageIter *var, char **type, DBusMessage **reply) argument 979 wpas_dbus_get_scan_ssids(DBusMessage *message, DBusMessageIter *var, struct wpa_driver_scan_params *params, DBusMessage **reply) argument 1067 wpas_dbus_get_scan_ies(DBusMessage *message, DBusMessageIter *var, struct wpa_driver_scan_params *params, DBusMessage **reply) argument 1131 wpas_dbus_get_scan_channels(DBusMessage *message, DBusMessageIter *var, struct wpa_driver_scan_params *params, DBusMessage **reply) argument 1252 DBusMessage *reply = NULL; local 1380 DBusMessage *reply = NULL; local 1477 DBusMessage *reply = NULL; local 1592 DBusMessage *reply = NULL; local 1645 DBusMessage *reply = NULL; local 1712 DBusMessage *reply = NULL; local 1783 DBusMessage *reply = NULL; local 1848 DBusMessage *reply = NULL; local 1905 DBusMessage *reply = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 88 struct wpa_eapol_key *reply; local 106 sizeof(*reply), &rlen, (void *) &reply); 110 reply->type = sm->proto == WPA_PROTO_RSN ? 119 WPA_PUT_BE16(reply->key_info, key_info); 120 WPA_PUT_BE16(reply->key_length, 0); 121 os_memcpy(reply->replay_counter, sm->request_counter, 125 WPA_PUT_BE16(reply->key_data_length, 0); 133 reply->key_mic : NULL); 277 struct wpa_eapol_key *reply; local 997 struct wpa_eapol_key *reply; local 1276 struct wpa_eapol_key *reply; local [all...] |
/external/mdnsresponder/mDNSCore/ |
H A D | uDNS.c | 255 // negative response so that applications get a reply. We also need to reinitialize the DNS servers 1055 // It's perfectly fine for this socket to close after the first reply. The server might 1057 // We'll only log this event if we've never received a reply before. 1083 tcpInfo->reply = mDNSPlatformMemAllocate(tcpInfo->replylen); 1084 if (!tcpInfo->reply) { LogMsg("ERROR: tcpCallback - malloc failed"); err = mStatus_NoMemoryErr; goto exit; } 1087 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed); 1119 DNSMessage *reply = tcpInfo->reply; local 1120 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen; 1125 tcpInfo->reply [all...] |
/external/mdnsresponder/mDNSShared/ |
H A D | dnsextd.c | 693 UDPServerTransaction(const DaemonInfo *d, const PktMsg *request, PktMsg *reply, mDNSBool *trunc) argument 720 // Wait for reply 728 // Receive reply 730 reply->len = recvfrom( sd, &reply->msg, sizeof(reply->msg), 0, NULL, NULL ); 731 require_action( ( ( int ) reply->len ) >= 0, exit, err = mStatus_UnknownErr; LogErr( "UDPServerTransaction", "recvfrom" ) ); 732 require_action( reply->len >= sizeof( DNSMessageHeader ), exit, err = mStatus_UnknownErr; Log( "UDPServerTransaction - Message too short (%d bytes)", reply->len ) ); 736 if ( reply 756 SuccessfulUpdateTransaction(PktMsg *request, PktMsg *reply) argument 922 PktMsg *reply = NULL; local 1300 PktMsg *reply = NULL; local 1478 PktMsg *reply; local 1510 PktMsg * reply = NULL; local 1745 PktMsg buf, *reply = NULL; local 2532 PktMsg * reply = NULL; local 2627 PktMsg reply; local 2677 PktMsg * reply = NULL; local 2771 PktMsg reply; local [all...] |
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | syswrap-darwin.c | 3615 // Intercept sysctl(kern.usrstack). The kernel's reply would be 4175 Reply *reply = (Reply *)ARG1; local 4177 if (reply->RetCode) PRINT("mig return %d", reply->RetCode); 4210 Reply *reply = (Reply *)ARG1; local 4212 if (!reply->RetCode) { 4213 PRINT("page size %llu", (ULong)reply->out_page_size); 4215 PRINT("mig return %d", reply->RetCode); 4239 Reply *reply = (Reply *)ARG1; local 4241 assign_port_name(reply 4273 Reply *reply = (Reply *)ARG1; local 4468 Reply *reply = (Reply *)ARG1; local 4504 Reply *reply = (Reply *)ARG1; local 4556 Reply *reply = (Reply *)ARG1; local 4605 Reply *reply = (Reply *)ARG1; local 4654 Reply *reply = (Reply *)ARG1; local 4746 Reply *reply = (Reply *)ARG1; local 4791 Reply *reply = (Reply *)ARG1; local 5042 Reply *reply = (Reply *)ARG1; local 5107 Reply *reply = (Reply *)ARG1; local 5148 Reply *reply = (Reply *)ARG1; local 5219 Reply *reply = (Reply *)ARG1; local 5303 Reply *reply = (Reply *)ARG1; local 5363 Reply *reply = (Reply *)ARG1; local 5420 Reply *reply = (Reply *)ARG1; local 5476 Reply *reply = (Reply *)ARG1; local 5618 Reply *reply = (Reply *)ARG1; local 5673 Reply *reply = (Reply *)ARG1; local 5735 Reply *reply = (Reply *)ARG1; local 5812 Reply *reply = (Reply *)ARG1; local 5867 Reply *reply = (Reply *)ARG1; local 5910 Reply *reply = (Reply *)ARG1; local 5953 Reply *reply = (Reply *)ARG1; local 5998 Reply *reply = (Reply *)ARG1; local 6057 Reply *reply = (Reply *)ARG1; local 6113 Reply *reply = (Reply *)ARG1; local 6166 Reply *reply = (Reply *)ARG1; local 6214 Reply *reply = (Reply *)ARG1; local 6277 Reply *reply = (Reply *)ARG1; local 6329 Reply *reply = (Reply *)ARG1; local 6454 Reply *reply = (Reply *)ARG1; local 6588 Reply *reply = (Reply *)ARG1; local 6697 Reply *reply = (Reply *)ARG1; local 6740 Reply *reply = (Reply *)ARG1; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.c | 813 struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) 834 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 836 reply[res++] = '\n'; 837 reply[res] = '\0'; 846 struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) 863 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 865 reply[res++] = '\n'; 866 reply[res] = '\0'; 902 char *reply, size_t max_len, 912 res = wpa_snprintf_hex_uppercase(reply, max_le 812 wpa_supplicant_ctrl_iface_wps_nfc_config_token( struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument 845 wpa_supplicant_ctrl_iface_wps_nfc_token( struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument 901 wpas_ctrl_nfc_get_handover_req_wps(struct wpa_supplicant *wpa_s, char *reply, size_t max_len, int cr) argument 923 wpas_ctrl_nfc_get_handover_req(struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument 946 wpas_ctrl_nfc_get_handover_sel_wps(struct wpa_supplicant *wpa_s, char *reply, size_t max_len, int ndef, int cr, char *uuid) argument 968 wpas_ctrl_nfc_get_handover_sel(struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument 1000 wpas_ctrl_nfc_rx_handover_req(struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument 1326 wpa_supplicant_ctrl_iface_wps_er_nfc_config_token( struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument 5242 char *reply; local 6197 char *reply; local [all...] |
/external/chromium/third_party/libevent/ |
H A D | evdns.c | 193 struct reply { struct 245 /* Represents part of a reply being built. (That is, a single RR.) */ 258 /* the components of the reply as we're constructing it. */ 279 /* Constructed response. Only set once we're ready to send a reply. */ 646 reply_callback(struct request *const req, u32 ttl, u32 err, struct reply *reply) { argument 649 if (reply) 651 reply->data.a.addrcount, ttl, 652 reply->data.a.addresses, 658 if (reply) { 682 reply_handle(struct request *const req, u16 flags, u32 ttl, struct reply *reply) argument 822 struct reply reply; local [all...] |