Searched defs:reply (Results 151 - 175 of 181) sorted by relevance

12345678

/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_er.c536 struct wpabuf *reply)
538 /* Note: reply includes null termination after the buffer data */
539 const char *tmp, *data = wpabuf_head(reply);
543 wpabuf_head(reply), wpabuf_len(reply));
613 struct wpabuf *reply; local
618 reply = http_client_get_body(c);
619 if (reply == NULL)
621 wps_er_parse_device_description(ap, reply);
1640 struct wpabuf *reply; local
535 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument
1817 struct wpabuf *reply; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dpeers.cpp321 char reply[100]; local
334 reply_len = sizeof(reply) - 1;
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
352 char reply[20]; local
354 reply_len = sizeof(reply) - 1;
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 ||
356 memcmp(reply, "FAIL", 4) == 0) {
367 char reply[20]; local
369 reply_len = sizeof(reply) - 1;
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply,
376 char reply[20]; local
391 char reply[20]; local
456 char reply[2048]; local
487 char reply[2048]; local
574 char reply[2048]; local
677 char reply[100]; local
769 char reply[20]; local
1061 char reply[100]; local
1350 char reply[100]; local
1384 char reply[100]; local
1408 char reply[100]; local
1431 char reply[100]; local
1452 char reply[100]; local
1480 char reply[100]; local
1515 char reply[100]; local
1535 char reply[100]; local
1553 char reply[20]; local
1710 char reply[100]; local
1749 char reply[100]; local
1797 char reply[64]; local
1822 char reply[100]; local
1845 char reply[100]; local
[all...]
H A Dwpagui.cpp728 char reply[10]; local
729 size_t reply_len = sizeof(reply);
730 ctrlRequest("DISCONNECT", reply, &reply_len);
964 char reply[10]; local
965 size_t reply_len = sizeof(reply);
966 ctrlRequest("REASSOCIATE", reply, &reply_len);
973 char reply[10]; local
974 size_t reply_len = sizeof(reply);
981 ctrlRequest(cmd.toAscii().constData(), reply, &reply_len);
990 char reply[1 local
1009 char reply[10]; local
1099 char reply[10]; local
1165 char reply[10]; local
1496 char reply[20]; local
1518 char reply[20]; local
1556 char reply[20]; local
[all...]
/external/chromium/net/base/
H A Dhost_resolver_impl.cc697 Task* reply = NewRunnableMethod(this, &IPv6ProbeJob::OnProbeComplete, local
705 origin_loop_->PostTask(FROM_HERE, reply);
710 // We didn't post, so delete the reply.
711 delete reply;
/external/chromium_org/content/browser/renderer_host/
H A Drender_message_filter.cc107 // issuing your callback. When done, write your reply parameters into
638 void RenderMessageFilter::SendLoadFontReply(IPC::Message* reply, argument
649 reply, result->font_data_size, handle, result->font_id);
650 Send(reply);
H A Drender_process_host_impl.cc1271 // hang waiting for a reply.
1272 IPC::Message* reply = IPC::SyncMessage::GenerateReply(&msg); local
1273 reply->set_reply_error();
1274 Send(reply);
H A Drender_widget_host_unittest.cc394 void set_update_msg_should_reply(bool reply) { argument
395 update_msg_should_reply_ = reply;
414 // message reply. False implies timeout.
449 // Construct a fake update reply.
1076 // Allowing the renderer to reply in time should give is a backing store.
/external/chromium_org/ipc/
H A Dipc_sync_channel_unittest.cc136 // the normal version while other want the delayed reply, we
429 // Use the DELAY_REPLY macro so that we can force the reply to be sent
699 // Server1 sends a sync msg to client1, which blocks the reply until
751 VLOG(1) << __FUNCTION__ << " Sending reply: " << reply_text_;
788 VLOG(1) << __FUNCTION__ << " Received reply: " << response;
836 // message the reply to the original messages comes, it is queued up correctly
873 // the receiver is waiting for a sync reply does not overflow the PostMessage
920 // Don't reply.
990 // Sleep a bit so that we wake up after the reply has been received.
1014 // bug, the reply messag
1310 OnPingTTL(int ping, IPC::Message* reply) argument
1774 OnReentrant1(Message* reply) argument
1781 Message* reply = reply_; local
[all...]
/external/chromium_org/third_party/mesa/src/src/glx/
H A Dglxcmds.c581 xGLXIsDirectReply reply; local
593 xcb_glx_is_direct_reply_t *reply = xcb_glx_is_direct_reply(c, local
598 const Bool is_direct = (reply != NULL && reply->is_direct) ? True : False;
605 free(reply);
615 _XReply(dpy, (xReply *) & reply, 0, False);
619 return reply.isDirect;
1422 xGLXQueryContextReply reply; local
1488 _XReply(dpy, (xReply *) & reply, 0, False);
1490 if (reply
[all...]
/external/chromium_org/webkit/browser/quota/
H A Dquota_manager.cc1551 const base::Callback<void(bool)>& reply) {
1559 reply);
1548 PostTaskAndReplyWithResultForDBThread( const tracked_objects::Location& from_here, const base::Callback<bool(QuotaDatabase*)>& task, const base::Callback<void(bool)>& reply) argument
/external/grub/netboot/
H A Detherboot.h434 reply; member in union:rpc_t::__anon17823
460 /* Block size used for NFS read accesses. A RPC reply packet (including all
/external/mesa3d/src/glx/
H A Dglxcmds.c581 xGLXIsDirectReply reply; local
593 xcb_glx_is_direct_reply_t *reply = xcb_glx_is_direct_reply(c, local
598 const Bool is_direct = (reply != NULL && reply->is_direct) ? True : False;
605 free(reply);
615 _XReply(dpy, (xReply *) & reply, 0, False);
619 return reply.isDirect;
1422 xGLXQueryContextReply reply; local
1488 _XReply(dpy, (xReply *) & reply, 0, False);
1490 if (reply
[all...]
/external/openssh/
H A Dclientloop.c550 packet_put_char(1); /* boolean: want reply */
1925 int exitval, id, reply, success = 0; local
1930 reply = packet_get_char();
1932 debug("client_input_channel_req: channel %d rtype %s reply %d",
1933 id, rtype, reply);
1959 if (reply && c != NULL) {
2020 /* XXX wait for reply */
2106 /* global request reply messages */
H A Dsshconnect2.c383 char *reply = packet_get_string(NULL); local
384 debug2("service_accept: %s", reply);
385 xfree(reply);
455 debug2("we sent a %s packet, wait for reply", method->name);
1628 error("ssh_keysign: no reply");
/external/ppp/pppd/
H A Dauth.c560 * incoming events (reply, timeout, etc.).
1476 struct pam_response *reply = NULL; local
1480 reply = malloc(sizeof(struct pam_response) * num_msg);
1481 if (!reply) return PAM_CONV_ERR;
1486 reply[replies].resp_retcode = PAM_SUCCESS;
1487 reply[replies].resp = COPY_STRING(PAM_username);
1491 reply[replies].resp_retcode = PAM_SUCCESS;
1492 reply[replies].resp = COPY_STRING(PAM_password);
1499 reply[replies].resp_retcode = PAM_SUCCESS;
1500 reply[replie
[all...]
H A Dsys-solaris.c585 } reply; local
723 dlpi_get_reply(ifd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0) {
2230 } reply; local
2252 || dlpi_get_reply(iffd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0
2254 || dlpi_get_reply(iffd, &reply.prim, DL_INFO_ACK, sizeof(reply)) < 0) {
2259 adrlen = reply.prim.info_ack.dl_addr_length;
2260 adrp = (unsigned char *)&reply
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c88 struct wpa_eapol_key *reply; local
106 sizeof(*reply), &rlen, (void *) &reply);
110 reply->type = sm->proto == WPA_PROTO_RSN ?
119 WPA_PUT_BE16(reply->key_info, key_info);
120 WPA_PUT_BE16(reply->key_length, 0);
121 os_memcpy(reply->replay_counter, sm->request_counter,
125 WPA_PUT_BE16(reply->key_data_length, 0);
133 reply->key_mic : NULL);
277 struct wpa_eapol_key *reply; local
997 struct wpa_eapol_key *reply; local
1276 struct wpa_eapol_key *reply; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c88 struct wpa_eapol_key *reply; local
106 sizeof(*reply), &rlen, (void *) &reply);
110 reply->type = sm->proto == WPA_PROTO_RSN ?
119 WPA_PUT_BE16(reply->key_info, key_info);
120 WPA_PUT_BE16(reply->key_length, 0);
121 os_memcpy(reply->replay_counter, sm->request_counter,
125 WPA_PUT_BE16(reply->key_data_length, 0);
133 reply->key_mic : NULL);
277 struct wpa_eapol_key *reply; local
997 struct wpa_eapol_key *reply; local
1276 struct wpa_eapol_key *reply; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c110 DBusMessage *reply; local
112 reply = dbus_message_new_error(message, WPAS_DBUS_ERROR_INVALID_ARGS,
116 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg,
119 return reply;
309 "%s: error constructing reply", __func__);
530 DBusMessage *reply = NULL; local
583 reply = dbus_message_new_error(message,
598 reply = dbus_message_new_method_return(message);
599 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH,
602 reply
637 DBusMessage *reply = NULL; local
667 DBusMessage *reply = NULL; local
964 wpas_dbus_get_scan_type(DBusMessage *message, DBusMessageIter *var, char **type, DBusMessage **reply) argument
979 wpas_dbus_get_scan_ssids(DBusMessage *message, DBusMessageIter *var, struct wpa_driver_scan_params *params, DBusMessage **reply) argument
1067 wpas_dbus_get_scan_ies(DBusMessage *message, DBusMessageIter *var, struct wpa_driver_scan_params *params, DBusMessage **reply) argument
1131 wpas_dbus_get_scan_channels(DBusMessage *message, DBusMessageIter *var, struct wpa_driver_scan_params *params, DBusMessage **reply) argument
1252 DBusMessage *reply = NULL; local
1380 DBusMessage *reply = NULL; local
1477 DBusMessage *reply = NULL; local
1592 DBusMessage *reply = NULL; local
1645 DBusMessage *reply = NULL; local
1712 DBusMessage *reply = NULL; local
1783 DBusMessage *reply = NULL; local
1848 DBusMessage *reply = NULL; local
1905 DBusMessage *reply = NULL; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c88 struct wpa_eapol_key *reply; local
106 sizeof(*reply), &rlen, (void *) &reply);
110 reply->type = sm->proto == WPA_PROTO_RSN ?
119 WPA_PUT_BE16(reply->key_info, key_info);
120 WPA_PUT_BE16(reply->key_length, 0);
121 os_memcpy(reply->replay_counter, sm->request_counter,
125 WPA_PUT_BE16(reply->key_data_length, 0);
133 reply->key_mic : NULL);
277 struct wpa_eapol_key *reply; local
997 struct wpa_eapol_key *reply; local
1276 struct wpa_eapol_key *reply; local
[all...]
/external/mdnsresponder/mDNSCore/
H A DuDNS.c255 // negative response so that applications get a reply. We also need to reinitialize the DNS servers
1055 // It's perfectly fine for this socket to close after the first reply. The server might
1057 // We'll only log this event if we've never received a reply before.
1083 tcpInfo->reply = mDNSPlatformMemAllocate(tcpInfo->replylen);
1084 if (!tcpInfo->reply) { LogMsg("ERROR: tcpCallback - malloc failed"); err = mStatus_NoMemoryErr; goto exit; }
1087 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed);
1119 DNSMessage *reply = tcpInfo->reply; local
1120 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen;
1125 tcpInfo->reply
[all...]
/external/mdnsresponder/mDNSShared/
H A Ddnsextd.c693 UDPServerTransaction(const DaemonInfo *d, const PktMsg *request, PktMsg *reply, mDNSBool *trunc) argument
720 // Wait for reply
728 // Receive reply
730 reply->len = recvfrom( sd, &reply->msg, sizeof(reply->msg), 0, NULL, NULL );
731 require_action( ( ( int ) reply->len ) >= 0, exit, err = mStatus_UnknownErr; LogErr( "UDPServerTransaction", "recvfrom" ) );
732 require_action( reply->len >= sizeof( DNSMessageHeader ), exit, err = mStatus_UnknownErr; Log( "UDPServerTransaction - Message too short (%d bytes)", reply->len ) );
736 if ( reply
756 SuccessfulUpdateTransaction(PktMsg *request, PktMsg *reply) argument
922 PktMsg *reply = NULL; local
1300 PktMsg *reply = NULL; local
1478 PktMsg *reply; local
1510 PktMsg * reply = NULL; local
1745 PktMsg buf, *reply = NULL; local
2532 PktMsg * reply = NULL; local
2627 PktMsg reply; local
2677 PktMsg * reply = NULL; local
2771 PktMsg reply; local
[all...]
/external/valgrind/main/coregrind/m_syswrap/
H A Dsyswrap-darwin.c3615 // Intercept sysctl(kern.usrstack). The kernel's reply would be
4175 Reply *reply = (Reply *)ARG1; local
4177 if (reply->RetCode) PRINT("mig return %d", reply->RetCode);
4210 Reply *reply = (Reply *)ARG1; local
4212 if (!reply->RetCode) {
4213 PRINT("page size %llu", (ULong)reply->out_page_size);
4215 PRINT("mig return %d", reply->RetCode);
4239 Reply *reply = (Reply *)ARG1; local
4241 assign_port_name(reply
4273 Reply *reply = (Reply *)ARG1; local
4468 Reply *reply = (Reply *)ARG1; local
4504 Reply *reply = (Reply *)ARG1; local
4556 Reply *reply = (Reply *)ARG1; local
4605 Reply *reply = (Reply *)ARG1; local
4654 Reply *reply = (Reply *)ARG1; local
4746 Reply *reply = (Reply *)ARG1; local
4791 Reply *reply = (Reply *)ARG1; local
5042 Reply *reply = (Reply *)ARG1; local
5107 Reply *reply = (Reply *)ARG1; local
5148 Reply *reply = (Reply *)ARG1; local
5219 Reply *reply = (Reply *)ARG1; local
5303 Reply *reply = (Reply *)ARG1; local
5363 Reply *reply = (Reply *)ARG1; local
5420 Reply *reply = (Reply *)ARG1; local
5476 Reply *reply = (Reply *)ARG1; local
5618 Reply *reply = (Reply *)ARG1; local
5673 Reply *reply = (Reply *)ARG1; local
5735 Reply *reply = (Reply *)ARG1; local
5812 Reply *reply = (Reply *)ARG1; local
5867 Reply *reply = (Reply *)ARG1; local
5910 Reply *reply = (Reply *)ARG1; local
5953 Reply *reply = (Reply *)ARG1; local
5998 Reply *reply = (Reply *)ARG1; local
6057 Reply *reply = (Reply *)ARG1; local
6113 Reply *reply = (Reply *)ARG1; local
6166 Reply *reply = (Reply *)ARG1; local
6214 Reply *reply = (Reply *)ARG1; local
6277 Reply *reply = (Reply *)ARG1; local
6329 Reply *reply = (Reply *)ARG1; local
6454 Reply *reply = (Reply *)ARG1; local
6588 Reply *reply = (Reply *)ARG1; local
6697 Reply *reply = (Reply *)ARG1; local
6740 Reply *reply = (Reply *)ARG1; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dctrl_iface.c813 struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len)
834 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
836 reply[res++] = '\n';
837 reply[res] = '\0';
846 struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len)
863 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
865 reply[res++] = '\n';
866 reply[res] = '\0';
902 char *reply, size_t max_len,
912 res = wpa_snprintf_hex_uppercase(reply, max_le
812 wpa_supplicant_ctrl_iface_wps_nfc_config_token( struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument
845 wpa_supplicant_ctrl_iface_wps_nfc_token( struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument
901 wpas_ctrl_nfc_get_handover_req_wps(struct wpa_supplicant *wpa_s, char *reply, size_t max_len, int cr) argument
923 wpas_ctrl_nfc_get_handover_req(struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument
946 wpas_ctrl_nfc_get_handover_sel_wps(struct wpa_supplicant *wpa_s, char *reply, size_t max_len, int ndef, int cr, char *uuid) argument
968 wpas_ctrl_nfc_get_handover_sel(struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument
1000 wpas_ctrl_nfc_rx_handover_req(struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument
1326 wpa_supplicant_ctrl_iface_wps_er_nfc_config_token( struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) argument
5242 char *reply; local
6197 char *reply; local
[all...]
/external/chromium/third_party/libevent/
H A Devdns.c193 struct reply { struct
245 /* Represents part of a reply being built. (That is, a single RR.) */
258 /* the components of the reply as we're constructing it. */
279 /* Constructed response. Only set once we're ready to send a reply. */
646 reply_callback(struct request *const req, u32 ttl, u32 err, struct reply *reply) { argument
649 if (reply)
651 reply->data.a.addrcount, ttl,
652 reply->data.a.addresses,
658 if (reply) {
682 reply_handle(struct request *const req, u16 flags, u32 ttl, struct reply *reply) argument
822 struct reply reply; local
[all...]

Completed in 724 milliseconds

12345678