Searched defs:reply (Results 101 - 125 of 193) sorted by relevance

12345678

/external/lldb/tools/driver/
H A DIOChannel.cpp154 char reply; local
175 reply = 'n';
176 got_char = el_getc(m_edit_line, &reply);
177 if (got_char == -1 || reply == 'n')
179 if (reply == 'a')
/external/mesa3d/src/gallium/auxiliary/vl/
H A Dvl_winsys_dri.c179 xcb_dri2_get_buffers_reply_t *reply; local
187 reply = vl_dri2_get_flush_reply(scrn);
188 if (!reply) {
191 reply = xcb_dri2_get_buffers_reply(scrn->conn, cookie, NULL);
193 if (!reply)
196 buffers = xcb_dri2_get_buffers_buffers(reply);
198 free(reply);
202 for (i = 0; i < reply->count; ++i) {
209 if (i == reply->count) {
210 free(reply);
261 xcb_dri2_get_msc_reply_t *reply; local
[all...]
/external/mesa3d/src/gallium/state_trackers/egl/x11/
H A Dglxinit.c140 xGLXSingleReply reply; local
163 _XReply(dpy, (xReply *) & reply, 0, False);
165 length = reply.length * 4;
166 numbytes = reply.size;
241 xGLXQueryVersionReply reply; local
250 _XReply(dpy, (xReply *) & reply, 0, False);
254 if (reply.majorVersion != GLX_MAJOR_VERSION) {
261 *major = reply.majorVersion;
262 *minor = min(reply.minorVersion, GLX_MINOR_VERSION);
310 ** of the reply
520 xGLXGetFBConfigsReply reply; local
[all...]
/external/mesa3d/src/glx/
H A Dglx_pbuffer.c267 * capture the reply rather than always calling Xmalloc.
274 xGLXGetDrawableAttributesReply reply; local
318 _XReply(dpy, (xReply *) & reply, 0, False);
320 if (reply.type == X_Error) {
326 length = reply.length;
328 num_attributes = (use_glx_1_3) ? reply.numAttribs : length / 2;
H A Dglxext.c290 xcb_glx_query_version_reply_t *reply = xcb_glx_query_version_reply(c, local
297 if (!reply)
300 if (reply->major_version != GLX_MAJOR_VERSION) {
301 free(reply);
304 *major = reply->major_version;
305 *minor = min(reply->minor_version, GLX_MINOR_VERSION);
306 free(reply);
310 xGLXQueryVersionReply reply;
319 _XReply(dpy, (xReply *) & reply, 0, False);
323 if (reply
654 xGLXGetVisualConfigsReply reply; local
684 xGLXGetFBConfigsReply reply; local
[all...]
H A Dsingle2.c131 xGLXGetErrorReply reply; local
143 retval = reply.error;
323 xGLXSingleReply reply; local
374 xGLXSingleReply reply; local
425 xGLXSingleReply reply; local
476 xGLXSingleReply reply; local
579 xGLXRenderModeReply reply; local
590 if (reply.newMode != mode) {
618 xGLXSingleReply reply; local
799 xGLXSingleReply reply; local
893 xcb_glx_are_textures_resident_reply_t *reply = local
[all...]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/
H A DSpdy3.java447 @Override public synchronized void ping(boolean reply, int payload1, int payload2) argument
451 if (reply != payloadIsReply) throw new IllegalArgumentException("payload != reply");
/external/qemu/distrib/sdl-1.2.15/src/video/fbcon/
H A DSDL_fbelo.c232 int eloWaitReply(unsigned char type, unsigned char *reply, int fd) { argument
245 ok = eloGetPacket(reply, &reply_p, &sum, fd);
247 if (ok && reply[1] != type && type != ELO_PARAMETER) {
249 fprintf(stderr, "Wrong reply received\n");
298 int eloSendQuery(unsigned char *request, unsigned char* reply, int fd) { argument
302 ok = eloWaitReply(toupper(request[1]), reply, fd);
329 unsigned char reply[ELO_PACKET_SIZE]; local
376 if (!eloSendQuery(req, reply, fd)) {
384 if (eloSendQuery(req, reply, fd)) {
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_ctrl.c453 char *reply, size_t *reply_len,
522 res = recv(ctrl->s, reply, *reply_len, 0);
525 if (res > 0 && reply[0] == '<') {
527 * wpa_supplicant, not the reply to the
535 reply[res] = '\0';
536 msg_cb(reply, res);
581 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
585 res = recv(ctrl->s, reply, *reply_len, 0);
690 char *reply, size_t *reply_len,
699 if (!ReadFile(ctrl->pipe, reply, *reply_le
452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
707 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c128 struct wpa_eapol_key *reply; local
139 NULL, sizeof(*reply) + kde_len, &rlen,
140 (void *) &reply);
144 reply->type = EAPOL_KEY_TYPE_RSN;
147 WPA_PUT_BE16(reply->key_info, key_info);
148 WPA_PUT_BE16(reply->key_length, 0);
149 os_memcpy(reply->replay_counter, key->replay_counter,
152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len);
155 pos = (u8 *) (reply
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_ctrl.c453 char *reply, size_t *reply_len,
522 res = recv(ctrl->s, reply, *reply_len, 0);
525 if (res > 0 && reply[0] == '<') {
527 * wpa_supplicant, not the reply to the
535 reply[res] = '\0';
536 msg_cb(reply, res);
581 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
585 res = recv(ctrl->s, reply, *reply_len, 0);
690 char *reply, size_t *reply_len,
699 if (!ReadFile(ctrl->pipe, reply, *reply_le
452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
707 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c128 struct wpa_eapol_key *reply; local
139 NULL, sizeof(*reply) + kde_len, &rlen,
140 (void *) &reply);
144 reply->type = EAPOL_KEY_TYPE_RSN;
147 WPA_PUT_BE16(reply->key_info, key_info);
148 WPA_PUT_BE16(reply->key_length, 0);
149 os_memcpy(reply->replay_counter, key->replay_counter,
152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len);
155 pos = (u8 *) (reply
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dctrl_iface_named_pipe.c282 char *reply = NULL, *send_buf; local
306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf,
310 if (reply) {
311 send_buf = reply;
325 os_free(reply);
329 os_free(reply);
717 char *reply = NULL, *send_buf; local
726 reply = wpa_supplicant_global_ctrl_iface_process(global, buf,
728 if (reply) {
729 send_buf = reply;
[all...]
H A Dctrl_iface_unix.c160 char *reply = NULL, *reply_buf = NULL; local
196 reply = reply_buf;
199 if (!reply && reply_len == 1) {
200 reply = "FAIL\n";
202 } else if (!reply && reply_len == 2) {
203 reply = "OK\n";
207 if (reply) {
208 if (sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from,
805 char *reply = NULL, *reply_buf = NULL; local
832 reply
[all...]
H A Dwnm_sta.c621 int reply)
630 wpa_s->wnm_reply = reply;
718 } else if (reply) {
619 ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s, const u8 *pos, const u8 *end, int reply) argument
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_helpers.c78 DBusMessage *reply; local
82 reply = dbus_message_new_method_return(message);
83 if (reply == NULL) {
84 wpa_printf(MSG_ERROR, "%s: out of memory creating dbus reply",
89 dbus_message_iter_init_append(reply, &iter);
91 wpa_printf(MSG_ERROR, "%s: out of memory creating reply",
93 dbus_message_unref(reply);
94 reply = dbus_message_new_error(message, DBUS_ERROR_NO_MEMORY,
96 return reply;
103 dbus_message_unref(reply);
164 DBusMessage *reply; local
198 DBusMessage *reply; local
382 DBusMessage *reply; local
[all...]
H A Ddbus_old_handlers.c38 DBusMessage *reply; local
40 reply = dbus_message_new_error(message, WPAS_ERROR_INVALID_OPTS,
44 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg,
47 return reply;
52 * wpas_dbus_new_success_reply - Return a new success reply message
53 * @message: Pointer to incoming dbus message this reply refers to
57 * Convenience function to create and return a success reply message
61 DBusMessage *reply; local
64 reply = dbus_message_new_method_return(message);
65 dbus_message_append_args(reply, DBUS_TYPE_UINT3
90 DBusMessage *reply = NULL; local
211 DBusMessage *reply = NULL; local
253 DBusMessage *reply = NULL; local
295 DBusMessage *reply = NULL; local
353 DBusMessage *reply; local
410 DBusMessage *reply; local
504 DBusMessage *reply = NULL; local
792 DBusMessage *reply = NULL; local
834 DBusMessage *reply = NULL; local
922 DBusMessage *reply = NULL; local
1076 DBusMessage *reply = NULL; local
1166 DBusMessage *reply = NULL; local
1274 DBusMessage *reply = NULL; local
1299 DBusMessage *reply = NULL; local
1329 DBusMessage *reply = NULL; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_ctrl.c453 char *reply, size_t *reply_len,
522 res = recv(ctrl->s, reply, *reply_len, 0);
525 if (res > 0 && reply[0] == '<') {
527 * wpa_supplicant, not the reply to the
535 reply[res] = '\0';
536 msg_cb(reply, res);
581 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
585 res = recv(ctrl->s, reply, *reply_len, 0);
690 char *reply, size_t *reply_len,
699 if (!ReadFile(ctrl->pipe, reply, *reply_le
452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
707 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c128 struct wpa_eapol_key *reply; local
139 NULL, sizeof(*reply) + kde_len, &rlen,
140 (void *) &reply);
144 reply->type = EAPOL_KEY_TYPE_RSN;
147 WPA_PUT_BE16(reply->key_info, key_info);
148 WPA_PUT_BE16(reply->key_length, 0);
149 os_memcpy(reply->replay_counter, key->replay_counter,
152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len);
155 pos = (u8 *) (reply
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp186 char reply[10], cmd[256]; local
224 memset(reply, 0, sizeof(reply));
225 reply_len = sizeof(reply) - 1;
228 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len);
229 if (reply[0] == 'F') {
236 id = atoi(reply);
404 reply_len = sizeof(reply);
405 wpagui->ctrlRequest(cmd, reply, &reply_len);
406 if (strncmp(reply, "O
429 char reply[10], cmd[256]; local
495 key_value_isset(const char *reply, size_t reply_len) argument
508 char reply[1024], cmd[256], *pos; local
791 char reply[10], cmd[256]; local
828 char reply[256]; local
[all...]
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dconsumer_management_service.cc317 const cryptohome::BaseReply& reply) {
318 if (!dbus_success || reply.error() != 0) {
325 reply.GetExtension(cryptohome::GetBootAttributeReply::reply).value());
332 const cryptohome::BaseReply& reply) {
333 if (!dbus_success || reply.error() != 0) {
351 const cryptohome::BaseReply& reply) {
352 if (!dbus_success || reply.error() != 0) {
313 OnGetBootAttributeDone( const GetOwnerCallback& callback, chromeos::DBusMethodCallStatus call_status, bool dbus_success, const cryptohome::BaseReply& reply) argument
328 OnSetBootAttributeDone( const SetOwnerCallback& callback, chromeos::DBusMethodCallStatus call_status, bool dbus_success, const cryptohome::BaseReply& reply) argument
347 OnFlushAndSignBootAttributesDone( const SetOwnerCallback& callback, chromeos::DBusMethodCallStatus call_status, bool dbus_success, const cryptohome::BaseReply& reply) argument
/external/chromium_org/components/nacl/browser/
H A Dnacl_browser.cc390 void NaClBrowser::WaitForResources(const base::Closure& reply) { argument
391 waiting_.push_back(reply);
/external/chromium_org/extensions/browser/api/cast_channel/
H A Dcast_socket_unittest.cc340 // Simulated result of verifying challenge reply.
385 // Create a test auth reply.
386 MessageInfo reply; local
388 auth_namespace, "sender-0", "receiver-0", "abcd", &reply);
390 ASSERT_TRUE(MessageInfoToCastMessage(reply, &reply_msg));
773 // Test connection error - challenge reply receive fails
796 // Test connection error - challenge reply verification fails
/external/ipsec-tools/src/racoon/
H A Disakmp_cfg.c498 struct isakmp_pl_attr *reply; local
503 if ((payload = vmalloc(sizeof(*reply))) == NULL) {
507 memset(payload->v, 0, sizeof(*reply));
622 reply = (struct isakmp_pl_attr *)payload->v;
623 reply->h.len = htons(payload->l);
624 reply->type = ISAKMP_CFG_REPLY;
625 reply->id = attrpl->id;
666 struct isakmp_pl_attr *reply; local
671 if ((payload = vmalloc(sizeof(*reply))) == NULL) {
675 memset(payload->v, 0, sizeof(*reply));
[all...]
H A Disakmp_xauth.c198 "Xauth reply but peer did not declare "
205 "Xauth reply while Xauth state is %d\n", xst->status);
367 "Delayed Xauth reply: phase 1 no longer exists.\n");
584 struct pam_response *reply = NULL; local
586 if ((reply = racoon_malloc(sizeof(*reply) * msg_count)) == NULL)
588 bzero(reply, sizeof(*reply) * msg_count);
594 reply[i].resp_retcode = PAM_SUCCESS;
595 if ((reply[
[all...]

Completed in 501 milliseconds

12345678