/external/lldb/tools/driver/ |
H A D | IOChannel.cpp | 154 char reply; local 175 reply = 'n'; 176 got_char = el_getc(m_edit_line, &reply); 177 if (got_char == -1 || reply == 'n') 179 if (reply == 'a')
|
/external/mesa3d/src/gallium/auxiliary/vl/ |
H A D | vl_winsys_dri.c | 179 xcb_dri2_get_buffers_reply_t *reply; local 187 reply = vl_dri2_get_flush_reply(scrn); 188 if (!reply) { 191 reply = xcb_dri2_get_buffers_reply(scrn->conn, cookie, NULL); 193 if (!reply) 196 buffers = xcb_dri2_get_buffers_buffers(reply); 198 free(reply); 202 for (i = 0; i < reply->count; ++i) { 209 if (i == reply->count) { 210 free(reply); 261 xcb_dri2_get_msc_reply_t *reply; local [all...] |
/external/mesa3d/src/gallium/state_trackers/egl/x11/ |
H A D | glxinit.c | 140 xGLXSingleReply reply; local 163 _XReply(dpy, (xReply *) & reply, 0, False); 165 length = reply.length * 4; 166 numbytes = reply.size; 241 xGLXQueryVersionReply reply; local 250 _XReply(dpy, (xReply *) & reply, 0, False); 254 if (reply.majorVersion != GLX_MAJOR_VERSION) { 261 *major = reply.majorVersion; 262 *minor = min(reply.minorVersion, GLX_MINOR_VERSION); 310 ** of the reply 520 xGLXGetFBConfigsReply reply; local [all...] |
/external/mesa3d/src/glx/ |
H A D | glx_pbuffer.c | 267 * capture the reply rather than always calling Xmalloc. 274 xGLXGetDrawableAttributesReply reply; local 318 _XReply(dpy, (xReply *) & reply, 0, False); 320 if (reply.type == X_Error) { 326 length = reply.length; 328 num_attributes = (use_glx_1_3) ? reply.numAttribs : length / 2;
|
H A D | glxext.c | 290 xcb_glx_query_version_reply_t *reply = xcb_glx_query_version_reply(c, local 297 if (!reply) 300 if (reply->major_version != GLX_MAJOR_VERSION) { 301 free(reply); 304 *major = reply->major_version; 305 *minor = min(reply->minor_version, GLX_MINOR_VERSION); 306 free(reply); 310 xGLXQueryVersionReply reply; 319 _XReply(dpy, (xReply *) & reply, 0, False); 323 if (reply 654 xGLXGetVisualConfigsReply reply; local 684 xGLXGetFBConfigsReply reply; local [all...] |
H A D | single2.c | 131 xGLXGetErrorReply reply; local 143 retval = reply.error; 323 xGLXSingleReply reply; local 374 xGLXSingleReply reply; local 425 xGLXSingleReply reply; local 476 xGLXSingleReply reply; local 579 xGLXRenderModeReply reply; local 590 if (reply.newMode != mode) { 618 xGLXSingleReply reply; local 799 xGLXSingleReply reply; local 893 xcb_glx_are_textures_resident_reply_t *reply = local [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/ |
H A D | Spdy3.java | 447 @Override public synchronized void ping(boolean reply, int payload1, int payload2) argument 451 if (reply != payloadIsReply) throw new IllegalArgumentException("payload != reply");
|
/external/qemu/distrib/sdl-1.2.15/src/video/fbcon/ |
H A D | SDL_fbelo.c | 232 int eloWaitReply(unsigned char type, unsigned char *reply, int fd) { argument 245 ok = eloGetPacket(reply, &reply_p, &sum, fd); 247 if (ok && reply[1] != type && type != ELO_PARAMETER) { 249 fprintf(stderr, "Wrong reply received\n"); 298 int eloSendQuery(unsigned char *request, unsigned char* reply, int fd) { argument 302 ok = eloWaitReply(toupper(request[1]), reply, fd); 329 unsigned char reply[ELO_PACKET_SIZE]; local 376 if (!eloSendQuery(req, reply, fd)) { 384 if (eloSendQuery(req, reply, fd)) {
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_ctrl.c | 453 char *reply, size_t *reply_len, 522 res = recv(ctrl->s, reply, *reply_len, 0); 525 if (res > 0 && reply[0] == '<') { 527 * wpa_supplicant, not the reply to the 535 reply[res] = '\0'; 536 msg_cb(reply, res); 581 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument 585 res = recv(ctrl->s, reply, *reply_len, 0); 690 char *reply, size_t *reply_len, 699 if (!ReadFile(ctrl->pipe, reply, *reply_le 452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 707 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 128 struct wpa_eapol_key *reply; local 139 NULL, sizeof(*reply) + kde_len, &rlen, 140 (void *) &reply); 144 reply->type = EAPOL_KEY_TYPE_RSN; 147 WPA_PUT_BE16(reply->key_info, key_info); 148 WPA_PUT_BE16(reply->key_length, 0); 149 os_memcpy(reply->replay_counter, key->replay_counter, 152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 155 pos = (u8 *) (reply [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_ctrl.c | 453 char *reply, size_t *reply_len, 522 res = recv(ctrl->s, reply, *reply_len, 0); 525 if (res > 0 && reply[0] == '<') { 527 * wpa_supplicant, not the reply to the 535 reply[res] = '\0'; 536 msg_cb(reply, res); 581 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument 585 res = recv(ctrl->s, reply, *reply_len, 0); 690 char *reply, size_t *reply_len, 699 if (!ReadFile(ctrl->pipe, reply, *reply_le 452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 707 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 128 struct wpa_eapol_key *reply; local 139 NULL, sizeof(*reply) + kde_len, &rlen, 140 (void *) &reply); 144 reply->type = EAPOL_KEY_TYPE_RSN; 147 WPA_PUT_BE16(reply->key_info, key_info); 148 WPA_PUT_BE16(reply->key_length, 0); 149 os_memcpy(reply->replay_counter, key->replay_counter, 152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 155 pos = (u8 *) (reply [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface_named_pipe.c | 282 char *reply = NULL, *send_buf; local 306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf, 310 if (reply) { 311 send_buf = reply; 325 os_free(reply); 329 os_free(reply); 717 char *reply = NULL, *send_buf; local 726 reply = wpa_supplicant_global_ctrl_iface_process(global, buf, 728 if (reply) { 729 send_buf = reply; [all...] |
H A D | ctrl_iface_unix.c | 160 char *reply = NULL, *reply_buf = NULL; local 196 reply = reply_buf; 199 if (!reply && reply_len == 1) { 200 reply = "FAIL\n"; 202 } else if (!reply && reply_len == 2) { 203 reply = "OK\n"; 207 if (reply) { 208 if (sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, 805 char *reply = NULL, *reply_buf = NULL; local 832 reply [all...] |
H A D | wnm_sta.c | 621 int reply) 630 wpa_s->wnm_reply = reply; 718 } else if (reply) { 619 ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s, const u8 *pos, const u8 *end, int reply) argument
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_helpers.c | 78 DBusMessage *reply; local 82 reply = dbus_message_new_method_return(message); 83 if (reply == NULL) { 84 wpa_printf(MSG_ERROR, "%s: out of memory creating dbus reply", 89 dbus_message_iter_init_append(reply, &iter); 91 wpa_printf(MSG_ERROR, "%s: out of memory creating reply", 93 dbus_message_unref(reply); 94 reply = dbus_message_new_error(message, DBUS_ERROR_NO_MEMORY, 96 return reply; 103 dbus_message_unref(reply); 164 DBusMessage *reply; local 198 DBusMessage *reply; local 382 DBusMessage *reply; local [all...] |
H A D | dbus_old_handlers.c | 38 DBusMessage *reply; local 40 reply = dbus_message_new_error(message, WPAS_ERROR_INVALID_OPTS, 44 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, 47 return reply; 52 * wpas_dbus_new_success_reply - Return a new success reply message 53 * @message: Pointer to incoming dbus message this reply refers to 57 * Convenience function to create and return a success reply message 61 DBusMessage *reply; local 64 reply = dbus_message_new_method_return(message); 65 dbus_message_append_args(reply, DBUS_TYPE_UINT3 90 DBusMessage *reply = NULL; local 211 DBusMessage *reply = NULL; local 253 DBusMessage *reply = NULL; local 295 DBusMessage *reply = NULL; local 353 DBusMessage *reply; local 410 DBusMessage *reply; local 504 DBusMessage *reply = NULL; local 792 DBusMessage *reply = NULL; local 834 DBusMessage *reply = NULL; local 922 DBusMessage *reply = NULL; local 1076 DBusMessage *reply = NULL; local 1166 DBusMessage *reply = NULL; local 1274 DBusMessage *reply = NULL; local 1299 DBusMessage *reply = NULL; local 1329 DBusMessage *reply = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_ctrl.c | 453 char *reply, size_t *reply_len, 522 res = recv(ctrl->s, reply, *reply_len, 0); 525 if (res > 0 && reply[0] == '<') { 527 * wpa_supplicant, not the reply to the 535 reply[res] = '\0'; 536 msg_cb(reply, res); 581 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument 585 res = recv(ctrl->s, reply, *reply_len, 0); 690 char *reply, size_t *reply_len, 699 if (!ReadFile(ctrl->pipe, reply, *reply_le 452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 707 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 128 struct wpa_eapol_key *reply; local 139 NULL, sizeof(*reply) + kde_len, &rlen, 140 (void *) &reply); 144 reply->type = EAPOL_KEY_TYPE_RSN; 147 WPA_PUT_BE16(reply->key_info, key_info); 148 WPA_PUT_BE16(reply->key_length, 0); 149 os_memcpy(reply->replay_counter, key->replay_counter, 152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 155 pos = (u8 *) (reply [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 186 char reply[10], cmd[256]; local 224 memset(reply, 0, sizeof(reply)); 225 reply_len = sizeof(reply) - 1; 228 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); 229 if (reply[0] == 'F') { 236 id = atoi(reply); 404 reply_len = sizeof(reply); 405 wpagui->ctrlRequest(cmd, reply, &reply_len); 406 if (strncmp(reply, "O 429 char reply[10], cmd[256]; local 495 key_value_isset(const char *reply, size_t reply_len) argument 508 char reply[1024], cmd[256], *pos; local 791 char reply[10], cmd[256]; local 828 char reply[256]; local [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | consumer_management_service.cc | 317 const cryptohome::BaseReply& reply) { 318 if (!dbus_success || reply.error() != 0) { 325 reply.GetExtension(cryptohome::GetBootAttributeReply::reply).value()); 332 const cryptohome::BaseReply& reply) { 333 if (!dbus_success || reply.error() != 0) { 351 const cryptohome::BaseReply& reply) { 352 if (!dbus_success || reply.error() != 0) { 313 OnGetBootAttributeDone( const GetOwnerCallback& callback, chromeos::DBusMethodCallStatus call_status, bool dbus_success, const cryptohome::BaseReply& reply) argument 328 OnSetBootAttributeDone( const SetOwnerCallback& callback, chromeos::DBusMethodCallStatus call_status, bool dbus_success, const cryptohome::BaseReply& reply) argument 347 OnFlushAndSignBootAttributesDone( const SetOwnerCallback& callback, chromeos::DBusMethodCallStatus call_status, bool dbus_success, const cryptohome::BaseReply& reply) argument
|
/external/chromium_org/components/nacl/browser/ |
H A D | nacl_browser.cc | 390 void NaClBrowser::WaitForResources(const base::Closure& reply) { argument 391 waiting_.push_back(reply);
|
/external/chromium_org/extensions/browser/api/cast_channel/ |
H A D | cast_socket_unittest.cc | 340 // Simulated result of verifying challenge reply. 385 // Create a test auth reply. 386 MessageInfo reply; local 388 auth_namespace, "sender-0", "receiver-0", "abcd", &reply); 390 ASSERT_TRUE(MessageInfoToCastMessage(reply, &reply_msg)); 773 // Test connection error - challenge reply receive fails 796 // Test connection error - challenge reply verification fails
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_cfg.c | 498 struct isakmp_pl_attr *reply; local 503 if ((payload = vmalloc(sizeof(*reply))) == NULL) { 507 memset(payload->v, 0, sizeof(*reply)); 622 reply = (struct isakmp_pl_attr *)payload->v; 623 reply->h.len = htons(payload->l); 624 reply->type = ISAKMP_CFG_REPLY; 625 reply->id = attrpl->id; 666 struct isakmp_pl_attr *reply; local 671 if ((payload = vmalloc(sizeof(*reply))) == NULL) { 675 memset(payload->v, 0, sizeof(*reply)); [all...] |
H A D | isakmp_xauth.c | 198 "Xauth reply but peer did not declare " 205 "Xauth reply while Xauth state is %d\n", xst->status); 367 "Delayed Xauth reply: phase 1 no longer exists.\n"); 584 struct pam_response *reply = NULL; local 586 if ((reply = racoon_malloc(sizeof(*reply) * msg_count)) == NULL) 588 bzero(reply, sizeof(*reply) * msg_count); 594 reply[i].resp_retcode = PAM_SUCCESS; 595 if ((reply[ [all...] |