/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface_named_pipe.c | 282 char *reply = NULL, *send_buf; local 306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf, 310 if (reply) { 311 send_buf = reply; 325 os_free(reply); 329 os_free(reply); 718 char *reply = NULL, *send_buf; local 727 reply = wpa_supplicant_global_ctrl_iface_process(global, buf, 729 if (reply) { 730 send_buf = reply; [all...] |
H A D | ctrl_iface_unix.c | 163 char *reply = NULL, *reply_buf = NULL; local 199 reply = reply_buf; 209 if (!reply && reply_len == 1) { 210 reply = "FAIL\n"; 212 } else if (!reply && reply_len == 2) { 213 reply = "OK\n"; 217 if (reply) { 218 if (sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, 828 char *reply = NULL, *reply_buf = NULL; local 855 reply [all...] |
H A D | wnm_sta.c | 788 int reply) 805 wpa_s->wnm_reply = reply; 914 } else if (reply) { 786 ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s, const u8 *pos, const u8 *end, int reply) argument
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_helpers.c | 84 DBusMessage *reply; local 88 reply = dbus_message_new_method_return(message); 89 if (reply == NULL) 92 dbus_message_iter_init_append(reply, &iter); 94 dbus_message_unref(reply); 101 dbus_message_unref(reply); 102 reply = wpas_dbus_reply_new_from_error( 106 return reply; 110 dbus_message_unref(reply); 114 return reply; 161 DBusMessage *reply; local 195 DBusMessage *reply; local 380 DBusMessage *reply; local [all...] |
H A D | dbus_old_handlers.c | 38 DBusMessage *reply; local 40 reply = dbus_message_new_error( 44 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, 47 return reply; 52 * wpas_dbus_new_success_reply - Return a new success reply message 53 * @message: Pointer to incoming dbus message this reply refers to 57 * Convenience function to create and return a success reply message 61 DBusMessage *reply; local 64 reply = dbus_message_new_method_return(message); 65 dbus_message_append_args(reply, DBUS_TYPE_UINT3 90 DBusMessage *reply = NULL; local 211 DBusMessage *reply = NULL; local 252 DBusMessage *reply = NULL; local 294 DBusMessage *reply = NULL; local 352 DBusMessage *reply; local 414 DBusMessage *reply; local 480 DBusMessage *reply = NULL; local 715 DBusMessage *reply = NULL; local 757 DBusMessage *reply = NULL; local 846 DBusMessage *reply = NULL; local 1000 DBusMessage *reply = NULL; local 1091 DBusMessage *reply = NULL; local 1201 DBusMessage *reply = NULL; local 1226 DBusMessage *reply = NULL; local 1256 DBusMessage *reply = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_ctrl.c | 452 char *reply, size_t *reply_len, 521 res = recv(ctrl->s, reply, *reply_len, 0); 524 if (res > 0 && reply[0] == '<') { 526 * wpa_supplicant, not the reply to the 534 reply[res] = '\0'; 535 msg_cb(reply, res); 580 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument 584 res = recv(ctrl->s, reply, *reply_len, 0); 689 char *reply, size_t *reply_len, 698 if (!ReadFile(ctrl->pipe, reply, *reply_le 451 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 688 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 706 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 187 char reply[10], cmd[256]; local 225 memset(reply, 0, sizeof(reply)); 226 reply_len = sizeof(reply) - 1; 229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); 230 if (reply[0] == 'F') { 237 id = atoi(reply); 405 reply_len = sizeof(reply); 406 wpagui->ctrlRequest(cmd, reply, &reply_len); 407 if (strncmp(reply, "O 430 char reply[10], cmd[256]; local 496 key_value_isset(const char *reply, size_t reply_len) argument 509 char reply[1024], cmd[256], *pos; local 792 char reply[10], cmd[256]; local 829 char reply[256]; local [all...] |
/external/google-breakpad/src/client/mac/handler/ |
H A D | exception_handler.cc | 126 mach_msg_header_t* reply); 206 mach_msg_header_t* reply) { 207 return exc_server(request, reply); 594 // code into the reply. 595 ExceptionReplyMessage reply; local 596 if (!breakpad_exc_server(&receive.header, &reply.header)) 599 // Send a reply and exit 600 mach_msg(&(reply.header), MACH_SEND_MSG, 601 reply.header.msgh_size, 0, MACH_PORT_NULL, 205 breakpad_exc_server(mach_msg_header_t* request, mach_msg_header_t* reply) argument
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_cfg.c | 498 struct isakmp_pl_attr *reply; local 503 if ((payload = vmalloc(sizeof(*reply))) == NULL) { 507 memset(payload->v, 0, sizeof(*reply)); 622 reply = (struct isakmp_pl_attr *)payload->v; 623 reply->h.len = htons(payload->l); 624 reply->type = ISAKMP_CFG_REPLY; 625 reply->id = attrpl->id; 666 struct isakmp_pl_attr *reply; local 671 if ((payload = vmalloc(sizeof(*reply))) == NULL) { 675 memset(payload->v, 0, sizeof(*reply)); [all...] |
H A D | isakmp_xauth.c | 198 "Xauth reply but peer did not declare " 205 "Xauth reply while Xauth state is %d\n", xst->status); 367 "Delayed Xauth reply: phase 1 no longer exists.\n"); 587 struct pam_response *reply = NULL; local 589 if ((reply = racoon_malloc(sizeof(*reply) * msg_count)) == NULL) 591 bzero(reply, sizeof(*reply) * msg_count); 597 reply[i].resp_retcode = PAM_SUCCESS; 598 if ((reply[ [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/ |
H A D | SpdyConnection.java | 389 final boolean reply, final int payload1, final int payload2, final Ping ping) { 394 writePing(reply, payload1, payload2, ping); 401 private void writePing(boolean reply, int payload1, int payload2, Ping ping) throws IOException { argument 405 frameWriter.ping(reply, payload1, payload2); 727 @Override public void ping(boolean reply, int payload1, int payload2) { argument 728 if (reply) { 734 // Send a reply to a client ping if this is a server and vice versa. 388 writePingLater( final boolean reply, final int payload1, final int payload2, final Ping ping) argument
|
/external/openssh/ |
H A D | auth-pam.c | 346 struct pam_response *reply; local 360 if ((reply = calloc(n, sizeof(*reply))) == NULL) 376 reply[i].resp = buffer_get_string(&buffer, NULL); 388 reply[i].resp = buffer_get_string(&buffer, NULL); 410 *resp = reply; 415 free(reply[i].resp); 417 free(reply); 559 struct pam_response *reply; local 569 if ((reply 966 struct pam_response *reply; local 1123 struct pam_response *reply; local [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_privsep.c | 45 void *reply, size_t *reply_len) 67 if (reply) { 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); 92 "for reply (cmd=%d)", cmd); 284 u8 reply[sizeof(int) + SSID_MAX_LEN]; local 285 size_t len = sizeof(reply); 287 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len); 290 os_memcpy(&ssid_len, reply, sizeof(int)); 293 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply"); 296 os_memcpy(ssid, &reply[sizeo 43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 130 struct wpa_eapol_key *reply; local 142 NULL, sizeof(*reply) + kde_len, &rlen, 143 (void *) &reply); 146 reply192 = (struct wpa_eapol_key_192 *) reply; 148 reply->type = EAPOL_KEY_TYPE_RSN; 151 WPA_PUT_BE16(reply->key_info, key_info); 152 WPA_PUT_BE16(reply->key_length, 0); 153 os_memcpy(reply->replay_counter, key->replay_counter, 156 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 158 WPA_PUT_BE16(reply [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp_web.c | 414 struct wpabuf **reply, const char **replyname) 449 *reply = wps_get_msg(peer->wps, &op_code); 450 if (*reply == NULL) { 455 *reply = NULL; 456 if (*reply == NULL) { 467 struct wpabuf **reply, const char **replyname) 492 *reply = NULL; 494 *reply = wps_get_msg(iface->peer.wps, &op_code); 496 if (*reply == NULL) 505 struct wpabuf **reply, cons 413 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument 466 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 504 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 629 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument 685 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument 858 struct wpabuf *reply = NULL; /* data for the reply */ local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_privsep.c | 45 void *reply, size_t *reply_len) 67 if (reply) { 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); 92 "for reply (cmd=%d)", cmd); 284 u8 reply[sizeof(int) + SSID_MAX_LEN]; local 285 size_t len = sizeof(reply); 287 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len); 290 os_memcpy(&ssid_len, reply, sizeof(int)); 293 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply"); 296 os_memcpy(ssid, &reply[sizeo 43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 130 struct wpa_eapol_key *reply; local 142 NULL, sizeof(*reply) + kde_len, &rlen, 143 (void *) &reply); 146 reply192 = (struct wpa_eapol_key_192 *) reply; 148 reply->type = EAPOL_KEY_TYPE_RSN; 151 WPA_PUT_BE16(reply->key_info, key_info); 152 WPA_PUT_BE16(reply->key_length, 0); 153 os_memcpy(reply->replay_counter, key->replay_counter, 156 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 158 WPA_PUT_BE16(reply [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp_web.c | 414 struct wpabuf **reply, const char **replyname) 449 *reply = wps_get_msg(peer->wps, &op_code); 450 if (*reply == NULL) { 455 *reply = NULL; 456 if (*reply == NULL) { 467 struct wpabuf **reply, const char **replyname) 492 *reply = NULL; 494 *reply = wps_get_msg(iface->peer.wps, &op_code); 496 if (*reply == NULL) 505 struct wpabuf **reply, cons 413 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument 466 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 504 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 629 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument 685 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument 858 struct wpabuf *reply = NULL; /* data for the reply */ local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_privsep.c | 45 void *reply, size_t *reply_len) 67 if (reply) { 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); 92 "for reply (cmd=%d)", cmd); 284 u8 reply[sizeof(int) + SSID_MAX_LEN]; local 285 size_t len = sizeof(reply); 287 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len); 290 os_memcpy(&ssid_len, reply, sizeof(int)); 293 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply"); 296 os_memcpy(ssid, &reply[sizeo 43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 130 struct wpa_eapol_key *reply; local 142 NULL, sizeof(*reply) + kde_len, &rlen, 143 (void *) &reply); 146 reply192 = (struct wpa_eapol_key_192 *) reply; 148 reply->type = EAPOL_KEY_TYPE_RSN; 151 WPA_PUT_BE16(reply->key_info, key_info); 152 WPA_PUT_BE16(reply->key_length, 0); 153 os_memcpy(reply->replay_counter, key->replay_counter, 156 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 158 WPA_PUT_BE16(reply [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp_web.c | 414 struct wpabuf **reply, const char **replyname) 449 *reply = wps_get_msg(peer->wps, &op_code); 450 if (*reply == NULL) { 455 *reply = NULL; 456 if (*reply == NULL) { 467 struct wpabuf **reply, const char **replyname) 492 *reply = NULL; 494 *reply = wps_get_msg(iface->peer.wps, &op_code); 496 if (*reply == NULL) 505 struct wpabuf **reply, cons 413 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument 466 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 504 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 629 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument 685 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument 858 struct wpabuf *reply = NULL; /* data for the reply */ local [all...] |
/external/kernel-headers/original/uapi/drm/ |
H A D | via_drm.h | 247 struct drm_wait_vblank_reply reply; member in union:drm_via_irqwait
|
/external/libdrm/include/drm/ |
H A D | via_drm.h | 245 struct drm_wait_vblank_reply reply; member in union:drm_via_irqwait
|
/external/libnl/lib/netfilter/ |
H A D | ct_obj.c | 119 static void dump_icmp(struct nl_dump_params *p, struct nfnl_ct *ct, int reply) argument 121 if (nfnl_ct_test_icmp_type(ct, reply)) 122 nl_dump(p, "icmp type %d ", nfnl_ct_get_icmp_type(ct, reply)); 124 if (nfnl_ct_test_icmp_type(ct, reply)) 125 nl_dump(p, "code %d ", nfnl_ct_get_icmp_code(ct, reply)); 127 if (nfnl_ct_test_icmp_type(ct, reply)) 128 nl_dump(p, "id %d ", nfnl_ct_get_icmp_id(ct, reply));
|
/external/libvterm/src/ |
H A D | state.c | 832 int reply; local 836 reply = state->mode.cursor; 840 reply = state->mode.screen; 844 reply = state->mode.origin; 848 reply = state->mode.autowrap; 852 reply = state->mode.cursor_blink; 856 reply = state->mode.cursor_visible; 860 reply = state->mode.leftrightmargin; 864 reply = state->mouse_flags == MOUSE_WANT_CLICK; 868 reply 1483 int reply; local [all...] |