Searched defs:reply (Results 51 - 75 of 124) sorted by relevance

12345

/external/wpa_supplicant_8/wpa_supplicant/
H A Dctrl_iface_named_pipe.c282 char *reply = NULL, *send_buf; local
306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf,
310 if (reply) {
311 send_buf = reply;
325 os_free(reply);
329 os_free(reply);
718 char *reply = NULL, *send_buf; local
727 reply = wpa_supplicant_global_ctrl_iface_process(global, buf,
729 if (reply) {
730 send_buf = reply;
[all...]
H A Dctrl_iface_unix.c163 char *reply = NULL, *reply_buf = NULL; local
199 reply = reply_buf;
209 if (!reply && reply_len == 1) {
210 reply = "FAIL\n";
212 } else if (!reply && reply_len == 2) {
213 reply = "OK\n";
217 if (reply) {
218 if (sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from,
828 char *reply = NULL, *reply_buf = NULL; local
855 reply
[all...]
H A Dwnm_sta.c788 int reply)
805 wpa_s->wnm_reply = reply;
914 } else if (reply) {
786 ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s, const u8 *pos, const u8 *end, int reply) argument
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_helpers.c84 DBusMessage *reply; local
88 reply = dbus_message_new_method_return(message);
89 if (reply == NULL)
92 dbus_message_iter_init_append(reply, &iter);
94 dbus_message_unref(reply);
101 dbus_message_unref(reply);
102 reply = wpas_dbus_reply_new_from_error(
106 return reply;
110 dbus_message_unref(reply);
114 return reply;
161 DBusMessage *reply; local
195 DBusMessage *reply; local
380 DBusMessage *reply; local
[all...]
H A Ddbus_old_handlers.c38 DBusMessage *reply; local
40 reply = dbus_message_new_error(
44 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg,
47 return reply;
52 * wpas_dbus_new_success_reply - Return a new success reply message
53 * @message: Pointer to incoming dbus message this reply refers to
57 * Convenience function to create and return a success reply message
61 DBusMessage *reply; local
64 reply = dbus_message_new_method_return(message);
65 dbus_message_append_args(reply, DBUS_TYPE_UINT3
90 DBusMessage *reply = NULL; local
211 DBusMessage *reply = NULL; local
252 DBusMessage *reply = NULL; local
294 DBusMessage *reply = NULL; local
352 DBusMessage *reply; local
414 DBusMessage *reply; local
480 DBusMessage *reply = NULL; local
715 DBusMessage *reply = NULL; local
757 DBusMessage *reply = NULL; local
846 DBusMessage *reply = NULL; local
1000 DBusMessage *reply = NULL; local
1091 DBusMessage *reply = NULL; local
1201 DBusMessage *reply = NULL; local
1226 DBusMessage *reply = NULL; local
1256 DBusMessage *reply = NULL; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_ctrl.c452 char *reply, size_t *reply_len,
521 res = recv(ctrl->s, reply, *reply_len, 0);
524 if (res > 0 && reply[0] == '<') {
526 * wpa_supplicant, not the reply to the
534 reply[res] = '\0';
535 msg_cb(reply, res);
580 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
584 res = recv(ctrl->s, reply, *reply_len, 0);
689 char *reply, size_t *reply_len,
698 if (!ReadFile(ctrl->pipe, reply, *reply_le
451 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
688 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
706 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp187 char reply[10], cmd[256]; local
225 memset(reply, 0, sizeof(reply));
226 reply_len = sizeof(reply) - 1;
229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len);
230 if (reply[0] == 'F') {
237 id = atoi(reply);
405 reply_len = sizeof(reply);
406 wpagui->ctrlRequest(cmd, reply, &reply_len);
407 if (strncmp(reply, "O
430 char reply[10], cmd[256]; local
496 key_value_isset(const char *reply, size_t reply_len) argument
509 char reply[1024], cmd[256], *pos; local
792 char reply[10], cmd[256]; local
829 char reply[256]; local
[all...]
/external/google-breakpad/src/client/mac/handler/
H A Dexception_handler.cc126 mach_msg_header_t* reply);
206 mach_msg_header_t* reply) {
207 return exc_server(request, reply);
594 // code into the reply.
595 ExceptionReplyMessage reply; local
596 if (!breakpad_exc_server(&receive.header, &reply.header))
599 // Send a reply and exit
600 mach_msg(&(reply.header), MACH_SEND_MSG,
601 reply.header.msgh_size, 0, MACH_PORT_NULL,
205 breakpad_exc_server(mach_msg_header_t* request, mach_msg_header_t* reply) argument
/external/ipsec-tools/src/racoon/
H A Disakmp_cfg.c498 struct isakmp_pl_attr *reply; local
503 if ((payload = vmalloc(sizeof(*reply))) == NULL) {
507 memset(payload->v, 0, sizeof(*reply));
622 reply = (struct isakmp_pl_attr *)payload->v;
623 reply->h.len = htons(payload->l);
624 reply->type = ISAKMP_CFG_REPLY;
625 reply->id = attrpl->id;
666 struct isakmp_pl_attr *reply; local
671 if ((payload = vmalloc(sizeof(*reply))) == NULL) {
675 memset(payload->v, 0, sizeof(*reply));
[all...]
H A Disakmp_xauth.c198 "Xauth reply but peer did not declare "
205 "Xauth reply while Xauth state is %d\n", xst->status);
367 "Delayed Xauth reply: phase 1 no longer exists.\n");
587 struct pam_response *reply = NULL; local
589 if ((reply = racoon_malloc(sizeof(*reply) * msg_count)) == NULL)
591 bzero(reply, sizeof(*reply) * msg_count);
597 reply[i].resp_retcode = PAM_SUCCESS;
598 if ((reply[
[all...]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/
H A DSpdyConnection.java389 final boolean reply, final int payload1, final int payload2, final Ping ping) {
394 writePing(reply, payload1, payload2, ping);
401 private void writePing(boolean reply, int payload1, int payload2, Ping ping) throws IOException { argument
405 frameWriter.ping(reply, payload1, payload2);
727 @Override public void ping(boolean reply, int payload1, int payload2) { argument
728 if (reply) {
734 // Send a reply to a client ping if this is a server and vice versa.
388 writePingLater( final boolean reply, final int payload1, final int payload2, final Ping ping) argument
/external/openssh/
H A Dauth-pam.c346 struct pam_response *reply; local
360 if ((reply = calloc(n, sizeof(*reply))) == NULL)
376 reply[i].resp = buffer_get_string(&buffer, NULL);
388 reply[i].resp = buffer_get_string(&buffer, NULL);
410 *resp = reply;
415 free(reply[i].resp);
417 free(reply);
559 struct pam_response *reply; local
569 if ((reply
966 struct pam_response *reply; local
1123 struct pam_response *reply; local
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_privsep.c45 void *reply, size_t *reply_len)
67 if (reply) {
83 res = recv(drv->cmd_socket, reply, *reply_len, 0);
92 "for reply (cmd=%d)", cmd);
284 u8 reply[sizeof(int) + SSID_MAX_LEN]; local
285 size_t len = sizeof(reply);
287 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len);
290 os_memcpy(&ssid_len, reply, sizeof(int));
293 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply");
296 os_memcpy(ssid, &reply[sizeo
43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c130 struct wpa_eapol_key *reply; local
142 NULL, sizeof(*reply) + kde_len, &rlen,
143 (void *) &reply);
146 reply192 = (struct wpa_eapol_key_192 *) reply;
148 reply->type = EAPOL_KEY_TYPE_RSN;
151 WPA_PUT_BE16(reply->key_info, key_info);
152 WPA_PUT_BE16(reply->key_length, 0);
153 os_memcpy(reply->replay_counter, key->replay_counter,
156 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
158 WPA_PUT_BE16(reply
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_upnp_web.c414 struct wpabuf **reply, const char **replyname)
449 *reply = wps_get_msg(peer->wps, &op_code);
450 if (*reply == NULL) {
455 *reply = NULL;
456 if (*reply == NULL) {
467 struct wpabuf **reply, const char **replyname)
492 *reply = NULL;
494 *reply = wps_get_msg(iface->peer.wps, &op_code);
496 if (*reply == NULL)
505 struct wpabuf **reply, cons
413 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument
466 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
504 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
629 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument
685 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument
858 struct wpabuf *reply = NULL; /* data for the reply */ local
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_privsep.c45 void *reply, size_t *reply_len)
67 if (reply) {
83 res = recv(drv->cmd_socket, reply, *reply_len, 0);
92 "for reply (cmd=%d)", cmd);
284 u8 reply[sizeof(int) + SSID_MAX_LEN]; local
285 size_t len = sizeof(reply);
287 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len);
290 os_memcpy(&ssid_len, reply, sizeof(int));
293 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply");
296 os_memcpy(ssid, &reply[sizeo
43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c130 struct wpa_eapol_key *reply; local
142 NULL, sizeof(*reply) + kde_len, &rlen,
143 (void *) &reply);
146 reply192 = (struct wpa_eapol_key_192 *) reply;
148 reply->type = EAPOL_KEY_TYPE_RSN;
151 WPA_PUT_BE16(reply->key_info, key_info);
152 WPA_PUT_BE16(reply->key_length, 0);
153 os_memcpy(reply->replay_counter, key->replay_counter,
156 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
158 WPA_PUT_BE16(reply
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_upnp_web.c414 struct wpabuf **reply, const char **replyname)
449 *reply = wps_get_msg(peer->wps, &op_code);
450 if (*reply == NULL) {
455 *reply = NULL;
456 if (*reply == NULL) {
467 struct wpabuf **reply, const char **replyname)
492 *reply = NULL;
494 *reply = wps_get_msg(iface->peer.wps, &op_code);
496 if (*reply == NULL)
505 struct wpabuf **reply, cons
413 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument
466 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
504 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
629 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument
685 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument
858 struct wpabuf *reply = NULL; /* data for the reply */ local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_privsep.c45 void *reply, size_t *reply_len)
67 if (reply) {
83 res = recv(drv->cmd_socket, reply, *reply_len, 0);
92 "for reply (cmd=%d)", cmd);
284 u8 reply[sizeof(int) + SSID_MAX_LEN]; local
285 size_t len = sizeof(reply);
287 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len);
290 os_memcpy(&ssid_len, reply, sizeof(int));
293 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply");
296 os_memcpy(ssid, &reply[sizeo
43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c130 struct wpa_eapol_key *reply; local
142 NULL, sizeof(*reply) + kde_len, &rlen,
143 (void *) &reply);
146 reply192 = (struct wpa_eapol_key_192 *) reply;
148 reply->type = EAPOL_KEY_TYPE_RSN;
151 WPA_PUT_BE16(reply->key_info, key_info);
152 WPA_PUT_BE16(reply->key_length, 0);
153 os_memcpy(reply->replay_counter, key->replay_counter,
156 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
158 WPA_PUT_BE16(reply
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_upnp_web.c414 struct wpabuf **reply, const char **replyname)
449 *reply = wps_get_msg(peer->wps, &op_code);
450 if (*reply == NULL) {
455 *reply = NULL;
456 if (*reply == NULL) {
467 struct wpabuf **reply, const char **replyname)
492 *reply = NULL;
494 *reply = wps_get_msg(iface->peer.wps, &op_code);
496 if (*reply == NULL)
505 struct wpabuf **reply, cons
413 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument
466 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
504 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
629 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument
685 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument
858 struct wpabuf *reply = NULL; /* data for the reply */ local
[all...]
/external/kernel-headers/original/uapi/drm/
H A Dvia_drm.h247 struct drm_wait_vblank_reply reply; member in union:drm_via_irqwait
/external/libdrm/include/drm/
H A Dvia_drm.h245 struct drm_wait_vblank_reply reply; member in union:drm_via_irqwait
/external/libnl/lib/netfilter/
H A Dct_obj.c119 static void dump_icmp(struct nl_dump_params *p, struct nfnl_ct *ct, int reply) argument
121 if (nfnl_ct_test_icmp_type(ct, reply))
122 nl_dump(p, "icmp type %d ", nfnl_ct_get_icmp_type(ct, reply));
124 if (nfnl_ct_test_icmp_type(ct, reply))
125 nl_dump(p, "code %d ", nfnl_ct_get_icmp_code(ct, reply));
127 if (nfnl_ct_test_icmp_type(ct, reply))
128 nl_dump(p, "id %d ", nfnl_ct_get_icmp_id(ct, reply));
/external/libvterm/src/
H A Dstate.c832 int reply; local
836 reply = state->mode.cursor;
840 reply = state->mode.screen;
844 reply = state->mode.origin;
848 reply = state->mode.autowrap;
852 reply = state->mode.cursor_blink;
856 reply = state->mode.cursor_visible;
860 reply = state->mode.leftrightmargin;
864 reply = state->mouse_flags == MOUSE_WANT_CLICK;
868 reply
1483 int reply; local
[all...]

Completed in 606 milliseconds

12345