Searched defs:reply (Results 76 - 100 of 124) sorted by relevance

12345

/external/lldb/source/Plugins/Process/MacOSX-Kernel/
H A DProcessKDP.cpp342 error.SetErrorString("invalid reply port from UDP connection");
895 // TODO: parse the stop reply packet
1030 DataExtractor reply; local
1034 reply,
1041 packet.PutBytesAsRawHex8(reply.GetDataStart(),
1042 reply.GetByteSize(),
/external/mesa3d/src/egl/drivers/dri2/
H A Dplatform_x11.c98 xcb_get_geometry_reply_t *reply; local
103 reply = xcb_get_geometry_reply (dri2_dpy->conn, cookie, &error);
104 if (reply == NULL)
111 *w = reply->width;
112 *h = reply->height;
114 free(reply);
152 xcb_get_image_reply_t *reply; local
157 reply = xcb_get_image_reply (dri2_dpy->conn, cookie, &error);
158 if (reply == NULL)
165 uint32_t bytes = xcb_get_image_data_length(reply);
185 xcb_get_geometry_reply_t *reply; local
381 xcb_dri2_get_buffers_reply_t *reply; local
414 xcb_dri2_get_buffers_with_format_reply_t *reply; local
710 xcb_dri2_swap_buffers_reply_t *reply; local
[all...]
/external/openssh/
H A Dmux.c388 /* prepare reply */
403 /* prepare reply */
426 /* prepare reply */
475 /* reply is deferred, sent by mux_session_confirm */
484 /* prepare reply */
591 /* no channel for reply */
795 /* delayed reply in mux_confirm_remote_forward */
956 /* prepare reply */
971 /* prepare reply */
987 /* prepare reply */
1026 Buffer reply; local
1315 Buffer reply; local
[all...]
H A Dserverloop.c265 packet_put_char(1); /* boolean: want reply */
1334 int id, reply, success = 0; local
1339 reply = packet_get_char();
1341 debug("server_input_channel_req: channel %d request %s reply %d",
1342 id, rtype, reply);
1353 if (reply && !(c->flags & CHAN_CLOSE_SENT)) {
H A Dclientloop.c569 packet_put_char(1); /* boolean: want reply */
2048 int exitval, id, reply, success = 0; local
2053 reply = packet_get_char();
2055 debug("client_input_channel_req: channel %d rtype %s reply %d",
2056 id, rtype, reply);
2082 if (reply && c != NULL && !(c->flags & CHAN_CLOSE_SENT)) {
2430 (r = sshpkt_put_u8(ssh, 1)) != 0) /* bool: want reply */
2521 /* XXX wait for reply */
2607 /* global request reply messages */
H A Dsshconnect2.c384 char *reply = packet_get_string(NULL); local
385 debug2("service_accept: %s", reply);
386 free(reply);
455 debug2("we sent a %s packet, wait for reply", method->name);
1532 error("%s: no reply", __func__);
/external/wpa_supplicant_8/hostapd/
H A Dctrl_iface.c294 char *cmd, char *reply,
312 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
314 reply[res++] = '\n';
315 reply[res] = '\0';
324 char *reply, size_t max_len,
334 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
336 reply[res++] = '\n';
337 reply[res] = '\0';
346 char *cmd, char *reply,
350 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply,
293 hostapd_ctrl_iface_wps_nfc_config_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
323 hostapd_ctrl_iface_wps_nfc_token_gen(struct hostapd_data *hapd, char *reply, size_t max_len, int ndef) argument
345 hostapd_ctrl_iface_wps_nfc_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
369 hostapd_ctrl_iface_nfc_get_handover_sel(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
1780 hostapd_ctrl_iface_mib(struct hostapd_data *hapd, char *reply, int reply_size, const char *param) argument
1800 struct wpabuf *reply; local
1858 char *reply; local
2381 char reply[24]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11.c254 struct ieee80211_mgmt *reply; local
258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
263 reply = (struct ieee80211_mgmt *) buf;
264 reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
266 os_memcpy(reply->da, dst, ETH_ALEN);
267 os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
268 os_memcpy(reply->bssid, bssid, ETH_ALEN);
270 reply->u.auth.auth_alg = host_to_le16(auth_alg);
271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
272 reply
1546 struct ieee80211_mgmt reply; local
1570 struct ieee80211_mgmt *reply; local
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_er.c534 struct wpabuf *reply)
536 /* Note: reply includes null termination after the buffer data */
537 const char *tmp, *data = wpabuf_head(reply);
541 wpabuf_head(reply), wpabuf_len(reply));
614 struct wpabuf *reply; local
619 reply = http_client_get_body(c);
620 if (reply == NULL)
622 wps_er_parse_device_description(ap, reply);
1645 struct wpabuf *reply; local
533 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument
1822 struct wpabuf *reply; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11.c254 struct ieee80211_mgmt *reply; local
258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
263 reply = (struct ieee80211_mgmt *) buf;
264 reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
266 os_memcpy(reply->da, dst, ETH_ALEN);
267 os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
268 os_memcpy(reply->bssid, bssid, ETH_ALEN);
270 reply->u.auth.auth_alg = host_to_le16(auth_alg);
271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
272 reply
1546 struct ieee80211_mgmt reply; local
1570 struct ieee80211_mgmt *reply; local
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_er.c534 struct wpabuf *reply)
536 /* Note: reply includes null termination after the buffer data */
537 const char *tmp, *data = wpabuf_head(reply);
541 wpabuf_head(reply), wpabuf_len(reply));
614 struct wpabuf *reply; local
619 reply = http_client_get_body(c);
620 if (reply == NULL)
622 wps_er_parse_device_description(ap, reply);
1645 struct wpabuf *reply; local
533 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument
1822 struct wpabuf *reply; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11.c254 struct ieee80211_mgmt *reply; local
258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
263 reply = (struct ieee80211_mgmt *) buf;
264 reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
266 os_memcpy(reply->da, dst, ETH_ALEN);
267 os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
268 os_memcpy(reply->bssid, bssid, ETH_ALEN);
270 reply->u.auth.auth_alg = host_to_le16(auth_alg);
271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
272 reply
1546 struct ieee80211_mgmt reply; local
1570 struct ieee80211_mgmt *reply; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_er.c534 struct wpabuf *reply)
536 /* Note: reply includes null termination after the buffer data */
537 const char *tmp, *data = wpabuf_head(reply);
541 wpabuf_head(reply), wpabuf_len(reply));
614 struct wpabuf *reply; local
619 reply = http_client_get_body(c);
620 if (reply == NULL)
622 wps_er_parse_device_description(ap, reply);
1645 struct wpabuf *reply; local
533 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument
1822 struct wpabuf *reply; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dpeers.cpp321 char reply[100]; local
334 reply_len = sizeof(reply) - 1;
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
352 char reply[20]; local
354 reply_len = sizeof(reply) - 1;
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 ||
356 memcmp(reply, "FAIL", 4) == 0) {
367 char reply[20]; local
369 reply_len = sizeof(reply) - 1;
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply,
376 char reply[20]; local
391 char reply[20]; local
456 char reply[2048]; local
487 char reply[2048]; local
574 char reply[2048]; local
677 char reply[100]; local
769 char reply[20]; local
1061 char reply[100]; local
1350 char reply[100]; local
1384 char reply[100]; local
1408 char reply[100]; local
1431 char reply[100]; local
1452 char reply[100]; local
1480 char reply[100]; local
1515 char reply[100]; local
1535 char reply[100]; local
1553 char reply[20]; local
1710 char reply[100]; local
1749 char reply[100]; local
1797 char reply[64]; local
1822 char reply[100]; local
1845 char reply[100]; local
[all...]
H A Dwpagui.cpp771 char reply[10]; local
772 size_t reply_len = sizeof(reply);
773 ctrlRequest("DISCONNECT", reply, &reply_len);
868 char reply[128]; local
869 size_t reply_len = sizeof(reply);
873 ctrlRequest("SIGNAL_POLL", reply, &reply_len);
877 if ((rssi = strstr(reply, "AVG_RSSI=")) != NULL)
879 else if ((rssi = strstr(reply, "RSSI=")) != NULL)
1054 char reply[10]; local
1055 size_t reply_len = sizeof(reply);
1063 char reply[10]; local
1080 char reply[10]; local
1099 char reply[10]; local
1189 char reply[10]; local
1255 char reply[10]; local
1660 char reply[20]; local
1682 char reply[20]; local
1720 char reply[20]; local
[all...]
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/framework/jdwp/
H A DVmMirror.java87 * Checks error code of given reply packet and throws
90 * @param reply
91 * reply packet to check
92 * @return ReplyPacket unchanged reply packet
94 public ReplyPacket checkReply(ReplyPacket reply) { argument
95 if (reply.getErrorCode() != JDWPConstants.Error.NONE)
96 throw new ReplyErrorCodeException(reply.getErrorCode());
97 return reply;
261 ReplyPacket reply = setBreakpoint(breakpointLocation, suspendPolicy);
262 checkReply(reply);
[all...]
/external/fio/
H A Dclient.c1100 struct fio_net_cmd_reply *reply = NULL; local
1104 reply = flist_entry(entry, struct fio_net_cmd_reply, list);
1106 if (cmd->tag == (uintptr_t) reply)
1109 reply = NULL;
1112 if (!reply) {
1117 flist_del(&reply->list);
1118 cmd->tag = reply->saved_tag;
1119 free(reply);
1125 struct fio_net_cmd_reply *reply = NULL; local
1129 reply
1581 struct fio_net_cmd_reply *reply; local
[all...]
H A Dserver.c324 struct fio_net_cmd_reply *reply; local
326 reply = (struct fio_net_cmd_reply *) (uintptr_t) tag;
327 flist_add_tail(&reply->list, list);
332 struct fio_net_cmd_reply *reply; local
334 reply = calloc(1, sizeof(*reply));
335 INIT_FLIST_HEAD(&reply->list);
336 fio_gettime(&reply->tv, NULL);
337 reply->saved_tag = tag;
338 reply
345 struct fio_net_cmd_reply *reply; local
[all...]
/external/kernel-headers/original/uapi/linux/
H A Dfd.h362 unsigned char reply[16]; member in struct:floppy_raw_cmd
/external/libdrm/
H A Dxf86drm.h334 drmVBlankReply reply; member in union:_drmVBlank
/external/mesa3d/src/glx/
H A Dglxcmds.c581 xGLXIsDirectReply reply; local
593 xcb_glx_is_direct_reply_t *reply = xcb_glx_is_direct_reply(c, local
598 const Bool is_direct = (reply != NULL && reply->is_direct) ? True : False;
605 free(reply);
615 _XReply(dpy, (xReply *) & reply, 0, False);
619 return reply.isDirect;
1422 xGLXQueryContextReply reply; local
1488 _XReply(dpy, (xReply *) & reply, 0, False);
1490 if (reply
[all...]
/external/ppp/pppd/
H A Dsys-solaris.c585 } reply; local
723 dlpi_get_reply(ifd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0) {
2233 } reply; local
2255 || dlpi_get_reply(iffd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0
2257 || dlpi_get_reply(iffd, &reply.prim, DL_INFO_ACK, sizeof(reply)) < 0) {
2262 adrlen = reply.prim.info_ack.dl_addr_length;
2263 adrp = (unsigned char *)&reply
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c734 RADIUS_DEBUG("Failed to allocate reply message");
891 RADIUS_DEBUG("Failed to allocate reply message");
997 struct radius_msg *reply; local
1053 RADIUS_DEBUG("No previous reply available for duplicate "
1060 reply = radius_server_macacl(data, client, sess, msg);
1061 if (reply == NULL)
1120 reply = radius_server_encapsulate_eap(data, client, sess, msg);
1123 if (reply) {
1129 radius_msg_dump(reply);
1132 switch (radius_msg_get_hdr(reply)
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c92 struct wpa_eapol_key *reply; local
115 hdrlen = mic_len == 24 ? sizeof(*reply192) : sizeof(*reply);
117 hdrlen, &rlen, (void *) &reply);
120 reply192 = (struct wpa_eapol_key_192 *) reply;
122 reply->type = (sm->proto == WPA_PROTO_RSN ||
132 WPA_PUT_BE16(reply->key_info, key_info);
133 WPA_PUT_BE16(reply->key_length, 0);
134 os_memcpy(reply->replay_counter, sm->request_counter,
141 WPA_PUT_BE16(reply->key_data_length, 0);
145 key_mic = reply192->key_mic; /* same offset in reply */
319 struct wpa_eapol_key *reply; local
1086 struct wpa_eapol_key *reply; local
1391 struct wpa_eapol_key *reply; local
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.c734 RADIUS_DEBUG("Failed to allocate reply message");
891 RADIUS_DEBUG("Failed to allocate reply message");
997 struct radius_msg *reply; local
1053 RADIUS_DEBUG("No previous reply available for duplicate "
1060 reply = radius_server_macacl(data, client, sess, msg);
1061 if (reply == NULL)
1120 reply = radius_server_encapsulate_eap(data, client, sess, msg);
1123 if (reply) {
1129 radius_msg_dump(reply);
1132 switch (radius_msg_get_hdr(reply)
[all...]

Completed in 610 milliseconds

12345