/external/lldb/source/Plugins/Process/MacOSX-Kernel/ |
H A D | ProcessKDP.cpp | 342 error.SetErrorString("invalid reply port from UDP connection"); 895 // TODO: parse the stop reply packet 1030 DataExtractor reply; local 1034 reply, 1041 packet.PutBytesAsRawHex8(reply.GetDataStart(), 1042 reply.GetByteSize(),
|
/external/mesa3d/src/egl/drivers/dri2/ |
H A D | platform_x11.c | 98 xcb_get_geometry_reply_t *reply; local 103 reply = xcb_get_geometry_reply (dri2_dpy->conn, cookie, &error); 104 if (reply == NULL) 111 *w = reply->width; 112 *h = reply->height; 114 free(reply); 152 xcb_get_image_reply_t *reply; local 157 reply = xcb_get_image_reply (dri2_dpy->conn, cookie, &error); 158 if (reply == NULL) 165 uint32_t bytes = xcb_get_image_data_length(reply); 185 xcb_get_geometry_reply_t *reply; local 381 xcb_dri2_get_buffers_reply_t *reply; local 414 xcb_dri2_get_buffers_with_format_reply_t *reply; local 710 xcb_dri2_swap_buffers_reply_t *reply; local [all...] |
/external/openssh/ |
H A D | mux.c | 388 /* prepare reply */ 403 /* prepare reply */ 426 /* prepare reply */ 475 /* reply is deferred, sent by mux_session_confirm */ 484 /* prepare reply */ 591 /* no channel for reply */ 795 /* delayed reply in mux_confirm_remote_forward */ 956 /* prepare reply */ 971 /* prepare reply */ 987 /* prepare reply */ 1026 Buffer reply; local 1315 Buffer reply; local [all...] |
H A D | serverloop.c | 265 packet_put_char(1); /* boolean: want reply */ 1334 int id, reply, success = 0; local 1339 reply = packet_get_char(); 1341 debug("server_input_channel_req: channel %d request %s reply %d", 1342 id, rtype, reply); 1353 if (reply && !(c->flags & CHAN_CLOSE_SENT)) {
|
H A D | clientloop.c | 569 packet_put_char(1); /* boolean: want reply */ 2048 int exitval, id, reply, success = 0; local 2053 reply = packet_get_char(); 2055 debug("client_input_channel_req: channel %d rtype %s reply %d", 2056 id, rtype, reply); 2082 if (reply && c != NULL && !(c->flags & CHAN_CLOSE_SENT)) { 2430 (r = sshpkt_put_u8(ssh, 1)) != 0) /* bool: want reply */ 2521 /* XXX wait for reply */ 2607 /* global request reply messages */
|
H A D | sshconnect2.c | 384 char *reply = packet_get_string(NULL); local 385 debug2("service_accept: %s", reply); 386 free(reply); 455 debug2("we sent a %s packet, wait for reply", method->name); 1532 error("%s: no reply", __func__);
|
/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 294 char *cmd, char *reply, 312 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 314 reply[res++] = '\n'; 315 reply[res] = '\0'; 324 char *reply, size_t max_len, 334 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 336 reply[res++] = '\n'; 337 reply[res] = '\0'; 346 char *cmd, char *reply, 350 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply, 293 hostapd_ctrl_iface_wps_nfc_config_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 323 hostapd_ctrl_iface_wps_nfc_token_gen(struct hostapd_data *hapd, char *reply, size_t max_len, int ndef) argument 345 hostapd_ctrl_iface_wps_nfc_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 369 hostapd_ctrl_iface_nfc_get_handover_sel(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 1780 hostapd_ctrl_iface_mib(struct hostapd_data *hapd, char *reply, int reply_size, const char *param) argument 1800 struct wpabuf *reply; local 1858 char *reply; local 2381 char reply[24]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 254 struct ieee80211_mgmt *reply; local 258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 263 reply = (struct ieee80211_mgmt *) buf; 264 reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 266 os_memcpy(reply->da, dst, ETH_ALEN); 267 os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN); 268 os_memcpy(reply->bssid, bssid, ETH_ALEN); 270 reply->u.auth.auth_alg = host_to_le16(auth_alg); 271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 272 reply 1546 struct ieee80211_mgmt reply; local 1570 struct ieee80211_mgmt *reply; local [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_er.c | 534 struct wpabuf *reply) 536 /* Note: reply includes null termination after the buffer data */ 537 const char *tmp, *data = wpabuf_head(reply); 541 wpabuf_head(reply), wpabuf_len(reply)); 614 struct wpabuf *reply; local 619 reply = http_client_get_body(c); 620 if (reply == NULL) 622 wps_er_parse_device_description(ap, reply); 1645 struct wpabuf *reply; local 533 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument 1822 struct wpabuf *reply; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 254 struct ieee80211_mgmt *reply; local 258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 263 reply = (struct ieee80211_mgmt *) buf; 264 reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 266 os_memcpy(reply->da, dst, ETH_ALEN); 267 os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN); 268 os_memcpy(reply->bssid, bssid, ETH_ALEN); 270 reply->u.auth.auth_alg = host_to_le16(auth_alg); 271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 272 reply 1546 struct ieee80211_mgmt reply; local 1570 struct ieee80211_mgmt *reply; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_er.c | 534 struct wpabuf *reply) 536 /* Note: reply includes null termination after the buffer data */ 537 const char *tmp, *data = wpabuf_head(reply); 541 wpabuf_head(reply), wpabuf_len(reply)); 614 struct wpabuf *reply; local 619 reply = http_client_get_body(c); 620 if (reply == NULL) 622 wps_er_parse_device_description(ap, reply); 1645 struct wpabuf *reply; local 533 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument 1822 struct wpabuf *reply; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 254 struct ieee80211_mgmt *reply; local 258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 263 reply = (struct ieee80211_mgmt *) buf; 264 reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 266 os_memcpy(reply->da, dst, ETH_ALEN); 267 os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN); 268 os_memcpy(reply->bssid, bssid, ETH_ALEN); 270 reply->u.auth.auth_alg = host_to_le16(auth_alg); 271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 272 reply 1546 struct ieee80211_mgmt reply; local 1570 struct ieee80211_mgmt *reply; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 534 struct wpabuf *reply) 536 /* Note: reply includes null termination after the buffer data */ 537 const char *tmp, *data = wpabuf_head(reply); 541 wpabuf_head(reply), wpabuf_len(reply)); 614 struct wpabuf *reply; local 619 reply = http_client_get_body(c); 620 if (reply == NULL) 622 wps_er_parse_device_description(ap, reply); 1645 struct wpabuf *reply; local 533 wps_er_parse_device_description(struct wps_er_ap *ap, struct wpabuf *reply) argument 1822 struct wpabuf *reply; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | peers.cpp | 321 char reply[100]; local 334 reply_len = sizeof(reply) - 1; 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { 352 char reply[20]; local 354 reply_len = sizeof(reply) - 1; 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || 356 memcmp(reply, "FAIL", 4) == 0) { 367 char reply[20]; local 369 reply_len = sizeof(reply) - 1; 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, 376 char reply[20]; local 391 char reply[20]; local 456 char reply[2048]; local 487 char reply[2048]; local 574 char reply[2048]; local 677 char reply[100]; local 769 char reply[20]; local 1061 char reply[100]; local 1350 char reply[100]; local 1384 char reply[100]; local 1408 char reply[100]; local 1431 char reply[100]; local 1452 char reply[100]; local 1480 char reply[100]; local 1515 char reply[100]; local 1535 char reply[100]; local 1553 char reply[20]; local 1710 char reply[100]; local 1749 char reply[100]; local 1797 char reply[64]; local 1822 char reply[100]; local 1845 char reply[100]; local [all...] |
H A D | wpagui.cpp | 771 char reply[10]; local 772 size_t reply_len = sizeof(reply); 773 ctrlRequest("DISCONNECT", reply, &reply_len); 868 char reply[128]; local 869 size_t reply_len = sizeof(reply); 873 ctrlRequest("SIGNAL_POLL", reply, &reply_len); 877 if ((rssi = strstr(reply, "AVG_RSSI=")) != NULL) 879 else if ((rssi = strstr(reply, "RSSI=")) != NULL) 1054 char reply[10]; local 1055 size_t reply_len = sizeof(reply); 1063 char reply[10]; local 1080 char reply[10]; local 1099 char reply[10]; local 1189 char reply[10]; local 1255 char reply[10]; local 1660 char reply[20]; local 1682 char reply[20]; local 1720 char reply[20]; local [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/framework/jdwp/ |
H A D | VmMirror.java | 87 * Checks error code of given reply packet and throws 90 * @param reply 91 * reply packet to check 92 * @return ReplyPacket unchanged reply packet 94 public ReplyPacket checkReply(ReplyPacket reply) { argument 95 if (reply.getErrorCode() != JDWPConstants.Error.NONE) 96 throw new ReplyErrorCodeException(reply.getErrorCode()); 97 return reply; 261 ReplyPacket reply = setBreakpoint(breakpointLocation, suspendPolicy); 262 checkReply(reply); [all...] |
/external/fio/ |
H A D | client.c | 1100 struct fio_net_cmd_reply *reply = NULL; local 1104 reply = flist_entry(entry, struct fio_net_cmd_reply, list); 1106 if (cmd->tag == (uintptr_t) reply) 1109 reply = NULL; 1112 if (!reply) { 1117 flist_del(&reply->list); 1118 cmd->tag = reply->saved_tag; 1119 free(reply); 1125 struct fio_net_cmd_reply *reply = NULL; local 1129 reply 1581 struct fio_net_cmd_reply *reply; local [all...] |
H A D | server.c | 324 struct fio_net_cmd_reply *reply; local 326 reply = (struct fio_net_cmd_reply *) (uintptr_t) tag; 327 flist_add_tail(&reply->list, list); 332 struct fio_net_cmd_reply *reply; local 334 reply = calloc(1, sizeof(*reply)); 335 INIT_FLIST_HEAD(&reply->list); 336 fio_gettime(&reply->tv, NULL); 337 reply->saved_tag = tag; 338 reply 345 struct fio_net_cmd_reply *reply; local [all...] |
/external/kernel-headers/original/uapi/linux/ |
H A D | fd.h | 362 unsigned char reply[16]; member in struct:floppy_raw_cmd
|
/external/libdrm/ |
H A D | xf86drm.h | 334 drmVBlankReply reply; member in union:_drmVBlank
|
/external/mesa3d/src/glx/ |
H A D | glxcmds.c | 581 xGLXIsDirectReply reply; local 593 xcb_glx_is_direct_reply_t *reply = xcb_glx_is_direct_reply(c, local 598 const Bool is_direct = (reply != NULL && reply->is_direct) ? True : False; 605 free(reply); 615 _XReply(dpy, (xReply *) & reply, 0, False); 619 return reply.isDirect; 1422 xGLXQueryContextReply reply; local 1488 _XReply(dpy, (xReply *) & reply, 0, False); 1490 if (reply [all...] |
/external/ppp/pppd/ |
H A D | sys-solaris.c | 585 } reply; local 723 dlpi_get_reply(ifd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0) { 2233 } reply; local 2255 || dlpi_get_reply(iffd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0 2257 || dlpi_get_reply(iffd, &reply.prim, DL_INFO_ACK, sizeof(reply)) < 0) { 2262 adrlen = reply.prim.info_ack.dl_addr_length; 2263 adrp = (unsigned char *)&reply [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 734 RADIUS_DEBUG("Failed to allocate reply message"); 891 RADIUS_DEBUG("Failed to allocate reply message"); 997 struct radius_msg *reply; local 1053 RADIUS_DEBUG("No previous reply available for duplicate " 1060 reply = radius_server_macacl(data, client, sess, msg); 1061 if (reply == NULL) 1120 reply = radius_server_encapsulate_eap(data, client, sess, msg); 1123 if (reply) { 1129 radius_msg_dump(reply); 1132 switch (radius_msg_get_hdr(reply) [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 92 struct wpa_eapol_key *reply; local 115 hdrlen = mic_len == 24 ? sizeof(*reply192) : sizeof(*reply); 117 hdrlen, &rlen, (void *) &reply); 120 reply192 = (struct wpa_eapol_key_192 *) reply; 122 reply->type = (sm->proto == WPA_PROTO_RSN || 132 WPA_PUT_BE16(reply->key_info, key_info); 133 WPA_PUT_BE16(reply->key_length, 0); 134 os_memcpy(reply->replay_counter, sm->request_counter, 141 WPA_PUT_BE16(reply->key_data_length, 0); 145 key_mic = reply192->key_mic; /* same offset in reply */ 319 struct wpa_eapol_key *reply; local 1086 struct wpa_eapol_key *reply; local 1391 struct wpa_eapol_key *reply; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 734 RADIUS_DEBUG("Failed to allocate reply message"); 891 RADIUS_DEBUG("Failed to allocate reply message"); 997 struct radius_msg *reply; local 1053 RADIUS_DEBUG("No previous reply available for duplicate " 1060 reply = radius_server_macacl(data, client, sess, msg); 1061 if (reply == NULL) 1120 reply = radius_server_encapsulate_eap(data, client, sess, msg); 1123 if (reply) { 1129 radius_msg_dump(reply); 1132 switch (radius_msg_get_hdr(reply) [all...] |