| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| userdatarequest.cpp | 82 size_t reply_len = sizeof(reply); local 92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len);
|
| scanresults.cpp | 57 size_t reply_len; local 69 reply_len = sizeof(reply) - 1; 70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) 72 reply[reply_len] = '\0'; 117 size_t reply_len = sizeof(reply); local 122 wpagui->ctrlRequest("SCAN", reply, &reply_len);
|
| networkconfig.cpp | 188 size_t reply_len; local 226 reply_len = sizeof(reply) - 1; 229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); 405 reply_len = sizeof(reply); 406 wpagui->ctrlRequest(cmd, reply, &reply_len); 415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); 431 size_t reply_len; local 434 reply_len = sizeof(reply); 435 wpagui->ctrlRequest(cmd, reply, &reply_len); 496 static int key_value_isset(const char *reply, size_t reply_len) 510 size_t reply_len; local 793 size_t reply_len; local 830 size_t reply_len; local [all...] |
| peers.cpp | 322 size_t reply_len; local 334 reply_len = sizeof(reply) - 1; 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { 353 size_t reply_len; local 354 reply_len = sizeof(reply) - 1; 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || 368 size_t reply_len; local 369 reply_len = sizeof(reply) - 1; 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); 377 size_t reply_len; local 392 size_t reply_len; local 457 size_t reply_len; local 490 size_t reply_len; local 577 size_t reply_len; local 680 size_t reply_len; local 1064 size_t reply_len; local 1353 size_t reply_len; local 1387 size_t reply_len; local 1411 size_t reply_len; local 1434 size_t reply_len; local 1455 size_t reply_len; local 1483 size_t reply_len; local 1518 size_t reply_len; local 1538 size_t reply_len; local 1713 size_t reply_len; local 1752 size_t reply_len; local 1800 size_t reply_len; local 1825 size_t reply_len; local 1848 size_t reply_len; local [all...] |
| wpagui.cpp | 787 size_t reply_len = sizeof(reply); local 788 ctrlRequest("DISCONNECT", reply, &reply_len); 884 size_t reply_len = sizeof(reply); local 888 ctrlRequest("SIGNAL_POLL", reply, &reply_len); 1070 size_t reply_len = sizeof(reply); local 1071 ctrlRequest("REASSOCIATE", reply, &reply_len); 1079 size_t reply_len = sizeof(reply); local 1086 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); 1096 size_t reply_len = sizeof(reply); local 1106 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); 1115 size_t reply_len = sizeof(reply); local 1205 size_t reply_len = sizeof(reply); local 1271 size_t reply_len = sizeof(reply) - 1; local 1676 size_t reply_len = sizeof(reply); local 1698 size_t reply_len = sizeof(reply) - 1; local 1736 size_t reply_len = sizeof(reply); local [all...] |
| /src/external/bsd/ntp/dist/ntpd/ |
| ntp_signd.c | 167 uint32_t reply_len; local 205 if (recv_packet(fd, &reply, &reply_len) != 0) { 219 if (reply_len <= sizeof(samba_reply)) { 220 memcpy(&samba_reply, reply, reply_len); 221 if (ntohl(samba_reply.op) == 3 && reply_len > offsetof(struct samba_key_out, pkt)) { 222 sendlen = reply_len - offsetof(struct samba_key_out, pkt);
|
| /src/sys/external/bsd/drm2/dist/drm/vmwgfx/ |
| vmwgfx_msg.c | 204 * @reply_len: Length of the reply. 210 unsigned long reply_len, bool hb) 223 reply_len, si, di, 233 while (reply_len) { 234 unsigned int bytes = min_t(unsigned long, reply_len, 4); 249 reply_len -= bytes; 322 size_t reply_len; local 351 reply_len = ebx; 352 reply = kzalloc(reply_len + 1, GFP_KERNEL); 360 ebx = vmw_port_hb_in(channel, reply, reply_len, 428 size_t reply_len = 0; local 577 size_t reply_len = 0; local [all...] |
| /src/external/bsd/libfido2/dist/src/ |
| dev.c | 171 int reply_len; local 174 if ((reply_len = fido_rx(dev, CTAP_CMD_INIT, &dev->attr, 185 if ((size_t)reply_len != sizeof(dev->attr) ||
|
| u2f.c | 320 int reply_len; local 369 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, 383 (size_t)reply_len)) != FIDO_OK) { 671 int reply_len; local 734 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, 748 (size_t)reply_len)) != FIDO_OK) { 922 int reply_len; local 931 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, 938 switch ((reply[reply_len - 2] << 8) | reply[reply_len - 1]) [all...] |
| cred.c | 154 int reply_len; local 164 if ((reply_len = fido_rx(dev, CTAP_CMD_CBOR, reply, FIDO_MAXMSG_CRED, 171 if ((r = cbor_parse_reply(reply, (size_t)reply_len, cred,
|
| /src/external/bsd/unbound/dist/testcode/ |
| testpkts.h | 179 size_t reply_len; member in struct:reply_packet
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| ctrl_iface_udp.c | 199 size_t *reply_len) 204 *reply_len = 1; 212 *reply_len = 7 + 2 * COOKIE_LEN; 234 size_t reply_len = 0; local 283 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 322 reply_len = 1; 325 reply_len = 2; 330 reply_len = 1; 332 reply_len = 2; 336 reply_len = 1 636 size_t reply_len; local [all...] |
| ctrl_iface_named_pipe.c | 283 size_t reply_len = 0, send_len; local 296 reply_len = 2; 300 reply_len = 2; 304 reply_len = 2; 307 &reply_len); 312 send_len = reply_len; 313 } else if (reply_len == 2) { 721 size_t reply_len = 0, send_len; local 730 &reply_len); 733 send_len = reply_len; [all...] |
| ctrl_iface_unix.c | 139 size_t reply_len = 0; local 163 reply_len = 1; 166 reply_len = 2; 171 reply_len = 1; 173 reply_len = 2; 177 reply_len = 1; 179 reply_len = 2; 185 &reply_len); 196 if (!reply && reply_len == 1) { 198 reply_len = 5 1108 size_t reply_len; local [all...] |
| ap.c | 1984 size_t reply_len = 0, i; local 1991 if (dlen > len - reply_len) 1992 return reply_len; 1993 os_memcpy(&buf[reply_len], ap_delimiter, dlen); 1994 reply_len += dlen; 1997 reply_len += hostapd_ctrl_iface_pmksa_list( 1999 &buf[reply_len], len - reply_len); 2005 if (dlen > len - reply_len) 2006 return reply_len; [all...] |
| ctrl_iface.c | 9234 char *reply, int reply_size, int *reply_len) 9251 *reply_len = -1; 9258 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); 9266 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); 9280 *reply_len = -1; 9300 *reply_len = -1; 9311 *reply_len = -1; 9341 *reply_len = -1; 9353 *reply_len = -1; 9409 *reply_len = os_snprintf(reply, reply_size, "%u\n" 10817 size_t reply_len; local 12522 int reply_len; local 14193 int reply_len; local [all...] |
| /src/external/ibm-public/postfix/dist/src/xsasl/ |
| xsasl_cyrus_server.c | 527 unsigned reply_len; local 550 reply_len = strlen(init_response); 552 VSTRING_SPACE(server->decoded, reply_len); 553 if ((sasl_status = SASL_DECODE64(init_response, reply_len,
|
| /src/external/bsd/libpcap/dist/ |
| pcap-rpcap-unix.c | 301 int reply_len; local 312 reply_len = rpcap_recv_pkt(p, p->fd, reply_buf, sizeof(reply_buf)); 313 if (reply_len != sizeof(reply_buf)) { 314 if (reply_len >= 0) 315 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Bad protocol (openreply: %u)", reply_len); 353 int reply_len; local 364 reply_len = rpcap_recv_pkt(p, p->fd, reply_buf, sizeof(reply_buf)); 365 if (reply_len != sizeof(reply_buf)) { 366 if (reply_len >= 0) 367 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Bad protocol (startreply: %u)", reply_len); 414 int reply_len; local [all...] |
| pcap-rpcap.c | 2093 size_t reply_len; local 2110 reply_len = sizeof(struct rpcap_authreply_old); 2116 reply_len = sizeof(struct rpcap_authreply); 2132 reply_len, &plen, errbuf) == -1)
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_privsep.c | 45 void *reply, size_t *reply_len) 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); 89 *reply_len = res; 135 size_t reply_len = 60000; local 139 buf = os_malloc(reply_len); 143 NULL, 0, buf, &reply_len); 150 (unsigned long) reply_len); 151 if (reply_len < sizeof(int)) { 153 (unsigned long) reply_len); 159 end = buf + reply_len; [all...] |
| /src/external/bsd/wpa/dist/src/fst/ |
| fst_ctrl_iface.c | 465 size_t reply_len; member in struct:list_sessions_cb_ctx 479 c->reply_len += ret; 497 ctx.reply_len = 0; 501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n"); 503 return ctx.reply_len;
|
| /src/external/bsd/wpa/dist/hostapd/ |
| ctrl_iface.c | 3988 int reply_len, res; local 3991 reply_len = 3; 3995 reply_len = 5; 3998 reply_len = -1; 4004 reply_len = hostapd_ctrl_iface_status(hapd, reply, 4007 reply_len = hostapd_drv_status(hapd, reply, reply_size); 4009 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); 4010 if (reply_len >= 0) { 4011 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, 4012 reply_size - reply_len); 4609 int reply_len; local 5355 int reply_len; local [all...] |
| /src/external/mpl/dhcp/dist/server/ |
| dhcpv6.c | 5786 int reply_len) 5814 if (reply_len < (*reply_ofs + 16)) { 5824 reply_len-(*reply_ofs)-16, 6197 int reply_len) 6226 if (reply_len < (*reply_ofs + 16)) { 6236 reply_len-(*reply_ofs)-16, 6290 int reply_len) 6321 if (reply_len < (*reply_ofs + 16)) { 6331 reply_len-(*reply_ofs)-16, 6374 int reply_len; local [all...] |