HomeSort by: relevance | last modified time | path
    Searched defs:reply_len (Results 1 - 23 of 23) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
userdatarequest.cpp 82 size_t reply_len = sizeof(reply); local
92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len);
scanresults.cpp 57 size_t reply_len; local
69 reply_len = sizeof(reply) - 1;
70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
72 reply[reply_len] = '\0';
117 size_t reply_len = sizeof(reply); local
122 wpagui->ctrlRequest("SCAN", reply, &reply_len);
networkconfig.cpp 188 size_t reply_len; local
226 reply_len = sizeof(reply) - 1;
229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len);
405 reply_len = sizeof(reply);
406 wpagui->ctrlRequest(cmd, reply, &reply_len);
415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len);
431 size_t reply_len; local
434 reply_len = sizeof(reply);
435 wpagui->ctrlRequest(cmd, reply, &reply_len);
496 static int key_value_isset(const char *reply, size_t reply_len)
510 size_t reply_len; local
793 size_t reply_len; local
830 size_t reply_len; local
    [all...]
peers.cpp 322 size_t reply_len; local
334 reply_len = sizeof(reply) - 1;
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
353 size_t reply_len; local
354 reply_len = sizeof(reply) - 1;
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 ||
368 size_t reply_len; local
369 reply_len = sizeof(reply) - 1;
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len);
377 size_t reply_len; local
392 size_t reply_len; local
457 size_t reply_len; local
490 size_t reply_len; local
577 size_t reply_len; local
680 size_t reply_len; local
1064 size_t reply_len; local
1353 size_t reply_len; local
1387 size_t reply_len; local
1411 size_t reply_len; local
1434 size_t reply_len; local
1455 size_t reply_len; local
1483 size_t reply_len; local
1518 size_t reply_len; local
1538 size_t reply_len; local
1713 size_t reply_len; local
1752 size_t reply_len; local
1800 size_t reply_len; local
1825 size_t reply_len; local
1848 size_t reply_len; local
    [all...]
wpagui.cpp 787 size_t reply_len = sizeof(reply); local
788 ctrlRequest("DISCONNECT", reply, &reply_len);
884 size_t reply_len = sizeof(reply); local
888 ctrlRequest("SIGNAL_POLL", reply, &reply_len);
1070 size_t reply_len = sizeof(reply); local
1071 ctrlRequest("REASSOCIATE", reply, &reply_len);
1079 size_t reply_len = sizeof(reply); local
1086 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len);
1096 size_t reply_len = sizeof(reply); local
1106 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len);
1115 size_t reply_len = sizeof(reply); local
1205 size_t reply_len = sizeof(reply); local
1271 size_t reply_len = sizeof(reply) - 1; local
1676 size_t reply_len = sizeof(reply); local
1698 size_t reply_len = sizeof(reply) - 1; local
1736 size_t reply_len = sizeof(reply); local
    [all...]
  /src/external/bsd/ntp/dist/ntpd/
ntp_signd.c 167 uint32_t reply_len; local
205 if (recv_packet(fd, &reply, &reply_len) != 0) {
219 if (reply_len <= sizeof(samba_reply)) {
220 memcpy(&samba_reply, reply, reply_len);
221 if (ntohl(samba_reply.op) == 3 && reply_len > offsetof(struct samba_key_out, pkt)) {
222 sendlen = reply_len - offsetof(struct samba_key_out, pkt);
  /src/sys/external/bsd/drm2/dist/drm/vmwgfx/
vmwgfx_msg.c 204 * @reply_len: Length of the reply.
210 unsigned long reply_len, bool hb)
223 reply_len, si, di,
233 while (reply_len) {
234 unsigned int bytes = min_t(unsigned long, reply_len, 4);
249 reply_len -= bytes;
322 size_t reply_len; local
351 reply_len = ebx;
352 reply = kzalloc(reply_len + 1, GFP_KERNEL);
360 ebx = vmw_port_hb_in(channel, reply, reply_len,
428 size_t reply_len = 0; local
577 size_t reply_len = 0; local
    [all...]
  /src/external/bsd/libfido2/dist/src/
dev.c 171 int reply_len; local
174 if ((reply_len = fido_rx(dev, CTAP_CMD_INIT, &dev->attr,
185 if ((size_t)reply_len != sizeof(dev->attr) ||
u2f.c 320 int reply_len; local
369 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply,
383 (size_t)reply_len)) != FIDO_OK) {
671 int reply_len; local
734 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply,
748 (size_t)reply_len)) != FIDO_OK) {
922 int reply_len; local
931 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG,
938 switch ((reply[reply_len - 2] << 8) | reply[reply_len - 1])
    [all...]
cred.c 154 int reply_len; local
164 if ((reply_len = fido_rx(dev, CTAP_CMD_CBOR, reply, FIDO_MAXMSG_CRED,
171 if ((r = cbor_parse_reply(reply, (size_t)reply_len, cred,
  /src/external/bsd/unbound/dist/testcode/
testpkts.h 179 size_t reply_len; member in struct:reply_packet
  /src/external/bsd/wpa/dist/wpa_supplicant/
ctrl_iface_udp.c 199 size_t *reply_len)
204 *reply_len = 1;
212 *reply_len = 7 + 2 * COOKIE_LEN;
234 size_t reply_len = 0; local
283 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len);
322 reply_len = 1;
325 reply_len = 2;
330 reply_len = 1;
332 reply_len = 2;
336 reply_len = 1
636 size_t reply_len; local
    [all...]
ctrl_iface_named_pipe.c 283 size_t reply_len = 0, send_len; local
296 reply_len = 2;
300 reply_len = 2;
304 reply_len = 2;
307 &reply_len);
312 send_len = reply_len;
313 } else if (reply_len == 2) {
721 size_t reply_len = 0, send_len; local
730 &reply_len);
733 send_len = reply_len;
    [all...]
ctrl_iface_unix.c 139 size_t reply_len = 0; local
163 reply_len = 1;
166 reply_len = 2;
171 reply_len = 1;
173 reply_len = 2;
177 reply_len = 1;
179 reply_len = 2;
185 &reply_len);
196 if (!reply && reply_len == 1) {
198 reply_len = 5
1108 size_t reply_len; local
    [all...]
ap.c 1984 size_t reply_len = 0, i; local
1991 if (dlen > len - reply_len)
1992 return reply_len;
1993 os_memcpy(&buf[reply_len], ap_delimiter, dlen);
1994 reply_len += dlen;
1997 reply_len += hostapd_ctrl_iface_pmksa_list(
1999 &buf[reply_len], len - reply_len);
2005 if (dlen > len - reply_len)
2006 return reply_len;
    [all...]
ctrl_iface.c 9234 char *reply, int reply_size, int *reply_len)
9251 *reply_len = -1;
9258 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n");
9266 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n");
9280 *reply_len = -1;
9300 *reply_len = -1;
9311 *reply_len = -1;
9341 *reply_len = -1;
9353 *reply_len = -1;
9409 *reply_len = os_snprintf(reply, reply_size, "%u\n"
10817 size_t reply_len; local
12522 int reply_len; local
14193 int reply_len; local
    [all...]
  /src/external/ibm-public/postfix/dist/src/xsasl/
xsasl_cyrus_server.c 527 unsigned reply_len; local
550 reply_len = strlen(init_response);
552 VSTRING_SPACE(server->decoded, reply_len);
553 if ((sasl_status = SASL_DECODE64(init_response, reply_len,
  /src/external/bsd/libpcap/dist/
pcap-rpcap-unix.c 301 int reply_len; local
312 reply_len = rpcap_recv_pkt(p, p->fd, reply_buf, sizeof(reply_buf));
313 if (reply_len != sizeof(reply_buf)) {
314 if (reply_len >= 0)
315 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Bad protocol (openreply: %u)", reply_len);
353 int reply_len; local
364 reply_len = rpcap_recv_pkt(p, p->fd, reply_buf, sizeof(reply_buf));
365 if (reply_len != sizeof(reply_buf)) {
366 if (reply_len >= 0)
367 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Bad protocol (startreply: %u)", reply_len);
414 int reply_len; local
    [all...]
pcap-rpcap.c 2093 size_t reply_len; local
2110 reply_len = sizeof(struct rpcap_authreply_old);
2116 reply_len = sizeof(struct rpcap_authreply);
2132 reply_len, &plen, errbuf) == -1)
  /src/external/bsd/wpa/dist/src/drivers/
driver_privsep.c 45 void *reply, size_t *reply_len)
83 res = recv(drv->cmd_socket, reply, *reply_len, 0);
89 *reply_len = res;
135 size_t reply_len = 60000; local
139 buf = os_malloc(reply_len);
143 NULL, 0, buf, &reply_len);
150 (unsigned long) reply_len);
151 if (reply_len < sizeof(int)) {
153 (unsigned long) reply_len);
159 end = buf + reply_len;
    [all...]
  /src/external/bsd/wpa/dist/src/fst/
fst_ctrl_iface.c 465 size_t reply_len; member in struct:list_sessions_cb_ctx
479 c->reply_len += ret;
497 ctx.reply_len = 0;
501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n");
503 return ctx.reply_len;
  /src/external/bsd/wpa/dist/hostapd/
ctrl_iface.c 3988 int reply_len, res; local
3991 reply_len = 3;
3995 reply_len = 5;
3998 reply_len = -1;
4004 reply_len = hostapd_ctrl_iface_status(hapd, reply,
4007 reply_len = hostapd_drv_status(hapd, reply, reply_size);
4009 reply_len = ieee802_11_get_mib(hapd, reply, reply_size);
4010 if (reply_len >= 0) {
4011 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len,
4012 reply_size - reply_len);
4609 int reply_len; local
5355 int reply_len; local
    [all...]
  /src/external/mpl/dhcp/dist/server/
dhcpv6.c 5786 int reply_len)
5814 if (reply_len < (*reply_ofs + 16)) {
5824 reply_len-(*reply_ofs)-16,
6197 int reply_len)
6226 if (reply_len < (*reply_ofs + 16)) {
6236 reply_len-(*reply_ofs)-16,
6290 int reply_len)
6321 if (reply_len < (*reply_ofs + 16)) {
6331 reply_len-(*reply_ofs)-16,
6374 int reply_len; local
    [all...]

Completed in 35 milliseconds