/system/wlan/ti/wilink_6_1/CUDK/configurationutility/src/ |
wpa_core.c | 370 S8 cmd[100]; local 372 os_sprintf(cmd, (PS8)"CHANGE_SUPPLICANT_DEBUG %ld %ld %ld", Level1, Level2, Level3); 373 IpcWpa_Command(pWpaCore->hIpcWpa, cmd, TRUE); 520 S8 cmd[256]; local 533 os_sprintf(cmd, (PS8)"ADD_NETWORK"); 534 if (IpcWpa_CommandWithResp(pWpaCore->hIpcWpa, cmd, TRUE, Resp, &RespLen)) 558 os_sprintf(cmd, (PS8)"SET_NETWORK %d bssid %s", NetworkID, temp); 560 if (IpcWpa_Command(pWpaCore->hIpcWpa, cmd, FALSE)) 567 os_sprintf(cmd, (PS8)"SET_NETWORK %d ssid \"%s\"", NetworkID, ssid->Ssid); 568 if (IpcWpa_Command(pWpaCore->hIpcWpa, cmd, 0) 886 S8 cmd[256]; local [all...] |
/development/cmds/monkey/src/com/android/commands/monkey/ |
MonkeySourceScript.java | 440 String cmd = args[0]; local 441 MonkeyCommandEvent e = new MonkeyCommandEvent(cmd); 448 String cmd = "input text " + input; local 449 MonkeyCommandEvent e = new MonkeyCommandEvent(cmd); 460 * @param line A string in the form {@code cmd(arg1,arg2,arg3)}.
|
/development/simulator/wrapsim/ |
SimMgr.c | 362 wsLog("message len (%d) is wrong for cmd (%d)\n", 383 wsLog("message len (%d) is wrong for cmd (%d)\n", 400 * Attach 8 bytes of data with "cmd" and "arg" to "msg". 406 static int setCommand(Message* msg, int cmd, int arg) 416 pInt[0] = cmd; 736 int cmd, arg; local 738 if (getCommand(&msg, &cmd, &arg) != 0) 741 switch (cmd) { 755 wsLog("Got unexpected command %d/%d\n", cmd, arg); 860 int cmd, arg local 886 int cmd, arg0, arg1, arg2; local [all...] |
/device/samsung/crespo/alsa-lib/aserver/ |
aserver.c | 154 int (*cmd)(client_t *client); member in struct:__anon1336 392 int cmd; local 397 cmd = ctrl->cmd; 398 ctrl->cmd = 0; 400 switch (cmd) { 514 ERROR("Bogus cmd: %x", ctrl->cmd); 522 .cmd = pcm_shm_cmd, 610 int cmd; local [all...] |
/device/samsung/crespo/alsa-lib/include/ |
aserver.h | 64 int cmd; member in struct:__anon1344 118 int cmd; member in struct:__anon1355
|
/device/samsung/crespo/alsa-utils/seq/aplaymidi/ |
aplaymidi.c | 302 unsigned char cmd; local 317 cmd = c; 318 if (cmd < 0xf0) 319 last_cmd = cmd; 324 cmd = last_cmd; 325 if (!cmd) 329 switch (cmd >> 4) { 347 event->type = cmd_type[cmd >> 4]; 350 event->data.d[0] = cmd & 0x0f; 358 event->type = cmd_type[cmd >> 4] [all...] |
/external/bluetooth/bluez/src/ |
glib-helper.c | 611 struct hci_cmd_data *cmd = user_data; local 622 cmd->cb(status, cmd->caller_data); 641 if (ocf != cmd->ocf) 659 if (evt_auth->handle != cmd->handle) { 671 cp.handle = cmd->handle; 674 cmd->ocf = OCF_SET_CONN_ENCRYPT; 685 if (evt_enc->handle != cmd->handle) 697 cmd->cb(status, cmd->caller_data) 707 struct hci_cmd_data *cmd; local [all...] |
/external/bluetooth/bluez/test/ |
avtest.c | 556 unsigned char cmd, int invalid, int preconf) 564 switch (cmd) { 585 do_avdtp_send(sk, src, dst, cmd, 0, 0); 671 hdr->signal_id = cmd; 685 if (cmd == AVDTP_OPEN && len >= 2 && 777 unsigned char cmd = 0x00; local 797 cmd = parse_cmd(optarg); 806 cmd = parse_cmd(optarg); 842 do_listen(&src, cmd, fragment); 852 process_avctp(sk, cmd); [all...] |
l2test.c | 859 l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf; local 892 cmd->code = L2CAP_INFO_REQ; 893 cmd->ident = 141; 894 cmd->len = htobs(2); 919 cmd->code = L2CAP_INFO_REQ; 920 cmd->ident = 142; 921 cmd->len = htobs(2); 969 cmd->code = L2CAP_INFO_REQ; 970 cmd->ident = 143; 971 cmd->len = htobs(2) [all...] |
/external/bluetooth/bluez/tools/ |
hciattach.c | 199 char cmd[5]; local 201 cmd[0] = HCI_COMMAND_PKT; 202 cmd[1] = 0x09; 203 cmd[2] = 0xfc; 204 cmd[3] = 0x01; 208 cmd[4] = 0x03; 211 cmd[4] = 0x02; 214 cmd[4] = 0x01; 217 cmd[4] = 0x00; 220 cmd[4] = 0x20 254 char cmd[5]; local 492 unsigned char cmd[30]; \/* Command *\/ local 662 char cmd[10], rsp[100]; local 767 char cmd[5]; local 872 unsigned char cmd[30], resp[30]; local [all...] |
/external/dnsmasq/src/ |
dnsmasq.c | 997 char *cmd; local 999 if (!(cmd = strsep(&next, ":"))) { 1008 my_syslog(LOG_ERR, _("Unknown cmd '%s'"), cmd); [all...] |
/external/elfutils/src/ |
ld.c | 1032 Elf_Cmd cmd = ELF_C_READ_MMAP; local 1034 while ((subelf = elf_begin (fd, cmd, elf)) != NULL) 1036 cmd = elf_next (subelf); [all...] |
/external/grub/netboot/ |
i82586.c | 64 #define CMD_SUSP 0x4000 /* Suspend after doing cmd. */ 65 #define CMD_INTR 0x2000 /* Interrupt after doing cmd. */ 211 0,0xf000|RX_START|CUC_START, /* SCB status and cmd. */ 293 unsigned short cmd, status; local 296 cmd = (status = shmem[iSCB_STATUS>>1]) & 0xf000; 298 cmd |= CUC_RESUME; 300 cmd |= CUC_START; 302 cmd |= RX_RESUME; 304 cmd |= RX_START; 305 if (cmd == 0) /* Nothing to do * [all...] |
/external/kernel-headers/original/linux/ |
if_vlan.h | 388 int cmd; /* Should be one of the vlan_ioctl_cmds enum above. */ member in struct:vlan_ioctl_args
|
/external/qemu/hw/ |
pci.c | 357 int cmd, i; local 360 cmd = le16_to_cpu(*(uint16_t *)(d->config + PCI_COMMAND)); 370 if (cmd & PCI_COMMAND_IO) { 384 if (cmd & PCI_COMMAND_MEMORY) {
|
/external/quake/quake/src/QW/client/ |
cl_input.c | 286 void CL_BaseMove (usercmd_t *cmd) 290 memset (cmd, 0, sizeof(*cmd)); 292 VectorCopy (cl.viewangles, cmd->angles); 295 cmd->sidemove += cl_sidespeed.value * CL_KeyState (&in_right); 296 cmd->sidemove -= cl_sidespeed.value * CL_KeyState (&in_left); 299 cmd->sidemove += cl_sidespeed.value * CL_KeyState (&in_moveright); 300 cmd->sidemove -= cl_sidespeed.value * CL_KeyState (&in_moveleft); 302 cmd->upmove += cl_upspeed.value * CL_KeyState (&in_up); 303 cmd->upmove -= cl_upspeed.value * CL_KeyState (&in_down) 392 usercmd_t *cmd, *oldcmd; local [all...] |
menu.c | 777 char cmd[80]; local 789 sprintf (cmd, "bind %s \"%s\"\n", Key_KeynumToString (k), bindnames[keys_cursor][0]); 790 Cbuf_InsertText (cmd);
|
/external/quake/quake/src/QW/server/ |
sv_user.c | 26 usercmd_t cmd; variable 280 MSG_WriteString (&host_client->netchan.message, va("cmd spawn %i 0\n",svs.spawncount) ); 286 va("cmd prespawn %i %i\n", svs.spawncount, buf) ); 1190 USER CMD EXECUTION [all...] |
/external/quake/quake/src/WinQuake/ |
server.h | 91 usercmd_t cmd; // movement member in struct:client_s 92 vec3_t wishdir; // intended motion calced from cmd
|
sys_android.cpp | 302 char cmd[256]; local 316 sprintf(cmd, "xterm -e %s %s", editor, filename); 317 system(cmd);
|
/external/wpa_supplicant/ |
driver_hostap.h | 66 /* PRISM2_IOCTL_HOSTAPD ioctl() cmd: */ 97 u32 cmd; member in struct:prism2_hostapd_param 133 u16 cmd; member in struct:prism2_hostapd_param::__anon8413::__anon8420
|
pcsc_funcs.c | 708 unsigned char cmd[50] = { SIM_CMD_SELECT }; local 714 cmd[0] = USIM_CLA; 715 cmd[3] = 0x04; 723 if (5 + aidlen > sizeof(cmd)) 725 cmd[2] = 0x04; /* Select by AID */ 726 cmd[4] = aidlen; /* len */ 727 os_memcpy(cmd + 5, aid, aidlen); 730 cmd[5] = file_id >> 8; 731 cmd[6] = file_id & 0xff; 735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len) 794 unsigned char cmd[5] = { SIM_CMD_READ_RECORD \/* , len *\/ }; local 829 unsigned char cmd[5] = { SIM_CMD_READ_RECORD \/* , len *\/ }; local 875 unsigned char cmd[5] = { SIM_CMD_READ_BIN \/* , len *\/ }; local 920 unsigned char cmd[5 + 8] = { SIM_CMD_VERIFY_CHV1 }; local 1044 unsigned char cmd[5 + 1 + 16] = { SIM_CMD_RUN_GSM_ALG }; local 1144 unsigned char cmd[5 + 1 + AKA_RAND_LEN + 1 + AKA_AUTN_LEN] = local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_hostap.h | 66 /* PRISM2_IOCTL_HOSTAPD ioctl() cmd: */ 97 u32 cmd; member in struct:prism2_hostapd_param 133 u16 cmd; member in struct:prism2_hostapd_param::__anon8581::__anon8588
|
driver_test.c | 112 char cmd[512], *pos, *end; local 119 end = cmd + sizeof(cmd); 120 pos = cmd; 144 if (sendto(drv->test_socket, cmd, os_strlen(cmd), 0, 281 char cmd[200], *pos, *end; local 283 end = cmd + sizeof(cmd); 284 pos = cmd; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.c | 281 char buf[1000], *pos, *cmd, *imsi; local 301 /* <cmd> <IMSI> ... */ 303 cmd = buf; 304 pos = os_strchr(cmd, ' '); 314 cmd, imsi); 316 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) 318 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) 322 "'%s'", cmd); [all...] |