/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 82 size_t reply_len = sizeof(reply); local 92 wpagui->ctrlRequest(cmd.toAscii().constData(), reply, &reply_len);
|
scanresults.cpp | 56 size_t reply_len; local 68 reply_len = sizeof(reply) - 1; 69 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) 71 reply[reply_len] = '\0'; 116 size_t reply_len = sizeof(reply); local 121 wpagui->ctrlRequest("SCAN", reply, &reply_len);
|
networkconfig.cpp | 187 size_t reply_len; local 225 reply_len = sizeof(reply) - 1; 228 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); 404 reply_len = sizeof(reply); 405 wpagui->ctrlRequest(cmd, reply, &reply_len); 414 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); 430 size_t reply_len; local 433 reply_len = sizeof(reply); 434 wpagui->ctrlRequest(cmd, reply, &reply_len); 495 static int key_value_isset(const char *reply, size_t reply_len) 509 size_t reply_len; local 792 size_t reply_len; local 829 size_t reply_len; local [all...] |
wpagui.cpp | 729 size_t reply_len = sizeof(reply); local 730 ctrlRequest("DISCONNECT", reply, &reply_len); 965 size_t reply_len = sizeof(reply); local 966 ctrlRequest("REASSOCIATE", reply, &reply_len); 974 size_t reply_len = sizeof(reply); local 981 ctrlRequest(cmd.toAscii().constData(), reply, &reply_len); 991 size_t reply_len = sizeof(reply); local 1001 ctrlRequest(cmd.toAscii().constData(), reply, &reply_len); 1010 size_t reply_len = sizeof(reply); local 1020 ctrlRequest(cmd.toAscii().constData(), reply, &reply_len); 1100 size_t reply_len = sizeof(reply); local 1166 size_t reply_len = sizeof(reply) - 1; local 1497 size_t reply_len = sizeof(reply); local 1519 size_t reply_len = sizeof(reply) - 1; local 1557 size_t reply_len = sizeof(reply); local [all...] |
peers.cpp | 322 size_t reply_len; local 334 reply_len = sizeof(reply) - 1; 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { 353 size_t reply_len; local 354 reply_len = sizeof(reply) - 1; 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || 368 size_t reply_len; local 369 reply_len = sizeof(reply) - 1; 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); 377 size_t reply_len; local 392 size_t reply_len; local 457 size_t reply_len; local 488 size_t reply_len; local 575 size_t reply_len; local 678 size_t reply_len; local 1062 size_t reply_len; local 1351 size_t reply_len; local 1385 size_t reply_len; local 1409 size_t reply_len; local 1432 size_t reply_len; local 1453 size_t reply_len; local 1481 size_t reply_len; local 1516 size_t reply_len; local 1536 size_t reply_len; local 1711 size_t reply_len; local 1750 size_t reply_len; local 1798 size_t reply_len; local 1823 size_t reply_len; local 1846 size_t reply_len; local [all...] |
/external/chromium_org/base/posix/ |
unix_domain_socket_linux.cc | 207 const ssize_t reply_len = RecvMsgWithFlags( local 210 if (reply_len == -1) 223 return reply_len;
|
/external/e2fsprogs/misc/ |
uuidd.c | 148 int32_t reply_len = 0; local 195 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); 202 if (reply_len < 0 || reply_len > buflen) { 208 ret = read_all(s, (char *) buf, reply_len); 211 if (reply_len >= (int) (16+sizeof(int))) 234 int32_t reply_len = 0; local 368 reply_len = strlen(reply_buf)+1; 372 reply_len = strlen(reply_buf)+1 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_udp.c | 179 size_t *reply_len) 184 *reply_len = 1; 192 *reply_len = 7 + 2 * COOKIE_LEN; 214 size_t reply_len = 0; local 250 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 285 reply_len = 1; 288 reply_len = 2; 292 reply_len = 1; 294 reply_len = 2; 298 reply_len = 1 548 size_t reply_len; local [all...] |
ctrl_iface_unix.c | 161 size_t reply_len = 0; local 176 reply_len = 1; 179 reply_len = 2; 184 reply_len = 1; 186 reply_len = 2; 190 reply_len = 1; 192 reply_len = 2; 195 &reply_len); 199 if (!reply && reply_len == 1) { 201 reply_len = 5 806 size_t reply_len; local [all...] |
ctrl_iface_named_pipe.c | 283 size_t reply_len = 0, send_len; local 296 reply_len = 2; 300 reply_len = 2; 304 reply_len = 2; 307 &reply_len); 312 send_len = reply_len; 313 } else if (reply_len == 2) { 718 size_t reply_len = 0, send_len; local 727 &reply_len); 730 send_len = reply_len; [all...] |
ctrl_iface.c | 6462 int reply_len; local 7459 int reply_len; local [all...] |
/external/chromium_org/native_client_sdk/src/tests/nacl_io_socket_test/ |
socket_test.cc | 593 const int reply_len = strlen(server_reply); local 662 ASSERT_EQ(reply_len, ki_send(new_socket, server_reply, reply_len, 0)); 665 ASSERT_EQ(reply_len, ki_recv(client_sock, inbuf, sizeof(inbuf), 0)); 666 inbuf[reply_len] = 0;
|
/external/e2fsprogs/lib/uuid/ |
gen_uuid.c | 487 int32_t reply_len = 0, expected = 16; local 535 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); 539 if (reply_len != expected) 542 ret = read_all(s, op_buf, reply_len);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 45 void *reply, size_t *reply_len) 82 res = recv(drv->cmd_socket, reply, *reply_len, 0); 87 *reply_len = res; 117 size_t reply_len = 60000; local 121 buf = os_malloc(reply_len); 125 NULL, 0, buf, &reply_len); 132 (unsigned long) reply_len); 133 if (reply_len < sizeof(int)) { 135 (unsigned long) reply_len); 141 end = buf + reply_len; [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/scsi/ |
sg.h | 226 int reply_len; member in struct:sg_header
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/scsi/ |
sg.h | 226 int reply_len; member in struct:sg_header
|
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 1363 int reply_len; local 1385 reply_len = 3; 1389 reply_len = 5; 1392 reply_len = -1; 1394 reply_len = hostapd_ctrl_iface_status(hapd, reply, 1397 reply_len = hostapd_drv_status(hapd, reply, reply_size); 1399 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); 1400 if (reply_len >= 0) { 1401 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, 1402 reply_size - reply_len); 1829 int reply_len; local [all...] |