Home
last modified time | relevance | path

Searched refs:reply_len (Results 1 – 15 of 15) sorted by relevance

/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp188 size_t reply_len; in addNetwork() local
226 reply_len = sizeof(reply) - 1; in addNetwork()
229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); in addNetwork()
405 reply_len = sizeof(reply); in addNetwork()
406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork()
415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); in addNetwork()
431 size_t reply_len; in setNetworkParam() local
434 reply_len = sizeof(reply); in setNetworkParam()
435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam()
496 static int key_value_isset(const char *reply, size_t reply_len) in key_value_isset() argument
[all …]
Dpeers.cpp322 size_t reply_len; in enter_pin() local
334 reply_len = sizeof(reply) - 1; in enter_pin()
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin()
353 size_t reply_len; in ctx_p2p_start() local
354 reply_len = sizeof(reply) - 1; in ctx_p2p_start()
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || in ctx_p2p_start()
368 size_t reply_len; in ctx_p2p_stop() local
369 reply_len = sizeof(reply) - 1; in ctx_p2p_stop()
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); in ctx_p2p_stop()
377 size_t reply_len; in ctx_p2p_listen() local
[all …]
Dscanresults.cpp57 size_t reply_len; in updateResults() local
69 reply_len = sizeof(reply) - 1; in updateResults()
70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) in updateResults()
72 reply[reply_len] = '\0'; in updateResults()
117 size_t reply_len = sizeof(reply); in scanRequest() local
122 wpagui->ctrlRequest("SCAN", reply, &reply_len); in scanRequest()
Dwpagui.cpp772 size_t reply_len = sizeof(reply); in disconnect() local
773 ctrlRequest("DISCONNECT", reply, &reply_len); in disconnect()
869 size_t reply_len = sizeof(reply); in signalMeterUpdate() local
873 ctrlRequest("SIGNAL_POLL", reply, &reply_len); in signalMeterUpdate()
1055 size_t reply_len = sizeof(reply); in connectB() local
1056 ctrlRequest("REASSOCIATE", reply, &reply_len); in connectB()
1064 size_t reply_len = sizeof(reply); in selectNetwork() local
1071 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in selectNetwork()
1081 size_t reply_len = sizeof(reply); in enableNetwork() local
1091 ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in enableNetwork()
[all …]
Duserdatarequest.cpp82 size_t reply_len = sizeof(reply); in sendReply() local
92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in sendReply()
/external/wpa_supplicant_8/hostapd/
Dctrl_iface.c1860 int reply_len; in hostapd_ctrl_iface_receive() local
1886 reply_len = 3; in hostapd_ctrl_iface_receive()
1890 reply_len = 5; in hostapd_ctrl_iface_receive()
1893 reply_len = -1; in hostapd_ctrl_iface_receive()
1895 reply_len = hostapd_ctrl_iface_status(hapd, reply, in hostapd_ctrl_iface_receive()
1898 reply_len = hostapd_drv_status(hapd, reply, reply_size); in hostapd_ctrl_iface_receive()
1900 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); in hostapd_ctrl_iface_receive()
1901 if (reply_len >= 0) { in hostapd_ctrl_iface_receive()
1902 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, in hostapd_ctrl_iface_receive()
1903 reply_size - reply_len); in hostapd_ctrl_iface_receive()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dctrl_iface_udp.c179 size_t *reply_len) argument
184 *reply_len = 1;
192 *reply_len = 7 + 2 * COOKIE_LEN;
214 size_t reply_len = 0; local
251 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len);
286 reply_len = 1;
289 reply_len = 2;
293 reply_len = 1;
295 reply_len = 2;
299 reply_len = 1;
[all …]
Dctrl_iface.c6980 char *reply, int reply_size, int *reply_len) in wpas_ctrl_scan() argument
6996 *reply_len = -1; in wpas_ctrl_scan()
7003 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan()
7011 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan()
7025 *reply_len = -1; in wpas_ctrl_scan()
7045 *reply_len = -1; in wpas_ctrl_scan()
7066 *reply_len = -1; in wpas_ctrl_scan()
7078 *reply_len = -1; in wpas_ctrl_scan()
7133 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan()
7153 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan()
[all …]
Dctrl_iface_unix.c164 size_t reply_len = 0; in wpa_supplicant_ctrl_iface_receive() local
179 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
182 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
187 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
189 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
193 reply_len = 1; in wpa_supplicant_ctrl_iface_receive()
195 reply_len = 2; in wpa_supplicant_ctrl_iface_receive()
198 &reply_len); in wpa_supplicant_ctrl_iface_receive()
209 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive()
211 reply_len = 5; in wpa_supplicant_ctrl_iface_receive()
[all …]
Dctrl_iface_named_pipe.c283 size_t reply_len = 0, send_len; in wpa_supplicant_ctrl_iface_rx() local
296 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
300 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
304 reply_len = 2; in wpa_supplicant_ctrl_iface_rx()
307 &reply_len); in wpa_supplicant_ctrl_iface_rx()
312 send_len = reply_len; in wpa_supplicant_ctrl_iface_rx()
313 } else if (reply_len == 2) { in wpa_supplicant_ctrl_iface_rx()
719 size_t reply_len = 0, send_len; in wpa_supplicant_global_iface_rx() local
728 &reply_len); in wpa_supplicant_global_iface_rx()
731 send_len = reply_len; in wpa_supplicant_global_iface_rx()
[all …]
/external/e2fsprogs/misc/
Duuidd.c148 int32_t reply_len = 0; in call_daemon() local
195 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in call_daemon()
202 if (reply_len < 0 || reply_len > buflen) { in call_daemon()
208 ret = read_all(s, (char *) buf, reply_len); in call_daemon()
211 if (reply_len >= (int) (16+sizeof(int))) in call_daemon()
234 int32_t reply_len = 0; in server_loop() local
368 reply_len = strlen(reply_buf)+1; in server_loop()
372 reply_len = strlen(reply_buf)+1; in server_loop()
382 reply_len = sizeof(uu); in server_loop()
392 reply_len = sizeof(uu); in server_loop()
[all …]
/external/wpa_supplicant_8/src/common/
Dwpa_ctrl.c452 char *reply, size_t *reply_len, in wpa_ctrl_request() argument
521 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request()
532 if ((size_t) res == *reply_len) in wpa_ctrl_request()
533 res = (*reply_len) - 1; in wpa_ctrl_request()
539 *reply_len = res; in wpa_ctrl_request()
580 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument
584 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv()
587 *reply_len = res; in wpa_ctrl_recv()
689 char *reply, size_t *reply_len, in wpa_ctrl_request() argument
693 DWORD readlen = *reply_len; in wpa_ctrl_request()
[all …]
Dwpa_ctrl.h355 char *reply, size_t *reply_len,
398 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
/external/wpa_supplicant_8/src/drivers/
Ddriver_privsep.c45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument
83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd()
89 *reply_len = res; in wpa_priv_cmd()
119 size_t reply_len = 60000; in wpa_driver_privsep_get_scan_results2() local
123 buf = os_malloc(reply_len); in wpa_driver_privsep_get_scan_results2()
127 NULL, 0, buf, &reply_len); in wpa_driver_privsep_get_scan_results2()
134 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2()
135 if (reply_len < sizeof(int)) { in wpa_driver_privsep_get_scan_results2()
137 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2()
143 end = buf + reply_len; in wpa_driver_privsep_get_scan_results2()
/external/e2fsprogs/lib/uuid/
Dgen_uuid.c487 int32_t reply_len = 0, expected = 16; in get_uuid_via_daemon() local
535 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); in get_uuid_via_daemon()
539 if (reply_len != expected) in get_uuid_via_daemon()
542 ret = read_all(s, op_buf, reply_len); in get_uuid_via_daemon()