/freebsd/contrib/wpa/hostapd/ |
H A D | ctrl_iface.c | 3988 int reply_len, res; in hostapd_ctrl_iface_receive_process() local 3991 reply_len = 3; in hostapd_ctrl_iface_receive_process() 3995 reply_len = 5; in hostapd_ctrl_iface_receive_process() 3998 reply_len = -1; in hostapd_ctrl_iface_receive_process() 4004 reply_len = hostapd_ctrl_iface_status(hapd, reply, in hostapd_ctrl_iface_receive_process() 4007 reply_len = hostapd_drv_status(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process() 4009 reply_len = ieee802_11_get_mib(hapd, reply, reply_size); in hostapd_ctrl_iface_receive_process() 4010 if (reply_len >= 0) { in hostapd_ctrl_iface_receive_process() 4011 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len, in hostapd_ctrl_iface_receive_process() 4012 reply_size - reply_len); in hostapd_ctrl_iface_receive_process() [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 199 size_t *reply_len) argument 204 *reply_len = 1; 212 *reply_len = 7 + 2 * COOKIE_LEN; 234 size_t reply_len = 0; local 283 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 322 reply_len = 1; 325 reply_len = 2; 330 reply_len = 1; 332 reply_len = 2; 336 reply_len = 1; [all …]
|
H A D | ctrl_iface.c | 9230 char *reply, int reply_size, int *reply_len) in wpas_ctrl_scan() argument 9247 *reply_len = -1; in wpas_ctrl_scan() 9254 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan() 9262 *reply_len = os_snprintf(reply, reply_size, "FAIL-BUSY\n"); in wpas_ctrl_scan() 9276 *reply_len = -1; in wpas_ctrl_scan() 9296 *reply_len = -1; in wpas_ctrl_scan() 9307 *reply_len = -1; in wpas_ctrl_scan() 9337 *reply_len = -1; in wpas_ctrl_scan() 9349 *reply_len = -1; in wpas_ctrl_scan() 9405 *reply_len = os_snprintf(reply, reply_size, "%u\n", in wpas_ctrl_scan() [all …]
|
H A D | ctrl_iface_unix.c | 139 size_t reply_len = 0; in wpa_supplicant_ctrl_iface_receive() local 163 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 166 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 171 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 173 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 177 reply_len = 1; in wpa_supplicant_ctrl_iface_receive() 179 reply_len = 2; in wpa_supplicant_ctrl_iface_receive() 185 &reply_len); in wpa_supplicant_ctrl_iface_receive() 196 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive() 198 reply_len = 5; in wpa_supplicant_ctrl_iface_receive() [all …]
|
H A D | ctrl_iface_named_pipe.c | 283 size_t reply_len = 0, send_len; in wpa_supplicant_ctrl_iface_rx() local 296 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 300 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 304 reply_len = 2; in wpa_supplicant_ctrl_iface_rx() 307 &reply_len); in wpa_supplicant_ctrl_iface_rx() 312 send_len = reply_len; in wpa_supplicant_ctrl_iface_rx() 313 } else if (reply_len == 2) { in wpa_supplicant_ctrl_iface_rx() 721 size_t reply_len = 0, send_len; in wpa_supplicant_global_iface_rx() local 730 &reply_len); in wpa_supplicant_global_iface_rx() 733 send_len = reply_len; in wpa_supplicant_global_iface_rx() [all …]
|
H A D | ap.c | 1984 size_t reply_len = 0, i; in wpas_ap_pmksa_cache_list() local 1991 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list() 1992 return reply_len; in wpas_ap_pmksa_cache_list() 1993 os_memcpy(&buf[reply_len], ap_delimiter, dlen); in wpas_ap_pmksa_cache_list() 1994 reply_len += dlen; in wpas_ap_pmksa_cache_list() 1997 reply_len += hostapd_ctrl_iface_pmksa_list( in wpas_ap_pmksa_cache_list() 1999 &buf[reply_len], len - reply_len); in wpas_ap_pmksa_cache_list() 2005 if (dlen > len - reply_len) in wpas_ap_pmksa_cache_list() 2006 return reply_len; in wpas_ap_pmksa_cache_list() 2007 os_memcpy(&buf[reply_len], mesh_delimiter, dlen); in wpas_ap_pmksa_cache_list() [all …]
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_ctrl.c | 482 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 563 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request() 575 if ((size_t) res == *reply_len) in wpa_ctrl_request() 576 res = (*reply_len) - 1; in wpa_ctrl_request() 582 *reply_len = res; in wpa_ctrl_request() 623 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument 627 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv() 630 *reply_len = res; in wpa_ctrl_recv() 732 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 736 DWORD readlen = *reply_len; in wpa_ctrl_request() [all …]
|
H A D | wpa_ctrl.h | 577 char *reply, size_t *reply_len, 620 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len);
|
/freebsd/contrib/ntp/ntpd/ |
H A D | ntp_signd.c | 165 uint32_t reply_len; in send_via_ntp_signd() local 203 if (recv_packet(fd, &reply, &reply_len) != 0) { in send_via_ntp_signd() 217 if (reply_len <= sizeof(samba_reply)) { in send_via_ntp_signd() 218 memcpy(&samba_reply, reply, reply_len); in send_via_ntp_signd() 219 if (ntohl(samba_reply.op) == 3 && reply_len > offsetof(struct samba_key_out, pkt)) { in send_via_ntp_signd() 220 sendlen = reply_len - offsetof(struct samba_key_out, pkt); in send_via_ntp_signd()
|
/freebsd/contrib/wpa/src/drivers/ |
H A D | driver_privsep.c | 45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd() 89 *reply_len = res; in wpa_priv_cmd() 135 size_t reply_len = 60000; in wpa_driver_privsep_get_scan_results2() local 139 buf = os_malloc(reply_len); in wpa_driver_privsep_get_scan_results2() 143 NULL, 0, buf, &reply_len); in wpa_driver_privsep_get_scan_results2() 150 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2() 151 if (reply_len < sizeof(int)) { in wpa_driver_privsep_get_scan_results2() 153 (unsigned long) reply_len); in wpa_driver_privsep_get_scan_results2() 159 end = buf + reply_len; in wpa_driver_privsep_get_scan_results2()
|
/freebsd/contrib/libfido2/src/ |
H A D | u2f.c | 319 int reply_len; in do_auth() local 368 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, in do_auth() 382 (size_t)reply_len)) != FIDO_OK) { in do_auth() 670 int reply_len; in u2f_register() local 733 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, in u2f_register() 747 (size_t)reply_len)) != FIDO_OK) { in u2f_register() 921 int reply_len; in u2f_get_touch_status() local 930 if ((reply_len = fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, in u2f_get_touch_status() 937 switch ((reply[reply_len - 2] << 8) | reply[reply_len - 1]) { in u2f_get_touch_status()
|
H A D | dev.c | 166 int reply_len; in fido_dev_open_rx() local 169 if ((reply_len = fido_rx(dev, CTAP_CMD_INIT, &dev->attr, in fido_dev_open_rx() 180 if ((size_t)reply_len != sizeof(dev->attr) || in fido_dev_open_rx()
|
H A D | cred.c | 143 int reply_len; in fido_dev_make_cred_rx() local 153 if ((reply_len = fido_rx(dev, CTAP_CMD_CBOR, reply, FIDO_MAXMSG_CRED, in fido_dev_make_cred_rx() 160 if ((r = cbor_parse_reply(reply, (size_t)reply_len, cred, in fido_dev_make_cred_rx()
|
/freebsd/sys/cam/scsi/ |
H A D | scsi_sg.c | 695 if (hdr->reply_len < 0) { in sgwrite() 741 } else if (hdr->reply_len != 0) { in sgwrite() 742 buf = malloc(hdr->reply_len, M_DEVBUF, M_WAITOK | M_ZERO); in sgwrite() 743 buf_len = hdr->reply_len; in sgwrite() 799 int error, pack_len, reply_len, pack_id; in sgread() local 809 if ((error = uiomove(&reply_len, 4, uio)) != 0) in sgread()
|
H A D | scsi_sg.h | 94 int reply_len; member
|
/freebsd/usr.sbin/mpsutil/ |
H A D | mpsutil.h | 111 uint32_t reply_len, void *buffer, int len, uint32_t flags); 113 uint32_t reply_len, void *data_in, uint32_t datain_len, void *data_out,
|
H A D | mps_cmd.c | 653 uint32_t reply_len, void *buffer, int len, uint32_t flags) in mps_user_command() argument 661 cmd.rpl_len = reply_len; in mps_user_command() 673 uint32_t reply_len, void *data_in, uint32_t datain_len, void *data_out, in mps_pass_command() argument 682 pass.ReplySize = reply_len; in mps_pass_command()
|
/freebsd/contrib/wpa/src/fst/ |
H A D | fst_ctrl_iface.c | 465 size_t reply_len; member 479 c->reply_len += ret; in list_session_enum_cb() 497 ctx.reply_len = 0; in list_sessions() 501 ctx.reply_len += os_snprintf(buf + ctx.reply_len, ctx.buflen, "\n"); in list_sessions() 503 return ctx.reply_len; in list_sessions()
|
/freebsd/contrib/libpcap/ |
H A D | pcap-rpcap.c | 2093 size_t reply_len; in rpcap_doauth() local 2110 reply_len = sizeof(struct rpcap_authreply_old); in rpcap_doauth() 2116 reply_len = sizeof(struct rpcap_authreply); in rpcap_doauth() 2132 reply_len, &plen, errbuf) == -1) in rpcap_doauth()
|
/freebsd/sys/dev/mpt/ |
H A D | mpt.c | 1435 mpt_recv_handshake_reply(struct mpt_softc *mpt, size_t reply_len, void *reply) in mpt_recv_handshake_reply() argument 1443 reply_len >>= 1; in mpt_recv_handshake_reply() 1470 if ((reply_len >> 1) != hdr->MsgLength && in mpt_recv_handshake_reply() 1474 hdr->MsgLength << 2, reply_len << 1, hdr->Function); in mpt_recv_handshake_reply() 1479 reply_left = reply_len - 2; in mpt_recv_handshake_reply()
|
H A D | mpt.h | 1065 size_t reply_len, void *reply);
|