/third_party/libdrm/freedreno/msm/ |
H A D | msm_ringbuffer.c | 465 struct drm_msm_gem_submit req = { in msm_ringbuffer_flush() local 475 req.flags |= MSM_SUBMIT_FENCE_FD_IN | MSM_SUBMIT_NO_IMPLICIT; in msm_ringbuffer_flush() 476 req.fence_fd = in_fence_fd; in msm_ringbuffer_flush() 480 req.flags |= MSM_SUBMIT_FENCE_FD_OUT; in msm_ringbuffer_flush() 509 req.bos = VOID2U64(msm_ring->submit.bos), in msm_ringbuffer_flush() 510 req.nr_bos = msm_ring->submit.nr_bos; in msm_ringbuffer_flush() 511 req.cmds = VOID2U64(msm_ring->submit.cmds), in msm_ringbuffer_flush() 512 req.nr_cmds = msm_ring->submit.nr_cmds; in msm_ringbuffer_flush() 514 DEBUG_MSG("nr_cmds=%u, nr_bos=%u", req.nr_cmds, req in msm_ringbuffer_flush() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_mschapv2.c | 231 * @req: Pointer to EAP-MSCHAPv2 header from the request 239 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, in eap_mschapv2_challenge() 250 if (req_len < sizeof(*req) + 1) { in eap_mschapv2_challenge() 256 pos = (const u8 *) (req + 1); in eap_mschapv2_challenge() 258 len = req_len - sizeof(*req) - 1; in eap_mschapv2_challenge() 290 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, in eap_mschapv2_challenge() 336 * @req: Pointer to EAP-MSCHAPv2 header from the request 345 const struct eap_mschapv2_hdr *req, in eap_mschapv2_success() 353 len = req_len - sizeof(*req); in eap_mschapv2_success() 354 pos = (const u8 *) (req in eap_mschapv2_success() 237 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) eap_mschapv2_challenge() argument 342 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) eap_mschapv2_success() argument 508 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) eap_mschapv2_change_password() argument 649 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) eap_mschapv2_failure() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_mschapv2.c | 231 * @req: Pointer to EAP-MSCHAPv2 header from the request 239 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, in eap_mschapv2_challenge() 250 if (req_len < sizeof(*req) + 1) { in eap_mschapv2_challenge() 256 pos = (const u8 *) (req + 1); in eap_mschapv2_challenge() 258 len = req_len - sizeof(*req) - 1; in eap_mschapv2_challenge() 290 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, in eap_mschapv2_challenge() 336 * @req: Pointer to EAP-MSCHAPv2 header from the request 345 const struct eap_mschapv2_hdr *req, in eap_mschapv2_success() 353 len = req_len - sizeof(*req); in eap_mschapv2_success() 354 pos = (const u8 *) (req in eap_mschapv2_success() 237 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) eap_mschapv2_challenge() argument 342 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) eap_mschapv2_success() argument 508 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) eap_mschapv2_change_password() argument 649 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) eap_mschapv2_failure() argument [all...] |
/foundation/systemabilitymgr/samgr_lite/samgr_endpoint/source/ |
H A D | default_client.c | 225 IpcIo req;
in QueryIdentity() local 227 IpcIoInit(&req, data, MAX_DATA_LEN, 0);
in QueryIdentity() 228 IpcIoPushUint32(&req, RES_FEATURE);
in QueryIdentity() 229 IpcIoPushUint32(&req, OP_GET);
in QueryIdentity() 230 IpcIoPushString(&req, service);
in QueryIdentity() 231 IpcIoPushBool(&req, feature == NULL);
in QueryIdentity() 233 IpcIoPushString(&req, feature);
in QueryIdentity() 238 int ret = Transact(context, samgr, INVALID_INDEX, &req, &reply, LITEIPC_FLAG_DEFAULT, (uintptr_t *)&replyBuf);
in QueryIdentity()
|
/third_party/libuv/test/ |
H A D | test-tcp-close-reset.c | 49 static void connect_cb(uv_connect_t* req, int status); 50 static void write_cb(uv_write_t* req, int status); 52 static void shutdown_cb(uv_shutdown_t* req, int status); 121 static void write_cb(uv_write_t* req, int status) { in write_cb() argument 124 ASSERT_PTR_EQ(req->handle, (uv_stream_t*)&tcp_client); in write_cb() 138 static void shutdown_cb(uv_shutdown_t* req, int status) { in shutdown_cb() argument 140 ASSERT_PTR_EQ(req->handle, (uv_stream_t*) &tcp_client); in shutdown_cb() 142 ASSERT_PTR_EQ(req->handle, (uv_stream_t*) &tcp_accepted); in shutdown_cb()
|
H A D | test-udp-sendmmsg-error.c | 31 static uv_udp_send_t req[DATAGRAMS]; variable 44 static void send_cb(uv_udp_send_t* req, int status) { in send_cb() argument 64 ASSERT_OK(uv_udp_send(&req[i], &client, &buf, 1, NULL, send_cb)); in TEST_IMPL()
|
H A D | test-tcp-write-after-connect.c | 34 static void write_cb(uv_write_t *req, int status) { in write_cb() argument 36 uv_close((uv_handle_t*) req->handle, NULL); in write_cb() 40 static void connect_cb(uv_connect_t *req, int status) { in connect_cb() argument
|
/third_party/libdrm/etnaviv/ |
H A D | etnaviv_cmd_stream.c | 184 struct drm_etnaviv_gem_submit req = { in flush() local 198 req.flags |= ETNA_SUBMIT_FENCE_FD_IN | ETNA_SUBMIT_NO_IMPLICIT; in flush() 199 req.fence_fd = in_fence_fd; in flush() 203 req.flags |= ETNA_SUBMIT_FENCE_FD_OUT; in flush() 206 &req, sizeof(req)); in flush() 211 priv->last_timestamp = req.fence; in flush() 221 *out_fence_fd = req.fence_fd; in flush()
|
/third_party/libdrm/freedreno/ |
H A D | freedreno_bo.c | 181 struct drm_gem_open req = { in fd_bo_from_name() local 193 if (drmIoctl(dev->fd, DRM_IOCTL_GEM_OPEN, &req)) { in fd_bo_from_name() 198 bo = lookup_bo(dev->handle_table, req.handle); in fd_bo_from_name() 202 bo = bo_from_handle(dev, req.size, req.handle); in fd_bo_from_name() 275 struct drm_gem_flink req = { in fd_bo_get_name() local 280 ret = drmIoctl(bo->dev->fd, DRM_IOCTL_GEM_FLINK, &req); in fd_bo_get_name() 286 set_name(bo, req.name); in fd_bo_get_name()
|
/third_party/mesa3d/src/gallium/winsys/svga/drm/ |
H A D | vmwgfx_drm.h | 253 * @req: Input data as described above. 260 struct drm_vmw_surface_create_req req; member 281 * @req: Input data as described above. 288 struct drm_vmw_surface_arg req; member 438 * @req: Input data as described above. 445 struct drm_vmw_alloc_bo_req req; member 974 * @req: Input argument as described above. 981 struct drm_vmw_gb_surface_create_req req; member 1016 * @req: Input data as described above at "struct drm_vmw_surface_arg" 1023 struct drm_vmw_surface_arg req; member 1106 enum drm_vmw_extended_context req; global() member 1188 struct drm_vmw_gb_surface_create_ext_req req; global() member 1231 struct drm_vmw_surface_arg req; global() member [all...] |
/third_party/musl/libc-test/src/functionalext/supplement/time/time_gtest/ |
H A D | sys_clock_test.cpp | 317 const timespec req = { .tv_nsec = 5000000 }; in HWTEST_F() local 318 int result = clock_nanosleep(CLOCK_MONOTONIC, 0, &req, nullptr); in HWTEST_F() 332 timespec req; in HWTEST_F() local 334 int err = clock_nanosleep(-1, 0, &req, &rem); in HWTEST_F() 346 timespec req; in HWTEST_F() local 347 req.tv_sec = 1; in HWTEST_F() 348 req.tv_nsec = 0; in HWTEST_F() 349 int result = clock_nanosleep(CLOCK_THREAD_CPUTIME_ID, 0, &req, nullptr); in HWTEST_F()
|
/third_party/python/Lib/distutils/tests/ |
H A D | test_register.py | 63 def open(self, req, data=None, timeout=None): 64 self.reqs.append(req) 185 req = self.conn.reqs[0] 186 headers = dict(req.headers) 188 self.assertIn(b'tarek', req.data) 203 req = self.conn.reqs[0] 204 headers = dict(req.headers) 206 self.assertIn(b'tarek', req.data)
|
/third_party/openssl/test/ |
H A D | http_test.c | 37 const char *req, *path; in mock_http_server() local 38 long count = BIO_get_mem_data(in, (unsigned char **)&req); in mock_http_server() 39 const char *hdr = (char *)req; in mock_http_server() 64 count -= (hdr - req); in mock_http_server() 91 /* skip req Connection header */ in mock_http_server() 119 BIO *rsp, *req = ASN1_item_i2d_mem_bio(x509_it, (ASN1_VALUE *)x509); in test_http_x509() local 124 if (wbio == NULL || rbio == NULL || req == NULL) in test_http_x509() 141 req, content_type, 1 /* expect_asn1 */, in test_http_x509() 150 BIO_free(req); in test_http_x509() 181 NULL /* content_type */, NULL /* req in test_http_keep_alive() [all...] |
/foundation/distributedhardware/device_manager/interfaces/inner_kits/native_cpp/src/ipc/ |
H A D | ipc_client_proxy.cpp | 42 int32_t IpcClientProxy::SendRequest(int32_t cmdCode, std::shared_ptr<IpcReq> req, std::shared_ptr<IpcRsp> rsp) in SendRequest() argument 47 if (ipcClientManager_ == nullptr || req == nullptr || rsp == nullptr) { in SendRequest() 48 LOGE("req,rsp or ipc client is null"); in SendRequest() 51 return ipcClientManager_->SendRequest(cmdCode, req, rsp); in SendRequest()
|
/foundation/distributedhardware/device_manager/test/servicesfuzztest/ipcclientmanager_fuzzer/ |
H A D | ipc_client_manager_fuzzer.cpp | 36 std::shared_ptr<IpcReq> req = std::make_shared<IpcReq>(); in IpcClientManagerFuzzTest() local 39 req->SetPkgName(pkgName); in IpcClientManagerFuzzTest() 44 instance->SendRequest(cmdCode, req, rsp); in IpcClientManagerFuzzTest()
|
/third_party/node/test/parallel/ |
H A D | test-gc-http-client-connaborted.js | 17 function serverHandler(req, res) { 31 const req = http.get({ 38 onGC(req, { ongc });
|
H A D | test-http-host-header-ipv6-fail.js | 28 http.createServer(common.mustCall(function(req, res) { 30 assert.strictEqual(req.headers.host, req.headers.expectedhost);
|
H A D | test-http-header-owstext.js | 13 const server = http.createServer(common.mustCall((req, res) => { 14 assert.strictEqual(req.headers[hdr], rcv); 15 req.pipe(res);
|
H A D | test-https-client-get-url.js | 40 const server = https.createServer(options, common.mustCall((req, res) => { 41 assert.strictEqual(req.method, 'GET'); 42 assert.strictEqual(req.url, '/foo?bar');
|
H A D | test-https-client-override-global-agent.js | 17 const server = https.Server(options, common.mustCall((req, res) => { 32 const req = https.get({ 35 req.on('close', () =>
|
H A D | test-https-close.js | 16 const server = https.createServer(options, (req, res) => { 49 const req = https.request(requestOptions, (res) => { 53 req.end();
|
H A D | test-https-pfx.js | 45 const server = https.createServer(options, function(req, res) { 46 assert.strictEqual(req.socket.authorized, false); // not a client cert 47 assert.strictEqual(req.socket.authorizationError,
|
/third_party/node/benchmark/http2/ |
H A D | headers.js | 40 const req = client.request(headersObject); 41 req.resume(); 42 req.on('end', () => {
|
/third_party/node/deps/openssl/openssl/crypto/http/ |
H A D | http_client.c | 57 BIO *req; /* BIO holding the request provided by caller */ member 128 BIO_free(rctx->req); in OSSL_HTTP_REQ_CTX_free() 274 const char *content_type, BIO *req) in set1_content() 281 if (rctx == NULL || (req == NULL && content_type != NULL)) { in set1_content() 290 BIO_free(rctx->req); in set1_content() 291 rctx->req = NULL; in set1_content() 292 if (req == NULL) in set1_content() 307 if (BIO_method_type(req) == BIO_TYPE_FILE) { in set1_content() 309 if (BIO_get_fp(req, &fp) == 1 && fseek(fp, 0, SEEK_END) == 0) { in set1_content() 317 req_len = BIO_ctrl(req, BIO_CTRL_INF in set1_content() 273 set1_content(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, BIO *req) set1_content() argument 337 OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, const ASN1_ITEM *it, const ASN1_VALUE *req) OSSL_HTTP_REQ_CTX_set1_req() argument 1015 OSSL_HTTP_set1_request(OSSL_HTTP_REQ_CTX *rctx, const char *path, const STACK_OF(CONF_VALUE) *headers, const char *content_type, BIO *req, const char *expected_content_type, int expect_asn1, size_t max_resp_len, int timeout, int keep_alive) OSSL_HTTP_set1_request() argument 1212 OSSL_HTTP_transfer(OSSL_HTTP_REQ_CTX **prctx, const char *server, const char *port, const char *path, int use_ssl, const char *proxy, const char *no_proxy, BIO *bio, BIO *rbio, OSSL_HTTP_bio_cb_t bio_update_fn, void *arg, int buf_size, const STACK_OF(CONF_VALUE) *headers, const char *content_type, BIO *req, const char *expected_ct, int expect_asn1, size_t max_resp_len, int timeout, int keep_alive) OSSL_HTTP_transfer() argument [all...] |
/third_party/openssl/crypto/http/ |
H A D | http_client.c | 57 BIO *req; /* BIO holding the request provided by caller */ member 128 BIO_free(rctx->req); in OSSL_HTTP_REQ_CTX_free() 267 const char *content_type, BIO *req) in set1_content() 274 if (rctx == NULL || (req == NULL && content_type != NULL)) { in set1_content() 283 BIO_free(rctx->req); in set1_content() 284 rctx->req = NULL; in set1_content() 285 if (req == NULL) in set1_content() 300 if (BIO_method_type(req) == BIO_TYPE_FILE) { in set1_content() 302 if (BIO_get_fp(req, &fp) == 1 && fseek(fp, 0, SEEK_END) == 0) { in set1_content() 310 req_len = BIO_ctrl(req, BIO_CTRL_INF in set1_content() 266 set1_content(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, BIO *req) set1_content() argument 330 OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, const ASN1_ITEM *it, const ASN1_VALUE *req) OSSL_HTTP_REQ_CTX_set1_req() argument 1004 OSSL_HTTP_set1_request(OSSL_HTTP_REQ_CTX *rctx, const char *path, const STACK_OF(CONF_VALUE) *headers, const char *content_type, BIO *req, const char *expected_content_type, int expect_asn1, size_t max_resp_len, int timeout, int keep_alive) OSSL_HTTP_set1_request() argument 1201 OSSL_HTTP_transfer(OSSL_HTTP_REQ_CTX **prctx, const char *server, const char *port, const char *path, int use_ssl, const char *proxy, const char *no_proxy, BIO *bio, BIO *rbio, OSSL_HTTP_bio_cb_t bio_update_fn, void *arg, int buf_size, const STACK_OF(CONF_VALUE) *headers, const char *content_type, BIO *req, const char *expected_ct, int expect_asn1, size_t max_resp_len, int timeout, int keep_alive) OSSL_HTTP_transfer() argument [all...] |