/third_party/musl/porting/linux/user/src/malloc/mallocng/ |
H A D | malloc.c | 238 static struct meta *alloc_group(int sc, size_t req) in alloc_group() argument 305 req += IB + UNIT; in alloc_group() 306 req += -req & (pagesize-1); in alloc_group() 307 if (req<size+UNIT || (req>=4*pagesize && 2*cnt>usage)) { in alloc_group() 309 needed = req; in alloc_group() 351 static int alloc_slot(int sc, size_t req) in alloc_slot() argument 356 struct meta *g = alloc_group(sc, req); in alloc_slot()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_pwd.c | 416 struct wpabuf *req; in eap_pwd_build_req() local 427 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, in eap_pwd_build_req() 429 if (req == NULL) { in eap_pwd_build_req() 435 wpabuf_put_u8(req, EAP_PWD_OPCODE_ID_EXCH); in eap_pwd_build_req() 438 wpabuf_put_u8(req, EAP_PWD_OPCODE_COMMIT_EXCH); in eap_pwd_build_req() 441 wpabuf_put_u8(req, EAP_PWD_OPCODE_CONFIRM_EXCH); in eap_pwd_build_req() 445 wpabuf_free(req); in eap_pwd_build_req() 448 return req; in eap_pwd_build_req() 504 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, in eap_pwd_build_req() 508 if (req in eap_pwd_build_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_pwd.c | 416 struct wpabuf *req; in eap_pwd_build_req() local 427 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, in eap_pwd_build_req() 429 if (req == NULL) { in eap_pwd_build_req() 435 wpabuf_put_u8(req, EAP_PWD_OPCODE_ID_EXCH); in eap_pwd_build_req() 438 wpabuf_put_u8(req, EAP_PWD_OPCODE_COMMIT_EXCH); in eap_pwd_build_req() 441 wpabuf_put_u8(req, EAP_PWD_OPCODE_CONFIRM_EXCH); in eap_pwd_build_req() 445 wpabuf_free(req); in eap_pwd_build_req() 448 return req; in eap_pwd_build_req() 504 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, in eap_pwd_build_req() 508 if (req in eap_pwd_build_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_peap.c | 461 * @req: EAP-TLV request to be processed. The caller must have validated that 473 const struct wpabuf *req, struct wpabuf **resp, in eap_tlv_process() 483 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); in eap_tlv_process() 517 *resp = eap_tlv_build_nak(eap_get_id(req), in eap_tlv_process() 588 eap_get_id(req), resp_status); in eap_tlv_process() 598 struct wpabuf *req, in eap_peap_phase2_request() 601 struct eap_hdr *hdr = wpabuf_mhead(req); in eap_peap_phase2_request() 620 if (eap_tlv_process(sm, data, &iret, req, resp, in eap_peap_phase2_request() 641 req, &eleft); in eap_peap_phase2_request() 719 &iret, req); in eap_peap_phase2_request() 471 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) eap_tlv_process() argument 595 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) eap_peap_phase2_request() argument 742 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) eap_peap_decrypt() argument 972 const struct eap_hdr *req; eap_peap_process() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_peap.c | 490 * @req: EAP-TLV request to be processed. The caller must have validated that 502 const struct wpabuf *req, struct wpabuf **resp, in eap_tlv_process() 512 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); in eap_tlv_process() 546 *resp = eap_tlv_build_nak(eap_get_id(req), in eap_tlv_process() 622 eap_get_id(req), resp_status); in eap_tlv_process() 632 struct wpabuf *req, in eap_peap_phase2_request() 635 struct eap_hdr *hdr = wpabuf_mhead(req); in eap_peap_phase2_request() 656 if (eap_tlv_process(sm, data, &iret, req, resp, in eap_peap_phase2_request() 677 req, &eleft); in eap_peap_phase2_request() 769 &iret, req); in eap_peap_phase2_request() 500 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) eap_tlv_process() argument 629 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) eap_peap_phase2_request() argument 792 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) eap_peap_decrypt() argument 1025 const struct eap_hdr *req; eap_peap_process() local [all...] |
/third_party/curl/lib/ |
H A D | http.h | 86 struct dynbuf *req 94 struct dynbuf *req 112 struct dynbuf *req); 287 void Curl_http_req_free(struct httpreq *req); 297 * using HTTP/2 pseudo headers preceding the `req->headers`. 307 * @param req the request to transform 311 struct httpreq *req, struct Curl_easy *data);
|
/third_party/libuv/test/ |
H A D | test-udp-ipv6.c | 38 #define CHECK_REQ(req) \ 39 ASSERT_PTR_EQ((req), &req_); 81 static void send_cb(uv_udp_send_t* req, int status) { in send_cb() argument 82 CHECK_REQ(req); in send_cb() 83 CHECK_HANDLE(req->handle); in send_cb()
|
H A D | test-multiple-listen.c | 67 static void connect_cb(uv_connect_t* req, int status) { in connect_cb() argument 68 ASSERT_NOT_NULL(req); in connect_cb() 70 free(req); in connect_cb()
|
H A D | benchmark-pound.c | 93 static void after_write(uv_write_t* req, int status) { in after_write() argument 96 uv_close((uv_handle_t*)req->handle, close_cb); in after_write() 103 static void connect_cb(uv_connect_t* req, int status) { in connect_cb() argument 112 uv_close((uv_handle_t*)req->handle, close_cb); in connect_cb() 117 ASSERT_NOT_NULL(req); in connect_cb() 120 conn = (conn_rec*)req->data; in connect_cb()
|
/third_party/musl/src/misc/ |
H A D | ioctl.c | 128 int ioctl(int fd, int req, ...) in ioctl() argument 132 va_start(ap, req); in ioctl() 135 int r = __syscall(SYS_ioctl, fd, req, arg); in ioctl() 136 if (SIOCGSTAMP != SIOCGSTAMP_OLD && req && r==-ENOTTY) { in ioctl() 138 if (compat_map[i].new_req != req) continue; in ioctl()
|
/third_party/node/deps/npm/node_modules/https-proxy-agent/dist/ |
H A D | index.js | 76 async connect(req, opts) { 117 req.emit('proxyConnect', connect); 118 this.emit('proxyConnect', connect, req); 120 req.once('socket', resume); 148 req.once('socket', (s) => {
|
/third_party/node/deps/uvwasi/src/ |
H A D | uv_mapping.c | 251 uv_fs_t req; in uvwasi__get_filetype_by_fd() local 254 r = uv_fs_fstat(NULL, &req, fd, NULL); in uvwasi__get_filetype_by_fd() 256 uv_fs_req_cleanup(&req); in uvwasi__get_filetype_by_fd() 273 *type = uvwasi__stat_to_filetype(&req.statbuf); in uvwasi__get_filetype_by_fd() 274 uv_fs_req_cleanup(&req); in uvwasi__get_filetype_by_fd()
|
/third_party/FreeBSD/sys/dev/usb/storage/ |
H A D | umass.c | 1151 struct usb_device_request req; in umass_init_shuttle() local 1159 req.bmRequestType = UT_READ_VENDOR_DEVICE; in umass_init_shuttle() 1160 req.bRequest = 1; /* XXX unknown command */ in umass_init_shuttle() 1161 USETW(req.wValue, 0); in umass_init_shuttle() 1162 req.wIndex[0] = sc->sc_iface_no; in umass_init_shuttle() 1163 req.wIndex[1] = 0; in umass_init_shuttle() 1164 USETW(req.wLength, sizeof(status)); in umass_init_shuttle() 1165 err = usbd_do_request(sc->sc_udev, NULL, &req, &status); in umass_init_shuttle() 1278 struct usb_device_request req; in umass_t_bbb_reset1_callback() local 1303 req in umass_t_bbb_reset1_callback() 1687 struct usb_device_request req; umass_bbb_get_max_lun() local 1736 struct usb_device_request req; umass_t_cbi_reset1_callback() local 1862 struct usb_device_request req; umass_t_cbi_command_callback() local [all...] |
/third_party/backends/include/sane/ |
H A D | sanei_net.h | 130 extern void sanei_w_init_req (Wire *w, SANE_Init_Req *req); 136 extern void sanei_w_control_option_req (Wire *w, SANE_Control_Option_Req *req); 142 extern void sanei_w_authorization_req (Wire *w, SANE_Authorization_Req *req);
|
/third_party/libuv/docs/code/cgi/ |
H A D | main.c | 11 void cleanup_handles(uv_process_t *req, int64_t exit_status, int term_signal) { in cleanup_handles() argument 13 uv_close((uv_handle_t*) req->data, NULL); in cleanup_handles() 14 uv_close((uv_handle_t*) req, NULL); in cleanup_handles()
|
/third_party/node/test/parallel/ |
H A D | test-async-hooks-http-parser-destroy.js | 47 const server = http.createServer((req, res) => { 48 req.on('close', common.mustCall(() => { 49 req.on('readable', common.mustNotCall());
|
H A D | test-async-wrap-tlssocket-asyncreset.js | 20 common.mustCall((req, res) => { 37 const req = https.get( 64 req.on('error', (err) => assert.fail(err));
|
H A D | test-http-agent-domain-reused-gc.js | 48 const server = http.createServer(common.mustCall((req, res) => { 63 const req = http.request({ agent }, common.mustCall((res) => { 67 req.end('');
|
H A D | test-http2-respond-file-fd-errors.js | 118 const req = client.request(); 120 req.on('close', common.mustCall(() => { 124 req.end();
|
H A D | test-http2-respond-file-errors.js | 95 const req = client.request(); 97 req.on('close', common.mustCall(() => { 101 req.end();
|
/third_party/node/test/pummel/ |
H A D | test-regress-GH-892.js | 86 const server = https.Server(serverOptions, function(req, res) { 92 req.on('data', function(d) { 97 req.on('end', function() {
|
/third_party/node/test/addons/openssl-key-engine/ |
H A D | test.js | 32 const server = https.createServer(serverOptions, common.mustCall((req, res) => { 48 const req = https.request(clientOptions, common.mustCall((response) => { 61 req.end();
|
/third_party/ltp/testcases/kernel/syscalls/setsockopt/ |
H A D | setsockopt06.c | 44 struct tpacket_req3 req = { in thread_run() local 54 ret = setsockopt(sock, SOL_PACKET, PACKET_RX_RING, &req, in thread_run() 55 sizeof(req)); in thread_run()
|
/third_party/typescript/tests/baselines/reference/ |
H A D | augmentExportEquals5.js | 41 (err: any, req: Request, res: Response, next: Function): any; 45 (req: Request, res: Response, next: Function): any; 51 (req: Request, res: Response, next: Function, param: any): any;
|
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 23 int OCSP_request_onereq_count(OCSP_REQUEST *req) in OCSP_request_onereq_count() argument 25 return sk_OCSP_ONEREQ_num(req->tbsRequest.requestList); in OCSP_request_onereq_count() 28 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i) in OCSP_request_onereq_get0() argument 30 return sk_OCSP_ONEREQ_value(req->tbsRequest.requestList, i); in OCSP_request_onereq_get0() 55 int OCSP_request_is_signed(OCSP_REQUEST *req) in OCSP_request_is_signed() argument 57 if (req->optionalSignature) in OCSP_request_is_signed()
|