Home
last modified time | relevance | path

Searched refs:response (Results 126 - 150 of 733) sorted by relevance

12345678910>>...30

/base/telephony/ril_adapter/test/fuzztest/newsmsnotify_fuzzer/
H A Dnewsmsnotify_fuzzer.cpp38 HRilSmsResponse response; in DoSomethingInterestingWithMyAPI() local
40 response.msgRef = static_cast<int32_t>(*data + offset); in DoSomethingInterestingWithMyAPI()
42 response.pdu = const_cast<char *>(NUMBER); in DoSomethingInterestingWithMyAPI()
43 response.errCode = static_cast<int32_t>(*data + offset); in DoSomethingInterestingWithMyAPI()
49 HRilManager::manager_->OnSmsReport(slotId, &report, (const uint8_t *)&response, sizeof(HRilSmsResponse)); in DoSomethingInterestingWithMyAPI()
/third_party/curl/lib/vauth/
H A Dcram.c48 * This is used to generate a CRAM-MD5 response message ready for sending to
67 char *response; in Curl_auth_create_cram_md5_message() local
84 /* Generate the response */ in Curl_auth_create_cram_md5_message()
85 response = aprintf( in Curl_auth_create_cram_md5_message()
90 if(!response) in Curl_auth_create_cram_md5_message()
93 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_cram_md5_message()
H A Ddigest.c321 * This is used to generate an already encoded DIGEST-MD5 response message
344 char *response = NULL; in Curl_auth_create_digest_md5_message() local
444 /* Now calculate the response hash */ in Curl_auth_create_digest_md5_message()
474 /* Generate the response */ in Curl_auth_create_digest_md5_message()
475 response = aprintf("username=\"%s\",realm=\"%s\",nonce=\"%s\"," in Curl_auth_create_digest_md5_message()
476 "cnonce=\"%s\",nc=\"%s\",digest-uri=\"%s\",response=%s," in Curl_auth_create_digest_md5_message()
481 if(!response) in Curl_auth_create_digest_md5_message()
484 /* Return the response. */ in Curl_auth_create_digest_md5_message()
485 Curl_bufref_set(out, response, strlen(response), curl_fre in Curl_auth_create_digest_md5_message()
692 char *response = NULL; auth_create_digest_http_message() local
[all...]
/third_party/node/test/parallel/
H A Dtest-http-status-code.js48 http.get({ port: s.address().port }, function(response) {
50 console.log(`client: statusCode: ${response.statusCode}`);
51 assert.strictEqual(response.statusCode, test);
52 response.on('end', function() {
56 response.resume();
H A Dtest-http-write-head.js70 http.get({ port: this.address().port }, common.mustCall((response) => {
71 response.on('end', common.mustCall(() => {
72 assert.strictEqual(response.headers.test, '2');
73 assert(response.rawHeaders.includes('Test'));
76 response.resume();
H A Dtest-http-server-headers-timeout-keepalive.js48 let response = '';
52 response += chunk;
54 // First response has ended
55 if (!second && response.endsWith('\r\n\r\n')) {
57 response.split('\r\n')[0],
66 response = '';
83 response,
H A Dtest-http-server-request-timeout-keepalive.js46 let response = '';
50 response += chunk;
52 // First response has ended
53 if (!second && response.endsWith('\r\n\r\n')) {
55 response.split('\r\n')[0],
64 response = '';
81 response,
H A Dtest-http-server-request-timeouts-mixed.js42 response: '',
48 request.response += chunk;
113 assert(request1.response.startsWith(responseOk));
114 assert(request2.response.startsWith(responseTimeout)); // It is expired due to headersTimeout
128 assert(request3.response.startsWith(responseTimeout)); // It is expired due to requestTimeout
129 assert(request4.response.startsWith(responseOk));
130 assert(request5.response.startsWith(responseTimeout)); // It is expired due to requestTimeout
H A Dtest-inspector.js9 function checkListResponse(response) {
12 response.length,
14 `Expected response length ${response.length} to be ${expectedLength}.`
16 assert.ok(response[0].devtoolsFrontendUrl);
19 .test(response[0].webSocketDebuggerUrl),
20 response[0].webSocketDebuggerUrl);
23 function checkVersion(response) {
24 assert.ok(response);
29 assert.strictEqual(JSON.stringify(response),
[all...]
H A Dtest-diagnostics-channel-http-server-start.js20 dc.subscribe('http.server.response.finish', common.mustCall((message) => {
23 response,
36 let response;
40 response = res;
59 assert.strictEqual(a.response, b.response);
/third_party/node/deps/npm/node_modules/jsonparse/examples/
H A Dtwitterfeed.js11 request.on('response', function (response) {
12 console.log(response.statusCode);
13 console.dir(response.headers);
14 response.on('data', function (chunk) {
17 response.on('end', function () {
/base/telephony/core_service/services/network_search/src/
H A Dnetwork_utils.cpp218 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) {
219 return rilManager->GetPreferredNetwork(slotId, response);
222 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) {
223 return rilManager->GetRadioState(slotId, response);
226 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) {
227 return rilManager->GetImei(slotId, response);
230 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) {
231 return rilManager->GetImeiSv(slotId, response);
234 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) {
235 return rilManager->GetMeid(slotId, response);
[all...]
/third_party/lwip/src/netif/ppp/
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response()
73 response_len = *response++; in chap_md5_verify_response()
84 /* Test if our hash matches the peer's response */ in chap_md5_verify_response()
85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { in chap_md5_verify_response()
95 static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, in chap_md5_make_response() argument
110 lwip_md5_finish(&ctx, &response[1]); in chap_md5_make_response()
112 response[0] = MD5_HASH_SIZE; in chap_md5_make_response()
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.h15 u8 *response);
20 u8 *response);
25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
32 size_t password_len, u8 *response);
35 u8 *response);
H A Dms_funcs.c142 * @response: 24-octet Response (OUT)
146 u8 *response) in challenge_response()
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
168 * @response: 24-octet Response (OUT)
174 u8 *response) in generate_nt_response()
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
195 * @response: 24-octet Response (OUT)
202 u8 *response) in generate_nt_response_pwhash()
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) challenge_response() argument
171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument
198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dms_funcs.h15 u8 *response);
20 u8 *response);
25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
32 size_t password_len, u8 *response);
35 u8 *response);
H A Dms_funcs.c142 * @response: 24-octet Response (OUT)
146 u8 *response) in challenge_response()
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
168 * @response: 24-octet Response (OUT)
174 u8 *response) in generate_nt_response()
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
195 * @response: 24-octet Response (OUT)
202 u8 *response) in generate_nt_response_pwhash()
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) challenge_response() argument
171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument
198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument
[all...]
/third_party/python/Lib/idlelib/
H A Drpc.py248 response = self.getresponse(seq, wait=0.05)
249 self.debug(("asyncreturn:%d:response: " % seq), response)
250 return self.decoderesponse(response)
252 def decoderesponse(self, response):
253 how, what = response
291 response = self._getresponse(myseq, wait)
292 if response is not None:
293 how, what = response
295 response
[all...]
/third_party/skia/third_party/externals/microhttpd/src/examples/
H A Dspdy_response_with_callback.c61 struct SPDY_Response *response, in response_done_callback()
72 SPDY_destroy_response(response); in response_done_callback()
98 struct SPDY_Response *response=NULL; in standard_request_handler() local
117 response = SPDY_build_response_with_callback(200,NULL, in standard_request_handler()
135 response = SPDY_build_response(200,NULL,SPDY_HTTP_VERSION_1_1,NULL,html,strlen(html)); in standard_request_handler()
139 if(NULL==response){ in standard_request_handler()
140 fprintf(stdout,"no response obj\n"); in standard_request_handler()
146 if(SPDY_queue_response(request,response,true,false,&response_done_callback,clspath)!=SPDY_YES) in standard_request_handler()
60 response_done_callback(void *cls, struct SPDY_Response *response, struct SPDY_Request *request, enum SPDY_RESPONSE_RESULT status, bool streamopened) response_done_callback() argument
H A Dquerystring_example.c43 struct MHD_Response *response; in ahc_echo() local
60 response = MHD_create_response_from_buffer (strlen (me), me, in ahc_echo()
62 if (response == NULL) in ahc_echo()
67 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
68 MHD_destroy_response (response); in ahc_echo()
/third_party/node/lib/internal/modules/esm/
H A Dworker.js135 const response = receiveMessageOnPort(syncCommPort);
137 if (response !== undefined) {
138 PromisePrototypeThen(handleMessage(response.message), undefined, errorHandler);
194 let response;
196 response = await ReflectApply(hooks[method], hooks, args);
199 response = exception;
204 // Send the method response (or exception) to the main thread.
207 wrapMessage(hasError ? 'error' : 'success', response),
208 transferArrayBuffer(hasError, response?.source),
211 // Or send the exception thrown when trying to send the response
[all...]
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/sa/
H A Dhks_dcm_callback_handler.cpp174 void HksDcmCallback(DcmAnonymousResponse *response)
176 if (response == nullptr) {
177 HKS_LOG_E("dcm callback got null response");
181 if (response->errCode != DCM_SUCCESS) {
182 HksReport(__func__, nullptr, nullptr, response->errCode);
184 HKS_LOG_I("dcm callback requestId %" LOG_PUBLIC PRIu64, response->requestId);
186 sptr<IHksService> hksProxy = g_instancesList.GetProxyWithoutLock(response->requestId);
188 HKS_LOG_E("GetProxyWithoutLock failed *requestId %" LOG_PUBLIC PRIu64, response->requestId);
194 HKS_IF_NOT_SUCC_LOGE_BREAK(response->errCode, "HksDcmCallback failed %" LOG_PUBLIC "d", response
[all...]
/base/telephony/core_service/services/sim/src/
H A Dsim_sms_controller.cpp142 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_UPDATE_COMPLETED); in UpdateSmsIcc() local
144 telRilManager_->UpdateSimMessage(slotId_, param, response); in UpdateSmsIcc()
146 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_UPDATE_COMPLETED); in UpdateSmsIcc() local
148 telRilManager_->UpdateCdmaSimMessage(slotId_, param, response); in UpdateSmsIcc()
151 TELEPHONY_LOGI("UpdateSmsIcc::wait(), response = false"); in UpdateSmsIcc()
171 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_DELETE_COMPLETED); in DelSmsIcc() local
172 telRilManager_->DelSimMessage(slotId_, index, response); in DelSmsIcc()
175 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_DELETE_COMPLETED); in DelSmsIcc() local
176 telRilManager_->DelCdmaSimMessage(slotId_, index, response); in DelSmsIcc()
180 TELEPHONY_LOGI("DelSmsIcc::wait(), response in DelSmsIcc()
199 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_WRITE_COMPLETED); AddSmsToIcc() local
203 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_WRITE_COMPLETED); AddSmsToIcc() local
[all...]
/base/telephony/cellular_call/services/utils/src/
H A Dcellular_call_supplement.cpp637 CallTransferResponse response; in BuildCallForwardQueryInfo() local
638 if (memset_s(&response, sizeof(response), 0, sizeof(response)) != EOK) { in BuildCallForwardQueryInfo()
643 if (strcpy_s(response.number, sizeof(response.number), queryResult.number.c_str()) != EOK) { in BuildCallForwardQueryInfo()
647 response.result = queryResult.result; in BuildCallForwardQueryInfo()
651 response.status = queryResult.status; in BuildCallForwardQueryInfo()
663 response.classx = queryResult.classx; in BuildCallForwardQueryInfo()
666 response in BuildCallForwardQueryInfo()
710 CallRestrictionResponse response; EventGetCallRestriction() local
1200 ClirResponse response; EventGetClir() local
1238 ColrResponse response; EventGetColr() local
1265 ColpResponse response; EventGetColp() local
[all...]
/base/telephony/call_manager/services/telephony_interaction/src/
H A Dreport_call_info_handler.cpp199 int32_t ReportCallInfoHandler::ReceiveImsCallModeRequest(const CallModeReportInfo &response) in ReceiveImsCallModeRequest() argument
202 reportCallInfoQueue.submit([response]() { in ReceiveImsCallModeRequest()
203 CallModeReportInfo reportInfo = response; in ReceiveImsCallModeRequest()
204 sptr<CallBase> call = CallObjectManager::GetOneCallObjectByIndex(response.callIndex); in ReceiveImsCallModeRequest()
217 int32_t ReportCallInfoHandler::ReceiveImsCallModeResponse(const CallModeReportInfo &response) in ReceiveImsCallModeResponse() argument
220 reportCallInfoQueue.submit([response]() { in ReceiveImsCallModeResponse()
221 CallModeReportInfo reportInfo = response; in ReceiveImsCallModeResponse()
223 if (response.slotId != -1) { in ReceiveImsCallModeResponse()
224 call = CallObjectManager::GetOneCallObjectByIndexAndSlotId(response.callIndex, response in ReceiveImsCallModeResponse()
[all...]

Completed in 17 milliseconds

12345678910>>...30