/base/telephony/ril_adapter/test/fuzztest/newsmsnotify_fuzzer/ |
H A D | newsmsnotify_fuzzer.cpp | 38 HRilSmsResponse response; in DoSomethingInterestingWithMyAPI() local 40 response.msgRef = static_cast<int32_t>(*data + offset); in DoSomethingInterestingWithMyAPI() 42 response.pdu = const_cast<char *>(NUMBER); in DoSomethingInterestingWithMyAPI() 43 response.errCode = static_cast<int32_t>(*data + offset); in DoSomethingInterestingWithMyAPI() 49 HRilManager::manager_->OnSmsReport(slotId, &report, (const uint8_t *)&response, sizeof(HRilSmsResponse)); in DoSomethingInterestingWithMyAPI()
|
/third_party/curl/lib/vauth/ |
H A D | cram.c | 48 * This is used to generate a CRAM-MD5 response message ready for sending to 67 char *response; in Curl_auth_create_cram_md5_message() local 84 /* Generate the response */ in Curl_auth_create_cram_md5_message() 85 response = aprintf( in Curl_auth_create_cram_md5_message() 90 if(!response) in Curl_auth_create_cram_md5_message() 93 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_cram_md5_message()
|
H A D | digest.c | 321 * This is used to generate an already encoded DIGEST-MD5 response message 344 char *response = NULL; in Curl_auth_create_digest_md5_message() local 444 /* Now calculate the response hash */ in Curl_auth_create_digest_md5_message() 474 /* Generate the response */ in Curl_auth_create_digest_md5_message() 475 response = aprintf("username=\"%s\",realm=\"%s\",nonce=\"%s\"," in Curl_auth_create_digest_md5_message() 476 "cnonce=\"%s\",nc=\"%s\",digest-uri=\"%s\",response=%s," in Curl_auth_create_digest_md5_message() 481 if(!response) in Curl_auth_create_digest_md5_message() 484 /* Return the response. */ in Curl_auth_create_digest_md5_message() 485 Curl_bufref_set(out, response, strlen(response), curl_fre in Curl_auth_create_digest_md5_message() 692 char *response = NULL; auth_create_digest_http_message() local [all...] |
/third_party/node/test/parallel/ |
H A D | test-http-status-code.js | 48 http.get({ port: s.address().port }, function(response) { 50 console.log(`client: statusCode: ${response.statusCode}`); 51 assert.strictEqual(response.statusCode, test); 52 response.on('end', function() { 56 response.resume();
|
H A D | test-http-write-head.js | 70 http.get({ port: this.address().port }, common.mustCall((response) => { 71 response.on('end', common.mustCall(() => { 72 assert.strictEqual(response.headers.test, '2'); 73 assert(response.rawHeaders.includes('Test')); 76 response.resume();
|
H A D | test-http-server-headers-timeout-keepalive.js | 48 let response = ''; 52 response += chunk; 54 // First response has ended 55 if (!second && response.endsWith('\r\n\r\n')) { 57 response.split('\r\n')[0], 66 response = ''; 83 response,
|
H A D | test-http-server-request-timeout-keepalive.js | 46 let response = ''; 50 response += chunk; 52 // First response has ended 53 if (!second && response.endsWith('\r\n\r\n')) { 55 response.split('\r\n')[0], 64 response = ''; 81 response,
|
H A D | test-http-server-request-timeouts-mixed.js | 42 response: '', 48 request.response += chunk; 113 assert(request1.response.startsWith(responseOk)); 114 assert(request2.response.startsWith(responseTimeout)); // It is expired due to headersTimeout 128 assert(request3.response.startsWith(responseTimeout)); // It is expired due to requestTimeout 129 assert(request4.response.startsWith(responseOk)); 130 assert(request5.response.startsWith(responseTimeout)); // It is expired due to requestTimeout
|
H A D | test-inspector.js | 9 function checkListResponse(response) { 12 response.length, 14 `Expected response length ${response.length} to be ${expectedLength}.` 16 assert.ok(response[0].devtoolsFrontendUrl); 19 .test(response[0].webSocketDebuggerUrl), 20 response[0].webSocketDebuggerUrl); 23 function checkVersion(response) { 24 assert.ok(response); 29 assert.strictEqual(JSON.stringify(response), [all...] |
H A D | test-diagnostics-channel-http-server-start.js | 20 dc.subscribe('http.server.response.finish', common.mustCall((message) => { 23 response, 36 let response; 40 response = res; 59 assert.strictEqual(a.response, b.response);
|
/third_party/node/deps/npm/node_modules/jsonparse/examples/ |
H A D | twitterfeed.js | 11 request.on('response', function (response) { 12 console.log(response.statusCode); 13 console.dir(response.headers); 14 response.on('data', function (chunk) { 17 response.on('end', function () {
|
/base/telephony/core_service/services/network_search/src/ |
H A D | network_utils.cpp | 218 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) { 219 return rilManager->GetPreferredNetwork(slotId, response); 222 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) { 223 return rilManager->GetRadioState(slotId, response); 226 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) { 227 return rilManager->GetImei(slotId, response); 230 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) { 231 return rilManager->GetImeiSv(slotId, response); 234 [](ITelRilManager *rilManager, int32_t slotId, const AppExecFwk::InnerEvent::Pointer &response) { 235 return rilManager->GetMeid(slotId, response); [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() 73 response_len = *response++; in chap_md5_verify_response() 84 /* Test if our hash matches the peer's response */ in chap_md5_verify_response() 85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { in chap_md5_verify_response() 95 static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, in chap_md5_make_response() argument 110 lwip_md5_finish(&ctx, &response[1]); in chap_md5_make_response() 112 response[0] = MD5_HASH_SIZE; in chap_md5_make_response() 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.h | 15 u8 *response); 20 u8 *response); 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 32 size_t password_len, u8 *response); 35 u8 *response);
|
H A D | ms_funcs.c | 142 * @response: 24-octet Response (OUT) 146 u8 *response) in challenge_response() 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 168 * @response: 24-octet Response (OUT) 174 u8 *response) in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 195 * @response: 24-octet Response (OUT) 202 u8 *response) in generate_nt_response_pwhash() 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) challenge_response() argument 171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument 198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument 306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.h | 15 u8 *response); 20 u8 *response); 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 32 size_t password_len, u8 *response); 35 u8 *response);
|
H A D | ms_funcs.c | 142 * @response: 24-octet Response (OUT) 146 u8 *response) in challenge_response() 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 168 * @response: 24-octet Response (OUT) 174 u8 *response) in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 195 * @response: 24-octet Response (OUT) 202 u8 *response) in generate_nt_response_pwhash() 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) challenge_response() argument 171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument 198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument 306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument [all...] |
/third_party/python/Lib/idlelib/ |
H A D | rpc.py | 248 response = self.getresponse(seq, wait=0.05) 249 self.debug(("asyncreturn:%d:response: " % seq), response) 250 return self.decoderesponse(response) 252 def decoderesponse(self, response): 253 how, what = response 291 response = self._getresponse(myseq, wait) 292 if response is not None: 293 how, what = response 295 response [all...] |
/third_party/skia/third_party/externals/microhttpd/src/examples/ |
H A D | spdy_response_with_callback.c | 61 struct SPDY_Response *response, in response_done_callback() 72 SPDY_destroy_response(response); in response_done_callback() 98 struct SPDY_Response *response=NULL; in standard_request_handler() local 117 response = SPDY_build_response_with_callback(200,NULL, in standard_request_handler() 135 response = SPDY_build_response(200,NULL,SPDY_HTTP_VERSION_1_1,NULL,html,strlen(html)); in standard_request_handler() 139 if(NULL==response){ in standard_request_handler() 140 fprintf(stdout,"no response obj\n"); in standard_request_handler() 146 if(SPDY_queue_response(request,response,true,false,&response_done_callback,clspath)!=SPDY_YES) in standard_request_handler() 60 response_done_callback(void *cls, struct SPDY_Response *response, struct SPDY_Request *request, enum SPDY_RESPONSE_RESULT status, bool streamopened) response_done_callback() argument
|
H A D | querystring_example.c | 43 struct MHD_Response *response; in ahc_echo() local 60 response = MHD_create_response_from_buffer (strlen (me), me, in ahc_echo() 62 if (response == NULL) in ahc_echo() 67 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 68 MHD_destroy_response (response); in ahc_echo()
|
/third_party/node/lib/internal/modules/esm/ |
H A D | worker.js | 135 const response = receiveMessageOnPort(syncCommPort); 137 if (response !== undefined) { 138 PromisePrototypeThen(handleMessage(response.message), undefined, errorHandler); 194 let response; 196 response = await ReflectApply(hooks[method], hooks, args); 199 response = exception; 204 // Send the method response (or exception) to the main thread. 207 wrapMessage(hasError ? 'error' : 'success', response), 208 transferArrayBuffer(hasError, response?.source), 211 // Or send the exception thrown when trying to send the response [all...] |
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/sa/ |
H A D | hks_dcm_callback_handler.cpp | 174 void HksDcmCallback(DcmAnonymousResponse *response) 176 if (response == nullptr) { 177 HKS_LOG_E("dcm callback got null response"); 181 if (response->errCode != DCM_SUCCESS) { 182 HksReport(__func__, nullptr, nullptr, response->errCode); 184 HKS_LOG_I("dcm callback requestId %" LOG_PUBLIC PRIu64, response->requestId); 186 sptr<IHksService> hksProxy = g_instancesList.GetProxyWithoutLock(response->requestId); 188 HKS_LOG_E("GetProxyWithoutLock failed *requestId %" LOG_PUBLIC PRIu64, response->requestId); 194 HKS_IF_NOT_SUCC_LOGE_BREAK(response->errCode, "HksDcmCallback failed %" LOG_PUBLIC "d", response [all...] |
/base/telephony/core_service/services/sim/src/ |
H A D | sim_sms_controller.cpp | 142 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_UPDATE_COMPLETED); in UpdateSmsIcc() local 144 telRilManager_->UpdateSimMessage(slotId_, param, response); in UpdateSmsIcc() 146 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_UPDATE_COMPLETED); in UpdateSmsIcc() local 148 telRilManager_->UpdateCdmaSimMessage(slotId_, param, response); in UpdateSmsIcc() 151 TELEPHONY_LOGI("UpdateSmsIcc::wait(), response = false"); in UpdateSmsIcc() 171 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_DELETE_COMPLETED); in DelSmsIcc() local 172 telRilManager_->DelSimMessage(slotId_, index, response); in DelSmsIcc() 175 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_DELETE_COMPLETED); in DelSmsIcc() local 176 telRilManager_->DelCdmaSimMessage(slotId_, index, response); in DelSmsIcc() 180 TELEPHONY_LOGI("DelSmsIcc::wait(), response in DelSmsIcc() 199 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_WRITE_COMPLETED); AddSmsToIcc() local 203 AppExecFwk::InnerEvent::Pointer response = BuildCallerInfo(SIM_SMS_WRITE_COMPLETED); AddSmsToIcc() local [all...] |
/base/telephony/cellular_call/services/utils/src/ |
H A D | cellular_call_supplement.cpp | 637 CallTransferResponse response; in BuildCallForwardQueryInfo() local 638 if (memset_s(&response, sizeof(response), 0, sizeof(response)) != EOK) { in BuildCallForwardQueryInfo() 643 if (strcpy_s(response.number, sizeof(response.number), queryResult.number.c_str()) != EOK) { in BuildCallForwardQueryInfo() 647 response.result = queryResult.result; in BuildCallForwardQueryInfo() 651 response.status = queryResult.status; in BuildCallForwardQueryInfo() 663 response.classx = queryResult.classx; in BuildCallForwardQueryInfo() 666 response in BuildCallForwardQueryInfo() 710 CallRestrictionResponse response; EventGetCallRestriction() local 1200 ClirResponse response; EventGetClir() local 1238 ColrResponse response; EventGetColr() local 1265 ColpResponse response; EventGetColp() local [all...] |
/base/telephony/call_manager/services/telephony_interaction/src/ |
H A D | report_call_info_handler.cpp | 199 int32_t ReportCallInfoHandler::ReceiveImsCallModeRequest(const CallModeReportInfo &response) in ReceiveImsCallModeRequest() argument 202 reportCallInfoQueue.submit([response]() { in ReceiveImsCallModeRequest() 203 CallModeReportInfo reportInfo = response; in ReceiveImsCallModeRequest() 204 sptr<CallBase> call = CallObjectManager::GetOneCallObjectByIndex(response.callIndex); in ReceiveImsCallModeRequest() 217 int32_t ReportCallInfoHandler::ReceiveImsCallModeResponse(const CallModeReportInfo &response) in ReceiveImsCallModeResponse() argument 220 reportCallInfoQueue.submit([response]() { in ReceiveImsCallModeResponse() 221 CallModeReportInfo reportInfo = response; in ReceiveImsCallModeResponse() 223 if (response.slotId != -1) { in ReceiveImsCallModeResponse() 224 call = CallObjectManager::GetOneCallObjectByIndexAndSlotId(response.callIndex, response in ReceiveImsCallModeResponse() [all...] |