/kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/ |
H A D | dcn32_clk_mgr_smu_msg.c | 70 /* Wait for response register to be ready */ in dcn32_smu_send_msg_with_param() 73 /* Clear response register */ in dcn32_smu_send_msg_with_param() 82 /* Wait for response */ in dcn32_smu_send_msg_with_param() 128 uint32_t response = 0; in dcn32_smu_set_hard_min_by_freq() local 136 DALSMC_MSG_SetHardMinByFreq, param, &response); in dcn32_smu_set_hard_min_by_freq() 138 smu_print("SMU Frequency set = %d KHz\n", response); in dcn32_smu_set_hard_min_by_freq() 140 return response; in dcn32_smu_set_hard_min_by_freq()
|
/kernel/linux/linux-6.6/drivers/net/wireless/ti/wl1251/ |
H A D | io.h | 38 u32 response; in wl1251_read_elp() local 41 wl->if_ops->read_elp(wl, addr, &response); in wl1251_read_elp() 43 wl->if_ops->read(wl, addr, &response, sizeof(u32)); in wl1251_read_elp() 45 return response; in wl1251_read_elp()
|
/third_party/node/test/parallel/ |
H A D | test-https-server-close-idle.js | 45 let response = ''; 49 response += chunk; 51 if (response.endsWith('0\r\n\r\n')) { 52 assert(response.startsWith('HTTP/1.1 200 OK\r\nConnection: keep-alive'));
|
H A D | test-http-allow-req-after-204-res.js | 46 }, common.mustCall((response) => { 47 response.on('end', common.mustCall(() => { 56 response.resume();
|
H A D | test-http-head-request.js | 41 }, common.mustCall(function(response) { 42 console.error('response start'); 43 response.on('end', common.mustCall(function() { 44 console.error('response end'); 46 response.resume();
|
H A D | test-http-header-read.js | 28 // the response header has been sent. Issue 752 on github. 46 http.get({ port: this.address().port }, function(response) { 47 response.on('end', function() { 50 response.resume();
|
H A D | test-http-url.parse-https.request.js | 43 const server = https.createServer(httpsOptions, function(request, response) { 46 response.writeHead(200, {}); 47 response.end('ok');
|
H A D | test-http-url.parse-basic.js | 41 const server = http.createServer(function(request, response) { 44 response.writeHead(200, {}); 45 response.end('ok');
|
H A D | test-http-url.parse-post.js | 40 const server = http.createServer(function(request, response) { 43 response.writeHead(200, {}); 44 response.end('ok');
|
/third_party/node/test/addons/openssl-key-engine/ |
H A D | test.js | 48 const req = https.request(clientOptions, common.mustCall((response) => { 50 response.setEncoding('utf8'); 51 response.on('data', (chunk) => { 55 response.on('end', common.mustCall(() => {
|
/third_party/node/deps/undici/src/lib/websocket/ |
H A D | util.js | 13 // If the server's response is validated as provided for above, it is 176 const { [kController]: controller, [kResponse]: response } = ws 180 if (response?.socket && !response.socket.destroyed) { 181 response.socket.destroy()
|
/vendor/hisilicon/hispark_pegasus/demo/coap_demo/ |
H A D | coap_service.c | 31 coap_pdu_t *request, coap_binary_t *token, coap_string_t *query, coap_pdu_t *response) in HelloHandler() 34 /* response with text "Hello World!" */ in HelloHandler() 41 response->code = COAP_RESPONSE_CODE(205); /* 返回值205,代表连接成功 */ in HelloHandler() 42 coap_add_option(response, COAP_OPTION_CONTENT_TYPE, in HelloHandler() 44 coap_add_data(response, strlen(responseData), (unsigned char *)responseData); in HelloHandler() 30 HelloHandler(coap_context_t *ctx, struct coap_resource_t *resource, coap_session_t *session, coap_pdu_t *request, coap_binary_t *token, coap_string_t *query, coap_pdu_t *response) HelloHandler() argument
|
/kernel/linux/linux-5.10/drivers/net/ieee802154/ |
H A D | ca8210.c | 345 * @sync_command_response: pointer to buffer to fill with sync response 977 * @response: buffer for storing synchronous response 981 * synchronous commands waits for the corresponding response to be read from 982 * the spi before returning. The response is written to the response parameter. 989 u8 *response, in ca8210_spi_exchange() 998 if ((buf[0] & SPI_SYN) && response) { /* if sync wait for confirm */ in ca8210_spi_exchange() 1000 priv->sync_command_response = response; in ca8210_spi_exchange() 1014 if (((buf[0] & SPI_SYN) && response)) in ca8210_spi_exchange() 986 ca8210_spi_exchange( const u8 *buf, size_t len, u8 *response, void *device_ref ) ca8210_spi_exchange() argument 1113 struct mac_message command, response; tdme_setsfr_request_sync() local 1543 struct mac_message command, response; mlme_reset_request_sync() local 1596 struct mac_message command, response; mlme_set_request_sync() local 1664 struct mac_message command, response; hwme_set_request_sync() local 1706 struct mac_message command, response; hwme_get_request_sync() local 2433 u8 response[CA8210_SPI_BUF_SIZE]; ca8210_test_check_upstream() local [all...] |
/kernel/linux/linux-6.6/drivers/net/ieee802154/ |
H A D | ca8210.c | 304 * @sync_command_response: pointer to buffer to fill with sync response 936 * @response: buffer for storing synchronous response 940 * synchronous commands waits for the corresponding response to be read from 941 * the spi before returning. The response is written to the response parameter. 948 u8 *response, in ca8210_spi_exchange() 957 if ((buf[0] & SPI_SYN) && response) { /* if sync wait for confirm */ in ca8210_spi_exchange() 959 priv->sync_command_response = response; in ca8210_spi_exchange() 973 if (((buf[0] & SPI_SYN) && response)) in ca8210_spi_exchange() 945 ca8210_spi_exchange( const u8 *buf, size_t len, u8 *response, void *device_ref ) ca8210_spi_exchange() argument 1072 struct mac_message command, response; tdme_setsfr_request_sync() local 1501 struct mac_message command, response; mlme_reset_request_sync() local 1554 struct mac_message command, response; mlme_set_request_sync() local 1622 struct mac_message command, response; hwme_set_request_sync() local 1664 struct mac_message command, response; hwme_get_request_sync() local 2390 u8 response[CA8210_SPI_BUF_SIZE]; ca8210_test_check_upstream() local [all...] |
/kernel/linux/linux-5.10/drivers/platform/chrome/ |
H A D | cros_ec_spi.c | 28 * SPI transfer size is 256 bytes, so at 5MHz we need a response 136 /* Reset end-of-response timer */ in terminate_request() 194 struct ec_host_response *response; in cros_ec_spi_receive_packet() local 248 /* If the entire response struct wasn't read, get the rest of it. */ in cros_ec_spi_receive_packet() 249 if (todo < sizeof(*response)) { in cros_ec_spi_receive_packet() 250 ret = receive_n_bytes(ec_dev, ptr, sizeof(*response) - todo); in cros_ec_spi_receive_packet() 253 ptr += (sizeof(*response) - todo); in cros_ec_spi_receive_packet() 254 todo = sizeof(*response); in cros_ec_spi_receive_packet() 257 response = (struct ec_host_response *)ec_dev->din; in cros_ec_spi_receive_packet() 260 if (response in cros_ec_spi_receive_packet() 391 struct ec_host_response *response; do_cros_ec_pkt_xfer_spi() local [all...] |
/kernel/linux/linux-6.6/drivers/platform/chrome/ |
H A D | cros_ec_spi.c | 28 * SPI transfer size is 256 bytes, so at 5MHz we need a response 130 /* Reset end-of-response timer */ in terminate_request() 189 struct ec_host_response *response; in cros_ec_spi_receive_packet() local 243 /* If the entire response struct wasn't read, get the rest of it. */ in cros_ec_spi_receive_packet() 244 if (todo < sizeof(*response)) { in cros_ec_spi_receive_packet() 245 ret = receive_n_bytes(ec_dev, ptr, sizeof(*response) - todo); in cros_ec_spi_receive_packet() 248 ptr += (sizeof(*response) - todo); in cros_ec_spi_receive_packet() 249 todo = sizeof(*response); in cros_ec_spi_receive_packet() 252 response = (struct ec_host_response *)ec_dev->din; in cros_ec_spi_receive_packet() 255 if (response in cros_ec_spi_receive_packet() 386 struct ec_host_response *response; do_cros_ec_pkt_xfer_spi() local [all...] |
/third_party/node/lib/internal/http2/ |
H A D | compat.js | 74 const kResponse = Symbol('response'); 173 // and response objects. 185 const response = this[kResponse]; 186 if (response !== undefined) 187 response.emit('drain'); 887 const response = new ServerResponse(stream); 892 if (!server.emit('connect', request, response)) { 893 response.statusCode = HTTP_STATUS_METHOD_NOT_ALLOWED; 894 response.end(); 903 server.emit('checkContinue', request, response); [all...] |
/third_party/python/Lib/test/ |
H A D | test_imaplib.py | 312 self.server.response = yield 316 self.server.response = yield 322 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake' 329 self.assertEqual(server.response, 339 self.server.response = yield 364 self.response = yield 375 self.server.response = yield 380 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake' 386 self.server.response = yield 391 self.assertEqual(server.response, [all...] |
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | cifsencrypt.c | 245 server->session_key.response, server->session_key.len); in cifs_calc_signature() 247 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 409 kfree_sensitive(ses->auth_key.response); in build_avpair_blob() 411 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 412 if (!ses->auth_key.response) { in build_avpair_blob() 417 blobptr = ses->auth_key.response; in build_avpair_blob() 452 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name() 455 blobptr = ses->auth_key.response; in find_domain_name() 505 if (!ses->auth_key.len || !ses->auth_key.response) in find_timestamp() 508 blobptr = ses->auth_key.response; in find_timestamp() [all...] |
/third_party/selinux/libsepol/include/sepol/ |
H A D | users.h | 21 const sepol_policydb_t * p, unsigned int *response); 26 const sepol_user_key_t * key, int *response); 32 sepol_user_t ** response);
|
H A D | ports.h | 14 const sepol_policydb_t * p, unsigned int *response); 19 const sepol_port_key_t * key, int *response); 25 sepol_port_t ** response);
|
H A D | ibendports.h | 15 unsigned int *response); 20 const sepol_ibendport_key_t *key, int *response); 26 sepol_ibendport_t **response);
|
H A D | booleans.h | 21 const sepol_policydb_t * p, unsigned int *response); 26 const sepol_bool_key_t * key, int *response); 32 sepol_bool_t ** response);
|
H A D | interfaces.h | 15 unsigned int *response); 20 const sepol_iface_key_t * key, int *response); 27 sepol_iface_t ** response);
|
H A D | ibpkeys.h | 15 const sepol_policydb_t *p, unsigned int *response); 20 const sepol_ibpkey_key_t *key, int *response); 26 sepol_ibpkey_t **response);
|