Home
last modified time | relevance | path

Searched refs:response (Results 226 - 250 of 1180) sorted by relevance

12345678910>>...48

/kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/
H A Ddcn32_clk_mgr_smu_msg.c70 /* Wait for response register to be ready */ in dcn32_smu_send_msg_with_param()
73 /* Clear response register */ in dcn32_smu_send_msg_with_param()
82 /* Wait for response */ in dcn32_smu_send_msg_with_param()
128 uint32_t response = 0; in dcn32_smu_set_hard_min_by_freq() local
136 DALSMC_MSG_SetHardMinByFreq, param, &response); in dcn32_smu_set_hard_min_by_freq()
138 smu_print("SMU Frequency set = %d KHz\n", response); in dcn32_smu_set_hard_min_by_freq()
140 return response; in dcn32_smu_set_hard_min_by_freq()
/kernel/linux/linux-6.6/drivers/net/wireless/ti/wl1251/
H A Dio.h38 u32 response; in wl1251_read_elp() local
41 wl->if_ops->read_elp(wl, addr, &response); in wl1251_read_elp()
43 wl->if_ops->read(wl, addr, &response, sizeof(u32)); in wl1251_read_elp()
45 return response; in wl1251_read_elp()
/third_party/node/test/parallel/
H A Dtest-https-server-close-idle.js45 let response = '';
49 response += chunk;
51 if (response.endsWith('0\r\n\r\n')) {
52 assert(response.startsWith('HTTP/1.1 200 OK\r\nConnection: keep-alive'));
H A Dtest-http-allow-req-after-204-res.js46 }, common.mustCall((response) => {
47 response.on('end', common.mustCall(() => {
56 response.resume();
H A Dtest-http-head-request.js41 }, common.mustCall(function(response) {
42 console.error('response start');
43 response.on('end', common.mustCall(function() {
44 console.error('response end');
46 response.resume();
H A Dtest-http-header-read.js28 // the response header has been sent. Issue 752 on github.
46 http.get({ port: this.address().port }, function(response) {
47 response.on('end', function() {
50 response.resume();
H A Dtest-http-url.parse-https.request.js43 const server = https.createServer(httpsOptions, function(request, response) {
46 response.writeHead(200, {});
47 response.end('ok');
H A Dtest-http-url.parse-basic.js41 const server = http.createServer(function(request, response) {
44 response.writeHead(200, {});
45 response.end('ok');
H A Dtest-http-url.parse-post.js40 const server = http.createServer(function(request, response) {
43 response.writeHead(200, {});
44 response.end('ok');
/third_party/node/test/addons/openssl-key-engine/
H A Dtest.js48 const req = https.request(clientOptions, common.mustCall((response) => {
50 response.setEncoding('utf8');
51 response.on('data', (chunk) => {
55 response.on('end', common.mustCall(() => {
/third_party/node/deps/undici/src/lib/websocket/
H A Dutil.js13 // If the server's response is validated as provided for above, it is
176 const { [kController]: controller, [kResponse]: response } = ws
180 if (response?.socket && !response.socket.destroyed) {
181 response.socket.destroy()
/vendor/hisilicon/hispark_pegasus/demo/coap_demo/
H A Dcoap_service.c31 coap_pdu_t *request, coap_binary_t *token, coap_string_t *query, coap_pdu_t *response) in HelloHandler()
34 /* response with text "Hello World!" */ in HelloHandler()
41 response->code = COAP_RESPONSE_CODE(205); /* 返回值205,代表连接成功 */ in HelloHandler()
42 coap_add_option(response, COAP_OPTION_CONTENT_TYPE, in HelloHandler()
44 coap_add_data(response, strlen(responseData), (unsigned char *)responseData); in HelloHandler()
30 HelloHandler(coap_context_t *ctx, struct coap_resource_t *resource, coap_session_t *session, coap_pdu_t *request, coap_binary_t *token, coap_string_t *query, coap_pdu_t *response) HelloHandler() argument
/kernel/linux/linux-5.10/drivers/net/ieee802154/
H A Dca8210.c345 * @sync_command_response: pointer to buffer to fill with sync response
977 * @response: buffer for storing synchronous response
981 * synchronous commands waits for the corresponding response to be read from
982 * the spi before returning. The response is written to the response parameter.
989 u8 *response, in ca8210_spi_exchange()
998 if ((buf[0] & SPI_SYN) && response) { /* if sync wait for confirm */ in ca8210_spi_exchange()
1000 priv->sync_command_response = response; in ca8210_spi_exchange()
1014 if (((buf[0] & SPI_SYN) && response)) in ca8210_spi_exchange()
986 ca8210_spi_exchange( const u8 *buf, size_t len, u8 *response, void *device_ref ) ca8210_spi_exchange() argument
1113 struct mac_message command, response; tdme_setsfr_request_sync() local
1543 struct mac_message command, response; mlme_reset_request_sync() local
1596 struct mac_message command, response; mlme_set_request_sync() local
1664 struct mac_message command, response; hwme_set_request_sync() local
1706 struct mac_message command, response; hwme_get_request_sync() local
2433 u8 response[CA8210_SPI_BUF_SIZE]; ca8210_test_check_upstream() local
[all...]
/kernel/linux/linux-6.6/drivers/net/ieee802154/
H A Dca8210.c304 * @sync_command_response: pointer to buffer to fill with sync response
936 * @response: buffer for storing synchronous response
940 * synchronous commands waits for the corresponding response to be read from
941 * the spi before returning. The response is written to the response parameter.
948 u8 *response, in ca8210_spi_exchange()
957 if ((buf[0] & SPI_SYN) && response) { /* if sync wait for confirm */ in ca8210_spi_exchange()
959 priv->sync_command_response = response; in ca8210_spi_exchange()
973 if (((buf[0] & SPI_SYN) && response)) in ca8210_spi_exchange()
945 ca8210_spi_exchange( const u8 *buf, size_t len, u8 *response, void *device_ref ) ca8210_spi_exchange() argument
1072 struct mac_message command, response; tdme_setsfr_request_sync() local
1501 struct mac_message command, response; mlme_reset_request_sync() local
1554 struct mac_message command, response; mlme_set_request_sync() local
1622 struct mac_message command, response; hwme_set_request_sync() local
1664 struct mac_message command, response; hwme_get_request_sync() local
2390 u8 response[CA8210_SPI_BUF_SIZE]; ca8210_test_check_upstream() local
[all...]
/kernel/linux/linux-5.10/drivers/platform/chrome/
H A Dcros_ec_spi.c28 * SPI transfer size is 256 bytes, so at 5MHz we need a response
136 /* Reset end-of-response timer */ in terminate_request()
194 struct ec_host_response *response; in cros_ec_spi_receive_packet() local
248 /* If the entire response struct wasn't read, get the rest of it. */ in cros_ec_spi_receive_packet()
249 if (todo < sizeof(*response)) { in cros_ec_spi_receive_packet()
250 ret = receive_n_bytes(ec_dev, ptr, sizeof(*response) - todo); in cros_ec_spi_receive_packet()
253 ptr += (sizeof(*response) - todo); in cros_ec_spi_receive_packet()
254 todo = sizeof(*response); in cros_ec_spi_receive_packet()
257 response = (struct ec_host_response *)ec_dev->din; in cros_ec_spi_receive_packet()
260 if (response in cros_ec_spi_receive_packet()
391 struct ec_host_response *response; do_cros_ec_pkt_xfer_spi() local
[all...]
/kernel/linux/linux-6.6/drivers/platform/chrome/
H A Dcros_ec_spi.c28 * SPI transfer size is 256 bytes, so at 5MHz we need a response
130 /* Reset end-of-response timer */ in terminate_request()
189 struct ec_host_response *response; in cros_ec_spi_receive_packet() local
243 /* If the entire response struct wasn't read, get the rest of it. */ in cros_ec_spi_receive_packet()
244 if (todo < sizeof(*response)) { in cros_ec_spi_receive_packet()
245 ret = receive_n_bytes(ec_dev, ptr, sizeof(*response) - todo); in cros_ec_spi_receive_packet()
248 ptr += (sizeof(*response) - todo); in cros_ec_spi_receive_packet()
249 todo = sizeof(*response); in cros_ec_spi_receive_packet()
252 response = (struct ec_host_response *)ec_dev->din; in cros_ec_spi_receive_packet()
255 if (response in cros_ec_spi_receive_packet()
386 struct ec_host_response *response; do_cros_ec_pkt_xfer_spi() local
[all...]
/third_party/node/lib/internal/http2/
H A Dcompat.js74 const kResponse = Symbol('response');
173 // and response objects.
185 const response = this[kResponse];
186 if (response !== undefined)
187 response.emit('drain');
887 const response = new ServerResponse(stream);
892 if (!server.emit('connect', request, response)) {
893 response.statusCode = HTTP_STATUS_METHOD_NOT_ALLOWED;
894 response.end();
903 server.emit('checkContinue', request, response);
[all...]
/third_party/python/Lib/test/
H A Dtest_imaplib.py312 self.server.response = yield
316 self.server.response = yield
322 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
329 self.assertEqual(server.response,
339 self.server.response = yield
364 self.response = yield
375 self.server.response = yield
380 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
386 self.server.response = yield
391 self.assertEqual(server.response,
[all...]
/kernel/linux/linux-6.6/fs/smb/client/
H A Dcifsencrypt.c245 server->session_key.response, server->session_key.len); in cifs_calc_signature()
247 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
409 kfree_sensitive(ses->auth_key.response); in build_avpair_blob()
411 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
412 if (!ses->auth_key.response) { in build_avpair_blob()
417 blobptr = ses->auth_key.response; in build_avpair_blob()
452 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name()
455 blobptr = ses->auth_key.response; in find_domain_name()
505 if (!ses->auth_key.len || !ses->auth_key.response) in find_timestamp()
508 blobptr = ses->auth_key.response; in find_timestamp()
[all...]
/third_party/selinux/libsepol/include/sepol/
H A Dusers.h21 const sepol_policydb_t * p, unsigned int *response);
26 const sepol_user_key_t * key, int *response);
32 sepol_user_t ** response);
H A Dports.h14 const sepol_policydb_t * p, unsigned int *response);
19 const sepol_port_key_t * key, int *response);
25 sepol_port_t ** response);
H A Dibendports.h15 unsigned int *response);
20 const sepol_ibendport_key_t *key, int *response);
26 sepol_ibendport_t **response);
H A Dbooleans.h21 const sepol_policydb_t * p, unsigned int *response);
26 const sepol_bool_key_t * key, int *response);
32 sepol_bool_t ** response);
H A Dinterfaces.h15 unsigned int *response);
20 const sepol_iface_key_t * key, int *response);
27 sepol_iface_t ** response);
H A Dibpkeys.h15 const sepol_policydb_t *p, unsigned int *response);
20 const sepol_ibpkey_key_t *key, int *response);
26 sepol_ibpkey_t **response);

Completed in 19 milliseconds

12345678910>>...48