Home
last modified time | relevance | path

Searched refs:response (Results 376 - 400 of 815) sorted by relevance

1...<<11121314151617181920>>...33

/third_party/ffmpeg/libavformat/
H A Dhttpauth.c147 char A1hash[33], A2hash[33], response[33]; in make_digest_auth() local
193 ff_data_to_hex(response, hash, 16, 1); in make_digest_auth()
207 strlen(uri) + strlen(response) + strlen(digest->algorithm) + in make_digest_auth()
221 av_strlcatf(authstr, len, ", response=\"%s\"", response); in make_digest_auth()
/third_party/curl/lib/
H A Dpingpong.c59 remaining time, or use pp->response because SERVER_RESPONSE_TIMEOUT is in Curl_pp_state_timeout()
60 supposed to govern the response for any given server response, not for in Curl_pp_state_timeout()
61 the time from connect to the given server response. */ in Curl_pp_state_timeout()
64 full response to arrive before we bail out */ in Curl_pp_state_timeout()
66 Curl_timediff(Curl_now(), pp->response); /* spent time */ in Curl_pp_state_timeout()
95 failf(data, "server response timeout"); in Curl_pp_statemach()
142 /* initialize stuff to prepare for reading a fresh new response */
146 pp->response = Curl_now(); /* start response tim in Curl_pp_init()
[all...]
/third_party/NuttX/fs/nfs/
H A Dnfs_util.c166 void *response, size_t resplen) in nfs_request()
174 request, reqlen, response, resplen); in nfs_request()
196 request, reqlen, response, resplen); in nfs_request()
205 memcpy(&replyh, response, sizeof(struct nfs_reply_header)); in nfs_request()
164 nfs_request(struct nfsmount *nmp, int procnum, void *request, size_t reqlen, void *response, size_t resplen) nfs_request() argument
/third_party/protobuf/conformance/
H A Dconformance_test_runner.cc150 std::string* response) { in RunTest()
181 response_obj.SerializeToString(response); in RunTest()
185 response->resize(len); in RunTest()
186 CheckedRead(read_fd_, (void*)response->c_str(), len); in RunTest()
147 RunTest( const std::string& test_name, const std::string& request, std::string* response) RunTest() argument
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/
H A Dtls_test_common.c170 struct MHD_Response *response; in http_ahc() local
182 response = MHD_create_response_from_buffer (strlen (test_data), in http_ahc()
185 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in http_ahc()
186 MHD_destroy_response (response); in http_ahc()
/third_party/skia/third_party/externals/microhttpd/src/testzzuf/
H A Dtest_get.c73 struct MHD_Response *response; in ahc_echo() local
84 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo()
87 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
88 MHD_destroy_response (response); in ahc_echo()
H A Dtest_post.c116 struct MHD_Response *response; in ahc_echo() local
134 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo()
137 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
138 MHD_destroy_response (response); in ahc_echo()
H A Dtest_post_form.c119 struct MHD_Response *response; in ahc_echo() local
139 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo()
142 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
143 MHD_destroy_response (response); in ahc_echo()
H A Dtest_put.c87 struct MHD_Response *response; in ahc_echo() local
108 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo()
111 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
112 MHD_destroy_response (response); in ahc_echo()
H A Dtest_put_chunked.c87 struct MHD_Response *response; in ahc_echo() local
110 fprintf (stderr, "Not ready for response: %u/%u\n", *done, 8); in ahc_echo()
114 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo()
117 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
118 MHD_destroy_response (response); in ahc_echo()
H A Dtest_put_large.c95 struct MHD_Response *response; in ahc_echo() local
122 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo()
125 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo()
126 MHD_destroy_response (response); in ahc_echo()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
H A Dwps-ap-nfc.py116 # override to avoid parser error in request/response.pretty() in nfcpy
120 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
129 response = self.process_request(request)
130 summary("send handover response {}".format(response.type))
131 return response
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
H A Dwps-ap-nfc.py116 # override to avoid parser error in request/response.pretty() in nfcpy
120 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
129 response = self.process_request(request)
130 summary("send handover response {}".format(response.type))
131 return response
/third_party/ffmpeg/libavfilter/
H A Daf_afir.c291 if (s->response) { in convert_coeffs()
359 if (s->response) in activate()
372 else if (s->response && ff_outlink_frame_wanted(ctx->outputs[1])) in activate()
393 if (s->response && s->have_coeffs) { in activate()
415 if (s->response) in activate()
427 if (s->response && in activate()
451 if (s->response) { in query_formats()
586 if (s->response) { in init()
649 { "response", "show IR frequency response", OFFSE
[all...]
/third_party/googletest/googletest/scripts/
H A Dupload.py216 response = self.opener.open(req)
217 response_body = response.read()
245 response = self.opener.open(req)
247 response = e
248 if (response.code != 302 or
249 response.info()["location"] != continue_location):
250 raise urllib2.HTTPError(req.get_full_url(), response.code, response.msg,
251 response.headers, response
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_ttls.c620 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap()
624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
628 "attributes (challenge len %lu response len %lu)", in eap_ttls_process_phase2_mschap()
655 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
660 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap()
677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap()
678 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); in eap_ttls_process_phase2_mschap()
684 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap()
696 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2()
702 if (challenge == NULL || response in eap_ttls_process_phase2_mschapv2()
617 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument
692 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_ttls.c621 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap()
625 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
629 "attributes (challenge len %lu response len %lu)", in eap_ttls_process_phase2_mschap()
656 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
661 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap()
678 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap()
679 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); in eap_ttls_process_phase2_mschap()
685 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap()
697 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2()
703 if (challenge == NULL || response in eap_ttls_process_phase2_mschapv2()
618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument
693 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument
[all...]
/foundation/bundlemanager/app_domain_verify/frameworks/verifier/src/
H A Dverify_task.cpp38 void VerifyTask::OnPostVerify(const std::string& uri, const OHOS::NetStack::HttpClient::HttpClientResponse& response) in OnPostVerify() argument
41 auto status = DomainVerifier::VerifyHost(response.GetResponseCode(), response.GetResult(), appVerifyBaseInfo_); in OnPostVerify()
/foundation/systemabilitymgr/samgr_lite/samgr/source/
H A Dtask_manager.c160 SAMGR_SendResponse(&exchange->request, &exchange->response); in ProcRequest()
174 exchange->handler(&exchange->request, &exchange->response); in ProcResponse()
187 exchange->handler(&exchange->request, &exchange->response); in ProcDirectRequest()
/third_party/ltp/testcases/kernel/syscalls/fanotify/
H A Dfanotify03.c57 unsigned int response; member
292 /* Write response to the permission event */ in test_fanotify()
297 resp.response = event_set[test_num].response; in test_fanotify()
/foundation/ai/ai_engine/services/server/plugin/cv/image_classification/source/
H A Dic_plugin.cpp274 int32_t ICPlugin::SyncProcess(IRequest *request, IResponse *&response) in SyncProcess() argument
315 retCode = DoProcess(handle, iter->second, request, response); in SyncProcess()
324 int32_t ICPlugin::DoProcess(intptr_t handle, const ICPluginConfig &config, IRequest *request, IResponse *&response) in DoProcess() argument
332 response = IResponse::Create(request); in DoProcess()
333 response->SetResult(outputInfo); in DoProcess()
/foundation/communication/dsoftbus/tests/core/connection/wifi_direct_cpp/adapter/
H A Dp2p_adapter_test.cpp193 RecommendChannelResponse response; in HWTEST_F() local
194 response.centerFreq = 0; in HWTEST_F()
195 response.centerFreq1 = 1; in HWTEST_F()
196 EXPECT_CALL(mock, Hid2dGetRecommendChannel).WillOnce(DoAll(SetArgPointee<1>(response), in HWTEST_F()
202 response.centerFreq1 = 0; in HWTEST_F()
/foundation/communication/dsoftbus/tests/sdk/transmission/moduletest/socket/stream_encrypt_test/
H A Dtmessenger.cpp78 if (msgType_ == MsgType::MSG_RSP && response != nullptr) { in ~Message()
79 delete response; in ~Message()
90 return response == nullptr ? "" : data + SEPARATOR + response->Encode(); in Encode()
300 LOGE("failed to send response"); in OnRequest()
366 const Response *rsp = (*it)->response; in GetMessageFromRecvList()
/third_party/ltp/lib/
H A Dtst_rtnetlink.c396 struct tst_rtnl_message *response; in tst_rtnl_send_validate() local
405 response = tst_rtnl_recv(file, lineno, ctx); in tst_rtnl_send_validate()
407 if (!response) in tst_rtnl_send_validate()
410 ret = tst_rtnl_check_acks(file, lineno, ctx, response); in tst_rtnl_send_validate()
411 tst_rtnl_free_message(response); in tst_rtnl_send_validate()
/third_party/node/lib/
H A D_http_server.js101 const onResponseFinishChannel = dc.channel('http.server.response.finish');
402 // The 204 response MUST NOT include a message-body, and thus is always
405 // The 304 response MUST NOT contain a message-body, and thus is always
408 // This class of status code indicates a provisional response,
647 // request, or response, then it's their responsibility.
883 let response;
887 response = requestHeaderFieldsTooLargeResponse;
890 response = requestChunkExtensionsTooLargeResponse;
893 response = requestTimeoutResponse;
896 response
[all...]

Completed in 16 milliseconds

1...<<11121314151617181920>>...33