/third_party/ffmpeg/libavformat/ |
H A D | httpauth.c | 147 char A1hash[33], A2hash[33], response[33]; in make_digest_auth() local 193 ff_data_to_hex(response, hash, 16, 1); in make_digest_auth() 207 strlen(uri) + strlen(response) + strlen(digest->algorithm) + in make_digest_auth() 221 av_strlcatf(authstr, len, ", response=\"%s\"", response); in make_digest_auth()
|
/third_party/curl/lib/ |
H A D | pingpong.c | 59 remaining time, or use pp->response because SERVER_RESPONSE_TIMEOUT is in Curl_pp_state_timeout() 60 supposed to govern the response for any given server response, not for in Curl_pp_state_timeout() 61 the time from connect to the given server response. */ in Curl_pp_state_timeout() 64 full response to arrive before we bail out */ in Curl_pp_state_timeout() 66 Curl_timediff(Curl_now(), pp->response); /* spent time */ in Curl_pp_state_timeout() 95 failf(data, "server response timeout"); in Curl_pp_statemach() 142 /* initialize stuff to prepare for reading a fresh new response */ 146 pp->response = Curl_now(); /* start response tim in Curl_pp_init() [all...] |
/third_party/NuttX/fs/nfs/ |
H A D | nfs_util.c | 166 void *response, size_t resplen) in nfs_request() 174 request, reqlen, response, resplen); in nfs_request() 196 request, reqlen, response, resplen); in nfs_request() 205 memcpy(&replyh, response, sizeof(struct nfs_reply_header)); in nfs_request() 164 nfs_request(struct nfsmount *nmp, int procnum, void *request, size_t reqlen, void *response, size_t resplen) nfs_request() argument
|
/third_party/protobuf/conformance/ |
H A D | conformance_test_runner.cc | 150 std::string* response) { in RunTest() 181 response_obj.SerializeToString(response); in RunTest() 185 response->resize(len); in RunTest() 186 CheckedRead(read_fd_, (void*)response->c_str(), len); in RunTest() 147 RunTest( const std::string& test_name, const std::string& request, std::string* response) RunTest() argument
|
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
H A D | tls_test_common.c | 170 struct MHD_Response *response; in http_ahc() local 182 response = MHD_create_response_from_buffer (strlen (test_data), in http_ahc() 185 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in http_ahc() 186 MHD_destroy_response (response); in http_ahc()
|
/third_party/skia/third_party/externals/microhttpd/src/testzzuf/ |
H A D | test_get.c | 73 struct MHD_Response *response; in ahc_echo() local 84 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo() 87 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 88 MHD_destroy_response (response); in ahc_echo()
|
H A D | test_post.c | 116 struct MHD_Response *response; in ahc_echo() local 134 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo() 137 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 138 MHD_destroy_response (response); in ahc_echo()
|
H A D | test_post_form.c | 119 struct MHD_Response *response; in ahc_echo() local 139 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo() 142 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 143 MHD_destroy_response (response); in ahc_echo()
|
H A D | test_put.c | 87 struct MHD_Response *response; in ahc_echo() local 108 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo() 111 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 112 MHD_destroy_response (response); in ahc_echo()
|
H A D | test_put_chunked.c | 87 struct MHD_Response *response; in ahc_echo() local 110 fprintf (stderr, "Not ready for response: %u/%u\n", *done, 8); in ahc_echo() 114 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo() 117 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 118 MHD_destroy_response (response); in ahc_echo()
|
H A D | test_put_large.c | 95 struct MHD_Response *response; in ahc_echo() local 122 response = MHD_create_response_from_buffer (strlen (url), in ahc_echo() 125 ret = MHD_queue_response (connection, MHD_HTTP_OK, response); in ahc_echo() 126 MHD_destroy_response (response); in ahc_echo()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | wps-ap-nfc.py | 116 # override to avoid parser error in request/response.pretty() in nfcpy 120 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12") 129 response = self.process_request(request) 130 summary("send handover response {}".format(response.type)) 131 return response
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | wps-ap-nfc.py | 116 # override to avoid parser error in request/response.pretty() in nfcpy 120 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12") 129 response = self.process_request(request) 130 summary("send handover response {}".format(response.type)) 131 return response
|
/third_party/ffmpeg/libavfilter/ |
H A D | af_afir.c | 291 if (s->response) { in convert_coeffs() 359 if (s->response) in activate() 372 else if (s->response && ff_outlink_frame_wanted(ctx->outputs[1])) in activate() 393 if (s->response && s->have_coeffs) { in activate() 415 if (s->response) in activate() 427 if (s->response && in activate() 451 if (s->response) { in query_formats() 586 if (s->response) { in init() 649 { "response", "show IR frequency response", OFFSE [all...] |
/third_party/googletest/googletest/scripts/ |
H A D | upload.py | 216 response = self.opener.open(req) 217 response_body = response.read() 245 response = self.opener.open(req) 247 response = e 248 if (response.code != 302 or 249 response.info()["location"] != continue_location): 250 raise urllib2.HTTPError(req.get_full_url(), response.code, response.msg, 251 response.headers, response [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_ttls.c | 620 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() 624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 628 "attributes (challenge len %lu response len %lu)", in eap_ttls_process_phase2_mschap() 655 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap() 660 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap() 677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 678 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); in eap_ttls_process_phase2_mschap() 684 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap() 696 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() 702 if (challenge == NULL || response in eap_ttls_process_phase2_mschapv2() 617 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument 692 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_ttls.c | 621 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() 625 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 629 "attributes (challenge len %lu response len %lu)", in eap_ttls_process_phase2_mschap() 656 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap() 661 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap() 678 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 679 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); in eap_ttls_process_phase2_mschap() 685 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap() 697 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() 703 if (challenge == NULL || response in eap_ttls_process_phase2_mschapv2() 618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument 693 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument [all...] |
/foundation/bundlemanager/app_domain_verify/frameworks/verifier/src/ |
H A D | verify_task.cpp | 38 void VerifyTask::OnPostVerify(const std::string& uri, const OHOS::NetStack::HttpClient::HttpClientResponse& response) in OnPostVerify() argument 41 auto status = DomainVerifier::VerifyHost(response.GetResponseCode(), response.GetResult(), appVerifyBaseInfo_); in OnPostVerify()
|
/foundation/systemabilitymgr/samgr_lite/samgr/source/ |
H A D | task_manager.c | 160 SAMGR_SendResponse(&exchange->request, &exchange->response);
in ProcRequest() 174 exchange->handler(&exchange->request, &exchange->response);
in ProcResponse() 187 exchange->handler(&exchange->request, &exchange->response);
in ProcDirectRequest()
|
/third_party/ltp/testcases/kernel/syscalls/fanotify/ |
H A D | fanotify03.c | 57 unsigned int response; member 292 /* Write response to the permission event */ in test_fanotify() 297 resp.response = event_set[test_num].response; in test_fanotify()
|
/foundation/ai/ai_engine/services/server/plugin/cv/image_classification/source/ |
H A D | ic_plugin.cpp | 274 int32_t ICPlugin::SyncProcess(IRequest *request, IResponse *&response)
in SyncProcess() argument 315 retCode = DoProcess(handle, iter->second, request, response);
in SyncProcess() 324 int32_t ICPlugin::DoProcess(intptr_t handle, const ICPluginConfig &config, IRequest *request, IResponse *&response)
in DoProcess() argument 332 response = IResponse::Create(request);
in DoProcess() 333 response->SetResult(outputInfo);
in DoProcess()
|
/foundation/communication/dsoftbus/tests/core/connection/wifi_direct_cpp/adapter/ |
H A D | p2p_adapter_test.cpp | 193 RecommendChannelResponse response; in HWTEST_F() local 194 response.centerFreq = 0; in HWTEST_F() 195 response.centerFreq1 = 1; in HWTEST_F() 196 EXPECT_CALL(mock, Hid2dGetRecommendChannel).WillOnce(DoAll(SetArgPointee<1>(response), in HWTEST_F() 202 response.centerFreq1 = 0; in HWTEST_F()
|
/foundation/communication/dsoftbus/tests/sdk/transmission/moduletest/socket/stream_encrypt_test/ |
H A D | tmessenger.cpp | 78 if (msgType_ == MsgType::MSG_RSP && response != nullptr) { in ~Message() 79 delete response; in ~Message() 90 return response == nullptr ? "" : data + SEPARATOR + response->Encode(); in Encode() 300 LOGE("failed to send response"); in OnRequest() 366 const Response *rsp = (*it)->response; in GetMessageFromRecvList()
|
/third_party/ltp/lib/ |
H A D | tst_rtnetlink.c | 396 struct tst_rtnl_message *response; in tst_rtnl_send_validate() local 405 response = tst_rtnl_recv(file, lineno, ctx); in tst_rtnl_send_validate() 407 if (!response) in tst_rtnl_send_validate() 410 ret = tst_rtnl_check_acks(file, lineno, ctx, response); in tst_rtnl_send_validate() 411 tst_rtnl_free_message(response); in tst_rtnl_send_validate()
|
/third_party/node/lib/ |
H A D | _http_server.js | 101 const onResponseFinishChannel = dc.channel('http.server.response.finish'); 402 // The 204 response MUST NOT include a message-body, and thus is always 405 // The 304 response MUST NOT contain a message-body, and thus is always 408 // This class of status code indicates a provisional response, 647 // request, or response, then it's their responsibility. 883 let response; 887 response = requestHeaderFieldsTooLargeResponse; 890 response = requestChunkExtensionsTooLargeResponse; 893 response = requestTimeoutResponse; 896 response [all...] |