/third_party/pulseaudio/src/pulse/ |
H A D | introspect.h | 501 typedef void (*pa_context_string_cb_t)(pa_context *c, int success, char *response, void *userdata);
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_asn.c | 368 ASN1_SEQUENCE_OF(OSSL_CMP_CERTREPMESSAGE, response, OSSL_CMP_CERTRESPONSE)
|
H A D | cmp_local.h | 52 /* attempts polling for a response if a 'waiting' PKIStatus is received */ 66 X509_NAME *expected_sender; /* expected sender in header of response */ 387 * -- to match this response with corresponding request (a value 409 * response SEQUENCE OF CertResponse 414 STACK_OF(OSSL_CMP_CERTRESPONSE) *response; member 465 * -- corresponding request, response, certConf, and PKIConf 538 * pollRep [26] PollRepContent --Polling response 647 * pollRep [26] PollRepContent --Polling response
|
/third_party/openssl/include/openssl/ |
H A D | ts.h | 225 * Declarations related to response generation, defined in ts/ts_resp_sign.c. 228 /* Optional flags for response generation. */ 230 /* Don't include the TSA name in response. */ 233 /* Set ordering to true in response. */ 260 * set the status info/failure info of the response). 267 /* Creates a response context that can be used for generating responses. */ 285 /* No additional certs are included in the response by default. */ 356 * Declarations related to response verification, 365 /* Verify the signer's certificate and the signature of the response. */ 367 /* Verify the version number of the response [all...] |
/third_party/openssl/test/ |
H A D | cmp_msg_test.c | 29 /* for error and response messages */ 399 || !sk_OSSL_CMP_CERTRESPONSE_push(crepmsg->response, cresp)) in execute_certrep_create()
|
/third_party/python/PCbuild/ |
H A D | build.bat | 16 echo.response file.
|
/third_party/node/test/fixtures/postject-copy/node_modules/postject/dist/ |
H A D | api.js | 142 return new Uint8Array(xhr.response); 157 if (xhr.status == 200 || xhr.status == 0 && xhr.response) { 158 onload(xhr.response); [all...] |
/device/soc/rockchip/common/sdk_linux/drivers/mmc/core/ |
H A D | block.c | 413 if (copy_to_user(&(ic_ptr->response), ic->response, sizeof(ic->response))) {
in mmc_blk_ioctl_copy_to_user() 441 /* Accumulate any response error bits seen */
in card_busy_detect() 559 memcpy(&idata->ic.response, cmd.resp, sizeof(cmd.resp));
in mmc_blk_ioctl_cmd_ext() 723 /* copy to user if data and response */
in mmc_blk_ioctl_multi_cmd() 1238 * in the response for the following CMD18/25. And if argument of
in mmc_blk_eval_resp_error() 1241 * the host drivers due to missing data response(for write)/data(for
in mmc_blk_eval_resp_error() 1248 /* If there is no error yet, check R1 response */
in mmc_blk_eval_resp_error() 1714 * response mod [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_http3_upstream.cc | 1146 // response body is sent. This is needed to ensure that RST_STREAM in downstream_eof() 1186 // stream, we don't have to do anything since response was in downstream_error() 1271 auto &resp = downstream->response(); in on_downstream_header_complete() 1277 DLOG(INFO, downstream) << "HTTP non-final response header"; in on_downstream_header_complete() 1279 DLOG(INFO, downstream) << "HTTP response header completed"; in on_downstream_header_complete() 1476 DLOG(INFO, downstream) << "HTTP response completed"; in on_downstream_body_complete() 1479 auto &resp = downstream->response(); in on_downstream_body_complete() 1600 // We have got all response body already. Send it off. in on_downstream_reset() 1690 const auto &resp = downstream->response(); in send_reply() 2516 ULOG(INFO, this) << "response unacked_lef in http_stream_close() [all...] |
H A D | shrpx_http2_session.cc | 642 // We only read HTTP header part. If tunneling succeeds, response in htp_hdrs_completecb() 858 // upstream *after* whole response body is sent. We just set in on_stream_close_callback() 915 auto &resp = downstream->response(); in on_header_callback2() 1102 auto &resp = downstream->response(); in on_response_headers() 1130 << "HTTP response headers. stream_id=" << frame->hd.stream_id << "\n" in on_response_headers() 1137 SSLOG(INFO, http2session) << "This is non-final response."; in on_response_headers() 1143 // Now Dowstream's response headers are erased. in on_response_headers() 1178 // Here we have response body but Content-Length is not known in in on_response_headers() 1206 // Handling early return (in other words, response was hijacked by in on_response_headers() 1431 // We don't want DATA after non-final response, whic in on_data_chunk_recv_callback() [all...] |
H A D | shrpx_log.cc | 591 const auto &resp = downstream->response(); in upstream_accesslog()
|
/third_party/pulseaudio/src/modules/bluetooth/ |
H A D | module-bluez5-device.c | 1485 /* We should send two blocks to the device before we expect a response. */ in thread_func() 2566 static int bluez5_device_message_handler(const char *object_path, const char *message, const pa_json_object *parameters, char **response, void *userdata) { in bluez5_device_message_handler() argument 2577 pa_assert(response); in bluez5_device_message_handler() 2675 *response = list_codecs(u); in bluez5_device_message_handler() 2686 *response = pa_json_encoder_to_string_free(encoder); in bluez5_device_message_handler()
|
/test/xts/acts/distributeddatamgr/dataObjecttest/dataObjectjstest/hap/entry/src/ohosTest/js/test/ |
H A D | ObjectStoreJsunitV9.test.js | 37 this.response += "\nstatus changed " + sessionId + " " + status + " " + networkId;
42 this.response += "\nstatus changed " + sessionId + " " + status + " " + networkId;
|
/third_party/backends/backend/ |
H A D | kvs1025_low.c | 222 PKV_CMD_HEADER header, PKV_CMD_RESPONSE response) in kv_send_command() 233 status = kv_usb_send_command (dev, header, response); in kv_send_command() 221 kv_send_command(PKV_DEV dev, PKV_CMD_HEADER header, PKV_CMD_RESPONSE response) kv_send_command() argument
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | protocol-esound.c | 586 int32_t response; in esd_proto_server_info() local 600 response = 0; in esd_proto_server_info() 601 connection_write(c, &response, sizeof(int32_t)); in esd_proto_server_info()
|
/third_party/python/Lib/test/ |
H A D | test_urllib2.py | 39 for module in 'request', 'response', 'parse', 'error', 'robotparser': 316 def extract_cookies(self, response, request): 317 self.ec_req, self.ec_r = request, response 416 elif action == "return response": 490 # sends supplied headers and code as first response 491 # sends 200 OK as second response 530 # sends supplied code response 606 # (instead of response), which becomes the OpenerDirector's return 653 [("http_error_302", "return response"), "http_error_303", 674 ("http_response", "return response")], [all...] |
/third_party/node/lib/ |
H A D | _http_client.js | 103 const onClientResponseFinishChannel = dc.channel('http.client.response.finish'); 244 this.once('response', cb); 424 // If we're aborting, we don't care about any more response data. 471 // receive a response. The error needs to 522 // If we don't have a response then we know that the socket 591 // the server will send a final response after this client 616 debug('AGENT incoming response!'); 619 // We already have a response object, this means the server 620 // sent a double response. 680 response [all...] |
/third_party/node/test/fixtures/wpt/common/security-features/resources/ |
H A D | common.sub.js | 36 [B] HTTP response headers. 61 e.g. HTTP referrer-policy response headers of HTML/worker scripts. 134 * @param {string} responseType Optional - how should the response be parsed. 153 resolve(xhr.response); 405 // crossOrigin attribute is added to read the pixel data of the response. 974 response URL might be different from what is specified by OriginType.
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_local.h | 52 /* attempts polling for a response if a 'waiting' PKIStatus is received */ 66 X509_NAME *expected_sender; /* expected sender in header of response */ 387 * -- to match this response with corresponding request (a value 409 * response SEQUENCE OF CertResponse 414 STACK_OF(OSSL_CMP_CERTRESPONSE) *response; member 465 * -- corresponding request, response, certConf, and PKIConf 538 * pollRep [26] PollRepContent --Polling response 647 * pollRep [26] PollRepContent --Polling response
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | ts.h | 283 * Declarations related to response generation, defined in ts/ts_resp_sign.c. 286 /* Optional flags for response generation. */ 288 /* Don't include the TSA name in response. */ 291 /* Set ordering to true in response. */ 318 * set the status info/failure info of the response). 327 /* Creates a response context that can be used for generating responses. */ 344 /* No additional certs are included in the response by default. */ 415 * Declarations related to response verification, 424 /* Verify the signer's certificate and the signature of the response. */ 426 /* Verify the version number of the response [all...] |
/third_party/node/tools/inspector_protocol/encoding/ |
H A D | encoding_test.cc | 1460 std::unique_ptr<char[]> response(new char[str.size() + 1]); 1461 memcpy(response.get(), str.c_str(), str.size() + 1); 1462 return response;
|
/third_party/python/Lib/test/test_asyncio/ |
H A D | test_events.py | 742 response = None 746 nonlocal response 753 response = csock.recv(99) 777 self.assertEqual(response, expected_response)
|
/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/ |
H A D | wl_cfgnan.h | 322 /* Data request Responder's response */ 426 bool response; member 715 /* ranging quest and response iovar handler */
|
/third_party/node/deps/v8/src/inspector/ |
H A D | v8-console.cc | 725 protocol::Response response = injectedScript->wrapObject( in inspectImpl() local 727 if (!response.IsSuccess()) return; in inspectImpl()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 1428 * the EAP request if no response is received. in eap_sm_calculateTimeout() 2099 const u8 *challenge, const u8 *response) in eap_server_mschap_rx_callback() 2110 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24, in eap_server_mschap_rx_callback() 2097 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) eap_server_mschap_rx_callback() argument
|