Home
last modified time | relevance | path

Searched refs:response (Results 476 - 500 of 519) sorted by relevance

1...<<1112131415161718192021

/third_party/pulseaudio/src/pulse/
H A Dintrospect.h501 typedef void (*pa_context_string_cb_t)(pa_context *c, int success, char *response, void *userdata);
/third_party/openssl/crypto/cmp/
H A Dcmp_asn.c368 ASN1_SEQUENCE_OF(OSSL_CMP_CERTREPMESSAGE, response, OSSL_CMP_CERTRESPONSE)
H A Dcmp_local.h52 /* attempts polling for a response if a 'waiting' PKIStatus is received */
66 X509_NAME *expected_sender; /* expected sender in header of response */
387 * -- to match this response with corresponding request (a value
409 * response SEQUENCE OF CertResponse
414 STACK_OF(OSSL_CMP_CERTRESPONSE) *response; member
465 * -- corresponding request, response, certConf, and PKIConf
538 * pollRep [26] PollRepContent --Polling response
647 * pollRep [26] PollRepContent --Polling response
/third_party/openssl/include/openssl/
H A Dts.h225 * Declarations related to response generation, defined in ts/ts_resp_sign.c.
228 /* Optional flags for response generation. */
230 /* Don't include the TSA name in response. */
233 /* Set ordering to true in response. */
260 * set the status info/failure info of the response).
267 /* Creates a response context that can be used for generating responses. */
285 /* No additional certs are included in the response by default. */
356 * Declarations related to response verification,
365 /* Verify the signer's certificate and the signature of the response. */
367 /* Verify the version number of the response
[all...]
/third_party/openssl/test/
H A Dcmp_msg_test.c29 /* for error and response messages */
399 || !sk_OSSL_CMP_CERTRESPONSE_push(crepmsg->response, cresp)) in execute_certrep_create()
/third_party/python/PCbuild/
H A Dbuild.bat16 echo.response file.
/third_party/node/test/fixtures/postject-copy/node_modules/postject/dist/
H A Dapi.js142 return new Uint8Array(xhr.response);
157 if (xhr.status == 200 || xhr.status == 0 && xhr.response) {
158 onload(xhr.response);
[all...]
/device/soc/rockchip/common/sdk_linux/drivers/mmc/core/
H A Dblock.c413 if (copy_to_user(&(ic_ptr->response), ic->response, sizeof(ic->response))) { in mmc_blk_ioctl_copy_to_user()
441 /* Accumulate any response error bits seen */ in card_busy_detect()
559 memcpy(&idata->ic.response, cmd.resp, sizeof(cmd.resp)); in mmc_blk_ioctl_cmd_ext()
723 /* copy to user if data and response */ in mmc_blk_ioctl_multi_cmd()
1238 * in the response for the following CMD18/25. And if argument of in mmc_blk_eval_resp_error()
1241 * the host drivers due to missing data response(for write)/data(for in mmc_blk_eval_resp_error()
1248 /* If there is no error yet, check R1 response */ in mmc_blk_eval_resp_error()
1714 * response mod
[all...]
/third_party/nghttp2/src/
H A Dshrpx_http3_upstream.cc1146 // response body is sent. This is needed to ensure that RST_STREAM in downstream_eof()
1186 // stream, we don't have to do anything since response was in downstream_error()
1271 auto &resp = downstream->response(); in on_downstream_header_complete()
1277 DLOG(INFO, downstream) << "HTTP non-final response header"; in on_downstream_header_complete()
1279 DLOG(INFO, downstream) << "HTTP response header completed"; in on_downstream_header_complete()
1476 DLOG(INFO, downstream) << "HTTP response completed"; in on_downstream_body_complete()
1479 auto &resp = downstream->response(); in on_downstream_body_complete()
1600 // We have got all response body already. Send it off. in on_downstream_reset()
1690 const auto &resp = downstream->response(); in send_reply()
2516 ULOG(INFO, this) << "response unacked_lef in http_stream_close()
[all...]
H A Dshrpx_http2_session.cc642 // We only read HTTP header part. If tunneling succeeds, response in htp_hdrs_completecb()
858 // upstream *after* whole response body is sent. We just set in on_stream_close_callback()
915 auto &resp = downstream->response(); in on_header_callback2()
1102 auto &resp = downstream->response(); in on_response_headers()
1130 << "HTTP response headers. stream_id=" << frame->hd.stream_id << "\n" in on_response_headers()
1137 SSLOG(INFO, http2session) << "This is non-final response."; in on_response_headers()
1143 // Now Dowstream's response headers are erased. in on_response_headers()
1178 // Here we have response body but Content-Length is not known in in on_response_headers()
1206 // Handling early return (in other words, response was hijacked by in on_response_headers()
1431 // We don't want DATA after non-final response, whic in on_data_chunk_recv_callback()
[all...]
H A Dshrpx_log.cc591 const auto &resp = downstream->response(); in upstream_accesslog()
/third_party/pulseaudio/src/modules/bluetooth/
H A Dmodule-bluez5-device.c1485 /* We should send two blocks to the device before we expect a response. */ in thread_func()
2566 static int bluez5_device_message_handler(const char *object_path, const char *message, const pa_json_object *parameters, char **response, void *userdata) { in bluez5_device_message_handler() argument
2577 pa_assert(response); in bluez5_device_message_handler()
2675 *response = list_codecs(u); in bluez5_device_message_handler()
2686 *response = pa_json_encoder_to_string_free(encoder); in bluez5_device_message_handler()
/test/xts/acts/distributeddatamgr/dataObjecttest/dataObjectjstest/hap/entry/src/ohosTest/js/test/
H A DObjectStoreJsunitV9.test.js37 this.response += "\nstatus changed " + sessionId + " " + status + " " + networkId;
42 this.response += "\nstatus changed " + sessionId + " " + status + " " + networkId;
/third_party/backends/backend/
H A Dkvs1025_low.c222 PKV_CMD_HEADER header, PKV_CMD_RESPONSE response) in kv_send_command()
233 status = kv_usb_send_command (dev, header, response); in kv_send_command()
221 kv_send_command(PKV_DEV dev, PKV_CMD_HEADER header, PKV_CMD_RESPONSE response) kv_send_command() argument
/third_party/pulseaudio/src/pulsecore/
H A Dprotocol-esound.c586 int32_t response; in esd_proto_server_info() local
600 response = 0; in esd_proto_server_info()
601 connection_write(c, &response, sizeof(int32_t)); in esd_proto_server_info()
/third_party/python/Lib/test/
H A Dtest_urllib2.py39 for module in 'request', 'response', 'parse', 'error', 'robotparser':
316 def extract_cookies(self, response, request):
317 self.ec_req, self.ec_r = request, response
416 elif action == "return response":
490 # sends supplied headers and code as first response
491 # sends 200 OK as second response
530 # sends supplied code response
606 # (instead of response), which becomes the OpenerDirector's return
653 [("http_error_302", "return response"), "http_error_303",
674 ("http_response", "return response")],
[all...]
/third_party/node/lib/
H A D_http_client.js103 const onClientResponseFinishChannel = dc.channel('http.client.response.finish');
244 this.once('response', cb);
424 // If we're aborting, we don't care about any more response data.
471 // receive a response. The error needs to
522 // If we don't have a response then we know that the socket
591 // the server will send a final response after this client
616 debug('AGENT incoming response!');
619 // We already have a response object, this means the server
620 // sent a double response.
680 response
[all...]
/third_party/node/test/fixtures/wpt/common/security-features/resources/
H A Dcommon.sub.js36 [B] HTTP response headers.
61 e.g. HTTP referrer-policy response headers of HTML/worker scripts.
134 * @param {string} responseType Optional - how should the response be parsed.
153 resolve(xhr.response);
405 // crossOrigin attribute is added to read the pixel data of the response.
974 response URL might be different from what is specified by OriginType.
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_local.h52 /* attempts polling for a response if a 'waiting' PKIStatus is received */
66 X509_NAME *expected_sender; /* expected sender in header of response */
387 * -- to match this response with corresponding request (a value
409 * response SEQUENCE OF CertResponse
414 STACK_OF(OSSL_CMP_CERTRESPONSE) *response; member
465 * -- corresponding request, response, certConf, and PKIConf
538 * pollRep [26] PollRepContent --Polling response
647 * pollRep [26] PollRepContent --Polling response
/third_party/openssl/ohos_lite/include/openssl/
H A Dts.h283 * Declarations related to response generation, defined in ts/ts_resp_sign.c.
286 /* Optional flags for response generation. */
288 /* Don't include the TSA name in response. */
291 /* Set ordering to true in response. */
318 * set the status info/failure info of the response).
327 /* Creates a response context that can be used for generating responses. */
344 /* No additional certs are included in the response by default. */
415 * Declarations related to response verification,
424 /* Verify the signer's certificate and the signature of the response. */
426 /* Verify the version number of the response
[all...]
/third_party/node/tools/inspector_protocol/encoding/
H A Dencoding_test.cc1460 std::unique_ptr<char[]> response(new char[str.size() + 1]);
1461 memcpy(response.get(), str.c_str(), str.size() + 1);
1462 return response;
/third_party/python/Lib/test/test_asyncio/
H A Dtest_events.py742 response = None
746 nonlocal response
753 response = csock.recv(99)
777 self.assertEqual(response, expected_response)
/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/
H A Dwl_cfgnan.h322 /* Data request Responder's response */
426 bool response; member
715 /* ranging quest and response iovar handler */
/third_party/node/deps/v8/src/inspector/
H A Dv8-console.cc725 protocol::Response response = injectedScript->wrapObject( in inspectImpl() local
727 if (!response.IsSuccess()) return; in inspectImpl()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server.c1428 * the EAP request if no response is received. in eap_sm_calculateTimeout()
2099 const u8 *challenge, const u8 *response) in eap_server_mschap_rx_callback()
2110 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24, in eap_server_mschap_rx_callback()
2097 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) eap_server_mschap_rx_callback() argument

Completed in 56 milliseconds

1...<<1112131415161718192021