/third_party/python/Lib/test/ |
H A D | test_io.py | 4175 sent = [] 4194 sent.append(msg) 4201 sent[-1] = sent[-1][:e.characters_written] 4205 sent.append(msg) 4219 sent, received = b''.join(sent), b''.join(received) 4220 self.assertEqual(sent, received)
|
H A D | test_smtplib.py | 56 sent = conn.send(buf) 57 buf = buf[sent:]
|
H A D | test_logging.py | 1791 # The log message sent to the SocketHandler is properly received. 1813 self.root_logger.exception('Never sent') 1814 self.root_logger.error('Never sent, either') 1900 # The log message sent to the DatagramHandler is properly received. 1981 # The log message sent to the SysLogHandler is properly received. 2064 # The log message sent to the HTTPHandler is properly received. 3308 sent = sock.send(s[sentsofar:]) 3309 sentsofar += sent 3310 left -= sent
|
/third_party/toybox/generated/ |
H A D | globals.h | 193 unsigned long sent, recv, fugit, min, max; member
|
/third_party/backends/backend/ |
H A D | umax_pp_low.c | 261 #define CMDSETGET(cmd,len,sent) if(cmdSetGet(cmd,len,sent)!=1)\ 263 DBG(0,"cmdSetGet(0x%02X,%d,sent) failed (%s:%d)\n",cmd,len,__FILE__,__LINE__);\ 282 #define CMDGETBUF(cmd,len,sent) if(cmdGetBuffer(cmd,len,sent)!=1)\ 288 #define CMDGETBUF32(cmd,len,sent) if(cmdGetBuffer32(cmd,len,sent)!=1)\ 294 #define CMDSET(cmd,len,sent) if(cmdSet(cmd,len,sent)!=1)\ 296 DBG(0,"cmdSet(0x%02X,%d,sent) faile [all...] |
/third_party/rust/crates/nix/src/sys/socket/ |
H A D | mod.rs | 1046 /// allowed to specify any credentials, while credentials sent by other 1506 /// `Vec` with numbers of sent bytes on each sent message. 1561 let sent = Errno::result(unsafe { in sendmmsg() 1573 received: sent in sendmmsg()
|
/third_party/libcoap/examples/ |
H A D | coap-server.c | 442 * Not setting response code will cause empty ACK to be sent in hnd_get_async() 911 /* resolve destination address where data should be sent */ in get_ongoing_proxy_session() 1597 const coap_pdu_t *sent COAP_UNUSED, in proxy_response_handler() 1720 const coap_pdu_t *sent COAP_UNUSED, in proxy_nack_handler() 2149 "\t-e \t\tEcho back the data sent with a PUT\n" in usage() 2186 "\t \t\tevery fifth response will still be sent as a confirmable\n" in usage()
|
/third_party/libabigail/tools/ |
H A D | fedabipkgdiff | 1433 'run will be sent to stdout.')
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 842 * so if it is not sent we can just choose any curve. in tls1_check_group_id() 1370 size_t tls12_get_psigalgs(SSL *s, int sent, const uint16_t **psigs) in tls12_get_psigalgs() argument 1394 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs() 1481 * Check signature algorithm is consistent with sent supported signature 1567 /* Check signature matches a type we sent */ in tls12_check_peer_sigalg() 1708 * If peer sent no signature algorithms check to see if we support in tls1_set_server_sigalgs() 1722 /* Check default matches a type we sent */ in tls1_set_server_sigalgs() 2753 * If peer sent no signature algorithms extension and we have set in tls1_check_chain() 3083 * Checks the given cert against signature_algorithm_cert restrictions sent by 3143 * the signature_algorithm_cert restrictions sent b [all...] |
H A D | ssl_local.h | 460 SSL_PHA_EXT_SENT, /* client-side only: extension sent */ 463 SSL_PHA_REQUESTED /* request received by client, or sent by server */ 595 /* Certificate chain peer sent. */ 627 /* Max number of bytes that can be sent as early data */ 1164 * sent as early data. 1279 /* we have shut things down, 0x01 sent, 0x02 for received */ 1346 /* Certificate authorities list peer sent */ 1439 /* used by the client to know if it actually sent alpn */ 1542 * but is a random value sent in the legacy session id field. 1630 /* OCSP response received or to be sent */ [all...] |
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 822 * so if it is not sent we can just choose any curve. in tls1_check_group_id() 1350 size_t tls12_get_psigalgs(SSL *s, int sent, const uint16_t **psigs) in tls12_get_psigalgs() argument 1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs() 1461 * Check signature algorithm is consistent with sent supported signature 1547 /* Check signature matches a type we sent */ in tls12_check_peer_sigalg() 1688 * If peer sent no signature algorithms check to see if we support in tls1_set_server_sigalgs() 1702 /* Check default matches a type we sent */ in tls1_set_server_sigalgs() 2733 * If peer sent no signature algorithms extension and we have set in tls1_check_chain() 3063 * Checks the given cert against signature_algorithm_cert restrictions sent by 3123 * the signature_algorithm_cert restrictions sent b [all...] |
H A D | ssl_local.h | 453 SSL_PHA_EXT_SENT, /* client-side only: extension sent */ 456 SSL_PHA_REQUESTED /* request received by client, or sent by server */ 588 /* Certificate chain peer sent. */ 620 /* Max number of bytes that can be sent as early data */ 1155 * sent as early data. 1255 /* we have shut things down, 0x01 sent, 0x02 for received */ 1322 /* Certificate authorities list peer sent */ 1415 /* used by the client to know if it actually sent alpn */ 1513 * but is a random value sent in the legacy session id field. 1601 /* OCSP response received or to be sent */ [all...] |
/third_party/node/lib/internal/ |
H A D | errors.js | 1132 E('ERR_HTTP2_SEND_FILE', 'Directories cannot be sent', Error); 1158 'Trailing headers have already been sent', Error); 1160 'Trailing headers cannot be sent until after the wantTrailers event is ' + 1168 'Cannot %s headers after they are sent to the client', Error); 1318 E('ERR_INVALID_HANDLE_TYPE', 'This handle type cannot be sent', TypeError);
|
/third_party/libwebsockets/lib/roles/http/server/ |
H A D | server.c | 2079 * client sent against our vhost name in lws_confirm_host_header() 2538 * partial is sent. in lws_http_transaction_completed() 2646 wsi->http.access_log.sent = 0; in lws_http_transaction_completed() 2935 * been sent. Http/1.1 pipelining must be able in lws_serve_http_file() 3168 * will be handled when the role data frame is sent... in lws_serve_http_file_fragment() 3255 /* adjust for what was not sent */ in lws_serve_http_file_fragment()
|
/third_party/typescript/lib/ |
H A D | tsserver.js | 43 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |
H A D | tsserverlibrary.js | 42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |
H A D | typingsInstaller.js | 43 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |
H A D | tsc.js | 43 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |
H A D | typescript.js | 42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |
H A D | typescriptServices.js | 42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |
/third_party/node/test/fixtures/snapshot/ |
H A D | typescript.js | 42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; [all...] |