Home
last modified time | relevance | path

Searched refs:sent (Results 201 - 221 of 221) sorted by relevance

123456789

/third_party/python/Lib/test/
H A Dtest_io.py4175 sent = []
4194 sent.append(msg)
4201 sent[-1] = sent[-1][:e.characters_written]
4205 sent.append(msg)
4219 sent, received = b''.join(sent), b''.join(received)
4220 self.assertEqual(sent, received)
H A Dtest_smtplib.py56 sent = conn.send(buf)
57 buf = buf[sent:]
H A Dtest_logging.py1791 # The log message sent to the SocketHandler is properly received.
1813 self.root_logger.exception('Never sent')
1814 self.root_logger.error('Never sent, either')
1900 # The log message sent to the DatagramHandler is properly received.
1981 # The log message sent to the SysLogHandler is properly received.
2064 # The log message sent to the HTTPHandler is properly received.
3308 sent = sock.send(s[sentsofar:])
3309 sentsofar += sent
3310 left -= sent
/third_party/toybox/generated/
H A Dglobals.h193 unsigned long sent, recv, fugit, min, max; member
/third_party/backends/backend/
H A Dumax_pp_low.c261 #define CMDSETGET(cmd,len,sent) if(cmdSetGet(cmd,len,sent)!=1)\
263 DBG(0,"cmdSetGet(0x%02X,%d,sent) failed (%s:%d)\n",cmd,len,__FILE__,__LINE__);\
282 #define CMDGETBUF(cmd,len,sent) if(cmdGetBuffer(cmd,len,sent)!=1)\
288 #define CMDGETBUF32(cmd,len,sent) if(cmdGetBuffer32(cmd,len,sent)!=1)\
294 #define CMDSET(cmd,len,sent) if(cmdSet(cmd,len,sent)!=1)\
296 DBG(0,"cmdSet(0x%02X,%d,sent) faile
[all...]
/third_party/rust/crates/nix/src/sys/socket/
H A Dmod.rs1046 /// allowed to specify any credentials, while credentials sent by other
1506 /// `Vec` with numbers of sent bytes on each sent message.
1561 let sent = Errno::result(unsafe { in sendmmsg()
1573 received: sent in sendmmsg()
/third_party/libcoap/examples/
H A Dcoap-server.c442 * Not setting response code will cause empty ACK to be sent in hnd_get_async()
911 /* resolve destination address where data should be sent */ in get_ongoing_proxy_session()
1597 const coap_pdu_t *sent COAP_UNUSED, in proxy_response_handler()
1720 const coap_pdu_t *sent COAP_UNUSED, in proxy_nack_handler()
2149 "\t-e \t\tEcho back the data sent with a PUT\n" in usage()
2186 "\t \t\tevery fifth response will still be sent as a confirmable\n" in usage()
/third_party/libabigail/tools/
H A Dfedabipkgdiff1433 'run will be sent to stdout.')
/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_lib.c842 * so if it is not sent we can just choose any curve. in tls1_check_group_id()
1370 size_t tls12_get_psigalgs(SSL *s, int sent, const uint16_t **psigs) in tls12_get_psigalgs() argument
1394 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs()
1481 * Check signature algorithm is consistent with sent supported signature
1567 /* Check signature matches a type we sent */ in tls12_check_peer_sigalg()
1708 * If peer sent no signature algorithms check to see if we support in tls1_set_server_sigalgs()
1722 /* Check default matches a type we sent */ in tls1_set_server_sigalgs()
2753 * If peer sent no signature algorithms extension and we have set in tls1_check_chain()
3083 * Checks the given cert against signature_algorithm_cert restrictions sent by
3143 * the signature_algorithm_cert restrictions sent b
[all...]
H A Dssl_local.h460 SSL_PHA_EXT_SENT, /* client-side only: extension sent */
463 SSL_PHA_REQUESTED /* request received by client, or sent by server */
595 /* Certificate chain peer sent. */
627 /* Max number of bytes that can be sent as early data */
1164 * sent as early data.
1279 /* we have shut things down, 0x01 sent, 0x02 for received */
1346 /* Certificate authorities list peer sent */
1439 /* used by the client to know if it actually sent alpn */
1542 * but is a random value sent in the legacy session id field.
1630 /* OCSP response received or to be sent */
[all...]
/third_party/openssl/ssl/
H A Dt1_lib.c822 * so if it is not sent we can just choose any curve. in tls1_check_group_id()
1350 size_t tls12_get_psigalgs(SSL *s, int sent, const uint16_t **psigs) in tls12_get_psigalgs() argument
1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs()
1461 * Check signature algorithm is consistent with sent supported signature
1547 /* Check signature matches a type we sent */ in tls12_check_peer_sigalg()
1688 * If peer sent no signature algorithms check to see if we support in tls1_set_server_sigalgs()
1702 /* Check default matches a type we sent */ in tls1_set_server_sigalgs()
2733 * If peer sent no signature algorithms extension and we have set in tls1_check_chain()
3063 * Checks the given cert against signature_algorithm_cert restrictions sent by
3123 * the signature_algorithm_cert restrictions sent b
[all...]
H A Dssl_local.h453 SSL_PHA_EXT_SENT, /* client-side only: extension sent */
456 SSL_PHA_REQUESTED /* request received by client, or sent by server */
588 /* Certificate chain peer sent. */
620 /* Max number of bytes that can be sent as early data */
1155 * sent as early data.
1255 /* we have shut things down, 0x01 sent, 0x02 for received */
1322 /* Certificate authorities list peer sent */
1415 /* used by the client to know if it actually sent alpn */
1513 * but is a random value sent in the legacy session id field.
1601 /* OCSP response received or to be sent */
[all...]
/third_party/node/lib/internal/
H A Derrors.js1132 E('ERR_HTTP2_SEND_FILE', 'Directories cannot be sent', Error);
1158 'Trailing headers have already been sent', Error);
1160 'Trailing headers cannot be sent until after the wantTrailers event is ' +
1168 'Cannot %s headers after they are sent to the client', Error);
1318 E('ERR_INVALID_HANDLE_TYPE', 'This handle type cannot be sent', TypeError);
/third_party/libwebsockets/lib/roles/http/server/
H A Dserver.c2079 * client sent against our vhost name in lws_confirm_host_header()
2538 * partial is sent. in lws_http_transaction_completed()
2646 wsi->http.access_log.sent = 0; in lws_http_transaction_completed()
2935 * been sent. Http/1.1 pipelining must be able in lws_serve_http_file()
3168 * will be handled when the role data frame is sent... in lws_serve_http_file_fragment()
3255 /* adjust for what was not sent */ in lws_serve_http_file_fragment()
/third_party/typescript/lib/
H A Dtsserver.js43 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]
H A Dtsserverlibrary.js42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]
H A DtypingsInstaller.js43 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]
H A Dtsc.js43 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]
H A Dtypescript.js42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]
H A DtypescriptServices.js42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]
/third_party/node/test/fixtures/snapshot/
H A Dtypescript.js42 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
[all...]

Completed in 236 milliseconds

123456789