/third_party/node/lib/internal/modules/esm/ |
H A D | resolve.js | 268 * Finalizes the resolution of a module specifier by checking if the resolved pathname contains encoded "/" or "\\" 295 if (getOptionValue('--experimental-specifier-resolution') === 'node') { 347 * @param {string} specifier - The import specifier that is not defined. 352 function importNotDefined(specifier, packageJSONUrl, base) { 354 specifier, packageJSONUrl && fileURLToPath(new URL('.', packageJSONUrl)), 749 const reason = 'is not a valid internal imports specifier name'; 816 * Parse a package name from a specifier. 817 * @param {string} specifier - The import specifier [all...] |
H A D | loader.js | 139 getOptionValue('--experimental-specifier-resolution') === 'node' 142 'The Node.js specifier resolution flag is experimental. It could change or be removed at any time.', 186 * register(specifier: string, parentURL: string): any; 218 importModuleDynamically: (specifier, { url }, importAttributes) => { 219 return this.import(specifier, url, importAttributes); 239 * @param {string} specifier The string after `from` in an `import` statement, 249 async getModuleJob(specifier, parentURL, importAttributes) { 250 const resolveResult = await this.resolve(specifier, parentURL, importAttributes); 329 * @param {string} specifier The first parameter of an `import()` expression. 335 async import(specifier, parentUR [all...] |
H A D | initialize_import_meta.js | 11 * @returns {(specifier: string) => string} Function to assign to import.meta.resolve 15 * @param {string} specifier 19 return function resolve(specifier, parentURL = defaultParentURL) { 27 ({ url } = loader.resolveSync(specifier, parentURL));
|
/third_party/node/test/parallel/ |
H A D | test-vm-module-link.js | 20 await bar.link(common.mustCall((specifier, module) => { 22 assert.strictEqual(specifier, 'foo'); 40 await mod.link(common.mustCall((specifier, module) => { 42 assert.strictEqual(specifier, parentName); 69 await foo.link(common.mustCall(async (specifier, module) => { 70 if (specifier === 'bar') { 74 assert.strictEqual(specifier, 'foo'); 113 async function link(specifier, referencingModule) { 114 if (moduleMap.has(specifier)) { 115 return moduleMap.get(specifier); [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_gpsk.c | 33 int specifier; /* CSuite/Specifier */ member 202 data->specifier = EAP_GPSK_CIPHER_RESERVED; in eap_gpsk_select_csuite() 205 int vendor, specifier; in eap_gpsk_select_csuite() local 207 specifier = WPA_GET_BE16(csuite->specifier); in eap_gpsk_select_csuite() 209 i, vendor, specifier); in eap_gpsk_select_csuite() 211 data->specifier == EAP_GPSK_CIPHER_RESERVED && in eap_gpsk_select_csuite() 212 eap_gpsk_supported_ciphersuite(vendor, specifier) && in eap_gpsk_select_csuite() 213 (!data->forced_cipher || data->forced_cipher == specifier)) in eap_gpsk_select_csuite() 216 data->specifier in eap_gpsk_select_csuite() 491 int vendor, specifier; eap_gpsk_validate_csuite() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_gpsk.c | 33 int specifier; /* CSuite/Specifier */ member 202 data->specifier = EAP_GPSK_CIPHER_RESERVED; in eap_gpsk_select_csuite() 205 int vendor, specifier; in eap_gpsk_select_csuite() local 207 specifier = WPA_GET_BE16(csuite->specifier); in eap_gpsk_select_csuite() 209 i, vendor, specifier); in eap_gpsk_select_csuite() 211 data->specifier == EAP_GPSK_CIPHER_RESERVED && in eap_gpsk_select_csuite() 212 eap_gpsk_supported_ciphersuite(vendor, specifier) && in eap_gpsk_select_csuite() 213 (!data->forced_cipher || data->forced_cipher == specifier)) in eap_gpsk_select_csuite() 216 data->specifier in eap_gpsk_select_csuite() 491 int vendor, specifier; eap_gpsk_validate_csuite() local [all...] |
/third_party/node/deps/npm/node_modules/node-gyp/gyp/pylib/packaging/ |
H A D | requirements.py | 23 Parse a given requirement string into its parts, such as name, specifier, 42 self.specifier: SpecifierSet = SpecifierSet(parsed.specifier) 55 if self.specifier: 56 yield str(self.specifier) 87 and self.specifier == other.specifier
|
H A D | _parser.py | 56 specifier: str 61 # Recursive descent parser for dependency specifier 74 "IDENTIFIER", expected="package name at the start of dependency specifier" 82 url, specifier, marker = _parse_requirement_details(tokenizer) 83 tokenizer.expect("END", expected="end of dependency specifier") 85 return ParsedRequirement(name, url, extras, specifier, marker) 93 | specifier WS? (requirement_marker)? 96 specifier = "" 107 return (url, specifier, marker) 113 return (url, specifier, marke [all...] |
H A D | specifiers.py | 42 Raised when attempting to create a :class:`Specifier` with a specifier 48 packaging.specifiers.InvalidSpecifier: Invalid specifier: 'lolwat' 94 Determines if the given item is contained within this specifier. 103 are contained within this specifier are allowed in it. 234 The string representation of a specifier which will be parsed and 237 This tells the specifier if it should accept prerelease versions if 241 If the given specifier is invalid (i.e. bad syntax). 245 raise InvalidSpecifier(f"Invalid specifier: '{spec}'") 268 # The == specifier can include a trailing .*, if it does we 274 # specifier allow [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.h | 41 u8 specifier[2]; member 48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier); 50 int specifier, 57 int specifier, 62 size_t eap_gpsk_mic_len(int vendor, int specifier); 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_gpsk_common.c | 21 * @specifier: CSuite/Specifier 24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) in eap_gpsk_supported_ciphersuite() argument 27 specifier == EAP_GPSK_CIPHER_AES) in eap_gpsk_supported_ciphersuite() 31 specifier == EAP_GPSK_CIPHER_SHA256) in eap_gpsk_supported_ciphersuite() 264 * @specifier: CSuite/Specifier 280 int specifier, in eap_gpsk_derive_keys() 291 vendor, specifier); in eap_gpsk_derive_keys() 317 switch (specifier) { in eap_gpsk_derive_keys() 332 "key derivation", vendor, specifier); in eap_gpsk_derive_keys() 405 * @specifier 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) eap_gpsk_derive_session_id() argument 482 eap_gpsk_mic_len(int vendor, int specifier) eap_gpsk_mic_len() argument 524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_gpsk_common.h | 41 u8 specifier[2]; member 48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier); 50 int specifier, 57 int specifier, 62 size_t eap_gpsk_mic_len(int vendor, int specifier); 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_gpsk_common.c | 21 * @specifier: CSuite/Specifier 24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) in eap_gpsk_supported_ciphersuite() argument 27 specifier == EAP_GPSK_CIPHER_AES) in eap_gpsk_supported_ciphersuite() 31 specifier == EAP_GPSK_CIPHER_SHA256) in eap_gpsk_supported_ciphersuite() 264 * @specifier: CSuite/Specifier 280 int specifier, in eap_gpsk_derive_keys() 291 vendor, specifier); in eap_gpsk_derive_keys() 317 switch (specifier) { in eap_gpsk_derive_keys() 332 "key derivation", vendor, specifier); in eap_gpsk_derive_keys() 405 * @specifier 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) eap_gpsk_derive_session_id() argument 482 eap_gpsk_mic_len(int vendor, int specifier) eap_gpsk_mic_len() argument 524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic() argument [all...] |
/third_party/node/lib/internal/modules/ |
H A D | helpers.js | 52 * Resolves the path of a given `require` specifier, following symlinks. 53 * @param {string} requestPath The `require` specifier 91 * @param {string} id - The identifier/specifier of the builtin module to load 126 * @typedef {(specifier: string) => unknown} RequireFunction 141 require = function require(specifier) { 143 const destination = resolve(specifier, conditions); 149 const specifier = destination.pathname; 151 if (BuiltinModule.canBeRequiredByUsers(specifier)) { 152 const mod = loadBuiltinModule(specifier, href); 155 throw new ERR_UNKNOWN_BUILTIN_MODULE(specifier); [all...] |
/third_party/node/deps/v8/src/builtins/ |
H A D | builtins-console.cc | 55 // Chrome also supports the non-standard bypass format specifier %_ 85 uint16_t specifier = state.str->Get(state.off + 1, isolate); in Formatter() local 86 if (specifier == 'd' || specifier == 'f' || specifier == 'i') { in Formatter() 92 auto builtin = specifier == 'f' ? isolate->global_parse_float_fun() in Formatter() 101 } else if (specifier == 's') { in Formatter() 113 } else if (specifier == 'c' || specifier == 'o' || specifier in Formatter() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_gpsk.c | 35 int specifier; /* CSuite/Specifier */ member 79 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier, in eap_gpsk_init() 87 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier, in eap_gpsk_init() 154 miclen = eap_gpsk_mic_len(data->vendor, data->specifier); in eap_gpsk_build_gpsk_3() 175 WPA_PUT_BE16(csuite->specifier, data->specifier); in eap_gpsk_build_gpsk_3() 182 data->specifier, start, pos - start, pos) < 0) in eap_gpsk_build_gpsk_3() 374 WPA_GET_BE16(csuite->specifier)); in eap_gpsk_process_gpsk_2() 379 data->specifier = WPA_GET_BE16(csuite->specifier); in eap_gpsk_process_gpsk_2() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_gpsk.c | 35 int specifier; /* CSuite/Specifier */ member 79 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier, in eap_gpsk_init() 87 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier, in eap_gpsk_init() 154 miclen = eap_gpsk_mic_len(data->vendor, data->specifier); in eap_gpsk_build_gpsk_3() 175 WPA_PUT_BE16(csuite->specifier, data->specifier); in eap_gpsk_build_gpsk_3() 182 data->specifier, start, pos - start, pos) < 0) in eap_gpsk_build_gpsk_3() 374 WPA_GET_BE16(csuite->specifier)); in eap_gpsk_process_gpsk_2() 379 data->specifier = WPA_GET_BE16(csuite->specifier); in eap_gpsk_process_gpsk_2() [all...] |
/third_party/node/lib/internal/policy/ |
H A D | manifest.js | 174 for (let specifier in dependencies) { 175 const target = dependencies[specifier]; 176 specifier = canonicalizeSpecifier(specifier, manifest.href); 177 normalizedDependencyMap[specifier] = target; 346 * @typedef {(specifier: string) => true | URL} DependencyMapper 511 resolve: (specifier, conditions) => { 513 specifier, 651 * If not able to canonicalize, returns the original specifier 655 * @param {string} specifier [all...] |
/third_party/node/deps/v8/src/ast/ |
H A D | modules.h | 127 AstModuleRequest(const AstRawString* specifier, in AstModuleRequest() argument 130 : specifier_(specifier), in AstModuleRequest() 138 const AstRawString* specifier() const { return specifier_; } in specifier() function in v8::internal::SourceTextModuleDescriptor::AstModuleRequest 266 int AddModuleRequest(const AstRawString* specifier, in AddModuleRequest() argument 269 DCHECK_NOT_NULL(specifier); in AddModuleRequest() 273 specifier, import_assertions, specifier_loc.beg_pos, in AddModuleRequest()
|
/third_party/curl/lib/ |
H A D | share.c | 45 share->specifier |= (1<<CURL_LOCK_DATA_SHARE); in curl_share_init() 136 share->specifier |= (unsigned int)(1<<type); in curl_share_setopt() 142 share->specifier &= ~(unsigned int)(1<<type); in curl_share_setopt() 267 if(share->specifier & (unsigned int)(1<<type)) { in Curl_share_lock() 284 if(share->specifier & (unsigned int)(1<<type)) { in Curl_share_unlock()
|
/third_party/node/benchmark/esm/ |
H A D | esm-loader-import.js | 13 specifier: [ 38 await import(new URL(conf.specifier.replace('{i}', i), benchmarkDirectory));
|
H A D | esm-loader-defaultResolve.js | 18 specifier: [ 46 defaultResolve(conf.specifier, { parentURL });
|
/third_party/node/deps/npm/node_modules/is-core-module/ |
H A D | index.js | 5 function specifierIncluded(current, specifier) { 7 var parts = specifier.split(' ');
|
/third_party/node/deps/v8/src/runtime/ |
H A D | runtime-module.cc | 32 Handle<Object> specifier = args.at(1); in RUNTIME_FUNCTION() local 43 referrer_script, specifier, import_assertions)); in RUNTIME_FUNCTION()
|
/third_party/libphonenumber/metadata/src/test/java/com/google/i18n/phonenumbers/metadata/model/ |
H A D | AltFormatSpecTest.java | 42 assertThat(spec.specifier()).isEqualTo("123X XXXX"); in testSimple() 73 assertThat(AltFormatSpec.create(t, p, "foo", Optional.empty()).specifier()).isEqualTo(spec); in assertGoodTemplateAndPrefix()
|