/third_party/skia/third_party/externals/angle2/src/libANGLE/renderer/ |
H A D | angle_format.py | 106 for token in tokens: 107 channels += token[0].lower() 117 for token in tokens: 118 bits[token[0]] = int(token[1:])
|
/base/telephony/core_service/test/unittest/core_service_gtest/ |
H A D | core_service_common_test.cpp | 83 SecurityToken token; in HWTEST_F() local 97 SecurityToken token; in HWTEST_F() local 123 SecurityToken token; in HWTEST_F() local 137 SecurityToken token; in HWTEST_F() local 150 SecurityToken token; in HWTEST_F() local 163 SecurityToken token; in HWTEST_F() local 176 SecurityToken token; in HWTEST_F() local 205 SecurityToken token; in HWTEST_F() local 223 SecurityToken token; in HWTEST_F() local
|
/foundation/ability/ability_runtime/frameworks/native/ability/native/recovery/ |
H A D | ability_recovery.cpp | 73 const std::shared_ptr<AbilityInfo>& abilityInfo, const sptr<IRemoteObject>& token) in InitAbilityInfo() 78 token_ = token; in InitAbilityInfo() 264 auto token = token_.promote(); in ScheduleSaveAbilityState() local 265 if (token == nullptr) { in ScheduleSaveAbilityState() 266 TAG_LOGE(AAFwkTag::RECOVERY, "token is nullptr"); in ScheduleSaveAbilityState() 275 abilityMgr->EnableRecoverAbility(token); in ScheduleSaveAbilityState() 278 abilityMgr->SubmitSaveRecoveryInfo(token); in ScheduleSaveAbilityState() 298 auto token = token_.promote(); in ScheduleRecoverAbility() local 299 if (token == nullptr) { in ScheduleRecoverAbility() 302 abilityMgr->ScheduleRecoverAbility(token, reaso in ScheduleRecoverAbility() 72 InitAbilityInfo(const std::shared_ptr<AbilityRuntime::UIAbility> ability, const std::shared_ptr<AbilityInfo>& abilityInfo, const sptr<IRemoteObject>& token) InitAbilityInfo() argument [all...] |
/foundation/communication/ipc/ipc/native/src/c_api/source/ |
H A D | ipc_cparcel.cpp | 327 int OH_IPCParcel_WriteInterfaceToken(OHIPCParcel *parcel, const char *token) in OH_IPCParcel_WriteInterfaceToken() argument 329 if (!IsIPCParcelValid(parcel, __func__) || token == nullptr) { in OH_IPCParcel_WriteInterfaceToken() 333 int tokenLen = strlen(token); in OH_IPCParcel_WriteInterfaceToken() 337 std::u16string u16Token = OHOS::Str8ToStr16(std::string(token, tokenLen)); in OH_IPCParcel_WriteInterfaceToken() 339 ZLOGE(LOG_LABEL, "convert token to u16string failed: %{public}d", tokenLen); in OH_IPCParcel_WriteInterfaceToken() 344 ZLOGE(LOG_LABEL, "WriteInterfaceToken failed! token len:%{public}d", tokenLen); in OH_IPCParcel_WriteInterfaceToken() 351 int OH_IPCParcel_ReadInterfaceToken(const OHIPCParcel *parcel, char **token, int32_t *len, in OH_IPCParcel_ReadInterfaceToken() argument 354 if (!IsIPCParcelValid(parcel, __func__) || !IsMemoryParamsValid(token, len, allocator, __func__)) { in OH_IPCParcel_ReadInterfaceToken() 368 *token = static_cast<char*>(allocator(memLength)); in OH_IPCParcel_ReadInterfaceToken() 369 if (*token in OH_IPCParcel_ReadInterfaceToken() [all...] |
/foundation/communication/netstack/test/unittest/tls_test/client/ |
H A D | TlsSocketUnilateralConnection.cpp | 140 AccessToken token;
in HWTEST_F() local 152 AccessToken token;
in HWTEST_F() local 169 AccessToken token;
in HWTEST_F() local 188 AccessToken token;
in HWTEST_F() local 215 AccessToken token;
in HWTEST_F() local 245 AccessToken token;
in HWTEST_F() local 274 AccessToken token;
in HWTEST_F() local 303 AccessToken token;
in HWTEST_F() local 340 AccessToken token;
in HWTEST_F() local
|
/foundation/communication/netstack/test/unittest/tlssocket/client/ |
H A D | TlsSocketUnilateralConnection.cpp | 140 AccessToken token; in HWTEST_F() local 152 AccessToken token; in HWTEST_F() local 169 AccessToken token; in HWTEST_F() local 188 AccessToken token; in HWTEST_F() local 215 AccessToken token; in HWTEST_F() local 245 AccessToken token; in HWTEST_F() local 274 AccessToken token; in HWTEST_F() local 303 AccessToken token; in HWTEST_F() local 340 AccessToken token; in HWTEST_F() local
|
/foundation/window/window_manager/wm/include/ |
H A D | window_adapter.h | 43 std::shared_ptr<RSSurfaceNode> surfaceNode, uint32_t& windowId, const sptr<IRemoteObject>& token); 105 SystemSessionConfig& systemConfig, sptr<IRemoteObject> token = nullptr); 108 sptr<WindowSessionProperty> property, sptr<ISession>& session, sptr<IRemoteObject> token = nullptr); 114 sptr<ISession>& session, sptr<WindowSessionProperty> property, sptr<IRemoteObject> token = nullptr); 123 const sptr<IRemoteObject>& token, uint64_t surfaceNodeId); 125 const sptr<IRemoteObject>& token); 126 virtual void UpdateModalExtensionRect(const sptr<IRemoteObject>& token, Rect rect); 127 virtual void ProcessModalExtensionPointDown(const sptr<IRemoteObject>& token, int32_t posX, int32_t posY); 129 virtual WMError UpdateExtWindowFlags(const sptr<IRemoteObject>& token, uint32_t extWindowFlags,
|
/foundation/window/window_manager/wmserver/include/zidl/ |
H A D | window_manager_interface.h | 97 uint32_t& windowId, sptr<IRemoteObject> token) = 0; 172 SystemSessionConfig& systemConfig, sptr<IRemoteObject> token = nullptr) { return WSError::WS_OK; } in CreateAndConnectSpecificSession() 175 sptr<WindowSessionProperty> property, sptr<ISession>& session, sptr<IRemoteObject> token = nullptr) in RecoverAndConnectSpecificSession() 184 sptr<ISession>& session, sptr<WindowSessionProperty> property, sptr<IRemoteObject> token = nullptr) in RecoverAndReconnectSceneSession() 206 const sptr<IRemoteObject>& token, uint64_t surfaceNodeId) {} in AddExtensionWindowStageToSCB() 208 const sptr<IRemoteObject>& token) {} in RemoveExtensionWindowStageFromSCB() 209 virtual void UpdateModalExtensionRect(const sptr<IRemoteObject>& token, Rect rect) {} in UpdateModalExtensionRect() argument 210 virtual void ProcessModalExtensionPointDown(const sptr<IRemoteObject>& token, int32_t posX, int32_t posY) {} in ProcessModalExtensionPointDown() argument 215 virtual WSError UpdateExtWindowFlags(const sptr<IRemoteObject>& token, uint32_t extWindowFlags, in UpdateExtWindowFlags() argument 205 AddExtensionWindowStageToSCB(const sptr<ISessionStage>& sessionStage, const sptr<IRemoteObject>& token, uint64_t surfaceNodeId) AddExtensionWindowStageToSCB() argument 207 RemoveExtensionWindowStageFromSCB(const sptr<ISessionStage>& sessionStage, const sptr<IRemoteObject>& token) RemoveExtensionWindowStageFromSCB() argument
|
/kernel/linux/linux-5.10/drivers/infiniband/hw/hfi1/ |
H A D | fault.c | 137 char *data, *token, *ptr, *end; in fault_opcodes_write() local 153 token = ptr; in fault_opcodes_write() 154 for (ptr = data; *ptr; ptr = end + 1, token = ptr) { in fault_opcodes_write() 163 if (token[0] == '-') { in fault_opcodes_write() 165 token++; in fault_opcodes_write() 167 dash = strchr(token, '-'); in fault_opcodes_write() 170 if (kstrtoul(token, 0, &range_start)) in fault_opcodes_write() 173 token = dash + 1; in fault_opcodes_write() 174 if (kstrtoul(token, 0, &range_end)) in fault_opcodes_write()
|
/kernel/linux/linux-6.6/drivers/infiniband/hw/hfi1/ |
H A D | fault.c | 95 char *data, *token, *ptr, *end; in fault_opcodes_write() local 111 token = ptr; in fault_opcodes_write() 112 for (ptr = data; *ptr; ptr = end + 1, token = ptr) { in fault_opcodes_write() 121 if (token[0] == '-') { in fault_opcodes_write() 123 token++; in fault_opcodes_write() 125 dash = strchr(token, '-'); in fault_opcodes_write() 128 if (kstrtoul(token, 0, &range_start)) in fault_opcodes_write() 131 token = dash + 1; in fault_opcodes_write() 132 if (kstrtoul(token, 0, &range_end)) in fault_opcodes_write()
|
/third_party/curl/src/ |
H A D | tool_paramhlp.c | 272 /* Return index of prototype token in set, card(set) if not found. 286 /* Include protocol token in set. */ 300 /* Exclude protocol token from set. */ 333 char *token; in proto2num() local 365 for(token = strtok(buffer, sep); in proto2num() 366 token; in proto2num() 367 token = strtok(NULL, sep)) { in proto2num() 370 /* Process token modifiers */ in proto2num() 371 while(!ISALNUM(*token)) { /* may be NULL if token i in proto2num() [all...] |
/third_party/libwebsockets/lib/core-net/ |
H A D | service.c | 394 if (!ebuf->token) in lws_buflist_aware_read() 395 ebuf->token = pt->serv_buf + LWS_PRE; in lws_buflist_aware_read() 401 ep = ebuf->token; in lws_buflist_aware_read() 410 bns = (int)lws_buflist_next_segment_len(&wsi->buflist, &ebuf->token); in lws_buflist_aware_read() 411 b = ebuf->token; in lws_buflist_aware_read() 418 ebuf->token = ep; in lws_buflist_aware_read() 443 n = lws_buflist_append_segment(&wsi->buflist, ebuf->token, (size_t)ebuf->len); in lws_buflist_aware_read() 461 ebuf->token = b; in lws_buflist_aware_read() 501 ebuf->token + used, in lws_buflist_aware_finished_consuming()
|
/third_party/libwebsockets/lib/roles/ws/ |
H A D | client-parser-ws.c | 43 pmdrx.eb_in.token = NULL; in lws_ws_client_rx_sm() 45 pmdrx.eb_out.token = NULL; in lws_ws_client_rx_sm() 517 pmdrx.eb_in.token = &wsi->ws->rx_ubuf[LWS_PRE]; in lws_ws_client_rx_sm() 539 pmdrx.eb_in.len, pmdrx.eb_in.token); in lws_ws_client_rx_sm() 575 pmdrx.eb_out.token, in lws_ws_client_rx_sm() 597 lwsl_hexdump_wsi_info(wsi, pmdrx.eb_out.token, in lws_ws_client_rx_sm() 608 if (!pmdrx.eb_out.token) in lws_ws_client_rx_sm() 611 pmdrx.eb_out.token[pmdrx.eb_out.len] = '\0'; in lws_ws_client_rx_sm() 648 wsi->user_space, pmdrx.eb_out.token, in lws_ws_client_rx_sm()
|
/kernel/linux/linux-5.10/net/rxrpc/ |
H A D | rxkad.c | 55 struct rxrpc_key_token *token; in rxkad_init_connection_security() local 60 token = conn->params.key->payload.data[0]; in rxkad_init_connection_security() 61 conn->security_ix = token->security_index; in rxkad_init_connection_security() 70 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 71 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 104 struct rxrpc_key_token *token; in rxkad_prime_packet_security() local 125 token = conn->params.key->payload.data[0]; in rxkad_prime_packet_security() 126 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 221 const struct rxrpc_key_token *token; in rxkad_secure_packet_encrypt() local 241 token in rxkad_secure_packet_encrypt() 433 const struct rxrpc_key_token *token; rxkad_verify_packet_2() local 812 const struct rxrpc_key_token *token; rxkad_respond_to_challenge() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 352 AccountToken *token = CreateAccountToken(); in GetAsyPubKeyInfo() local 353 if (token == NULL) { in GetAsyPubKeyInfo() 354 LOGE("Failed to create token."); in GetAsyPubKeyInfo() 359 if (GetAccountAuthTokenManager()->getToken(params->osAccountId, token, in GetAsyPubKeyInfo() 361 LOGE("Get token from local error."); in GetAsyPubKeyInfo() 364 uint32_t pkInfoLen = token->pkInfoStr.length; in GetAsyPubKeyInfo() 373 if (memcpy_s(params->pkInfoSelf.val, params->pkInfoSelf.length, token->pkInfoStr.val, pkInfoLen) != EOK) { in GetAsyPubKeyInfo() 377 if (memcpy_s(params->pkSelf, PK_SIZE, token->pkInfo.devicePk.val, token->pkInfo.devicePk.length) != EOK) { in GetAsyPubKeyInfo() 381 if (memcpy_s(params->pkInfoSignSelf.val, params->pkInfoSignSelf.length, token in GetAsyPubKeyInfo() [all...] |
/foundation/window/window_manager/wm/test/unittest/ |
H A D | window_adapter_test.cpp | 359 sptr<IRemoteObject> token = sptr<IRemoteObjectMocker>::MakeSptr(); in HWTEST_F() local 360 ASSERT_NE(token, nullptr); in HWTEST_F() 361 windowAdapter.UpdateModalExtensionRect(token, rect); in HWTEST_F() 375 sptr<IRemoteObject> token = sptr<IRemoteObjectMocker>::MakeSptr(); in HWTEST_F() local 376 ASSERT_NE(token, nullptr); in HWTEST_F() 377 windowAdapter.ProcessModalExtensionPointDown(token, 0, 0); in HWTEST_F() 431 sptr<IRemoteObject> token = sptr<IRemoteObjectMocker>::MakeSptr(); in HWTEST_F() local 432 ASSERT_NE(token, nullptr); in HWTEST_F() 433 windowAdapter.UpdateExtWindowFlags(token, 7, 7); in HWTEST_F() 720 sptr<IRemoteObject> token; in HWTEST_F() local [all...] |
/kernel/linux/linux-6.6/tools/perf/util/ |
H A D | parse-events.y | 58 %token PE_START_EVENTS PE_START_TERMS 59 %token PE_VALUE PE_VALUE_SYM_HW PE_VALUE_SYM_SW PE_TERM 60 %token PE_VALUE_SYM_TOOL 61 %token PE_EVENT_NAME 62 %token PE_RAW PE_NAME 63 %token PE_MODIFIER_EVENT PE_MODIFIER_BP PE_BP_COLON PE_BP_SLASH 64 %token PE_LEGACY_CACHE 65 %token PE_PREFIX_MEM 66 %token PE_ERROR 67 %token PE_DRV_CFG_TER [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | common.c | 1009 * cstr_token - Get next token from const char string 1012 * @last: a pointer to a character following the returned token 1015 * Returns: a pointer to token position in str or NULL 1020 * - The returned token is not a NULL terminated string, but a token 1022 * of the returned token could be calculated as (last - token). 1026 const char *end, *token = str; in cstr_token() local 1032 token = *last; in cstr_token() 1034 while (*token in cstr_token() 1060 char *token = (char *) cstr_token(str, delim, (const char **) context); str_token() local [all...] |
/foundation/ability/ability_runtime/test/unittest/app_mgr_service_inner_second_test/ |
H A D | app_mgr_service_inner_second_test.cpp | 217 loadParam->token = token_; in HWTEST_F() 247 loadParam->token = token_; in HWTEST_F() 288 loadParam->token = token_; in HWTEST_F() 311 loadParam->token = token_; in HWTEST_F() 370 loadParam->token = token_; in HWTEST_F() 398 loadParam->token = token_; in HWTEST_F() 492 loadParam->token = token_; in HWTEST_F() 522 loadParam->token = token_; in HWTEST_F() 600 loadParam->token = token_; in HWTEST_F() 640 loadParam->token in HWTEST_F() 1806 OHOS::sptr<IRemoteObject> token = sptr<IRemoteObject>(new (std::nothrow) MockAbilityToken()); HWTEST_F() local 1860 OHOS::sptr<IRemoteObject> token = sptr<IRemoteObject>(new (std::nothrow) MockAbilityToken()); HWTEST_F() local 2061 sptr<IRemoteObject> token = new MockAbilityToken(); HWTEST_F() local [all...] |
/base/account/os_account/frameworks/appaccount/native/test/unittest/ |
H A D | app_account_manager_test.cpp | 433 * @tc.desc: Fail to set oauth token visibility with invalid name. 461 * @tc.desc: Fail to set oauth token visibility from shell process. 475 * @tc.desc: Fail to set oauth token visibility with invalid parameter. 503 * @tc.desc: Fail to set oauth token visibility from shell process. 517 * @tc.desc: Fail to check oauth token visibility with invalid name. 551 * @tc.desc: Fail to check oauth token visibility from shell process. 567 * @tc.desc: Fail to check oauth token visibility with invalid name. 601 * @tc.desc: Fail to check oauth token visibility from shell process. 1345 * @tc.desc: Get oauth token with invalid data. 1352 std::string token; in HWTEST_F() local 1371 std::string token; HWTEST_F() local 1394 std::string token; HWTEST_F() local 1409 std::string token; HWTEST_F() local 1428 std::string token; HWTEST_F() local 1451 std::string token; HWTEST_F() local [all...] |
/foundation/ability/ability_runtime/interfaces/inner_api/app_manager/src/appmgr/ |
H A D | app_mgr_client.cpp | 156 AppMgrResultCode AppMgrClient::TerminateAbility(const sptr<IRemoteObject> &token, bool clearMissionFlag) in TerminateAbility() argument 162 amsService->TerminateAbility(token, clearMissionFlag); in TerminateAbility() 169 AppMgrResultCode AppMgrClient::UpdateAbilityState(const sptr<IRemoteObject> &token, const AbilityState state) in UpdateAbilityState() argument 175 amsService->UpdateAbilityState(token, state); in UpdateAbilityState() 182 AppMgrResultCode AppMgrClient::UpdateExtensionState(const sptr<IRemoteObject> &token, const ExtensionState state) in UpdateExtensionState() argument 188 amsService->UpdateExtensionState(token, state); in UpdateExtensionState() 208 AppMgrResultCode AppMgrClient::KillProcessByAbilityToken(const sptr<IRemoteObject> &token) in KillProcessByAbilityToken() argument 214 amsService->KillProcessByAbilityToken(token); in KillProcessByAbilityToken() 247 AppMgrResultCode AppMgrClient::AttachPidToParent(const sptr<IRemoteObject> &token, in AttachPidToParent() argument 254 amsService->AttachPidToParent(token, callerToke in AttachPidToParent() 567 AbilityAttachTimeOut(const sptr<IRemoteObject> &token) AbilityAttachTimeOut() argument 580 PrepareTerminate(const sptr<IRemoteObject> &token, bool clearMissionFlag) PrepareTerminate() argument 593 GetRunningProcessInfoByToken(const sptr<IRemoteObject> &token, AppExecFwk::RunningProcessInfo &info) GetRunningProcessInfoByToken() argument 1093 NotifyPageShow(const sptr<IRemoteObject> &token, const PageStateData &pageStateData) NotifyPageShow() argument 1102 NotifyPageHide(const sptr<IRemoteObject> &token, const PageStateData &pageStateData) NotifyPageHide() argument 1299 AttachedToStatusBar(const sptr<IRemoteObject> &token) AttachedToStatusBar() argument 1348 CleanAbilityByUserRequest(const sptr<IRemoteObject> &token) CleanAbilityByUserRequest() argument [all...] |
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | keystore.c | 5 * write authentication token-related packets with the underlying 445 * @auth_tok_key: key containing the authentication token 446 * @auth_tok: authentication token 760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 819 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet() 823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1035 "rc = [%d]. s->auth_tok->token in ecryptfs_parse_tag_70_packet() [all...] |
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | keystore.c | 5 * write authentication token-related packets with the underlying 445 * @auth_tok_key: key containing the authentication token 446 * @auth_tok: authentication token 539 * @auth_tok_key: key containing the authentication token 761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 762 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 820 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet() 824 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1032 s->auth_tok->token in ecryptfs_parse_tag_70_packet() [all...] |
/third_party/jerryscript/jerry-core/parser/js/ |
H A D | js-parser.c | 967 parser_append_breakpoint_info (context_p, JERRY_DEBUGGER_BREAKPOINT_LIST, context_p->token.line); in parser_post_processing() 969 context_p->last_breakpoint_line = context_p->token.line; in parser_post_processing() 1735 if (context_p->token.type == end_type) in parser_parse_function_arguments() 1768 else if (context_p->token.type == LEXER_THREE_DOTS) in parser_parse_function_arguments() 1784 if (context_p->token.type == LEXER_LEFT_SQUARE || context_p->token.type == LEXER_LEFT_BRACE) in parser_parse_function_arguments() 1822 if (context_p->token.type != LEXER_COMMA) in parser_parse_function_arguments() 1832 if (context_p->token.type != LEXER_LITERAL in parser_parse_function_arguments() 1833 || context_p->token.lit_location.type != LEXER_IDENT_LITERAL) in parser_parse_function_arguments() 1839 &context_p->token in parser_parse_function_arguments() [all...] |
/foundation/ability/dmsfwk/services/dtbabilitymgr/include/continuation_manager/ |
H A D | app_device_callback_interface.h | 34 virtual int32_t OnDeviceConnect(int32_t token, const std::vector<ContinuationResult>& continuationResults) = 0;
35 virtual int32_t OnDeviceDisconnect(int32_t token, const std::vector<ContinuationResult>& continuationResults) = 0;
|