/third_party/skia/third_party/externals/swiftshader/src/Shader/ |
H A D | PixelShader.hpp | 27 explicit PixelShader(const unsigned long *token); 31 static int validate(const unsigned long *const token); // Returns number of instructions if valid
|
/third_party/typescript/tests/baselines/reference/ |
H A D | interfaceDeclaration4.js | 24 token:string; 29 public token: string;
|
/third_party/python/Lib/lib2to3/fixes/ |
H A D | fix_numliterals.py | 7 from ..pgen2 import token namespace 15 _accept_type = token.NUMBER
|
/third_party/libcoap/examples/ |
H A D | coap-client.c | 62 coap_binary_t *token; member 107 static char *pkcs11_pin = NULL; /* PKCS11 pin to unlock access to token */ 209 track_new_token(size_t tokenlen, uint8_t *token) { in track_new_token() argument 213 coap_log_info("Unable to track new token\n"); in track_new_token() 217 tracked_tokens[tracked_tokens_count].token = coap_new_binary(tokenlen); in track_new_token() 218 if (!tracked_tokens[tracked_tokens_count].token) in track_new_token() 220 memcpy(tracked_tokens[tracked_tokens_count].token->s, token, tokenlen); in track_new_token() 226 track_check_token(coap_bin_const_t *token) { in track_check_token() argument 230 if (coap_binary_equal(token, tracked_token in track_check_token() 238 track_flush_token(coap_bin_const_t *token, int force) track_flush_token() argument 267 uint8_t token[8]; coap_new_request() local 350 coap_bin_const_t token = coap_pdu_get_token(sent); nack_handler() local 393 coap_bin_const_t token = coap_pdu_get_token(received); message_handler() local [all...] |
/third_party/glslang/glslang/HLSL/ |
H A D | hlslScanContext.cpp | 541 // Wrapper for tokenizeClass() to get everything inside the token. 542 void HlslScanContext::tokenize(HlslToken& token) in tokenize() argument 544 EHlslTokenClass tokenClass = tokenizeClass(token); in tokenize() 545 token.tokenClass = tokenClass; in tokenize() 558 // Fill in token information for the next token, except for the token class. 559 // Returns the enum value of the token class of the next token found. 562 EHlslTokenClass HlslScanContext::tokenizeClass(HlslToken& token) in tokenizeClass() argument 567 int token = ppContext.tokenize(ppToken); tokenizeClass() local 639 EHlslTokenClass token = tokenizeIdentifier(); tokenizeClass() local [all...] |
/third_party/icu/icu4c/source/i18n/ |
H A D | measunit_extra.cpp | 54 "Ambiguous token values: prefix tokens are overlapping with CompoundPart tokens"); 56 "Ambiguous token values: prefix tokens are overlapping with CompoundPart tokens"); 631 // of that token in fSource. In case of U_FAILURE(status), the token 637 // recent matching token. 639 // Find the longest token that matches a value in the trie: 687 // 1 = power token seen (will not accept another power token) 688 // 2 = SI or binary prefix token seen (will not accept a power, or SI or binary prefix token) [all...] |
/third_party/node/deps/icu-small/source/i18n/ |
H A D | measunit_extra.cpp | 54 "Ambiguous token values: prefix tokens are overlapping with CompoundPart tokens"); 56 "Ambiguous token values: prefix tokens are overlapping with CompoundPart tokens"); 631 // of that token in fSource. In case of U_FAILURE(status), the token 637 // recent matching token. 639 // Find the longest token that matches a value in the trie: 687 // 1 = power token seen (will not accept another power token) 688 // 2 = SI or binary prefix token seen (will not accept a power, or SI or binary prefix token) [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | ts.c | 633 PKCS7 *token = TS_RESP_get_token(response); in reply_command() local 634 if (!i2d_PKCS7_bio(out_bio, token)) in reply_command() 655 /* Reads a PKCS7 token and adds default 'granted' status info to it. */ 659 PKCS7 *token = NULL; in read_PKCS7() local 664 if ((token = d2i_PKCS7_bio(in_bio, NULL)) == NULL) in read_PKCS7() 666 if ((tst_info = PKCS7_to_TS_TST_INFO(token)) == NULL) in read_PKCS7() 676 TS_RESP_set_tst_info(resp, token, tst_info); in read_PKCS7() 677 token = NULL; /* Ownership is lost. */ in read_PKCS7() 682 PKCS7_free(token); in read_PKCS7() 853 PKCS7 *token in verify_command() local [all...] |
/third_party/openssl/apps/ |
H A D | ts.c | 633 PKCS7 *token = TS_RESP_get_token(response); in reply_command() local 634 if (!i2d_PKCS7_bio(out_bio, token)) in reply_command() 655 /* Reads a PKCS7 token and adds default 'granted' status info to it. */ 659 PKCS7 *token = NULL; in read_PKCS7() local 664 if ((token = d2i_PKCS7_bio(in_bio, NULL)) == NULL) in read_PKCS7() 666 if ((tst_info = PKCS7_to_TS_TST_INFO(token)) == NULL) in read_PKCS7() 676 TS_RESP_set_tst_info(resp, token, tst_info); in read_PKCS7() 677 token = NULL; /* Ownership is lost. */ in read_PKCS7() 682 PKCS7_free(token); in read_PKCS7() 853 PKCS7 *token in verify_command() local [all...] |
/third_party/skia/third_party/externals/icu/source/i18n/ |
H A D | measunit_extra.cpp | 55 "Ambiguous token values: prefix tokens are overlapping with CompoundPart tokens"); 57 "Ambiguous token values: prefix tokens are overlapping with CompoundPart tokens"); 635 // of that token in fSource. In case of U_FAILURE(status), the token 641 // recent matching token. 643 // Find the longest token that matches a value in the trie: 691 // 1 = power token seen (will not accept another power token) 692 // 2 = SI or binary prefix token seen (will not accept a power, or SI or binary prefix token) [all...] |
/kernel/linux/linux-5.10/scripts/ |
H A D | check-sysctl-docs | 77 token = trimpunct($i) 78 if (length(token) > 0 && token != "and") {
|
/kernel/linux/linux-5.10/fs/hmdfs/ |
H A D | super.c | 106 int token; in hmdfs_parse_options() local 111 token = match_token(p, hmdfs_tokens, args); in hmdfs_parse_options() 113 switch (token) { in hmdfs_parse_options()
|
/kernel/linux/linux-6.6/fs/hmdfs/ |
H A D | super.c | 106 int token; in hmdfs_parse_options() local 111 token = match_token(p, hmdfs_tokens, args); in hmdfs_parse_options() 113 switch (token) { in hmdfs_parse_options()
|
/kernel/linux/linux-6.6/drivers/pci/hotplug/ |
H A D | rpaphp_pci.c | 75 int token = rtas_token("get-sensor-state"); in __rpaphp_get_sensor_state() local 80 if (token == RTAS_UNKNOWN_SERVICE) in __rpaphp_get_sensor_state() 94 rc = rtas_call(token, 2, 2, state, DR_ENTITY_SENSE, in __rpaphp_get_sensor_state()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | lwt_helpers.h | 21 struct nstoken *token = open_netns(NETNS); \ 22 if (ASSERT_OK_PTR(token, "setns")) { \ 24 close_netns(token); \
|
/third_party/node/deps/npm/node_modules/sigstore/dist/ |
H A D | config.js | 77 // explicit identity token is provided, use that. Otherwise, use the CI 80 const token = options.identityToken; 81 if (token) { 83 return { getToken: () => Promise.resolve(token) };
|
/third_party/rust/crates/syn/src/ |
H A D | restriction.rs | 32 pub paren_token: token::Paren, 51 // pub paren_token: token::Paren, 70 if input.peek(token::Group) { in parse() 91 if input.peek(token::Paren) { in parse_pub() 165 // "crate", automatically add the "in" token. in to_tokens()
|
/third_party/vk-gl-cts/framework/randomshaders/ |
H A D | rsgToken.hpp | 232 TokenStream& operator<< (const Token& token); 244 inline TokenStream& TokenStream::operator<< (const Token& token) in operator <<() argument 249 m_tokens[m_numTokens] = token; in operator <<()
|
/kernel/linux/linux-5.10/fs/ |
H A D | fs_context.c | 63 unsigned int token; in vfs_parse_sb_flag() local 65 token = lookup_constant(common_set_sb_flag, key, 0); in vfs_parse_sb_flag() 66 if (token) { in vfs_parse_sb_flag() 67 fc->sb_flags |= token; in vfs_parse_sb_flag() 68 fc->sb_flags_mask |= token; in vfs_parse_sb_flag() 72 token = lookup_constant(common_clear_sb_flag, key, 0); in vfs_parse_sb_flag() 73 if (token) { in vfs_parse_sb_flag() 74 fc->sb_flags &= ~token; in vfs_parse_sb_flag() 75 fc->sb_flags_mask |= token; in vfs_parse_sb_flag()
|
/kernel/linux/linux-6.6/fs/ |
H A D | fs_context.c | 63 unsigned int token; in vfs_parse_sb_flag() local 65 token = lookup_constant(common_set_sb_flag, key, 0); in vfs_parse_sb_flag() 66 if (token) { in vfs_parse_sb_flag() 67 fc->sb_flags |= token; in vfs_parse_sb_flag() 68 fc->sb_flags_mask |= token; in vfs_parse_sb_flag() 72 token = lookup_constant(common_clear_sb_flag, key, 0); in vfs_parse_sb_flag() 73 if (token) { in vfs_parse_sb_flag() 74 fc->sb_flags &= ~token; in vfs_parse_sb_flag() 75 fc->sb_flags_mask |= token; in vfs_parse_sb_flag()
|
/kernel/linux/linux-5.10/drivers/usb/host/ |
H A D | oxu210hp-hcd.c | 271 #define IS_SHORT_READ(token) (QTD_LENGTH(token) != 0 && QTD_PID(token) == 1) 343 #define QH_STATE_COMPLETING 5 /* don't touch token.HALT */ 1207 int token, int maxpacket) in qtd_fill() 1238 qtd->hw_token = cpu_to_le32((count << 16) | token); in qtd_fill() 1297 size_t length, u32 token) in qtd_copy_status() 1300 if (likely(QTD_PID(token) != 2)) in qtd_copy_status() 1301 urb->actual_length += length - QTD_LENGTH(token); in qtd_copy_status() 1308 if (unlikely(IS_SHORT_READ(token))) in qtd_copy_status() 1206 qtd_fill(struct ehci_qtd *qtd, dma_addr_t buf, size_t len, int token, int maxpacket) qtd_fill() argument 1296 qtd_copy_status(struct oxu_hcd *oxu, struct urb *urb, size_t length, u32 token) qtd_copy_status() argument 1436 u32 token = 0; qh_completions() local 1621 u32 token; qh_urb_transaction() local 1996 __le32 token; qh_append_tds() local [all...] |
/kernel/linux/linux-6.6/drivers/usb/host/ |
H A D | oxu210hp-hcd.c | 271 #define IS_SHORT_READ(token) (QTD_LENGTH(token) != 0 && QTD_PID(token) == 1) 343 #define QH_STATE_COMPLETING 5 /* don't touch token.HALT */ 1207 int token, int maxpacket) in qtd_fill() 1238 qtd->hw_token = cpu_to_le32((count << 16) | token); in qtd_fill() 1297 size_t length, u32 token) in qtd_copy_status() 1300 if (likely(QTD_PID(token) != 2)) in qtd_copy_status() 1301 urb->actual_length += length - QTD_LENGTH(token); in qtd_copy_status() 1308 if (unlikely(IS_SHORT_READ(token))) in qtd_copy_status() 1206 qtd_fill(struct ehci_qtd *qtd, dma_addr_t buf, size_t len, int token, int maxpacket) qtd_fill() argument 1296 qtd_copy_status(struct oxu_hcd *oxu, struct urb *urb, size_t length, u32 token) qtd_copy_status() argument 1437 u32 token = 0; qh_completions() local 1622 u32 token; qh_urb_transaction() local 1997 __le32 token; qh_append_tds() local [all...] |
/kernel/linux/linux-6.6/drivers/mtd/ubi/ |
H A D | build.c | 1402 char *tokens[MTD_PARAM_MAX_COUNT], *token; in ubi_mtd_param_parse() local 1442 token = tokens[1]; in ubi_mtd_param_parse() 1443 if (token) { in ubi_mtd_param_parse() 1444 p->vid_hdr_offs = bytes_str_to_int(token); in ubi_mtd_param_parse() 1450 token = tokens[2]; in ubi_mtd_param_parse() 1451 if (token) { in ubi_mtd_param_parse() 1452 int err = kstrtoint(token, 10, &p->max_beb_per1024); in ubi_mtd_param_parse() 1456 token); in ubi_mtd_param_parse() 1461 token = tokens[3]; in ubi_mtd_param_parse() 1462 if (token) { in ubi_mtd_param_parse() [all...] |
/third_party/mesa3d/src/gallium/drivers/i915/ |
H A D | i915_fpc_translate.c | 332 * Convert TGSI_TEXTURE_x token to DO_SAMPLE_TYPE_x token 841 const union i915_full_token *token, in i915_translate_token() 845 switch (token->Token.Type) { in i915_translate_token() 848 assert(token->FullProperty.Property.PropertyName == in i915_translate_token() 850 token->FullProperty.Property.PropertyName == in i915_translate_token() 852 token->FullProperty.Property.PropertyName == in i915_translate_token() 854 token->FullProperty.Property.PropertyName == in i915_translate_token() 859 if (token->FullDeclaration.Declaration.File == TGSI_FILE_CONSTANT) { in i915_translate_token() 860 if (token in i915_translate_token() 840 i915_translate_token(struct i915_fp_compile *p, const union i915_full_token *token, struct i915_fragment_shader *fs) i915_translate_token() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_pkt.c | 158 hd->token.base = NULL; in ngtcp2_pkt_hd_init() 159 hd->token.len = 0; in ngtcp2_pkt_hd_init() 176 const uint8_t *token = NULL; in ngtcp2_pkt_decode_hd_long() local 274 token = p; in ngtcp2_pkt_decode_hd_long() 311 dest->token.base = (uint8_t *)token; in ngtcp2_pkt_decode_hd_long() 312 dest->token.len = tokenlen; in ngtcp2_pkt_decode_hd_long() 376 dest->token.base = NULL; in ngtcp2_pkt_decode_hd_short() 377 dest->token.len = 0; in ngtcp2_pkt_decode_hd_short() 396 len += ngtcp2_put_varint_len(hd->token in ngtcp2_pkt_encode_hd_long() 2250 ngtcp2_pkt_write_retry( uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx) ngtcp2_pkt_write_retry() argument 2319 ngtcp2_pkt_encode_pseudo_retry( uint8_t *dest, size_t destlen, const ngtcp2_pkt_hd *hd, uint8_t unused, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen) ngtcp2_pkt_encode_pseudo_retry() argument [all...] |