Home
last modified time | relevance | path

Searched refs:token (Results 776 - 800 of 1006) sorted by relevance

1...<<3132333435363738394041

/third_party/mesa3d/src/mesa/main/
H A Dfeedback.c100 _mesa_PassThrough( GLfloat token ) in _mesa_PassThrough()
107 _mesa_feedback_token( ctx, token ); in _mesa_PassThrough()
/third_party/node/deps/ngtcp2/nghttp3/lib/includes/nghttp3/
H A Dnghttp3.h763 * :member:`nghttp3_qpack_nv.token`.
767 * :enum:`NGHTTP3_QPACK_TOKEN__AUTHORITY` is a token for
772 * :enum:`NGHTTP3_QPACK_TOKEN__PATH` is a token for ``:path``.
776 * :enum:`NGHTTP3_QPACK_TOKEN_AGE` is a token for ``age``.
780 * :enum:`NGHTTP3_QPACK_TOKEN_CONTENT_DISPOSITION` is a token for
785 * :enum:`NGHTTP3_QPACK_TOKEN_CONTENT_LENGTH` is a token for
790 * :enum:`NGHTTP3_QPACK_TOKEN_COOKIE` is a token for ``cookie``.
794 * :enum:`NGHTTP3_QPACK_TOKEN_DATE` is a token for ``date``.
798 * :enum:`NGHTTP3_QPACK_TOKEN_ETAG` is a token for ``etag``.
802 * :enum:`NGHTTP3_QPACK_TOKEN_IF_MODIFIED_SINCE` is a token fo
1077 int32_t token; global() member
[all...]
/third_party/python/Tools/peg_generator/pegen/
H A Dpython_generator.py2 import token namespace
197 tokens: Set[str] = set(token.tok_name.values()),
/third_party/skia/third_party/externals/swiftshader/src/OpenGL/compiler/
H A DValidateLimitations.cpp180 const char *reason, const char* token) in error()
184 mSink << "'" << token << "' : " << reason << "\n"; in error()
179 error(TSourceLoc loc, const char *reason, const char* token) error() argument
H A DParseHelper.cpp210 const char* reason, const char* token, in error()
215 srcLoc, reason, token, extraInfo); in error()
220 const char* reason, const char* token, in warning()
224 srcLoc, reason, token, extraInfo); in warning()
228 const char* reason, const char* token, in info()
232 srcLoc, reason, token, extraInfo); in info()
438 bool TParseContext::integerErrorCheck(TIntermTyped* node, const char* token) in integerErrorCheck() argument
443 error(node->getLine(), "integer expression required", token); in integerErrorCheck()
454 bool TParseContext::globalErrorCheck(const TSourceLoc &line, bool global, const char* token) in globalErrorCheck() argument
459 error(line, "only allowed at global scope", token); in globalErrorCheck()
209 error(const TSourceLoc& loc, const char* reason, const char* token, const char* extraInfo) error() argument
219 warning(const TSourceLoc& loc, const char* reason, const char* token, const char* extraInfo) warning() argument
227 info(const TSourceLoc& loc, const char* reason, const char* token, const char* extraInfo) info() argument
[all...]
/third_party/skia/third_party/externals/swiftshader/tests/regres/cmd/export_to_sheets/
H A Dmain.go44 authdir = flag.String("authdir", "~/.regres-auth", "directory to hold credentials.json and generated token")
377 // Retrieve a token, saves the token, then returns the generated client.
379 // The file token.json stores the user's access and refresh tokens, and is
382 tokFile := filepath.Join(authdir, "token.json")
387 return nil, cause.Wrap(err, "Unable to get token from web")
390 log.Println("Warning: failed to write token: %v", err)
396 // Request a token from the web, then returns the retrieved token.
398 authURL := config.AuthCodeURL("state-token", oauth
[all...]
/third_party/python/Lib/email/
H A Dgenerator.py378 token = random.randrange(sys.maxsize)
379 boundary = ('=' * 15) + (_fmt % token) + '=='
/third_party/toybox/kconfig/
H A Dmenu.c160 void menu_add_option(int token, char *arg) in menu_add_option() argument
164 switch (token) { in menu_add_option()
/third_party/python/Lib/lib2to3/tests/
H A Dtest_refactor.py15 from lib2to3.pgen2 import token namespace
132 name_fixes = d.pop(token.NAME)
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_pwd_common.c122 const u8 *token) in compute_password_element()
184 * pwd-seed = H(token | peer-id | server-id | password | in compute_password_element()
190 eap_pwd_h_update(hash, token, sizeof(u32)); in compute_password_element()
118 compute_password_element(EAP_PWD_group *grp, u16 num, const u8 *password, size_t password_len, const u8 *id_server, size_t id_server_len, const u8 *id_peer, size_t id_peer_len, const u8 *token) compute_password_element() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_pwd_common.c122 const u8 *token) in compute_password_element()
184 * pwd-seed = H(token | peer-id | server-id | password | in compute_password_element()
190 eap_pwd_h_update(hash, token, sizeof(u32)); in compute_password_element()
118 compute_password_element(EAP_PWD_group *grp, u16 num, const u8 *password, size_t password_len, const u8 *id_server, size_t id_server_len, const u8 *id_peer, size_t id_peer_len, const u8 *token) compute_password_element() argument
/third_party/skia/third_party/externals/opengl-registry/xml/
H A Dreadme.tex313 token (enumerant) names used in the API.
368 Each \tag{enum} tag defines a single GL (or other API) token.
375 \item \attr{name} - enumerant name, a legal C preprocessor token name.
378 the same token (used to address a few accidental incompatibilities
386 where token names have been changed as a result of profile changes
592 \item \attr{name} - version name, used as the C preprocessor token under
595 \item \attr{protect} - an additional preprocessor token used to protect
683 \item \attr{protect} - an additional preprocessor token used to protect
/test/testfwk/arkxtest/uitest/napi/
H A Duitest_napi.cpp75 NAPI_ASSERT(env, argc > 0, "Need session token argument!"); in ScheduleEstablishConnection()
76 auto token = JsStrToCppStr(env, argv[0]); in ScheduleEstablishConnection() local
77 g_establishConnectionFuture = async(launch::async, [env, token]() { in ScheduleEstablishConnection()
81 auto result = g_apiTransactClient.InitAndConnectPeer(token, callbackHandler); in ScheduleEstablishConnection()
/third_party/node/deps/ngtcp2/nghttp3/lib/
H A Dnghttp3_http.c836 switch (nv->token) { in http_request_on_header()
964 switch (nv->token) { in http_response_on_header()
1325 switch (nv->token) { in nghttp3_http_on_header()
/third_party/node/deps/v8/src/objects/
H A Djs-locale.cc206 std::string token;
208 while (std::getline(token_stream, token, '-')) {
209 tokens.push_back(token);
/third_party/vk-gl-cts/external/openglcts/modules/gl/
H A Dgl3cGPUShader5Tests.cpp304 /** Replace first occurance of <token> with <text> in <string> starting at <search_posistion>
306 * @param token Token string
308 * @param text String that will be used as replacement for <token>
311 void Utils::replaceToken(const glw::GLchar* token, size_t& search_position, const glw::GLchar* text, in replaceToken() argument
315 const size_t token_length = strlen(token); in replaceToken()
316 const size_t token_position = string.find(token, search_position); in replaceToken()
/third_party/skia/third_party/externals/angle2/tools/flex-bison/third_party/skeletons/
H A Dyacc.c594 /* YYTOKNUM[NUM] -- (External) token number corresponding to the
595 (internal) symbol number NUM (which must be that of a token). */
644 /* Error token number */
843 determined by a syntactically unacceptable token.
849 lookahead token, it should also be invoked before reporting a syntax
1095 about the unexpected token YYTOKEN for the state stack whose top is
1096 YYSSP.]b4_lac_if([[ In order to see if a particular token T is a
1128 that there is no unexpected or expected token to report. In that
1139 - Of course, the expected token list depends on states to have
1144 token lis
[all...]
/third_party/skia/third_party/externals/freetype/src/type42/
H A Dt42parse.c562 /* with exactly one space after the `RD' token. */ in t42_parse_sfnts()
886 FT_ERROR(( "t42_parse_charstrings: invalid token\n" )); in t42_parse_charstrings()
1218 T1_TokenRec token; in FT_LOCAL_DEF() local
1221 /* skip the `known' keyword and the token following it */ in FT_LOCAL_DEF()
1223 T1_ToToken( parser, &token ); in FT_LOCAL_DEF()
1225 /* if the last token was an array, skip it! */ in FT_LOCAL_DEF()
1226 if ( token.type == T1_TOKEN_TYPE_ARRAY ) in FT_LOCAL_DEF()
/test/xts/acts/communication/dsoftbus/capi_ipc/entry/src/main/cpp/
H A Dipc_capi.cpp888 const char *token = ""; in OHIPCParcelWriteInterfaceToken() local
889 int ret = OH_IPCParcel_WriteInterfaceToken(parcel, token); in OHIPCParcelWriteInterfaceToken()
904 char *token = nullptr; in OHIPCParcelReadInterfaceToken() local
907 int ret = OH_IPCParcel_ReadInterfaceToken(parcel, &token, &len, allocator); in OHIPCParcelReadInterfaceToken()
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/text/
H A DPluralRules.java1411 // the token t is always one item ahead in parseConstraint()
1500 /* Returns a parse exception wrapping the token and context strings. */
1501 private static ParseException unexpected(String token, String context) { in unexpected() argument
1502 return new ParseException("unexpected token '" + token + in unexpected()
1507 * Returns the token at x if available, else throws a parse exception.
1514 throw new ParseException("missing token at end of '" + context + "'", -1); in nextToken()
2071 * Checks whether a token is a valid keyword.
2073 * @param token the token t
2076 isValidKeyword(String token) isValidKeyword() argument
[all...]
/third_party/ltp/tools/sparse/sparse-src/
H A Dsymbol.c32 #include "token.h"
800 struct token *token = built_in_token(stream, ident); in create_symbol() local
802 sym = alloc_symbol(token->pos, type); in create_symbol()
803 bind_symbol(sym, token->ident, namespace); in create_symbol()
/third_party/libuv/src/unix/
H A Dcore.c1821 char* token; in uv__search_path() local
1854 token = NULL; in uv__search_path()
1864 token = uv__strtok(cloned_path, ":", &itr); in uv__search_path()
1865 while (token != NULL) { in uv__search_path()
1866 snprintf(trypath, sizeof(trypath) - 1, "%s/%s", token, prog); in uv__search_path()
1883 token = uv__strtok(NULL, ":", &itr); in uv__search_path()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl.c1965 const char *token, *last = NULL; in tls_match_dn_field() local
1974 while ((token = cstr_token(match, "/", &last))) { in tls_match_dn_field()
1975 if (last - token >= (int) sizeof(field)) { in tls_match_dn_field()
1981 os_memcpy(field, token, last - token); in tls_match_dn_field()
1982 field[last - token] = '\0'; in tls_match_dn_field()
2073 const char *token, *last = NULL; in tls_match_suffix()
2076 while ((token = cstr_token(match, ";", &last))) { in tls_match_suffix()
2077 if (tls_match_suffix_helper(cert, token, last - token, ful in tls_match_suffix()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dieee802_11.c548 const u8 *token, size_t token_len) in check_sae_token()
560 if (token_idx == 0 || token_idx != WPA_GET_BE16(token)) { in check_sae_token()
561 wpa_printf(MSG_DEBUG, "SAE: Invalid anti-clogging token from " in check_sae_token()
563 MAC2STR(addr), WPA_GET_BE16(token), token_idx); in check_sae_token()
569 addrs[1] = token; in check_sae_token()
573 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) in check_sae_token()
576 hapd->sae_pending_token_idx[idx] = 0; /* invalidate used token */ in check_sae_token()
586 u8 *token; in auth_build_token_req() local
601 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key", in auth_build_token_req()
623 token in auth_build_token_req()
547 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) check_sae_token() argument
1037 const u8 *token = NULL; handle_auth_sae() local
[all...]
/test/xts/acts/distributed_schedule_lite/system_ability_manager_posix/src/
H A DLiteIPCClientTest.cpp258 ASSERT_EQ(svcIdentity.token == 0xffffffff, TRUE); in HWTEST_F()

Completed in 34 milliseconds

1...<<3132333435363738394041