/third_party/mesa3d/src/mesa/main/ |
H A D | feedback.c | 100 _mesa_PassThrough( GLfloat token ) in _mesa_PassThrough() 107 _mesa_feedback_token( ctx, token ); in _mesa_PassThrough()
|
/third_party/node/deps/ngtcp2/nghttp3/lib/includes/nghttp3/ |
H A D | nghttp3.h | 763 * :member:`nghttp3_qpack_nv.token`. 767 * :enum:`NGHTTP3_QPACK_TOKEN__AUTHORITY` is a token for 772 * :enum:`NGHTTP3_QPACK_TOKEN__PATH` is a token for ``:path``. 776 * :enum:`NGHTTP3_QPACK_TOKEN_AGE` is a token for ``age``. 780 * :enum:`NGHTTP3_QPACK_TOKEN_CONTENT_DISPOSITION` is a token for 785 * :enum:`NGHTTP3_QPACK_TOKEN_CONTENT_LENGTH` is a token for 790 * :enum:`NGHTTP3_QPACK_TOKEN_COOKIE` is a token for ``cookie``. 794 * :enum:`NGHTTP3_QPACK_TOKEN_DATE` is a token for ``date``. 798 * :enum:`NGHTTP3_QPACK_TOKEN_ETAG` is a token for ``etag``. 802 * :enum:`NGHTTP3_QPACK_TOKEN_IF_MODIFIED_SINCE` is a token fo 1077 int32_t token; global() member [all...] |
/third_party/python/Tools/peg_generator/pegen/ |
H A D | python_generator.py | 2 import token namespace 197 tokens: Set[str] = set(token.tok_name.values()),
|
/third_party/skia/third_party/externals/swiftshader/src/OpenGL/compiler/ |
H A D | ValidateLimitations.cpp | 180 const char *reason, const char* token) in error() 184 mSink << "'" << token << "' : " << reason << "\n"; in error() 179 error(TSourceLoc loc, const char *reason, const char* token) error() argument
|
H A D | ParseHelper.cpp | 210 const char* reason, const char* token, in error() 215 srcLoc, reason, token, extraInfo); in error() 220 const char* reason, const char* token, in warning() 224 srcLoc, reason, token, extraInfo); in warning() 228 const char* reason, const char* token, in info() 232 srcLoc, reason, token, extraInfo); in info() 438 bool TParseContext::integerErrorCheck(TIntermTyped* node, const char* token) in integerErrorCheck() argument 443 error(node->getLine(), "integer expression required", token); in integerErrorCheck() 454 bool TParseContext::globalErrorCheck(const TSourceLoc &line, bool global, const char* token) in globalErrorCheck() argument 459 error(line, "only allowed at global scope", token); in globalErrorCheck() 209 error(const TSourceLoc& loc, const char* reason, const char* token, const char* extraInfo) error() argument 219 warning(const TSourceLoc& loc, const char* reason, const char* token, const char* extraInfo) warning() argument 227 info(const TSourceLoc& loc, const char* reason, const char* token, const char* extraInfo) info() argument [all...] |
/third_party/skia/third_party/externals/swiftshader/tests/regres/cmd/export_to_sheets/ |
H A D | main.go | 44 authdir = flag.String("authdir", "~/.regres-auth", "directory to hold credentials.json and generated token") 377 // Retrieve a token, saves the token, then returns the generated client. 379 // The file token.json stores the user's access and refresh tokens, and is 382 tokFile := filepath.Join(authdir, "token.json") 387 return nil, cause.Wrap(err, "Unable to get token from web") 390 log.Println("Warning: failed to write token: %v", err) 396 // Request a token from the web, then returns the retrieved token. 398 authURL := config.AuthCodeURL("state-token", oauth [all...] |
/third_party/python/Lib/email/ |
H A D | generator.py | 378 token = random.randrange(sys.maxsize) 379 boundary = ('=' * 15) + (_fmt % token) + '=='
|
/third_party/toybox/kconfig/ |
H A D | menu.c | 160 void menu_add_option(int token, char *arg) in menu_add_option() argument 164 switch (token) { in menu_add_option()
|
/third_party/python/Lib/lib2to3/tests/ |
H A D | test_refactor.py | 15 from lib2to3.pgen2 import token namespace 132 name_fixes = d.pop(token.NAME)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pwd_common.c | 122 const u8 *token) in compute_password_element() 184 * pwd-seed = H(token | peer-id | server-id | password | in compute_password_element() 190 eap_pwd_h_update(hash, token, sizeof(u32)); in compute_password_element() 118 compute_password_element(EAP_PWD_group *grp, u16 num, const u8 *password, size_t password_len, const u8 *id_server, size_t id_server_len, const u8 *id_peer, size_t id_peer_len, const u8 *token) compute_password_element() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pwd_common.c | 122 const u8 *token) in compute_password_element() 184 * pwd-seed = H(token | peer-id | server-id | password | in compute_password_element() 190 eap_pwd_h_update(hash, token, sizeof(u32)); in compute_password_element() 118 compute_password_element(EAP_PWD_group *grp, u16 num, const u8 *password, size_t password_len, const u8 *id_server, size_t id_server_len, const u8 *id_peer, size_t id_peer_len, const u8 *token) compute_password_element() argument
|
/third_party/skia/third_party/externals/opengl-registry/xml/ |
H A D | readme.tex | 313 token (enumerant) names used in the API. 368 Each \tag{enum} tag defines a single GL (or other API) token. 375 \item \attr{name} - enumerant name, a legal C preprocessor token name. 378 the same token (used to address a few accidental incompatibilities 386 where token names have been changed as a result of profile changes 592 \item \attr{name} - version name, used as the C preprocessor token under 595 \item \attr{protect} - an additional preprocessor token used to protect 683 \item \attr{protect} - an additional preprocessor token used to protect
|
/test/testfwk/arkxtest/uitest/napi/ |
H A D | uitest_napi.cpp | 75 NAPI_ASSERT(env, argc > 0, "Need session token argument!"); in ScheduleEstablishConnection() 76 auto token = JsStrToCppStr(env, argv[0]); in ScheduleEstablishConnection() local 77 g_establishConnectionFuture = async(launch::async, [env, token]() { in ScheduleEstablishConnection() 81 auto result = g_apiTransactClient.InitAndConnectPeer(token, callbackHandler); in ScheduleEstablishConnection()
|
/third_party/node/deps/ngtcp2/nghttp3/lib/ |
H A D | nghttp3_http.c | 836 switch (nv->token) { in http_request_on_header() 964 switch (nv->token) { in http_response_on_header() 1325 switch (nv->token) { in nghttp3_http_on_header()
|
/third_party/node/deps/v8/src/objects/ |
H A D | js-locale.cc | 206 std::string token; 208 while (std::getline(token_stream, token, '-')) { 209 tokens.push_back(token);
|
/third_party/vk-gl-cts/external/openglcts/modules/gl/ |
H A D | gl3cGPUShader5Tests.cpp | 304 /** Replace first occurance of <token> with <text> in <string> starting at <search_posistion> 306 * @param token Token string 308 * @param text String that will be used as replacement for <token> 311 void Utils::replaceToken(const glw::GLchar* token, size_t& search_position, const glw::GLchar* text, in replaceToken() argument 315 const size_t token_length = strlen(token); in replaceToken() 316 const size_t token_position = string.find(token, search_position); in replaceToken()
|
/third_party/skia/third_party/externals/angle2/tools/flex-bison/third_party/skeletons/ |
H A D | yacc.c | 594 /* YYTOKNUM[NUM] -- (External) token number corresponding to the 595 (internal) symbol number NUM (which must be that of a token). */ 644 /* Error token number */ 843 determined by a syntactically unacceptable token. 849 lookahead token, it should also be invoked before reporting a syntax 1095 about the unexpected token YYTOKEN for the state stack whose top is 1096 YYSSP.]b4_lac_if([[ In order to see if a particular token T is a 1128 that there is no unexpected or expected token to report. In that 1139 - Of course, the expected token list depends on states to have 1144 token lis [all...] |
/third_party/skia/third_party/externals/freetype/src/type42/ |
H A D | t42parse.c | 562 /* with exactly one space after the `RD' token. */ in t42_parse_sfnts() 886 FT_ERROR(( "t42_parse_charstrings: invalid token\n" )); in t42_parse_charstrings() 1218 T1_TokenRec token; in FT_LOCAL_DEF() local 1221 /* skip the `known' keyword and the token following it */ in FT_LOCAL_DEF() 1223 T1_ToToken( parser, &token ); in FT_LOCAL_DEF() 1225 /* if the last token was an array, skip it! */ in FT_LOCAL_DEF() 1226 if ( token.type == T1_TOKEN_TYPE_ARRAY ) in FT_LOCAL_DEF()
|
/test/xts/acts/communication/dsoftbus/capi_ipc/entry/src/main/cpp/ |
H A D | ipc_capi.cpp | 888 const char *token = ""; in OHIPCParcelWriteInterfaceToken() local 889 int ret = OH_IPCParcel_WriteInterfaceToken(parcel, token); in OHIPCParcelWriteInterfaceToken() 904 char *token = nullptr; in OHIPCParcelReadInterfaceToken() local 907 int ret = OH_IPCParcel_ReadInterfaceToken(parcel, &token, &len, allocator); in OHIPCParcelReadInterfaceToken()
|
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/text/ |
H A D | PluralRules.java | 1411 // the token t is always one item ahead in parseConstraint() 1500 /* Returns a parse exception wrapping the token and context strings. */ 1501 private static ParseException unexpected(String token, String context) { in unexpected() argument 1502 return new ParseException("unexpected token '" + token + in unexpected() 1507 * Returns the token at x if available, else throws a parse exception. 1514 throw new ParseException("missing token at end of '" + context + "'", -1); in nextToken() 2071 * Checks whether a token is a valid keyword. 2073 * @param token the token t 2076 isValidKeyword(String token) isValidKeyword() argument [all...] |
/third_party/ltp/tools/sparse/sparse-src/ |
H A D | symbol.c | 32 #include "token.h" 800 struct token *token = built_in_token(stream, ident); in create_symbol() local 802 sym = alloc_symbol(token->pos, type); in create_symbol() 803 bind_symbol(sym, token->ident, namespace); in create_symbol()
|
/third_party/libuv/src/unix/ |
H A D | core.c | 1821 char* token; in uv__search_path() local 1854 token = NULL; in uv__search_path() 1864 token = uv__strtok(cloned_path, ":", &itr); in uv__search_path() 1865 while (token != NULL) { in uv__search_path() 1866 snprintf(trypath, sizeof(trypath) - 1, "%s/%s", token, prog); in uv__search_path() 1883 token = uv__strtok(NULL, ":", &itr); in uv__search_path()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl.c | 1965 const char *token, *last = NULL; in tls_match_dn_field() local 1974 while ((token = cstr_token(match, "/", &last))) { in tls_match_dn_field() 1975 if (last - token >= (int) sizeof(field)) { in tls_match_dn_field() 1981 os_memcpy(field, token, last - token); in tls_match_dn_field() 1982 field[last - token] = '\0'; in tls_match_dn_field() 2073 const char *token, *last = NULL; in tls_match_suffix() 2076 while ((token = cstr_token(match, ";", &last))) { in tls_match_suffix() 2077 if (tls_match_suffix_helper(cert, token, last - token, ful in tls_match_suffix() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ieee802_11.c | 548 const u8 *token, size_t token_len) in check_sae_token() 560 if (token_idx == 0 || token_idx != WPA_GET_BE16(token)) { in check_sae_token() 561 wpa_printf(MSG_DEBUG, "SAE: Invalid anti-clogging token from " in check_sae_token() 563 MAC2STR(addr), WPA_GET_BE16(token), token_idx); in check_sae_token() 569 addrs[1] = token; in check_sae_token() 573 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) in check_sae_token() 576 hapd->sae_pending_token_idx[idx] = 0; /* invalidate used token */ in check_sae_token() 586 u8 *token; in auth_build_token_req() local 601 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key", in auth_build_token_req() 623 token in auth_build_token_req() 547 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) check_sae_token() argument 1037 const u8 *token = NULL; handle_auth_sae() local [all...] |
/test/xts/acts/distributed_schedule_lite/system_ability_manager_posix/src/ |
H A D | LiteIPCClientTest.cpp | 258 ASSERT_EQ(svcIdentity.token == 0xffffffff, TRUE); in HWTEST_F()
|