/barrelfish-master/lib/acpica/source/compiler/ |
H A D | asltokens.y | 4 * Module Name: asltokens.y - Bison/Yacc token types 138 %token <i> PARSEOP_ACCESSAS 139 %token <i> PARSEOP_ACCESSATTRIB_BLOCK 140 %token <i> PARSEOP_ACCESSATTRIB_BLOCK_CALL 141 %token <i> PARSEOP_ACCESSATTRIB_BYTE 142 %token <i> PARSEOP_ACCESSATTRIB_MULTIBYTE 143 %token <i> PARSEOP_ACCESSATTRIB_QUICK 144 %token <i> PARSEOP_ACCESSATTRIB_RAW_BYTES 145 %token <i> PARSEOP_ACCESSATTRIB_RAW_PROCESS 146 %token < [all...] |
H A D | prparser.y | 161 %token <op> EXPOP_EOF 162 %token <op> EXPOP_NEW_LINE 163 %token <op> EXPOP_NUMBER 164 %token <op> EXPOP_HEX_NUMBER 165 %token <op> EXPOP_RESERVED1 166 %token <op> EXPOP_RESERVED2 167 %token <op> EXPOP_PAREN_OPEN 168 %token <op> EXPOP_PAREN_CLOSE 184 %token <op> EXPOP_DEFINE 185 %token <o [all...] |
H A D | dtparser.y | 161 %token <op> EXPOP_EOF 162 %token <op> EXPOP_NEW_LINE 163 %token <op> EXPOP_NUMBER 164 %token <op> EXPOP_HEX_NUMBER 165 %token <op> EXPOP_DECIMAL_NUMBER 166 %token <op> EXPOP_LABEL 167 %token <op> EXPOP_PAREN_OPEN 168 %token <op> EXPOP_PAREN_CLOSE 290 * PARAMETERS: ParseOpcode - Parser token (EXPOP_*)
|
/barrelfish-master/lib/octopus/parser/ |
H A D | parse.y | 32 %token RBRACKET 33 %token LBRACKET 34 %token RCURLY 35 %token LCURLY 36 %token COLON 37 %token COMMA 38 %token GT 39 %token GE 40 %token LT 41 %token L [all...] |
/barrelfish-master/usr/boot_perfmon/ |
H A D | tests.c | 19 static coreset_token_t token; variable 47 err = coreset_get_next(set, &token, &id); 89 token = CORESET_INIT_TOKEN; 90 err = coreset_get_next(set, &token, &id); 97 err = coreset_get_next(set, &token, &id);
|
/barrelfish-master/lib/lwip2/src/core/ |
H A D | def.c | 105 lwip_strnstr(const char* buffer, const char* token, size_t n) argument 108 size_t tokenlen = strlen(token); 113 if ((*p == *token) && (strncmp(p, token, tokenlen) == 0)) {
|
/barrelfish-master/usr/eclipseclp/Kernel/src/ |
H A D | read.c | 158 * corresponding IDENTIFIER, NUMBER or STRING token. 163 * IDENTIFIER token 165 * [a,b] represented by the [ token, 166 * [b] represented by the , token, 167 * [] represented by the ] token, 171 * [a,b|T] represented by the [ token, 172 * [b|T] represented by the , token, 179 * subscript(X, [...]) represented by the [ token, 182 * 'with attributes'(X,[Args]) represented by { token, 186 * with(a,[Args]) represented by the { token 249 token_desc token, /* current token */ member in struct:parse_desc [all...] |
H A D | lex.h | 104 #define LexError(token) ((token) < 0) 165 int class; /* token class */ 168 * Depending on the token class, we have either: 172 pword term; /* token value */ 173 char * string; /* token string (if any) */ 175 source_pos_t pos; /* source position of token */
|
/barrelfish-master/lib/bomp/backends/ |
H A D | xomp_gateway_client.c | 31 uint64_t token; ///< memory token member in struct:xgw_msg_st 54 * \brief generates a memory token based on the domain 56 * \return 64bit token 64 uint64_t token = len << 32; local 68 return token | sig; 83 TXQCONT(msg_st), st->addr, st->token); 198 st->token = xomp_gateway_make_token();
|
H A D | xomp_gateway.c | 45 /// our token 179 uint64_t token) 190 if (token != xgw_token) { 191 XWG_DEBUG("get_memory_call_rx token do not match: %lx %lx\n", token, 261 XWG_DEBUG("gateway iref:%"PRIxIREF" @ {%s} with token: %lx\n", iref, svc_name, 177 get_memory_call_rx(struct xomp_gateway_binding *b, lpaddr_t addr, uint64_t token) argument
|
/barrelfish-master/lib/lua/src/ |
H A D | llex.c | 49 static l_noret lexerror (LexState *ls, const char *msg, int token); 75 const char *luaX_token2str (LexState *ls, int token) { argument 76 if (token < FIRST_RESERVED) { /* single-byte symbols? */ 77 lua_assert(token == cast(unsigned char, token)); 78 return (lisprint(token)) ? luaO_pushfstring(ls->L, LUA_QL("%c"), token) : 79 luaO_pushfstring(ls->L, "char(%d)", token); 82 const char *s = luaX_tokens[token - FIRST_RESERVED]; 83 if (token < TK_EO 91 txtToken(LexState *ls, int token) argument 104 lexerror(LexState *ls, const char *msg, int token) argument [all...] |
H A D | llex.h | 44 int token; member in struct:Token 54 int lastline; /* line of last token `consumed' */ 55 Token t; /* current token */ 56 Token lookahead; /* look ahead token */ 75 LUAI_FUNC const char *luaX_token2str (LexState *ls, int token);
|
H A D | lparser.c | 61 /* last token from outer function must be EOS */ 62 lua_assert(ls->fs != NULL || ls->t.token == TK_EOS); 63 if (ls->t.token == TK_NAME || ls->t.token == TK_STRING) { 72 ls->t.token = 0; /* remove 'near to' from final message */ 77 static l_noret error_expected (LexState *ls, int token) { argument 79 luaO_pushfstring(ls->L, "%s expected", luaX_token2str(ls, token))); 102 if (ls->t.token == c) { 111 if (ls->t.token != c) 575 /* last token rea [all...] |
/barrelfish-master/lib/libc/net/ |
H A D | nsparser.y | 56 %token NL 57 %token SUCCESS UNAVAIL NOTFOUND TRYAGAIN 58 %token RETURN CONTINUE 59 %token ERRORTOKEN 60 %token <str> STRING
|
/barrelfish-master/include/flounder/ |
H A D | flounder_support_ump.h | 40 uint32_t token; ///< Outgoing message's token member in struct:flounder_ump_state 75 ctrl->token = s->token;
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_4758cca.c | 104 static int getModulusAndExponent(const unsigned char *token, long *exponentLength, 867 static int getModulusAndExponent(const unsigned char*token, long *exponentLength, 873 if (*token++ != (char)0x1E) /* internal PKA token? */ 876 if (*token++) /* token version must be zero */ 879 len = *token++; 881 len |= (unsigned char)*token++; 883 token += 4; /* skip reserved bytes */ 885 if (*token [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_rsp_verify.c | 74 PKCS7 *token, TS_TST_INFO *tst_info); 140 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, argument 153 if (!token) 160 if(!PKCS7_type_is_signed(token)) 167 sinfos = PKCS7_get_signer_info(token); 177 if (PKCS7_get_detached(token)) 185 signers = PKCS7_get0_signers(token, certs, 0); 197 p7bio = PKCS7_dataInit(token, NULL); 203 j = PKCS7_signatureVerify(p7bio, token, si, signer); 360 * - Calls _TS_RESP_verify_token to verify the token conten 364 PKCS7 *token = TS_RESP_get_token(response); local 384 TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token) argument 408 int_TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token, TS_TST_INFO *tst_info) argument [all...] |
H A D | ts_asn1.c | 188 if (a->token) { 195 a->tst_info = PKCS7_to_TS_TST_INFO(a->token); 226 ASN1_OPT(TS_RESP, token, PKCS7), 279 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token) 287 if (!PKCS7_type_is_signed(token)) 294 if (PKCS7_get_detached(token)) 301 pkcs7_signed = token->d.sign;
|
/barrelfish-master/include/barrelfish/ |
H A D | coreset.h | 43 errval_t coreset_get_next(struct coreset *set, coreset_token_t *token,
|
H A D | threads.h | 84 void thread_set_outgoing_token(uint32_t token); 85 void thread_get_outgoing_token(uint32_t *token);
|
/barrelfish-master/lib/libc/posix1e/ |
H A D | mac.c | 157 char *token; local 159 token = strsep(string, " \t"); 160 while (token != NULL && *token == '\0') 161 token = strsep(string, " \t"); 163 return (token);
|
/barrelfish-master/lib/devif/backends/net/mlx4/drivers/net/mlx4/ |
H A D | cmd.c | 139 u16 token; member in struct:mlx4_cmd_context 489 context->token += cmd->token_mask + 1; 561 u16 token, int event) { 609 MLX4_DEBUG("hcr + 5: %d\n", (u32 ) cpu_to_be32(token << 16)); 627 __raw_writel((u32) cpu_to_be32(token << 16), hcr + 5); 686 vhcr->token = cpu_to_be16(CMD_POLL_TOKEN); 799 void mlx4_cmd_event(struct mlx4_priv *priv, u16 token, u8 status, u64 out_param) { argument 800 struct mlx4_cmd_context *context = &priv->cmd.context[token 807 if (token != context->token) 559 mlx4_cmd_post(struct mlx4_priv *pdev, struct timespec *ts1, u64 in_param, u64 out_param, u32 in_modifier, u8 op_modifier, u16 op, u16 token, int event) argument [all...] |
/barrelfish-master/lib/libc/rpc/ |
H A D | getnetpath.c | 60 int valid; /* token that indicates a valid netpath_vars */ 188 /* couldn't find this token in the database; go to next one. */ 229 * Returns pointer to the rest-of-the-string after the current token. 230 * The token itself starts at arg, and we null terminate it. We return NULL 231 * if either the arg is empty, or if this is the last token. 234 * token - char to parse string for 237 _get_next_token(char *npp, int token) argument 243 if ((cp = strchr(npp, token)) == NULL) { 247 * did find a token, but it might be escaped. 250 /* if slash was also escaped, carry on, otherwise find next token */ [all...] |
/barrelfish-master/lib/barrelfish/ |
H A D | coreset.c | 170 * \param token Token to maintain internal state 174 * for the #token the first time the function is called. The function 175 * updates the token for subsequent calls. 180 errval_t coreset_get_next(struct coreset *set, coreset_token_t *token, argument 184 coreid_t elem = *token; 185 (*token)++; 190 // Couldn't we store the last core ID in the token? -AB
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | testtsa | 111 TOKEN_DER=$2.token.der 138 # create the token from the response first 139 ../../util/shlib_wrap.sh ../../apps/openssl ts -reply -in $2 -out $2.token -token_out 141 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2.token -token_in \ 144 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2.token -token_in \ 187 echo "Verifying valid token..."
|