Searched refs:token (Results 1 - 25 of 61) sorted by relevance

123

/barrelfish-master/lib/acpica/source/compiler/
H A Dasltokens.y4 * Module Name: asltokens.y - Bison/Yacc token types
138 %token <i> PARSEOP_ACCESSAS
139 %token <i> PARSEOP_ACCESSATTRIB_BLOCK
140 %token <i> PARSEOP_ACCESSATTRIB_BLOCK_CALL
141 %token <i> PARSEOP_ACCESSATTRIB_BYTE
142 %token <i> PARSEOP_ACCESSATTRIB_MULTIBYTE
143 %token <i> PARSEOP_ACCESSATTRIB_QUICK
144 %token <i> PARSEOP_ACCESSATTRIB_RAW_BYTES
145 %token <i> PARSEOP_ACCESSATTRIB_RAW_PROCESS
146 %token <
[all...]
H A Dprparser.y161 %token <op> EXPOP_EOF
162 %token <op> EXPOP_NEW_LINE
163 %token <op> EXPOP_NUMBER
164 %token <op> EXPOP_HEX_NUMBER
165 %token <op> EXPOP_RESERVED1
166 %token <op> EXPOP_RESERVED2
167 %token <op> EXPOP_PAREN_OPEN
168 %token <op> EXPOP_PAREN_CLOSE
184 %token <op> EXPOP_DEFINE
185 %token <o
[all...]
H A Ddtparser.y161 %token <op> EXPOP_EOF
162 %token <op> EXPOP_NEW_LINE
163 %token <op> EXPOP_NUMBER
164 %token <op> EXPOP_HEX_NUMBER
165 %token <op> EXPOP_DECIMAL_NUMBER
166 %token <op> EXPOP_LABEL
167 %token <op> EXPOP_PAREN_OPEN
168 %token <op> EXPOP_PAREN_CLOSE
290 * PARAMETERS: ParseOpcode - Parser token (EXPOP_*)
/barrelfish-master/lib/octopus/parser/
H A Dparse.y32 %token RBRACKET
33 %token LBRACKET
34 %token RCURLY
35 %token LCURLY
36 %token COLON
37 %token COMMA
38 %token GT
39 %token GE
40 %token LT
41 %token L
[all...]
/barrelfish-master/usr/boot_perfmon/
H A Dtests.c19 static coreset_token_t token; variable
47 err = coreset_get_next(set, &token, &id);
89 token = CORESET_INIT_TOKEN;
90 err = coreset_get_next(set, &token, &id);
97 err = coreset_get_next(set, &token, &id);
/barrelfish-master/lib/lwip2/src/core/
H A Ddef.c105 lwip_strnstr(const char* buffer, const char* token, size_t n) argument
108 size_t tokenlen = strlen(token);
113 if ((*p == *token) && (strncmp(p, token, tokenlen) == 0)) {
/barrelfish-master/usr/eclipseclp/Kernel/src/
H A Dread.c158 * corresponding IDENTIFIER, NUMBER or STRING token.
163 * IDENTIFIER token
165 * [a,b] represented by the [ token,
166 * [b] represented by the , token,
167 * [] represented by the ] token,
171 * [a,b|T] represented by the [ token,
172 * [b|T] represented by the , token,
179 * subscript(X, [...]) represented by the [ token,
182 * 'with attributes'(X,[Args]) represented by { token,
186 * with(a,[Args]) represented by the { token
249 token_desc token, /* current token */ member in struct:parse_desc
[all...]
H A Dlex.h104 #define LexError(token) ((token) < 0)
165 int class; /* token class */
168 * Depending on the token class, we have either:
172 pword term; /* token value */
173 char * string; /* token string (if any) */
175 source_pos_t pos; /* source position of token */
/barrelfish-master/lib/bomp/backends/
H A Dxomp_gateway_client.c31 uint64_t token; ///< memory token member in struct:xgw_msg_st
54 * \brief generates a memory token based on the domain
56 * \return 64bit token
64 uint64_t token = len << 32; local
68 return token | sig;
83 TXQCONT(msg_st), st->addr, st->token);
198 st->token = xomp_gateway_make_token();
H A Dxomp_gateway.c45 /// our token
179 uint64_t token)
190 if (token != xgw_token) {
191 XWG_DEBUG("get_memory_call_rx token do not match: %lx %lx\n", token,
261 XWG_DEBUG("gateway iref:%"PRIxIREF" @ {%s} with token: %lx\n", iref, svc_name,
177 get_memory_call_rx(struct xomp_gateway_binding *b, lpaddr_t addr, uint64_t token) argument
/barrelfish-master/lib/lua/src/
H A Dllex.c49 static l_noret lexerror (LexState *ls, const char *msg, int token);
75 const char *luaX_token2str (LexState *ls, int token) { argument
76 if (token < FIRST_RESERVED) { /* single-byte symbols? */
77 lua_assert(token == cast(unsigned char, token));
78 return (lisprint(token)) ? luaO_pushfstring(ls->L, LUA_QL("%c"), token) :
79 luaO_pushfstring(ls->L, "char(%d)", token);
82 const char *s = luaX_tokens[token - FIRST_RESERVED];
83 if (token < TK_EO
91 txtToken(LexState *ls, int token) argument
104 lexerror(LexState *ls, const char *msg, int token) argument
[all...]
H A Dllex.h44 int token; member in struct:Token
54 int lastline; /* line of last token `consumed' */
55 Token t; /* current token */
56 Token lookahead; /* look ahead token */
75 LUAI_FUNC const char *luaX_token2str (LexState *ls, int token);
H A Dlparser.c61 /* last token from outer function must be EOS */
62 lua_assert(ls->fs != NULL || ls->t.token == TK_EOS);
63 if (ls->t.token == TK_NAME || ls->t.token == TK_STRING) {
72 ls->t.token = 0; /* remove 'near to' from final message */
77 static l_noret error_expected (LexState *ls, int token) { argument
79 luaO_pushfstring(ls->L, "%s expected", luaX_token2str(ls, token)));
102 if (ls->t.token == c) {
111 if (ls->t.token != c)
575 /* last token rea
[all...]
/barrelfish-master/lib/libc/net/
H A Dnsparser.y56 %token NL
57 %token SUCCESS UNAVAIL NOTFOUND TRYAGAIN
58 %token RETURN CONTINUE
59 %token ERRORTOKEN
60 %token <str> STRING
/barrelfish-master/include/flounder/
H A Dflounder_support_ump.h40 uint32_t token; ///< Outgoing message's token member in struct:flounder_ump_state
75 ctrl->token = s->token;
/barrelfish-master/lib/openssl-1.0.0d/engines/
H A De_4758cca.c104 static int getModulusAndExponent(const unsigned char *token, long *exponentLength,
867 static int getModulusAndExponent(const unsigned char*token, long *exponentLength,
873 if (*token++ != (char)0x1E) /* internal PKA token? */
876 if (*token++) /* token version must be zero */
879 len = *token++;
881 len |= (unsigned char)*token++;
883 token += 4; /* skip reserved bytes */
885 if (*token
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/
H A Dts_rsp_verify.c74 PKCS7 *token, TS_TST_INFO *tst_info);
140 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, argument
153 if (!token)
160 if(!PKCS7_type_is_signed(token))
167 sinfos = PKCS7_get_signer_info(token);
177 if (PKCS7_get_detached(token))
185 signers = PKCS7_get0_signers(token, certs, 0);
197 p7bio = PKCS7_dataInit(token, NULL);
203 j = PKCS7_signatureVerify(p7bio, token, si, signer);
360 * - Calls _TS_RESP_verify_token to verify the token conten
364 PKCS7 *token = TS_RESP_get_token(response); local
384 TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token) argument
408 int_TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token, TS_TST_INFO *tst_info) argument
[all...]
H A Dts_asn1.c188 if (a->token) {
195 a->tst_info = PKCS7_to_TS_TST_INFO(a->token);
226 ASN1_OPT(TS_RESP, token, PKCS7),
279 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token)
287 if (!PKCS7_type_is_signed(token))
294 if (PKCS7_get_detached(token))
301 pkcs7_signed = token->d.sign;
/barrelfish-master/include/barrelfish/
H A Dcoreset.h43 errval_t coreset_get_next(struct coreset *set, coreset_token_t *token,
H A Dthreads.h84 void thread_set_outgoing_token(uint32_t token);
85 void thread_get_outgoing_token(uint32_t *token);
/barrelfish-master/lib/libc/posix1e/
H A Dmac.c157 char *token; local
159 token = strsep(string, " \t");
160 while (token != NULL && *token == '\0')
161 token = strsep(string, " \t");
163 return (token);
/barrelfish-master/lib/devif/backends/net/mlx4/drivers/net/mlx4/
H A Dcmd.c139 u16 token; member in struct:mlx4_cmd_context
489 context->token += cmd->token_mask + 1;
561 u16 token, int event) {
609 MLX4_DEBUG("hcr + 5: %d\n", (u32 ) cpu_to_be32(token << 16));
627 __raw_writel((u32) cpu_to_be32(token << 16), hcr + 5);
686 vhcr->token = cpu_to_be16(CMD_POLL_TOKEN);
799 void mlx4_cmd_event(struct mlx4_priv *priv, u16 token, u8 status, u64 out_param) { argument
800 struct mlx4_cmd_context *context = &priv->cmd.context[token
807 if (token != context->token)
559 mlx4_cmd_post(struct mlx4_priv *pdev, struct timespec *ts1, u64 in_param, u64 out_param, u32 in_modifier, u8 op_modifier, u16 op, u16 token, int event) argument
[all...]
/barrelfish-master/lib/libc/rpc/
H A Dgetnetpath.c60 int valid; /* token that indicates a valid netpath_vars */
188 /* couldn't find this token in the database; go to next one. */
229 * Returns pointer to the rest-of-the-string after the current token.
230 * The token itself starts at arg, and we null terminate it. We return NULL
231 * if either the arg is empty, or if this is the last token.
234 * token - char to parse string for
237 _get_next_token(char *npp, int token) argument
243 if ((cp = strchr(npp, token)) == NULL) {
247 * did find a token, but it might be escaped.
250 /* if slash was also escaped, carry on, otherwise find next token */
[all...]
/barrelfish-master/lib/barrelfish/
H A Dcoreset.c170 * \param token Token to maintain internal state
174 * for the #token the first time the function is called. The function
175 * updates the token for subsequent calls.
180 errval_t coreset_get_next(struct coreset *set, coreset_token_t *token, argument
184 coreid_t elem = *token;
185 (*token)++;
190 // Couldn't we store the last core ID in the token? -AB
/barrelfish-master/lib/openssl-1.0.0d/test/
H A Dtesttsa111 TOKEN_DER=$2.token.der
138 # create the token from the response first
139 ../../util/shlib_wrap.sh ../../apps/openssl ts -reply -in $2 -out $2.token -token_out
141 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2.token -token_in \
144 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2.token -token_in \
187 echo "Verifying valid token..."

Completed in 314 milliseconds

123