/third_party/toybox/toys/pending/ |
D | crontab.c | 89 char *ctoken = strsep(&src, ","), *dtoken; in validate_component() local 95 dtoken = strsep(&ctoken, "-"); in validate_component() 96 if (isdigit(*dtoken)) { in validate_component() 97 if (getval(dtoken, min, (min ? max : max-1)) < 0) return 1; in validate_component() 98 } else if (getindex(dtoken, max) < 0) return 1; in validate_component()
|
D | crond.c | 165 char *ctoken = strsep(&src, ","), *dtoken; in parse_and_fillarray() local 171 dtoken = strsep(&ctoken, "-"); in parse_and_fillarray() 172 if (isdigit(*dtoken)) { in parse_and_fillarray() 173 if ((start = getval(dtoken, min, (min ? max : max-1))) < 0) goto ERROR; in parse_and_fillarray() 175 } else if ((start = getindex(dtoken, max)) < 0) goto ERROR; in parse_and_fillarray()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | tdls.c | 109 u8 dtoken; member 534 u8 dtoken, const u8 *lnkid, in wpa_tdls_key_mic_teardown() argument 545 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 562 *pos++ = dtoken; in wpa_tdls_key_mic_teardown() 610 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 617 dtoken, lnkid, (u8 *) ftie, mic); in wpa_supplicant_verify_tdls_mic_teardown() 779 dialog_token = peer->dtoken; in wpa_tdls_send_teardown() 994 peer->dtoken, peer, in wpa_tdls_recv_teardown() 1244 const unsigned char *src_addr, u8 dtoken, in wpa_tdls_send_tpk_m2() argument 1326 dtoken, 0, 0, peer->initiator, rbuf, in wpa_tdls_send_tpk_m2() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | tdls.c | 109 u8 dtoken; member 538 u8 dtoken, const u8 *lnkid, in wpa_tdls_key_mic_teardown() argument 549 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 566 *pos++ = dtoken; in wpa_tdls_key_mic_teardown() 614 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 621 dtoken, lnkid, (u8 *) ftie, mic); in wpa_supplicant_verify_tdls_mic_teardown() 787 dialog_token = peer->dtoken; in wpa_tdls_send_teardown() 1002 peer->dtoken, peer, in wpa_tdls_recv_teardown() 1252 const unsigned char *src_addr, u8 dtoken, in wpa_tdls_send_tpk_m2() argument 1334 dtoken, 0, 0, peer->initiator, rbuf, in wpa_tdls_send_tpk_m2() [all …]
|
/third_party/flatbuffers/src/ |
D | idl_parser.cpp | 1874 CheckedError Parser::TryTypedValue(const std::string *name, int dtoken, in TryTypedValue() argument 1877 FLATBUFFERS_ASSERT(*destmatch == false && dtoken == token_); in TryTypedValue() 1893 if ((kTokenFloatConstant != dtoken) && IsFloat(e.type.base_type)) { in TryTypedValue() 1929 #define IF_ECHECK_(force, dtoken, check, req) \ in ParseSingleValue() argument 1930 if (!match && ((dtoken) == token_) && ((check) || IsConstTrue(force))) \ in ParseSingleValue() 1931 ECHECK(TryTypedValue(name, dtoken, check, e, req, &match)) in ParseSingleValue() 1932 #define TRY_ECHECK(dtoken, check, req) IF_ECHECK_(false, dtoken, check, req) in ParseSingleValue() argument 1933 #define FORCE_ECHECK(dtoken, check, req) IF_ECHECK_(true, dtoken, check, req) in ParseSingleValue() argument
|
/third_party/flatbuffers/include/flatbuffers/ |
D | idl.h | 932 FLATBUFFERS_CHECKED_ERROR TryTypedValue(const std::string *name, int dtoken,
|