Home
last modified time | relevance | path

Searched refs:dtoken (Results 1 – 6 of 6) sorted by relevance

/third_party/toybox/toys/pending/
Dcrontab.c89 char *ctoken = strsep(&src, ","), *dtoken; in validate_component() local
95 dtoken = strsep(&ctoken, "-"); in validate_component()
96 if (isdigit(*dtoken)) { in validate_component()
97 if (getval(dtoken, min, (min ? max : max-1)) < 0) return 1; in validate_component()
98 } else if (getindex(dtoken, max) < 0) return 1; in validate_component()
Dcrond.c165 char *ctoken = strsep(&src, ","), *dtoken; in parse_and_fillarray() local
171 dtoken = strsep(&ctoken, "-"); in parse_and_fillarray()
172 if (isdigit(*dtoken)) { in parse_and_fillarray()
173 if ((start = getval(dtoken, min, (min ? max : max-1))) < 0) goto ERROR; in parse_and_fillarray()
175 } else if ((start = getindex(dtoken, max)) < 0) goto ERROR; in parse_and_fillarray()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dtdls.c109 u8 dtoken; member
534 u8 dtoken, const u8 *lnkid, in wpa_tdls_key_mic_teardown() argument
545 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown()
562 *pos++ = dtoken; in wpa_tdls_key_mic_teardown()
610 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument
617 dtoken, lnkid, (u8 *) ftie, mic); in wpa_supplicant_verify_tdls_mic_teardown()
779 dialog_token = peer->dtoken; in wpa_tdls_send_teardown()
994 peer->dtoken, peer, in wpa_tdls_recv_teardown()
1244 const unsigned char *src_addr, u8 dtoken, in wpa_tdls_send_tpk_m2() argument
1326 dtoken, 0, 0, peer->initiator, rbuf, in wpa_tdls_send_tpk_m2()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dtdls.c109 u8 dtoken; member
538 u8 dtoken, const u8 *lnkid, in wpa_tdls_key_mic_teardown() argument
549 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown()
566 *pos++ = dtoken; in wpa_tdls_key_mic_teardown()
614 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument
621 dtoken, lnkid, (u8 *) ftie, mic); in wpa_supplicant_verify_tdls_mic_teardown()
787 dialog_token = peer->dtoken; in wpa_tdls_send_teardown()
1002 peer->dtoken, peer, in wpa_tdls_recv_teardown()
1252 const unsigned char *src_addr, u8 dtoken, in wpa_tdls_send_tpk_m2() argument
1334 dtoken, 0, 0, peer->initiator, rbuf, in wpa_tdls_send_tpk_m2()
[all …]
/third_party/flatbuffers/src/
Didl_parser.cpp1874 CheckedError Parser::TryTypedValue(const std::string *name, int dtoken, in TryTypedValue() argument
1877 FLATBUFFERS_ASSERT(*destmatch == false && dtoken == token_); in TryTypedValue()
1893 if ((kTokenFloatConstant != dtoken) && IsFloat(e.type.base_type)) { in TryTypedValue()
1929 #define IF_ECHECK_(force, dtoken, check, req) \ in ParseSingleValue() argument
1930 if (!match && ((dtoken) == token_) && ((check) || IsConstTrue(force))) \ in ParseSingleValue()
1931 ECHECK(TryTypedValue(name, dtoken, check, e, req, &match)) in ParseSingleValue()
1932 #define TRY_ECHECK(dtoken, check, req) IF_ECHECK_(false, dtoken, check, req) in ParseSingleValue() argument
1933 #define FORCE_ECHECK(dtoken, check, req) IF_ECHECK_(true, dtoken, check, req) in ParseSingleValue() argument
/third_party/flatbuffers/include/flatbuffers/
Didl.h932 FLATBUFFERS_CHECKED_ERROR TryTypedValue(const std::string *name, int dtoken,