Home
last modified time | relevance | path

Searched refs:token (Results 1 – 5 of 5) sorted by relevance

/bootable/recovery/applypatch/
Dapplypatch.h75 SinkFn sink, void* token, SHA_CTX* ctx);
83 SinkFn sink, void* token, SHA_CTX* ctx,
Dimgpatch.c40 SinkFn sink, void* token, SHA_CTX* ctx, in ApplyImagePatch() argument
82 patch, patch_offset, sink, token, ctx); in ApplyImagePatch()
99 data_len, token) != data_len) { in ApplyImagePatch()
214 if (sink(temp_data, have, token) != have) { in ApplyImagePatch()
Dapplypatch.c34 static ssize_t FileSink(unsigned char* data, ssize_t len, void* token);
537 ssize_t FileSink(unsigned char* data, ssize_t len, void* token) { in FileSink() argument
538 int fd = *(int *)token; in FileSink()
558 ssize_t MemorySink(unsigned char* data, ssize_t len, void* token) { in MemorySink() argument
559 MemorySinkInfo* msi = (MemorySinkInfo*)token; in MemorySink()
827 void* token = NULL; in GenerateTarget() local
842 token = &msi; in GenerateTarget()
856 token = &output; in GenerateTarget()
869 patch, 0, sink, token, &ctx); in GenerateTarget()
873 patch, sink, token, &ctx, bonus_data); in GenerateTarget()
Dbspatch.c102 SinkFn sink, void* token, SHA_CTX* ctx) { in ApplyBSDiffPatch() argument
111 if (sink(new_data, new_size, token) < new_size) { in ApplyBSDiffPatch()
/bootable/recovery/edify/
Dparser.y45 %token AND OR SUBSTR SUPERSTR EQ NE IF THEN ELSE ENDIF
46 %token <str> STRING BAD