Searched refs:tag (Results 301 - 325 of 965) sorted by relevance

<<11121314151617181920>>

/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Drsa.c40 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) {
42 "tag 0x%x", hdr.class, hdr.tag);
89 hdr.tag != ASN1_TAG_SEQUENCE) {
91 "(public key) - found class %d tag 0x%x",
92 hdr.class, hdr.tag);
173 hdr.tag != ASN1_TAG_SEQUENCE) {
175 "(public key) - found class %d tag 0x%x",
176 hdr.class, hdr.tag);
H A Dtlsv1_cred.c85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument
89 plen = os_strlen(tag);
94 if (os_memcmp(buf + i, tag, plen) == 0)
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
124 "certificate end tag (%s)", pem_cert_end);
371 hdr.tag != ASN1_TAG_SEQUENCE) {
373 "valid SEQUENCE - found class %d tag 0x%x",
374 hdr.class, hdr.tag);
384 hdr.tag != ASN1_TAG_INTEGER) {
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun
[all...]
/external/valgrind/main/VEX/priv/
H A Dhost_x86_defs.c163 am->tag = Xam_IR;
170 am->tag = Xam_IRRS;
180 switch (am->tag) {
192 switch (am->tag) {
214 switch (am->tag) {
228 switch (am->tag) {
245 op->tag = Xrmi_Imm;
251 op->tag = Xrmi_Reg;
257 op->tag = Xrmi_Mem;
263 switch (op->tag) {
[all...]
H A Dhost_x86_isel.c108 return e->tag == Iex_Const
109 && e->Iex.Const.con->tag == Ico_U8
115 return e->tag == Iex_Const
116 && e->Iex.Const.con->tag == Ico_U32
122 return e->tag == Iex_Const
123 && e->Iex.Const.con->tag == Ico_U64
312 switch (am4->tag) {
374 switch (e->tag) {
559 if (guard->tag == Iex_Const
560 && guard->Iex.Const.con->tag
[all...]
H A Dhost_ppc_defs.c322 am->tag = Pam_IR;
329 am->tag = Pam_RR;
336 switch (am->tag) {
347 switch (am->tag) {
367 switch (am->tag) {
381 switch (am->tag) {
398 op->tag = Prh_Imm;
410 op->tag = Prh_Reg;
416 switch (op->tag) {
435 switch (op->tag) {
[all...]
/external/protobuf/src/google/protobuf/compiler/
H A Dplugin.pb.cc234 ::google::protobuf::uint32 tag; local
235 while ((tag = input->ReadTag()) != 0) {
236 switch (::google::protobuf::internal::WireFormatLite::GetTagFieldNumber(tag)) {
239 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) ==
257 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) ==
274 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) ==
289 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) ==
294 input, tag, mutable_unknown_fields()));
568 ::google::protobuf::uint32 tag; local
569 while ((tag
889 ::google::protobuf::uint32 tag; local
[all...]
/external/javassist/src/main/javassist/bytecode/
H A DMethodInfo.java168 = (AnnotationDefaultAttribute) getAttribute(AnnotationDefaultAttribute.tag);
177 = getAttribute(SignatureAttribute.tag);
324 ExceptionsAttribute.tag);
334 AttributeInfo info = AttributeInfo.lookup(attribute, CodeAttribute.tag);
342 AttributeInfo.remove(attribute, ExceptionsAttribute.tag);
364 AttributeInfo.remove(attribute, CodeAttribute.tag);
453 .getAttribute(LineNumberAttribute.tag);
/external/icu4c/test/intltest/
H A Drestsnew.cpp633 char tag[100]; local
699 uprv_strcpy(tag, "string_");
700 uprv_strcat(tag, frag);
704 action += tag;
709 UnicodeString string = theBundle.getStringEx(tag, status);
726 uprv_strcpy(tag, "array_");
727 uprv_strcat(tag, frag);
731 action += tag;
736 ResourceBundle array = theBundle.get(tag, status);
774 ResourceBundle array = theBundle.get(tag, statu
[all...]
/external/chromium/chrome/browser/sync/glue/
H A Dautofill_model_associator.cc73 std::string tag = KeyToTag(ix->key().name(), ix->key().value()); local
74 if (id_map_.find(tag) != id_map_.end()) {
82 if (node.InitByClientTagLookup(syncable::AUTOFILL, tag)) {
84 DCHECK_EQ(tag, KeyToTag(UTF8ToUTF16(autofill.name()),
93 if (!write_node.InitByClientTagLookup(syncable::AUTOFILL, tag)) {
100 Associate(&tag, node.GetId());
104 autofill_root, tag)) {
108 node.SetTitle(UTF8ToWide(tag));
110 Associate(&tag, node.GetId());
338 std::string tag(KeyToTa
450 GetSyncIdForTaggedNode(const std::string& tag, int64* sync_id) argument
[all...]
/external/elfutils/src/
H A Dldscript.y49 static struct expression *new_expr (int tag);
52 static struct input_rule *new_input_rule (int tag);
53 static struct output_rule *new_output_rule (int tag);
472 new_expr (int tag)
477 newp->tag = tag;
495 new_input_rule (int tag)
500 newp->tag = tag;
507 new_output_rule (int tag)
[all...]
/external/freetype/src/sfnt/
H A Dttload.c51 /* tag :: The searched tag. */
58 FT_ULong tag )
69 (FT_Char)( tag >> 24 ),
70 (FT_Char)( tag >> 16 ),
71 (FT_Char)( tag >> 8 ),
72 (FT_Char)( tag ) ));
81 if ( entry->Tag == tag )
116 /* tag :: The searched tag
[all...]
/external/protobuf/java/src/main/java/com/google/protobuf/
H A DAbstractMessage.java255 final int tag = input.readTag();
256 if (tag == 0) {
261 this, tag)) {
262 // end group tag
274 * @param tag The tag, which should have already been read.
275 * @return {@code true} unless the tag is an end-group tag.
283 final int tag) throws IOException {
287 tag
278 mergeFieldFrom( final CodedInputStream input, final UnknownFieldSet.Builder unknownFields, final ExtensionRegistryLite extensionRegistry, final Message.Builder builder, final int tag) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_cred.c85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument
89 plen = os_strlen(tag);
94 if (os_memcmp(buf + i, tag, plen) == 0)
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
124 "certificate end tag (%s)", pem_cert_end);
371 hdr.tag != ASN1_TAG_SEQUENCE) {
373 "valid SEQUENCE - found class %d tag 0x%x",
374 hdr.class, hdr.tag);
384 hdr.tag != ASN1_TAG_INTEGER) {
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_cred.c85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument
89 plen = os_strlen(tag);
94 if (os_memcmp(buf + i, tag, plen) == 0)
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
124 "certificate end tag (%s)", pem_cert_end);
371 hdr.tag != ASN1_TAG_SEQUENCE) {
373 "valid SEQUENCE - found class %d tag 0x%x",
374 hdr.class, hdr.tag);
384 hdr.tag != ASN1_TAG_INTEGER) {
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun
[all...]
/external/dropbear/libtomcrypt/demos/
H A Dtv_gen.c398 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
403 "are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag of the previous\n"
428 len = sizeof(tag);
429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) {
439 fprintf(out, "%02X", tag[z]);
445 key[z] = tag[z % len];
458 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
463 "are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag o
522 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
584 unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
[all...]
/external/e2fsprogs/lib/blkid/
H A Dread.c238 * Extract a tag of the form NAME="value" from the line.
278 * Extract a tag of the form <NAME>value</NAME> from the line.
298 * Extract a tag from the line.
300 * Return 1 if a valid tag was found.
301 * Return 0 if no tag found.
327 DBG(DEBUG_READ, printf(" tag: %s=\"%s\"\n", name, value));
464 blkid_tag tag = list_entry(p, struct blkid_struct_tag, bit_tags); local
465 if (tag)
466 printf(" tag: %s=\"%s\"\n", tag
[all...]
H A Dsave.c46 blkid_tag tag = list_entry(p, struct blkid_struct_tag, bit_tags); local
47 fprintf(file, " %s=\"%s\"", tag->bit_name,tag->bit_val);
/external/markdown/markdown/
H A Dpreprocessors.py86 tag = p % left_tag
87 i = block.rfind(tag)
89 return tag.lstrip("<").rstrip(">"), i + len(p)-2 + len(left_tag)
105 def _is_oneliner(self, tag):
106 return (tag in ['hr', 'hr/'])
157 # if is block level tag and is not complete
177 # if find closing tag
/external/proguard/src/proguard/classfile/io/
H A DLibraryClassReader.java102 int tag = constant.getTag();
103 if (tag == ClassConstants.CONSTANT_Class ||
104 tag == ClassConstants.CONSTANT_Utf8)
111 if (tag == ClassConstants.CONSTANT_Long ||
112 tag == ClassConstants.CONSTANT_Double)
/external/srec/srec/EventLog/src/
H A Driff.c27 char tag[4]; member in struct:ChunkContext_t
332 char form[4], tag[4]; local
371 if (fread(tag, 1, 4, f) != 4) break;
372 if (!strncmp(tag, c->tag, 4))
386 if (fread(tag, 1, 4, f) != 4) break;
391 if (!strncmp(tag, c->tag, 4))
428 if (fread(tag, 1, 4, f) != 4) break;
429 if (!strncmp(tag,
[all...]
/external/v8/src/
H A Dprofile-generator.h97 INLINE(CodeEntry(Logger::LogEventsAndTags tag,
114 INLINE(static bool is_js_function_tag(Logger::LogEventsAndTags tag));
310 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag,
312 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, const char* name);
313 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag,
315 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, int args_count);
397 INLINE(CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, argument
401 return profiles_->NewCodeEntry(tag, name, resource_name, line_number);
404 INLINE(CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, argument
406 return profiles_->NewCodeEntry(tag, nam
409 NewCodeEntry(Logger::LogEventsAndTags tag, const char* name_prefix, String* name) argument
415 NewCodeEntry(Logger::LogEventsAndTags tag, int args_count) argument
[all...]
/external/webkit/Source/JavaScriptCore/jit/
H A DJITStubCall.h124 m_jit->poke(JIT::Imm32(value.tag()), m_stackIndex + 1);
129 void addArgument(JIT::RegisterID tag, JIT::RegisterID payload) argument
132 m_jit->poke(tag, m_stackIndex + 1);
148 void getArgument(size_t argumentNumber, JIT::RegisterID tag, JIT::RegisterID payload) argument
152 m_jit->peek(tag, stackIndex + 1);
/external/chromium/third_party/libevent/
H A Devent_rpcgen.py34 print >>sys.stderr, ( 'Entry "%s" duplicates tag number '
58 """Prints the tag definitions for a structure."""
212 ' ev_uint32_t tag;\n'
214 ' if (evtag_peek(evbuf, &tag) == -1)\n'
216 ' switch (tag) {\n'
265 ' ev_uint32_t tag;\n'
270 ' if (evtag_unmarshal(evbuf, &tag, tmp) == -1'
271 ' || tag != need_tag)\n'
287 'evtag_marshal_%(name)s(struct evbuffer *evbuf, ev_uint32_t tag, '
294 ' evtag_marshal(evbuf, tag, EVBUFFER_DAT
[all...]
/external/chromium/chrome/browser/
H A Dkeychain_mock_mac.h126 // Sets the data and length of |tag| in the item-th test item.
127 void SetTestDataBytes(int item, UInt32 tag, const void* data, size_t length);
128 // Sets the data and length of |tag| in the item-th test item based on
132 void SetTestDataString(int item, UInt32 tag, const char* value);
147 // Returns the address of the attribute in attribute_list with tag |tag|.
149 const SecKeychainAttributeList& attribute_list, UInt32 tag);
/external/chromium/net/tools/testserver/
H A Dchromiumsync.py49 # Well-known server tag of the top level "Google Chrome" folder.
161 tag: A known-to-the-client value that uniquely identifies a server-created
164 parent_tag: The tag of the permanent item's parent. If ROOT_ID, indicates
165 a top-level item. Otherwise, this must be the tag value of some other
172 def __init__(self, tag, name, parent_tag, sync_type):
173 self.tag = tag
308 def _ServerTagToId(self, tag):
309 """Determine the server ID from a server-unique tag.
315 tag
[all...]

Completed in 572 milliseconds

<<11121314151617181920>>