/external/chromium_org/gpu/command_buffer/client/ |
H A D | fenced_allocator_test.cc | 74 return command_buffer_->GetLastState().token; 189 // Checks the free-pending-token mechanism. 212 int32 token = helper_.get()->InsertToken(); local 213 allocator_->FreePendingToken(offsets[0], token); 217 // until it has to wait for something. Which means the token shouldn't have 219 EXPECT_GT(token, GetToken()); 222 // process the commands until the token is passed. 227 // Check that the token has indeed passed. 228 EXPECT_LE(token, GetToken()); 237 // Checks the free-pending-token mechanis 259 int32 token = helper_.get()->InsertToken(); local 375 int32 token = helper_.get()->InsertToken(); local 621 int32 token = helper_.get()->InsertToken(); local [all...] |
H A D | mapped_memory_unittest.cc | 71 return command_buffer_->GetLastState().token; 243 int32 token = helper_.get()->InsertToken(); local 244 manager_->FreePendingToken(pointers[0], token); 247 // until it has to wait for something. Which means the token shouldn't have 249 EXPECT_GT(token, GetToken()); 250 // Force it to read up to the token 252 // Check that the token has indeed passed. 253 EXPECT_LE(token, GetToken()); 378 int32 token = helper_.get()->InsertToken(); local 379 manager_->FreePendingToken(mem2, token); [all...] |
H A D | query_tracker.h | 113 void MarkAsPending(int32 token) { argument 114 token_ = token; 120 int32 token() const { function in class:gpu::gles2::QueryTracker::Query
|
/external/chromium_org/gpu/command_buffer/service/ |
H A D | common_decoder_unittest.cc | 113 virtual void set_token(int32 token) OVERRIDE { 114 token_ = token; 117 int32 token() const { function in class:gpu::MockCommandBufferEngine 210 EXPECT_EQ(0, engine_.token()); 213 EXPECT_EQ(kTokenId, engine_.token());
|
H A D | gpu_scheduler.cc | 186 void GpuScheduler::set_token(int32 token) { argument 187 command_buffer_->SetToken(token);
|
/external/chromium_org/remoting/host/win/ |
H A D | launch_process_with_token.cc | 123 // Copies the process token making it a primary impersonation token. 130 PLOG(ERROR) << "Failed to open process token"; 141 PLOG(ERROR) << "Failed to duplicate the process token"; 170 PLOG(ERROR) << "Failed to enable SE_TCB_NAME privilege in a token"; 303 HANDLE token; member in struct:__anon10487::CreateProcessRequest 369 // using the default (i.e. Winlogon) token. This routine relies on undocumented 409 // Creates a copy of the current process token for the given |session_id| so 426 PLOG(ERROR) << "Failed to impersonate the privileged token"; 430 // Change the session ID of the token [all...] |
H A D | unprivileged_process_delegate.cc | 74 // Creates a token with limited access that will be used to run the worker 77 // Create a token representing LocalService account. 83 ScopedHandle token(temp_handle); 86 if (restricted_token.Init(token.Get()) != ERROR_SUCCESS) 89 // Remove all privileges in the token. 101 // Return the resulting token. 238 // Create a restricted token that will be used to run the worker process. 239 ScopedHandle token; local 240 if (!CreateRestrictedToken(&token)) { 241 PLOG(ERROR) << "Failed to create a restricted LocalService token"; [all...] |
/external/chromium_org/remoting/webapp/ |
H A D | wcs_sandbox_container.js | 80 * Refreshes access token and starts a timer to update it periodically. 106 * @param {string} token The access token. 109 remoting.WcsSandboxContainer.prototype.setAccessToken_ = function(token) { 112 'token': token
|
/external/chromium_org/sandbox/win/src/ |
H A D | process_thread_interception.cc | 175 ACCESS_MASK desired_access, PHANDLE token) { 176 NTSTATUS status = orig_OpenProcessToken(process, desired_access, token); 187 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) 206 *token = answer.handle; 219 ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) { 221 handle_attributes, token); 232 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) 251 *token = answer.handle; 173 TargetNtOpenProcessToken( NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process, ACCESS_MASK desired_access, PHANDLE token) argument 217 TargetNtOpenProcessTokenEx( NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process, ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) argument
|
H A D | restricted_token_utils.cc | 30 restricted_token.Init(NULL); // Initialized with the current process token 84 // This token has to be able to create objects in BNO. 86 // in the token to achieve this. You should also set the process to be 161 // Create the primary (restricted) token for the process 172 // Create the impersonation token (restricted) to be able to start the 210 // Change the token of the main thread of the new process for the 211 // impersonation token with more rights. 298 DWORD SetTokenIntegrityLevel(HANDLE token, IntegrityLevel integrity_level) { argument 317 BOOL result = ::SetTokenInformation(token, TokenIntegrityLevel, &label, 340 base::win::ScopedHandle token(token_handl [all...] |
/external/chromium_org/sync/android/java/src/org/chromium/sync/signin/ |
H A D | AccountManagerHelper.java | 56 * Invoked on the UI thread once a token has been provided by the AccountManager. 57 * @param token Auth token, or null if no token is available (bad credentials, 60 void tokenAvailable(String token); argument 157 * Gets the auth token synchronously. 171 * Gets the auth token and returns the response asynchronously. 172 * This should be called when we have a foreground activity that needs an auth token. 216 // Gets the auth token synchronously 234 Log.w(TAG, "Auth token [all...] |
/external/chromium_org/sync/internal_api/public/util/ |
H A D | immutable_unittest.cc | 21 // Helper class that keeps track of the token passed in at 22 // construction and how many times that token is copied. 25 explicit TokenCore(const char* token) : token_(token), copy_count_(0) {} argument 48 const char kEmptyToken[] = "<empty token>"; 50 // Base class for various token classes, differing in swap behavior. 56 explicit TokenBase(const char* token) : core_(new TokenCore(token)) {} argument 154 void RunTokenTest(const char* token, bool expect_copies) { argument 155 SCOPED_TRACE(token); 192 RunTokenContainerTest(const char* token) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/ |
H A D | WindowProxy.cpp | 165 // has a security token which is the domain. The outer window cannot 373 String token; local 374 // We stick with an empty token if document.domain was modified or if we 381 token = origin->toString(); 383 // An empty or "null" token means we always have to call 387 // case, we use the global object as the security token to avoid 391 if (token.isEmpty() || token == "null") { 397 token = "private-script://" + token; [all...] |
/external/chromium_org/third_party/WebKit/Source/core/css/parser/ |
H A D | MediaQueryParser.cpp | 24 PassRefPtrWillBeRawPtr<MediaQuerySet> MediaQueryParser::parseMediaCondition(MediaQueryTokenIterator token, MediaQueryTokenIterator endToken) argument 26 return MediaQueryParser(MediaConditionParser).parseImpl(token, endToken); 60 void MediaQueryParser::readRestrictor(MediaQueryTokenType type, const MediaQueryToken& token) argument 62 readMediaType(type, token); 65 void MediaQueryParser::readMediaType(MediaQueryTokenType type, const MediaQueryToken& token) argument 70 if (m_state == ReadRestrictor && equalIgnoringCase(token.value(), "not")) { 72 } else if (m_state == ReadRestrictor && equalIgnoringCase(token.value(), "only")) { 75 m_mediaQueryData.setMediaType(token.value()); 83 skipUntilComma(type, token); 87 void MediaQueryParser::readAnd(MediaQueryTokenType type, const MediaQueryToken& token) argument 101 readFeatureStart(MediaQueryTokenType type, const MediaQueryToken& token) argument 109 readFeature(MediaQueryTokenType type, const MediaQueryToken& token) argument 119 readFeatureColon(MediaQueryTokenType type, const MediaQueryToken& token) argument 129 readFeatureValue(MediaQueryTokenType type, const MediaQueryToken& token) argument 139 readFeatureEnd(MediaQueryTokenType type, const MediaQueryToken& token) argument 154 skipUntilComma(MediaQueryTokenType type, const MediaQueryToken& token) argument 163 skipUntilBlockEnd(MediaQueryTokenType type, const MediaQueryToken& token) argument 169 done(MediaQueryTokenType type, const MediaQueryToken& token) argument 171 handleBlocks(const MediaQueryToken& token) argument 178 processToken(const MediaQueryToken& token) argument 191 parseImpl(MediaQueryTokenIterator token, MediaQueryTokenIterator endToken) argument 238 addParserValue(MediaQueryTokenType type, const MediaQueryToken& token) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/ |
H A D | HTMLViewSourceDocument.cpp | 95 void HTMLViewSourceDocument::addSource(const String& source, HTMLToken& token, SourceAnnotation annotation) argument 100 switch (token.type()) { 105 processDoctypeToken(source, token); 108 processEndOfFileToken(source, token); 112 processTagToken(source, token, annotation); 115 processCommentToken(source, token); 118 processCharacterToken(source, token, annotation); 137 void HTMLViewSourceDocument::processTagToken(const String& source, HTMLToken& token, SourceAnnotation annotation) argument 142 AtomicString tagName(token.name()); 145 HTMLToken::AttributeList::const_iterator iter = token [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
H A D | HTMLDocumentParser.h | 179 HTMLToken& token() { return *m_token; } function in class:blink::HTMLDocumentParser
|
H A D | HTMLTokenizer.cpp | 207 bool HTMLTokenizer::nextToken(SegmentedString& source, HTMLToken& token) argument 209 // If we have a token in progress, then we're supposed to be called back 210 // with the same token so we can finish it. 211 ASSERT(!m_token || m_token == &token || token.type() == HTMLToken::Uninitialized); 212 m_token = &token;
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
H A D | JSONParser.cpp | 63 bool parseConstToken(const CharType* start, const CharType* end, const CharType** tokenEnd, const char* token) argument 65 while (start < end && *token != '\0' && *start++ == *token++) { } 66 if (*token != '\0') 349 Token token = parseToken(start, end, &tokenStart, &tokenEnd); local 350 switch (token) { 381 token = parseToken(start, end, &tokenStart, &tokenEnd); 382 while (token != ArrayEnd) { 390 token = parseToken(start, end, &tokenStart, &tokenEnd); 391 if (token [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/UglifyJS/ |
H A D | parse-js.js | 17 function to fetch the next token. 249 function is_token(token, type, val) { 250 return token.type == type && (val == null || token.value == val); 302 function token(type, value, is_comment) { 368 return token("num", valid); 410 return token("string", ret); 424 return token("comment1", ret, true); 432 tok = token("comment2", text, true); 462 return token("regex [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/ |
H A D | parser.py | 3 import opcode, re, sys, token, tokenize namespace 101 prev_toktype = token.INDENT 112 if toktype == token.INDENT: 114 elif toktype == token.DEDENT: 116 elif toktype == token.NAME and ttext == 'class': 121 elif toktype == token.OP and ttext == ':': 124 # token so that the #pragma comment will be recognized on 128 elif toktype == token.STRING and prev_toktype == token.INDENT: 135 elif toktype == token [all...] |
/external/chromium_org/third_party/angle/src/compiler/translator/ |
H A D | ValidateLimitations.cpp | 205 const char *reason, const char *token) 209 mSink << "'" << token << "' : " << reason << "\n"; 204 error(TSourceLoc loc, const char *reason, const char *token) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | cipher_test.c | 95 char *token = *string; local 118 return token;
|
/external/chromium_org/third_party/icu/source/tools/genrb/ |
H A D | read.c | 42 struct UString *token, 45 static UChar32 getNextChar (UCHARBUF *buf, UBool skipwhite, struct UString *token, UErrorCode *status); 46 static void seekUntilNewline (UCHARBUF *buf, struct UString *token, UErrorCode *status); 47 static void seekUntilEndOfComment (UCHARBUF *buf, struct UString *token, UErrorCode *status); 55 /* Read and return the next token from the stream. If the token is of 56 type eString, fill in the token parameter with the token. If the 57 token is eError, then the status parameter will contain the 65 struct UString *token, 64 getNextToken(UCHARBUF* buf, struct UString *token, uint32_t *linenumber, struct UString *comment, UErrorCode *status) argument 118 getStringToken(UCHARBUF* buf, UChar32 initialChar, struct UString *token, UErrorCode *status) argument 319 getNextChar(UCHARBUF* buf, UBool skipwhite, struct UString *token, UErrorCode *status) argument 376 seekUntilNewline(UCHARBUF* buf, struct UString *token, UErrorCode *status) argument 394 seekUntilEndOfComment(UCHARBUF *buf, struct UString *token, UErrorCode *status) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | xmppclientsettings.h | 48 const std::string& token) { 50 auth_token_ = token; 47 set_auth_token(const std::string& mechanism, const std::string& token) argument
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/encoder/ |
H A D | tokenize.c | 111 int pt; /* near block/prev token context index */ 118 int band, rc, v, token; local 144 token = vp8_dct_value_tokens_ptr[v].Token; 145 t->Token = token; 149 ++x->coef_counts [1] [0] [pt] [token]; 150 pt = vp8_prev_token_class[token]; 161 token = vp8_dct_value_tokens_ptr[v].Token; 163 t->Token = token; 168 ++x->coef_counts [1] [band] [pt] [token]; 170 pt = vp8_prev_token_class[token]; 204 int token; local [all...] |