Searched refs:specifier (Results 1 - 25 of 54) sorted by relevance

123

/external/guava/guava/src/com/google/common/net/
H A DHostSpecifier.java28 * A syntactically valid host specifier, suitable for use in a URI.
38 * methods. No attempt is made to verify that a provided specifier corresponds
61 * Returns a {@code HostSpecifier} built from the provided {@code specifier},
62 * which is already known to be valid. If the {@code specifier} might be
65 * <p>The specifier must be in one of these formats:
73 * @throws IllegalArgumentException if the specifier is not valid.
75 public static HostSpecifier fromValid(String specifier) { argument
78 final HostAndPort parsedHost = HostAndPort.fromString(specifier);
82 // Try to interpret the specifier as an IP address. Note we build
113 * {@link #fromValid(String)} for a specifier tha
118 from(String specifier) argument
139 isValid(String specifier) argument
[all...]
/external/libcxx/test/re/re.def/defns.regex.format.specifier/
H A DAndroid.mk17 test_makefile := external/libcxx/test/re/re.def/defns.regex.format.specifier/Android.mk
19 test_name := re/re.def/defns.regex.format.specifier/nothing_to_do
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_gpsk_common.h41 u8 specifier[2]; member in struct:eap_gpsk_csuite
48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier);
50 int specifier,
57 int specifier,
62 size_t eap_gpsk_mic_len(int vendor, int specifier);
64 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_gpsk_common.c21 * @specifier: CSuite/Specifier
24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument
27 specifier == EAP_GPSK_CIPHER_AES)
31 specifier == EAP_GPSK_CIPHER_SHA256)
263 * @specifier: CSuite/Specifier
279 int specifier,
290 vendor, specifier);
316 switch (specifier) {
331 "key derivation", vendor, specifier);
404 * @specifier
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
481 eap_gpsk_mic_len(int vendor, int specifier) argument
523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_gpsk_common.h41 u8 specifier[2]; member in struct:eap_gpsk_csuite
48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier);
50 int specifier,
57 int specifier,
62 size_t eap_gpsk_mic_len(int vendor, int specifier);
64 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_gpsk_common.c21 * @specifier: CSuite/Specifier
24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument
27 specifier == EAP_GPSK_CIPHER_AES)
31 specifier == EAP_GPSK_CIPHER_SHA256)
263 * @specifier: CSuite/Specifier
279 int specifier,
290 vendor, specifier);
316 switch (specifier) {
331 "key derivation", vendor, specifier);
404 * @specifier
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
481 eap_gpsk_mic_len(int vendor, int specifier) argument
523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_gpsk_common.h41 u8 specifier[2]; member in struct:eap_gpsk_csuite
48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier);
50 int specifier,
57 int specifier,
62 size_t eap_gpsk_mic_len(int vendor, int specifier);
64 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_gpsk_common.c21 * @specifier: CSuite/Specifier
24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument
27 specifier == EAP_GPSK_CIPHER_AES)
31 specifier == EAP_GPSK_CIPHER_SHA256)
263 * @specifier: CSuite/Specifier
279 int specifier,
290 vendor, specifier);
316 switch (specifier) {
331 "key derivation", vendor, specifier);
404 * @specifier
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
481 eap_gpsk_mic_len(int vendor, int specifier) argument
523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
[all...]
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/models/
H A Dtest_configuration.py74 for category, specifier in test_configuration.items():
75 self.add_specifier(category, specifier)
79 def add_specifier(self, category, specifier):
80 self._specifier_to_category[specifier] = category
93 def specifier_priority(self, specifier):
94 return self.category_priority(self._specifier_to_category[specifier])
96 def category_for_specifier(self, specifier):
97 return self._specifier_to_category.get(specifier)
101 for specifier in specifiers:
102 category_slots[self.specifier_priority(specifier)]
[all...]
H A Dtest_expectations.py41 # Test expectation and specifier constants.
86 MISSING_BUG_WARNING = 'Test lacks BUG specifier.'
149 parsed_specifiers = set([specifier.lower() for specifier in expectation_line.specifiers])
504 for specifier in specifiers:
506 specifier = specifier.upper()
507 new_specifiers.append(TestExpectationParser._inverted_configuration_tokens.get(specifier, specifier))
/external/clang/test/CXX/temp/
H A Dp3.cpp15 expected-error {{requires a type specifier}}
/external/clang/test/CXX/temp/temp.res/temp.local/
H A Dp3.cpp28 expected-error{{requires a type specifier}}
/external/clang/test/Sema/
H A Dinvalid-struct-init.c5 _efree((p)); // expected-error{{type name requires a specifier or qualifier}} \
6 expected-warning {{type specifier missing, defaults to 'int'}}
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gpsk.c33 int specifier; /* CSuite/Specifier */ member in struct:eap_gpsk_data
205 data->specifier = EAP_GPSK_CIPHER_RESERVED;
208 int vendor, specifier; local
210 specifier = WPA_GET_BE16(csuite->specifier);
212 i, vendor, specifier);
214 data->specifier == EAP_GPSK_CIPHER_RESERVED &&
215 eap_gpsk_supported_ciphersuite(vendor, specifier) &&
216 (!data->forced_cipher || data->forced_cipher == specifier))
219 data->specifier
494 int vendor, specifier; local
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gpsk.c33 int specifier; /* CSuite/Specifier */ member in struct:eap_gpsk_data
205 data->specifier = EAP_GPSK_CIPHER_RESERVED;
208 int vendor, specifier; local
210 specifier = WPA_GET_BE16(csuite->specifier);
212 i, vendor, specifier);
214 data->specifier == EAP_GPSK_CIPHER_RESERVED &&
215 eap_gpsk_supported_ciphersuite(vendor, specifier) &&
216 (!data->forced_cipher || data->forced_cipher == specifier))
219 data->specifier
494 int vendor, specifier; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c33 int specifier; /* CSuite/Specifier */ member in struct:eap_gpsk_data
205 data->specifier = EAP_GPSK_CIPHER_RESERVED;
208 int vendor, specifier; local
210 specifier = WPA_GET_BE16(csuite->specifier);
212 i, vendor, specifier);
214 data->specifier == EAP_GPSK_CIPHER_RESERVED &&
215 eap_gpsk_supported_ciphersuite(vendor, specifier) &&
216 (!data->forced_cipher || data->forced_cipher == specifier))
219 data->specifier
494 int vendor, specifier; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gpsk.c33 int specifier; /* CSuite/Specifier */ member in struct:eap_gpsk_data
77 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
85 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
152 miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
173 WPA_PUT_BE16(csuite->specifier, data->specifier);
180 data->specifier, start, pos - start, pos) < 0)
373 WPA_GET_BE16(csuite->specifier));
378 data->specifier = WPA_GET_BE16(csuite->specifier);
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gpsk.c33 int specifier; /* CSuite/Specifier */ member in struct:eap_gpsk_data
77 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
85 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
152 miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
173 WPA_PUT_BE16(csuite->specifier, data->specifier);
180 data->specifier, start, pos - start, pos) < 0)
373 WPA_GET_BE16(csuite->specifier));
378 data->specifier = WPA_GET_BE16(csuite->specifier);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gpsk.c33 int specifier; /* CSuite/Specifier */ member in struct:eap_gpsk_data
77 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
85 WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
152 miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
173 WPA_PUT_BE16(csuite->specifier, data->specifier);
180 data->specifier, start, pos - start, pos) < 0)
373 WPA_GET_BE16(csuite->specifier));
378 data->specifier = WPA_GET_BE16(csuite->specifier);
[all...]
/external/guava/guava-tests/test/com/google/common/net/
H A DHostSpecifierTest.java86 private static HostSpecifier spec(String specifier) { argument
87 return HostSpecifier.fromValid(specifier);
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common_interceptors_format.inc68 // Returns true if the character is an integer conversion specifier.
73 // Returns true if the character is an floating point conversion specifier.
103 // Invalid conversion specifier.
218 // Conversion specifier.
327 Report("WARNING: unexpected format specifier in scanf interceptor: "
428 // Conversion specifier.
523 Report("WARNING: unexpected format specifier in printf "
/external/clang/test/SemaTemplate/
H A Dtemp_arg_template.cpp38 expected-error{{C++ requires a type specifier for all declarations}}
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/common/
H A Dutilities.js928 function addSpecifierToken(specifier, precision, substitutionIndex)
930 tokens.push({ type: "specifier", specifier: specifier, precision: precision, substitutionIndex: substitutionIndex });
961 // This is a precision specifier. If no digit follows the ".",
1069 if (token.type !== "specifier") {
1076 // just output the format specifier literally and move on.
1078 result = append(result, "%" + (token.precision > -1 ? token.precision : "") + token.specifier);
1084 if (!(token.specifier in formatters)) {
1086 warn("unsupported format character \u201C" + token.specifier
[all...]
/external/chromium_org/chromeos/network/
H A Dnetwork_state_handler.cc792 std::string specifier = network->GetSpecifier(); local
793 DCHECK(!specifier.empty());
800 specifier_guid_map_.erase(specifier);
802 specifier_guid_map_[specifier] = network->guid();
807 SpecifierGuidMap::iterator iter = specifier_guid_map_.find(specifier);
812 specifier_guid_map_[specifier] = guid;
/external/lldb/include/lldb/Target/
H A DTarget.h1019 // Set the specifier. The stop hook will own the specifier, and is responsible for deleting it when we're done.
1021 SetSpecifier (SymbolContextSpecifier *specifier) argument
1023 m_specifier_sp.reset (specifier);
1032 // Set the Thread Specifier. The stop hook will own the thread specifier, and is responsible for deleting it when we're done.
1034 SetThreadSpecifier (ThreadSpec *specifier);
1065 // and SetSpecifier to set the specifier shared pointer (can be null, that will match anything.)

Completed in 3255 milliseconds

123