Searched refs:token (Results 1 – 8 of 8) sorted by relevance
420 let (kernel_image, token) = self.lvb_inner( in load_verify_boot()429 self.kernel_jump(kernel_image, ramdisk, dtb, token) in load_verify_boot()532 let token = slot_cursor.ctx.mark_boot_attempt().map_err(|_| Error::OperationProhibited)?; in lvb_inner() localVariable534 Ok((kernel_image, token)) in lvb_inner()
66 %token AND OR SUBSTR SUPERSTR EQ NE IF THEN ELSE ENDIF67 %token <str> STRING BAD
411 String token = text.substring(start, end); in wrapText() local412 int tokenWidth = metrics.stringWidth(token); in wrapText()414 if (token.contains(ANDROID_STRING) in wrapText()425 line.append(token); in wrapText()
341 let token = self.take_boot_token().ok_or(Error::OperationProhibited)?; in mark_boot_attempt() localVariable342 Ok(token) in mark_boot_attempt()345 let token = self.take_boot_token().ok_or(Error::OperationProhibited)?; in mark_boot_attempt() localVariable346 Ok(token) in mark_boot_attempt()
235 let token = self.take_boot_token().ok_or(Error::OperationProhibited)?; in mark_boot_attempt() localVariable236 Ok(token) in mark_boot_attempt()239 let token = self.take_boot_token().ok_or(Error::OperationProhibited)?; in mark_boot_attempt() localVariable240 Ok(token) in mark_boot_attempt()
107 const std::string& token = tokens[pos++]; in ParseTargetInfoAndSourceInfo() local109 if (!android::base::ParseUint(token, &src_blocks)) { in ParseTargetInfoAndSourceInfo()110 *err = "invalid src_block_count \""s + token + "\""; in ParseTargetInfoAndSourceInfo()
999 const std::string& token = params.tokens[params.cpos++]; in LoadSourceBlocks() local1000 if (!android::base::ParseUint(token, src_blocks)) { in LoadSourceBlocks()1001 LOG(ERROR) << "invalid src_block_count \"" << token << "\""; in LoadSourceBlocks()
108 e.g. `Authorization` header to contain valid auth token. While performing