Searched refs:token (Results 1 - 25 of 33) sorted by relevance

12

/dovecot/src/lib-fts/
H A Dfts-filter-common.c11 void fts_filter_truncate_token(string_t *token, size_t max_length) argument
13 if (str_len(token) <= max_length)
17 fts_tokenizer_delete_trailing_partial_char(token->data, &len);
18 str_truncate(token, len);
H A Dfts-filter-common.h4 void fts_filter_truncate_token(string_t *token, size_t max_length);
H A Dfts-filter-contractions.c29 filter->token = str_new(default_pool, 64);
41 const char *token = *_token; local
43 switch (token[pos]) {
46 if (token[pos] == '\0' || token[pos] != 'u')
58 if (token[pos] == '\0')
60 char_size = uni_utf8_get_char(token + pos, &apostrophe);
63 *_token = token + pos;
65 if (token[pos] == '\0') /* nothing left */
H A Dfts-filter-english-possessive.c23 const char **token,
26 size_t len = strlen(*token);
29 if (len > 1 && ((*token)[len-1] == 's' || (*token)[len-1] == 'S')) {
31 c = get_ending_utf8_char(*token, &len);
33 *token = t_strndup(*token, len);
22 fts_filter_english_possessive_filter(struct fts_filter *filter ATTR_UNUSED, const char **token, const char **error_r ATTR_UNUSED) argument
H A Dfts-filter-lowercase.c39 filter->token = str_new(default_pool, 64);
48 const char **token,
52 str_truncate(filter->token, 0);
53 fts_icu_lcase(filter->token, *token);
54 fts_filter_truncate_token(filter->token, filter->max_length);
55 *token = str_c(filter->token);
57 *token = t_str_lcase(*token);
47 fts_filter_lowercase_filter(struct fts_filter *filter ATTR_UNUSED, const char **token, const char **error_r ATTR_UNUSED) argument
[all...]
H A Dfts-filter-private.h20 int (*filter)(struct fts_filter *filter, const char **token,
30 string_t *token; member in struct:fts_filter
H A Dtest-fts-tokenizer.c82 const char *token, *error; local
88 while (fts_tokenizer_next(tok, input, input_len, &token, &error) > 0) {
89 test_assert_strcmp(token, expected_output[outi]);
92 while (fts_tokenizer_next(tok, NULL, 0, &token, &error) > 0) {
93 test_assert_strcmp(token, expected_output[outi]);
102 while (fts_tokenizer_next(tok, input+i, char_len, &token, &error) > 0) {
103 test_assert_strcmp(token, expected_output[outi]);
107 while (fts_tokenizer_final(tok, &token, &error) > 0) {
108 test_assert_strcmp(token, expected_output[outi]);
119 while (fts_tokenizer_next(tok, input+i, char_len, &token,
393 const char *token, *error; local
462 const char *token, *error; local
483 const char *token, *error; local
[all...]
H A Dtest-fts-filter.c73 const char *token; local
81 token = tests[i].input;
82 ret = fts_filter_filter(filter, &token, &error);
85 test_assert_idx(strcmp(token, tests[i].output) == 0, i);
87 test_assert_idx(token == NULL && tests[i].output == NULL, i);
105 const char *token; local
112 token = tests[i].input;
113 test_assert_idx(fts_filter_filter(filter, &token, &error) > 0 &&
114 strcmp(token, tests[i].output) == 0, 0);
133 const char *token; local
161 const char *token; local
190 const char *token; local
231 const char *token; local
291 const char *token; local
339 const char *token; local
369 const char *error = NULL, *token = "foobar"; local
384 const char *error = NULL, *token = "foobar"; local
401 const char *token = NULL; local
436 const char *token = NULL; local
468 const char *token = NULL; local
530 const char *token = NULL; local
563 const char *token = NULL; local
644 const char *token = empty_tokens[i]; local
656 const char *token, *error; local
689 const char *error = NULL, *token = "foo"; local
706 const char *token = "\\xe4\\x95\\x91\\x25\\xe2\\x94\\xad\\xe1\\x90\\xad\\xee\\x94\\x81\\xe2\\x8e\\x9e" local
739 const char *token = "abcdefghi\\xC3\\x85"; local
762 const char *token = NULL; local
814 const char *token = NULL; local
876 const char *token = NULL; local
960 const char *token = NULL; local
[all...]
H A Dfts-filter.c113 str_free(&fp->token);
118 int fts_filter_filter(struct fts_filter *filter, const char **token, argument
123 i_assert((*token)[0] != '\0');
127 ret = fts_filter_filter(filter->parent, token, error_r);
129 /* Parent returned token or no parent. */
131 ret = filter->v.filter(filter, token, error_r);
134 *token = NULL;
136 i_assert(*token != NULL);
137 i_assert((*token)[0] != '\0');
H A Dfts-filter-stemmer-snowball.c71 const char **token, const char **error_r)
82 base = sb_stemmer_stem(sp->stemmer, (const unsigned char *)*token, strlen(*token));
88 "Out of memory", strlen(*token));
90 *token = t_strndup(base, sb_stemmer_length(sp->stemmer));
112 const char **token ATTR_UNUSED,
70 fts_filter_stemmer_snowball_filter(struct fts_filter *filter, const char **token, const char **error_r) argument
H A Dfts-tokenizer-generic.c88 tok->token = buffer_create_dynamic(default_pool, 64);
100 buffer_free(&tok->token);
108 const unsigned char *data = tok->token->data;
109 size_t len = tok->token->used;
114 apostrophe, because otherwise the token would have already
117 token - a truncated token may end with apostrophe. */
128 t_strndup(tok->token->data, len);
129 buffer_set_used_size(tok->token, 0);
184 buffer_set_used_size(tok->token,
[all...]
H A Dfts-filter-normalizer-icu.c77 fts_filter_normalizer_icu_filter(struct fts_filter *filter, const char **token, argument
89 fts_icu_utf8_to_utf16(&np->utf16_token, *token);
104 *token = str_c(np->utf8_token);
122 const char **token ATTR_UNUSED,
H A Dfts-filter.h64 /* Returns 1 if token is returned in *token, 0 if token was filtered
65 out (*token is also set to NULL) and -1 on error.
66 Input is also given via *token.
68 int fts_filter_filter(struct fts_filter *filter, const char **token,
H A Dfts-tokenizer-generic-private.h52 buffer_t *token; member in struct:generic_fts_tokenizer
/dovecot/src/auth/
H A Ddb-oauth2.h21 /* token to use */
22 const char *token; member in struct:db_oauth2_request
38 void db_oauth2_lookup(struct db_oauth2 *db, struct db_oauth2_request *req, const char *token, struct auth_request *request, db_oauth2_lookup_callback_t *callback, void *context);
39 #define db_oauth2_lookup(db, req, token, request, callback, context) \
40 db_oauth2_lookup(db, req, token + \
H A Dmech-winbind.c166 const char **token; local
203 token = t_strsplit_spaces(answer, " ");
204 if (token[0] == NULL ||
205 (token[1] == NULL && strcmp(token[0], "BH") != 0) ||
206 (gss_spnego && (token[1] == NULL || token[2] == NULL))) {
231 if (strcmp(token[0], "TT") == 0) {
234 buf = t_base64_decode_str(token[1]);
239 } else if (strcmp(token[
[all...]
H A Dmech-oauth2.c56 /* we could get new token after this */
82 user=Username^Aauth=Bearer token^A^A
92 /* Specification says that client is sent "invalid token" challenge
102 const char *token = NULL; local
122 token = value+7;
133 if (user_given && token != NULL)
134 auth_request_verify_plain(request, token,
137 auth_request_log_info(request, AUTH_SUBSYS_MECH, "Username or token missing");
143 gs2flag,a=username,^Afield=...^Afield=...^Aauth=Bearer token^A^A
165 const char *token local
[all...]
/dovecot/src/plugins/fts-lucene/
H A DSnowball.cc112 Token* SnowballFilter::next(Token* token){ argument
113 if (input->next(token) == NULL)
117 unsigned int len = I_MIN(LUCENE_MAX_WORD_LEN, token->termLength());
122 uni_ucs4_to_utf8((const unichar_t *)token->termBuffer(), len, &buf);
135 token->set(tchartext,token->startOffset(), token->endOffset(), token->type());
145 token->set(tchartext,token
[all...]
H A DSnowballFilter.h38 Token* next(Token* token);
/dovecot/src/lib-oauth2/
H A Doauth2.c17 const char *token, *error; local
22 while((ret = json_parse_next(req->parser, &type, &token)) > 0) {
27 req->field_name = p_strdup(req->pool, token);
39 field->value = p_strdup(req->pool, token);
86 bool oauth2_valid_token(const char *token) argument
88 if (token == NULL || *token == '\0' || strpbrk(token, "\r\n") != NULL)
H A Doauth2-introspect.c76 i_assert(oauth2_valid_token(input->token));
93 http_url_escape_param(enc, input->token);
109 /* add token */
110 enc = t_str_new(strlen(input->token)+6);
111 str_append(enc, "token=");
112 http_url_escape_param(enc, input->token);
128 input->token));
/dovecot/src/plugins/apparmor/
H A Dapparmor-plugin.c27 unsigned long token; member in struct:apparmor_mail_user
55 if (aa_change_hat(NULL, auser->token)<0)
89 /* generate a magic token */
90 random_fill(&auser->token, sizeof(auser->token));
93 if (aa_change_hatv(array_idx_modifiable(&hats, 0), auser->token) < 0) {
/dovecot/src/lib-imap/
H A Dimap-url.h69 const unsigned char *token, size_t token_len);
/dovecot/src/plugins/fts/
H A Dfts-search-args.c60 const char *orig_token, const char *token,
72 array_append(&tokens, &token, 1);
76 token2 = t_strdup(token);
82 *error_r = t_strdup_printf("Couldn't filter search token: %s", error);
85 /* The filter dropped the token, which means it was
108 const char *token, *error; local
112 a parent AND and place all the filtered token alternatives under
124 orig_token_len, &token, &error)) > 0) {
127 token, error_r) < 0)
131 (ret = fts_tokenizer_final(user_lang->search_tokenizer, &token,
56 fts_backend_dovecot_expand_tokens(struct fts_filter *filter, pool_t pool, struct mail_search_arg *parent_arg, const struct mail_search_arg *orig_arg, const char *orig_token, const char *token, const char **error_r) argument
[all...]
/dovecot/src/lib-imap-urlauth/
H A Dimap-urlauth.c89 unsigned char *token; local
91 token = t_new(unsigned char, SHA1_RESULTLEN + 1);
92 token[0] = IMAP_URLAUTH_MECH_INTERNAL_VERSION;
96 hmac_final(&hmac, token+1);
99 return token;
105 const unsigned char *token, size_t token_len)
110 if (rumpurl == NULL || token == NULL)
118 return memcmp(token, valtoken, valtoken_len) == 0;
254 const unsigned char *token; local
320 token
103 imap_urlauth_internal_verify(const char *rumpurl, const unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN], const unsigned char *token, size_t token_len) argument
[all...]

Completed in 28 milliseconds

12