/dovecot/src/lib-fts/ |
H A D | fts-filter-common.c | 11 void fts_filter_truncate_token(string_t *token, size_t max_length) argument 13 if (str_len(token) <= max_length) 17 fts_tokenizer_delete_trailing_partial_char(token->data, &len); 18 str_truncate(token, len);
|
H A D | fts-filter-common.h | 4 void fts_filter_truncate_token(string_t *token, size_t max_length);
|
H A D | fts-filter-contractions.c | 29 filter->token = str_new(default_pool, 64); 41 const char *token = *_token; local 43 switch (token[pos]) { 46 if (token[pos] == '\0' || token[pos] != 'u') 58 if (token[pos] == '\0') 60 char_size = uni_utf8_get_char(token + pos, &apostrophe); 63 *_token = token + pos; 65 if (token[pos] == '\0') /* nothing left */
|
H A D | fts-filter-english-possessive.c | 23 const char **token, 26 size_t len = strlen(*token); 29 if (len > 1 && ((*token)[len-1] == 's' || (*token)[len-1] == 'S')) { 31 c = get_ending_utf8_char(*token, &len); 33 *token = t_strndup(*token, len); 22 fts_filter_english_possessive_filter(struct fts_filter *filter ATTR_UNUSED, const char **token, const char **error_r ATTR_UNUSED) argument
|
H A D | fts-filter-lowercase.c | 39 filter->token = str_new(default_pool, 64); 48 const char **token, 52 str_truncate(filter->token, 0); 53 fts_icu_lcase(filter->token, *token); 54 fts_filter_truncate_token(filter->token, filter->max_length); 55 *token = str_c(filter->token); 57 *token = t_str_lcase(*token); 47 fts_filter_lowercase_filter(struct fts_filter *filter ATTR_UNUSED, const char **token, const char **error_r ATTR_UNUSED) argument [all...] |
H A D | fts-filter-private.h | 20 int (*filter)(struct fts_filter *filter, const char **token, 30 string_t *token; member in struct:fts_filter
|
H A D | test-fts-tokenizer.c | 82 const char *token, *error; local 88 while (fts_tokenizer_next(tok, input, input_len, &token, &error) > 0) { 89 test_assert_strcmp(token, expected_output[outi]); 92 while (fts_tokenizer_next(tok, NULL, 0, &token, &error) > 0) { 93 test_assert_strcmp(token, expected_output[outi]); 102 while (fts_tokenizer_next(tok, input+i, char_len, &token, &error) > 0) { 103 test_assert_strcmp(token, expected_output[outi]); 107 while (fts_tokenizer_final(tok, &token, &error) > 0) { 108 test_assert_strcmp(token, expected_output[outi]); 119 while (fts_tokenizer_next(tok, input+i, char_len, &token, 393 const char *token, *error; local 462 const char *token, *error; local 483 const char *token, *error; local [all...] |
H A D | test-fts-filter.c | 73 const char *token; local 81 token = tests[i].input; 82 ret = fts_filter_filter(filter, &token, &error); 85 test_assert_idx(strcmp(token, tests[i].output) == 0, i); 87 test_assert_idx(token == NULL && tests[i].output == NULL, i); 105 const char *token; local 112 token = tests[i].input; 113 test_assert_idx(fts_filter_filter(filter, &token, &error) > 0 && 114 strcmp(token, tests[i].output) == 0, 0); 133 const char *token; local 161 const char *token; local 190 const char *token; local 231 const char *token; local 291 const char *token; local 339 const char *token; local 369 const char *error = NULL, *token = "foobar"; local 384 const char *error = NULL, *token = "foobar"; local 401 const char *token = NULL; local 436 const char *token = NULL; local 468 const char *token = NULL; local 530 const char *token = NULL; local 563 const char *token = NULL; local 644 const char *token = empty_tokens[i]; local 656 const char *token, *error; local 689 const char *error = NULL, *token = "foo"; local 706 const char *token = "\\xe4\\x95\\x91\\x25\\xe2\\x94\\xad\\xe1\\x90\\xad\\xee\\x94\\x81\\xe2\\x8e\\x9e" local 739 const char *token = "abcdefghi\\xC3\\x85"; local 762 const char *token = NULL; local 814 const char *token = NULL; local 876 const char *token = NULL; local 960 const char *token = NULL; local [all...] |
H A D | fts-filter.c | 113 str_free(&fp->token); 118 int fts_filter_filter(struct fts_filter *filter, const char **token, argument 123 i_assert((*token)[0] != '\0'); 127 ret = fts_filter_filter(filter->parent, token, error_r); 129 /* Parent returned token or no parent. */ 131 ret = filter->v.filter(filter, token, error_r); 134 *token = NULL; 136 i_assert(*token != NULL); 137 i_assert((*token)[0] != '\0');
|
H A D | fts-filter-stemmer-snowball.c | 71 const char **token, const char **error_r) 82 base = sb_stemmer_stem(sp->stemmer, (const unsigned char *)*token, strlen(*token)); 88 "Out of memory", strlen(*token)); 90 *token = t_strndup(base, sb_stemmer_length(sp->stemmer)); 112 const char **token ATTR_UNUSED, 70 fts_filter_stemmer_snowball_filter(struct fts_filter *filter, const char **token, const char **error_r) argument
|
H A D | fts-tokenizer-generic.c | 88 tok->token = buffer_create_dynamic(default_pool, 64); 100 buffer_free(&tok->token); 108 const unsigned char *data = tok->token->data; 109 size_t len = tok->token->used; 114 apostrophe, because otherwise the token would have already 117 token - a truncated token may end with apostrophe. */ 128 t_strndup(tok->token->data, len); 129 buffer_set_used_size(tok->token, 0); 184 buffer_set_used_size(tok->token, [all...] |
H A D | fts-filter-normalizer-icu.c | 77 fts_filter_normalizer_icu_filter(struct fts_filter *filter, const char **token, argument 89 fts_icu_utf8_to_utf16(&np->utf16_token, *token); 104 *token = str_c(np->utf8_token); 122 const char **token ATTR_UNUSED,
|
H A D | fts-filter.h | 64 /* Returns 1 if token is returned in *token, 0 if token was filtered 65 out (*token is also set to NULL) and -1 on error. 66 Input is also given via *token. 68 int fts_filter_filter(struct fts_filter *filter, const char **token,
|
H A D | fts-tokenizer-generic-private.h | 52 buffer_t *token; member in struct:generic_fts_tokenizer
|
/dovecot/src/auth/ |
H A D | db-oauth2.h | 21 /* token to use */ 22 const char *token; member in struct:db_oauth2_request 38 void db_oauth2_lookup(struct db_oauth2 *db, struct db_oauth2_request *req, const char *token, struct auth_request *request, db_oauth2_lookup_callback_t *callback, void *context); 39 #define db_oauth2_lookup(db, req, token, request, callback, context) \ 40 db_oauth2_lookup(db, req, token + \
|
H A D | mech-winbind.c | 166 const char **token; local 203 token = t_strsplit_spaces(answer, " "); 204 if (token[0] == NULL || 205 (token[1] == NULL && strcmp(token[0], "BH") != 0) || 206 (gss_spnego && (token[1] == NULL || token[2] == NULL))) { 231 if (strcmp(token[0], "TT") == 0) { 234 buf = t_base64_decode_str(token[1]); 239 } else if (strcmp(token[ [all...] |
H A D | mech-oauth2.c | 56 /* we could get new token after this */ 82 user=Username^Aauth=Bearer token^A^A 92 /* Specification says that client is sent "invalid token" challenge 102 const char *token = NULL; local 122 token = value+7; 133 if (user_given && token != NULL) 134 auth_request_verify_plain(request, token, 137 auth_request_log_info(request, AUTH_SUBSYS_MECH, "Username or token missing"); 143 gs2flag,a=username,^Afield=...^Afield=...^Aauth=Bearer token^A^A 165 const char *token local [all...] |
/dovecot/src/plugins/fts-lucene/ |
H A D | Snowball.cc | 112 Token* SnowballFilter::next(Token* token){ argument 113 if (input->next(token) == NULL) 117 unsigned int len = I_MIN(LUCENE_MAX_WORD_LEN, token->termLength()); 122 uni_ucs4_to_utf8((const unichar_t *)token->termBuffer(), len, &buf); 135 token->set(tchartext,token->startOffset(), token->endOffset(), token->type()); 145 token->set(tchartext,token [all...] |
H A D | SnowballFilter.h | 38 Token* next(Token* token);
|
/dovecot/src/lib-oauth2/ |
H A D | oauth2.c | 17 const char *token, *error; local 22 while((ret = json_parse_next(req->parser, &type, &token)) > 0) { 27 req->field_name = p_strdup(req->pool, token); 39 field->value = p_strdup(req->pool, token); 86 bool oauth2_valid_token(const char *token) argument 88 if (token == NULL || *token == '\0' || strpbrk(token, "\r\n") != NULL)
|
H A D | oauth2-introspect.c | 76 i_assert(oauth2_valid_token(input->token)); 93 http_url_escape_param(enc, input->token); 109 /* add token */ 110 enc = t_str_new(strlen(input->token)+6); 111 str_append(enc, "token="); 112 http_url_escape_param(enc, input->token); 128 input->token));
|
/dovecot/src/plugins/apparmor/ |
H A D | apparmor-plugin.c | 27 unsigned long token; member in struct:apparmor_mail_user 55 if (aa_change_hat(NULL, auser->token)<0) 89 /* generate a magic token */ 90 random_fill(&auser->token, sizeof(auser->token)); 93 if (aa_change_hatv(array_idx_modifiable(&hats, 0), auser->token) < 0) {
|
/dovecot/src/lib-imap/ |
H A D | imap-url.h | 69 const unsigned char *token, size_t token_len);
|
/dovecot/src/plugins/fts/ |
H A D | fts-search-args.c | 60 const char *orig_token, const char *token, 72 array_append(&tokens, &token, 1); 76 token2 = t_strdup(token); 82 *error_r = t_strdup_printf("Couldn't filter search token: %s", error); 85 /* The filter dropped the token, which means it was 108 const char *token, *error; local 112 a parent AND and place all the filtered token alternatives under 124 orig_token_len, &token, &error)) > 0) { 127 token, error_r) < 0) 131 (ret = fts_tokenizer_final(user_lang->search_tokenizer, &token, 56 fts_backend_dovecot_expand_tokens(struct fts_filter *filter, pool_t pool, struct mail_search_arg *parent_arg, const struct mail_search_arg *orig_arg, const char *orig_token, const char *token, const char **error_r) argument [all...] |
/dovecot/src/lib-imap-urlauth/ |
H A D | imap-urlauth.c | 89 unsigned char *token; local 91 token = t_new(unsigned char, SHA1_RESULTLEN + 1); 92 token[0] = IMAP_URLAUTH_MECH_INTERNAL_VERSION; 96 hmac_final(&hmac, token+1); 99 return token; 105 const unsigned char *token, size_t token_len) 110 if (rumpurl == NULL || token == NULL) 118 return memcmp(token, valtoken, valtoken_len) == 0; 254 const unsigned char *token; local 320 token 103 imap_urlauth_internal_verify(const char *rumpurl, const unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN], const unsigned char *token, size_t token_len) argument [all...] |