HomeSort by relevance Sort by last modified time
    Searched full:programs (Results 326 - 350 of 2561) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface.h 60 * programs.
84 * processing to allow control interface programs to attach with
97 * external programs.
  /ndk/sources/host-tools/sed-4.2.1/lib/
stdbool.in.h 27 Programs that use <stdbool.h> should be aware of some limitations
37 - Programs should not undefine the macros bool, true, and false,
55 Also, it is suggested that programs use 'bool' rather than '_Bool';
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/
sysexits.h 36 * SYSEXITS.H -- Exit status codes for system programs.
39 * exit statuses for system programs, notably delivermail
43 * clashing with other exit statuses that random programs may
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/
sysexits.h 36 * SYSEXITS.H -- Exit status codes for system programs.
39 * exit statuses for system programs, notably delivermail
43 * clashing with other exit statuses that random programs may
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/
sysexits.h 36 * SYSEXITS.H -- Exit status codes for system programs.
39 * exit statuses for system programs, notably delivermail
43 * clashing with other exit statuses that random programs may
  /cts/tests/tests/security/src/android/security/cts/
ListeningPortsTest.java 87 * installed programs to gain unauthorized access to program data or
103 * installed programs to gain unauthorized access to program data or
119 * installed programs to gain unauthorized access to program data or
135 * installed programs to gain unauthorized access to program data or
177 * malicious locally installed programs to gain unauthorized access to
  /external/e2fsprogs/debian/
control.in 148 The blkid library which allows system programs like fsck and
161 The blkid library which allows system programs like fsck and
175 The blkid library which allows system programs like fsck and
209 that directly accesses extended file systems. Programs that use libext2fs
210 include e2fsck, mke2fs, and tune2fs. Programs that use libe2p include
245 This package contains programs for creating, checking, and maintaining
266 uuid runtime programs, contained in the uuid-runtime package.
  /prebuilts/gcc/darwin-x86/arm/arm-eabi-4.6/share/info/
standards.info 46 * Program Behavior:: Program behavior for all programs
48 * Documentation:: Documenting programs.
63 guide to writing portable, robust and reliable programs. It focuses on
64 programs written in C, but many of the rules and principles are useful
123 * Reading Non-Free Code:: Referring to proprietary programs.
130 2.1 Referring to Proprietary Programs
134 work on GNU! (Or to any other proprietary programs.)
153 Or go for generality. For example, Unix programs often have static
207 We have more detailed advice for maintainers of programs; if you have
228 naming or labeling our own programs or activities. For example, sinc
    [all...]
  /prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.6/share/info/
standards.info 46 * Program Behavior:: Program behavior for all programs
48 * Documentation:: Documenting programs.
63 guide to writing portable, robust and reliable programs. It focuses on
64 programs written in C, but many of the rules and principles are useful
123 * Reading Non-Free Code:: Referring to proprietary programs.
130 2.1 Referring to Proprietary Programs
134 work on GNU! (Or to any other proprietary programs.)
153 Or go for generality. For example, Unix programs often have static
207 We have more detailed advice for maintainers of programs; if you have
228 naming or labeling our own programs or activities. For example, sinc
    [all...]
  /prebuilts/gcc/linux-x86/arm/arm-eabi-4.6/share/info/
standards.info 46 * Program Behavior:: Program behavior for all programs
48 * Documentation:: Documenting programs.
63 guide to writing portable, robust and reliable programs. It focuses on
64 programs written in C, but many of the rules and principles are useful
123 * Reading Non-Free Code:: Referring to proprietary programs.
130 2.1 Referring to Proprietary Programs
134 work on GNU! (Or to any other proprietary programs.)
153 Or go for generality. For example, Unix programs often have static
207 We have more detailed advice for maintainers of programs; if you have
228 naming or labeling our own programs or activities. For example, sinc
    [all...]
  /prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.6/share/info/
standards.info 46 * Program Behavior:: Program behavior for all programs
48 * Documentation:: Documenting programs.
63 guide to writing portable, robust and reliable programs. It focuses on
64 programs written in C, but many of the rules and principles are useful
123 * Reading Non-Free Code:: Referring to proprietary programs.
130 2.1 Referring to Proprietary Programs
134 work on GNU! (Or to any other proprietary programs.)
153 Or go for generality. For example, Unix programs often have static
207 We have more detailed advice for maintainers of programs; if you have
228 naming or labeling our own programs or activities. For example, sinc
    [all...]
  /external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/Antlr.Runtime/
TokenRewriteStream.cs 52 * machine instruction streams (programs) operating on a single input tape. :)
178 * I'm calling these things "programs."
182 protected IDictionary<string, IList<RewriteOperation>> programs = null; field in class:Antlr.Runtime.TokenRewriteStream
192 programs = new Dictionary<string, IList<RewriteOperation>>();
193 programs[DEFAULT_PROGRAM_NAME] = new List<RewriteOperation>(PROGRAM_INIT_SIZE);
219 if (programs.TryGetValue(programName, out @is) && @is != null) {
224 programs[programName] = sublist;
350 if (!programs.TryGetValue(name, out @is) || @is == null) {
358 programs[name] = @is;
392 if (!programs.TryGetValue(programName, out rewrites)
    [all...]
  /external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/
TokenRewriteStream.cs 55 * machine instruction streams (programs) operating on a single input tape. :)
200 * I'm calling these things "programs."
204 protected IDictionary<string, IList<RewriteOperation>> programs = null; field in class:Antlr.Runtime.TokenRewriteStream
216 programs = new Dictionary<string, IList<RewriteOperation>>();
217 programs[DEFAULT_PROGRAM_NAME] = new List<RewriteOperation>( PROGRAM_INIT_SIZE );
247 if ( programs.TryGetValue( programName, out @is ) && @is != null )
253 programs[programName] = sublist;
404 if ( !programs.TryGetValue( name, out @is ) || @is == null )
414 programs[name] = @is;
455 if ( !programs.TryGetValue( programName, out rewrites )
    [all...]
  /external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/
TokenRewriteStream.java 42 * machine instruction streams (programs) operating on a single input tape. :)
159 * I'm calling these things "programs."
162 protected Map programs = null; field in class:TokenRewriteStream
172 programs = new HashMap();
173 programs.put(DEFAULT_PROGRAM_NAME, new ArrayList(PROGRAM_INIT_SIZE));
196 List is = (List)programs.get(programName);
198 programs.put(programName, is.subList(MIN_TOKEN_INDEX,instructionIndex));
321 List is = (List)programs.get(name);
330 programs.put(name, is);
362 List rewrites = (List)programs.get(programName)
    [all...]
  /ndk/sources/host-tools/make-3.81/doc/
make-stds.texi 34 describes conventions for writing the Makefiles for GNU programs.
62 Different @code{make} programs have incompatible suffix lists and
77 you need to run programs that are a part of your package during the
163 Stick to the generally supported options for these programs. For
171 and related programs, but should do so via @code{make} variables so that the
172 user can substitute alternatives. Here are some of the programs we
180 Use the following @code{make} variables to run those programs:
213 In particular, you should run most utility programs via variables.
220 don't need to replace them with other programs.
342 Executable programs are installed in one of the following directories
    [all...]
  /external/valgrind/main/drd/docs/
drd-manual.xml 20 programs. The tool works for any program that uses the POSIX threading
50 Multithreaded programs can use one or more of the following programming
99 threads primitives. DRD however does not support programs that use
100 e.g. Linux' futexes directly. Attempts to analyze such programs with
281 All programs that follow a locking discipline are data-race free, but not all
282 data-race free programs follow a locking discipline. There exist multithreaded
283 programs where access to shared data is arbitrated via condition variables,
294 multithreaded programs at runtime. The approach of the so-called Eraser
300 all classes of multithreaded programs. An important advantage of
334 most programs do not share stack variables over threads
    [all...]
  /external/bison/lib/
w32spawn.h 122 - programs that inspect GetCommandLine() and ignore argv,
123 - mingw programs that have a global variable 'int _CRT_glob = 0;',
124 - Cygwin programs, when invoked from a Cygwin program.
  /external/jpeg/
usage.doc 4 This file describes usage of the JPEG conversion programs cjpeg and djpeg,
5 as well as the utility programs jpegtran, rdjpgcom and wrjpgcom. (See
7 your own programs.)
15 These programs implement JPEG image compression and decompression. JPEG
32 We provide two programs, cjpeg to compress an image file into JPEG format,
39 The programs read the specified input file, or standard input if none is
42 programs.
51 TWO_FILE_COMMANDLINE when you compile the programs; see install.doc.)
128 other JPEG programs may be unable to decode the resulting file. Use -baseline
368 HINTS FOR BOTH PROGRAMS
    [all...]
  /external/llvm/docs/CommandGuide/
bugpoint.rst 27 run. This is useful if you are debugging programs which depend on non-LLVM
32 Append the test programs exit code to the output file so that a change in exit
80 reduce test programs. If you're trying to find a bug in one of these passes,
  /external/llvm/include/llvm/Support/
Program.h 26 /// This class provides an abstraction for programs that are executable by the
28 /// programs from the path and to execute them in various ways. The sys::Path
31 /// @brief An abstraction for finding and executing programs.
  /external/qemu/distrib/jpeg-6b/
usage.doc 4 This file describes usage of the JPEG conversion programs cjpeg and djpeg,
5 as well as the utility programs jpegtran, rdjpgcom and wrjpgcom. (See
7 your own programs.)
15 These programs implement JPEG image compression and decompression. JPEG
32 We provide two programs, cjpeg to compress an image file into JPEG format,
39 The programs read the specified input file, or standard input if none is
42 programs.
51 TWO_FILE_COMMANDLINE when you compile the programs; see install.doc.)
128 other JPEG programs may be unable to decode the resulting file. Use -baseline
368 HINTS FOR BOTH PROGRAMS
    [all...]
  /system/extras/tests/bionic/libc/
Android.mk 15 # Build control file for Bionic's test programs
16 # define the BIONIC_TESTS environment variable to build the test programs
249 # TODO: Add a variety of GLibc test programs too...
  /bionic/libc/upstream-netbsd/libc/gen/
setjmperr.c 43 * Programs that wish to exit gracefully from this error may
  /development/tools/
make_key 37 # and .pk8-creating programs, to avoid having the private key ever
  /device/ti/panda/wl12xx/
LICENCE 15 in whole or in part, the software programs that accompany this Agreement
17 programs. By installing, copying or otherwise using the Licensed
87 5. Export Control. Thesoftware programs and any "on-line" documentation as well
88 as any updates or upgrades to such software programs or documentation

Completed in 747 milliseconds

<<11121314151617181920>>