/external/mesa3d/src/glsl/builtins/profiles/ |
110.vert | 7 * "The built-ins suffixed with "Lod" are only allowed in a vertex shader."
|
/external/mp4parser/isoparser/src/main/java/com/coremedia/iso/boxes/apple/ |
AppleMeanBox.java | 10 * Apple Meaning box. Allowed as subbox of "----" box.
|
AppleNameBox.java | 10 * Apple Name box. Allowed as subbox of "----" box.
|
/external/qemu/distrib/sdl-1.2.15/docs/man3/ |
SDL_ResizeEvent.3 | 24 When \fBSDL_RESIZABLE\fP is passed as a \fBflag\fR to \fI\fBSDL_SetVideoMode\fP\fR the user is allowed to resize the applications window\&. When the window is resized an \fBSDL_VIDEORESIZE\fP is report, with the new window width and height values stored in \fBw\fR and \fBh\fR, respectively\&. When an \fBSDL_VIDEORESIZE\fP is received the window should be resized to the new dimensions using \fI\fBSDL_SetVideoMode\fP\fR\&.
|
/external/skia/tests/ |
BitmapTest.cpp | 18 // Zero-sized bitmaps are allowed
|
/external/valgrind/main/drd/tests/ |
memory_allocation.c | 27 * allowed by POSIX.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
mempolicy.h | 22 #define MPOL_F_MEMS_ALLOWED (1<<2) /* return allowed memories */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
mempolicy.h | 22 #define MPOL_F_MEMS_ALLOWED (1<<2) /* return allowed memories */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
mempolicy.h | 22 #define MPOL_F_MEMS_ALLOWED (1<<2) /* return allowed memories */
|
/external/clang/test/SemaCXX/ |
reinterpret-cast.cpp | 12 // T->T is allowed per [expr.reinterpret.cast]p2 so long as it doesn't 21 // T*->T* is allowed 29 (void)reinterpret_cast<structure>(s); // expected-error {{reinterpret_cast from 'structure' to 'structure' is not allowed}} 32 (void)reinterpret_cast<float>(f); // expected-error {{reinterpret_cast from 'float' to 'float' is not allowed}} 99 (void)reinterpret_cast<void (structure::*)()>(psi); // expected-error {{reinterpret_cast from 'const int structure::*' to 'void (structure::*)()' is not allowed}} 100 (void)reinterpret_cast<int structure::*>(psf); // expected-error {{reinterpret_cast from 'void (structure::*)()' to 'int structure::*' is not allowed}} 104 (void)reinterpret_cast<void (structure::*)()>(0); // expected-error {{reinterpret_cast from 'int' to 'void (structure::*)()' is not allowed}} 105 (void)reinterpret_cast<int structure::*>(0); // expected-error {{reinterpret_cast from 'int' to 'int structure::*' is not allowed}} 128 int *y = &reinterpret_cast<int&>(x.a); // expected-error {{not allowed}} 131 float& w(v4 &a) { return reinterpret_cast<float&>(a[1]); } // expected-error {{not allowed}} [all...] |
/external/jsilver/src/com/google/clearsilver/jsilver/data/ |
DefaultDataContext.java | 27 * names, with no '.' allowed. We use this to limit our search in the stack for the first occurence 281 throw new UnsupportedOperationException("Not allowed on local variables."); 317 throw new UnsupportedOperationException("Not allowed on local variables."); 333 throw new UnsupportedOperationException("Not allowed on local variables."); 337 throw new UnsupportedOperationException("Not allowed on local variables."); 341 throw new UnsupportedOperationException("Not allowed on local variables."); 345 throw new UnsupportedOperationException("Not allowed on local variables."); 349 throw new UnsupportedOperationException("Not allowed on local variables."); 357 throw new UnsupportedOperationException("Not allowed on local variables."); 361 throw new UnsupportedOperationException("Not allowed on local variables.") [all...] |
/external/openssh/ |
auth-rsa.c | 168 int allowed = 0; local 248 /* break out, this key is allowed */ 249 allowed = 1; 256 /* return key if allowed */ 257 if (allowed && rkey != NULL) 262 return allowed; 267 * return key if login is allowed, NULL otherwise 274 u_int i, allowed = 0; local 278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey) [all...] |
/external/srtp/googlepatches/ |
vidyo-4-srtp-rtx.patch | 10 + * are allowed. (Note that such repeated 112 + "# tx rtx allowed:%s\r\n", 132 + "# tx rtx allowed:%s\r\n", 158 + 0, /* retransmission not allowed */ 166 + 0, /* retransmission not allowed */ 174 + 0, /* retransmission not allowed */ 182 + 0, /* retransmission not allowed */ 190 + 0, /* retransmission not allowed */ 198 + 0, /* retransmission not allowed */ 206 + 0, /* retransmission not allowed */ [all...] |
/external/chromium/chrome/browser/download/ |
download_request_limiter.h | 22 // should be allowed or not. It is designed to keep pages from downloading 27 // be allowed or denied. 33 // . The first time CanDownloadOnIOThread is invoked the download is allowed and 39 // is prompted as to whether the download is allowed or disallowed. The users 41 // the user allowed the download, multiple downloads are allowed without any 92 // Number of "ALLOWED" downloads. 137 // Notifies the callbacks as to whether the download is allowed or not.
|
/external/chromium/chrome/browser/extensions/ |
browser_action_test_util.h | 61 // Returns the minimum allowed size of an extension popup. 64 // Returns the maximum allowed size of an extension popup.
|
/external/chromium/chrome/browser/geolocation/ |
geolocation_settings_state.h | 30 void OnGeolocationPermissionSet(const GURL& requesting_origin, bool allowed); 44 // There's at least one entry with ALLOWED setting.
|
/external/chromium/chrome/browser/notifications/ |
notifications_prefs_cache_unittest.cc | 15 allowed_origins.push_back(GURL("http://allowed.com")); 37 EXPECT_EQ(cache->HasPermission(GURL("http://allowed.com")),
|
/external/chromium/chrome/browser/ui/cocoa/tab_contents/ |
web_contents_drag_source.h | 27 // A mask of the allowed drag operations. 45 // Returns a mask of the allowed drag operations.
|
/external/chromium/net/http/ |
http_auth_filter.h | 20 // allowed for a particular peer. 34 // All proxies are allowed.
|
/external/chromium_org/chrome/browser/chromeos/login/screens/ |
error_screen_actor.h | 68 virtual void AllowGuestSignin(bool allowed) = 0; 69 virtual void AllowOfflineLogin(bool allowed) = 0;
|
/external/chromium_org/chrome/browser/content_settings/ |
content_settings_usages_state.h | 35 void OnPermissionSet(const GURL& requesting_origin, bool allowed); 49 // There's at least one entry with ALLOWED setting.
|
/external/chromium_org/chrome/browser/extensions/api/content_settings/ |
content_settings_unittest.cc | 38 { "http://www.example.com/path", "Specific paths are not allowed." }, 40 "Path wildcards in file URL patterns are not allowed." },
|
/external/chromium_org/chrome/browser/extensions/ |
browser_action_test_util.h | 65 // Returns the minimum allowed size of an extension popup. 68 // Returns the maximum allowed size of an extension popup.
|
/external/chromium_org/chrome/browser/media/ |
chrome_midi_permission_context.h | 56 bool allowed); 64 bool allowed);
|
/external/chromium_org/chrome/browser/notifications/ |
desktop_notification_service_unittest.cc | 33 service_->GrantPermission(GURL("http://allowed.com")); 43 GURL("http://allowed.com")),
|