HomeSort by relevance Sort by last modified time
    Searched full:allowed (Results 351 - 375 of 7690) sorted by null

<<11121314151617181920>>

  /external/mesa3d/src/glsl/builtins/profiles/
110.vert 7 * "The built-ins suffixed with "Lod" are only allowed in a vertex shader."
  /external/mp4parser/isoparser/src/main/java/com/coremedia/iso/boxes/apple/
AppleMeanBox.java 10 * Apple Meaning box. Allowed as subbox of "----" box.
AppleNameBox.java 10 * Apple Name box. Allowed as subbox of "----" box.
  /external/qemu/distrib/sdl-1.2.15/docs/man3/
SDL_ResizeEvent.3 24 When \fBSDL_RESIZABLE\fP is passed as a \fBflag\fR to \fI\fBSDL_SetVideoMode\fP\fR the user is allowed to resize the applications window\&. When the window is resized an \fBSDL_VIDEORESIZE\fP is report, with the new window width and height values stored in \fBw\fR and \fBh\fR, respectively\&. When an \fBSDL_VIDEORESIZE\fP is received the window should be resized to the new dimensions using \fI\fBSDL_SetVideoMode\fP\fR\&.
  /external/skia/tests/
BitmapTest.cpp 18 // Zero-sized bitmaps are allowed
  /external/valgrind/main/drd/tests/
memory_allocation.c 27 * allowed by POSIX.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
mempolicy.h 22 #define MPOL_F_MEMS_ALLOWED (1<<2) /* return allowed memories */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
mempolicy.h 22 #define MPOL_F_MEMS_ALLOWED (1<<2) /* return allowed memories */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
mempolicy.h 22 #define MPOL_F_MEMS_ALLOWED (1<<2) /* return allowed memories */
  /external/clang/test/SemaCXX/
reinterpret-cast.cpp 12 // T->T is allowed per [expr.reinterpret.cast]p2 so long as it doesn't
21 // T*->T* is allowed
29 (void)reinterpret_cast<structure>(s); // expected-error {{reinterpret_cast from 'structure' to 'structure' is not allowed}}
32 (void)reinterpret_cast<float>(f); // expected-error {{reinterpret_cast from 'float' to 'float' is not allowed}}
99 (void)reinterpret_cast<void (structure::*)()>(psi); // expected-error {{reinterpret_cast from 'const int structure::*' to 'void (structure::*)()' is not allowed}}
100 (void)reinterpret_cast<int structure::*>(psf); // expected-error {{reinterpret_cast from 'void (structure::*)()' to 'int structure::*' is not allowed}}
104 (void)reinterpret_cast<void (structure::*)()>(0); // expected-error {{reinterpret_cast from 'int' to 'void (structure::*)()' is not allowed}}
105 (void)reinterpret_cast<int structure::*>(0); // expected-error {{reinterpret_cast from 'int' to 'int structure::*' is not allowed}}
128 int *y = &reinterpret_cast<int&>(x.a); // expected-error {{not allowed}}
131 float& w(v4 &a) { return reinterpret_cast<float&>(a[1]); } // expected-error {{not allowed}}
    [all...]
  /external/jsilver/src/com/google/clearsilver/jsilver/data/
DefaultDataContext.java 27 * names, with no '.' allowed. We use this to limit our search in the stack for the first occurence
281 throw new UnsupportedOperationException("Not allowed on local variables.");
317 throw new UnsupportedOperationException("Not allowed on local variables.");
333 throw new UnsupportedOperationException("Not allowed on local variables.");
337 throw new UnsupportedOperationException("Not allowed on local variables.");
341 throw new UnsupportedOperationException("Not allowed on local variables.");
345 throw new UnsupportedOperationException("Not allowed on local variables.");
349 throw new UnsupportedOperationException("Not allowed on local variables.");
357 throw new UnsupportedOperationException("Not allowed on local variables.");
361 throw new UnsupportedOperationException("Not allowed on local variables.")
    [all...]
  /external/openssh/
auth-rsa.c 168 int allowed = 0; local
248 /* break out, this key is allowed */
249 allowed = 1;
256 /* return key if allowed */
257 if (allowed && rkey != NULL)
262 return allowed;
267 * return key if login is allowed, NULL otherwise
274 u_int i, allowed = 0; local
278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) {
281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey)
    [all...]
  /external/srtp/googlepatches/
vidyo-4-srtp-rtx.patch 10 + * are allowed. (Note that such repeated
112 + "# tx rtx allowed:%s\r\n",
132 + "# tx rtx allowed:%s\r\n",
158 + 0, /* retransmission not allowed */
166 + 0, /* retransmission not allowed */
174 + 0, /* retransmission not allowed */
182 + 0, /* retransmission not allowed */
190 + 0, /* retransmission not allowed */
198 + 0, /* retransmission not allowed */
206 + 0, /* retransmission not allowed */
    [all...]
  /external/chromium/chrome/browser/download/
download_request_limiter.h 22 // should be allowed or not. It is designed to keep pages from downloading
27 // be allowed or denied.
33 // . The first time CanDownloadOnIOThread is invoked the download is allowed and
39 // is prompted as to whether the download is allowed or disallowed. The users
41 // the user allowed the download, multiple downloads are allowed without any
92 // Number of "ALLOWED" downloads.
137 // Notifies the callbacks as to whether the download is allowed or not.
  /external/chromium/chrome/browser/extensions/
browser_action_test_util.h 61 // Returns the minimum allowed size of an extension popup.
64 // Returns the maximum allowed size of an extension popup.
  /external/chromium/chrome/browser/geolocation/
geolocation_settings_state.h 30 void OnGeolocationPermissionSet(const GURL& requesting_origin, bool allowed);
44 // There's at least one entry with ALLOWED setting.
  /external/chromium/chrome/browser/notifications/
notifications_prefs_cache_unittest.cc 15 allowed_origins.push_back(GURL("http://allowed.com"));
37 EXPECT_EQ(cache->HasPermission(GURL("http://allowed.com")),
  /external/chromium/chrome/browser/ui/cocoa/tab_contents/
web_contents_drag_source.h 27 // A mask of the allowed drag operations.
45 // Returns a mask of the allowed drag operations.
  /external/chromium/net/http/
http_auth_filter.h 20 // allowed for a particular peer.
34 // All proxies are allowed.
  /external/chromium_org/chrome/browser/chromeos/login/screens/
error_screen_actor.h 68 virtual void AllowGuestSignin(bool allowed) = 0;
69 virtual void AllowOfflineLogin(bool allowed) = 0;
  /external/chromium_org/chrome/browser/content_settings/
content_settings_usages_state.h 35 void OnPermissionSet(const GURL& requesting_origin, bool allowed);
49 // There's at least one entry with ALLOWED setting.
  /external/chromium_org/chrome/browser/extensions/api/content_settings/
content_settings_unittest.cc 38 { "http://www.example.com/path", "Specific paths are not allowed." },
40 "Path wildcards in file URL patterns are not allowed." },
  /external/chromium_org/chrome/browser/extensions/
browser_action_test_util.h 65 // Returns the minimum allowed size of an extension popup.
68 // Returns the maximum allowed size of an extension popup.
  /external/chromium_org/chrome/browser/media/
chrome_midi_permission_context.h 56 bool allowed);
64 bool allowed);
  /external/chromium_org/chrome/browser/notifications/
desktop_notification_service_unittest.cc 33 service_->GrantPermission(GURL("http://allowed.com"));
43 GURL("http://allowed.com")),

Completed in 1215 milliseconds

<<11121314151617181920>>