HomeSort by relevance Sort by last modified time
    Searched full:executable (Results 326 - 350 of 4711) sorted by null

<<11121314151617181920>>

  /external/okhttp/okcurl/
pom.xml 80 <artifactId>really-executable-jar-maven-plugin</artifactId>
86 <goal>really-executable-jar</goal>
  /external/skia/gyp/
apptype_console.gypi 5 # target_defaults used for executable targets that generate a console app
34 ['_type == "executable"', {
  /external/skia/platform_tools/android/gyp/
dependencies.gypi 72 # executable target which changes to a shared library if the target OS is
86 ['_type == "executable"', {
98 # executable target which changes to a shared library if the target OS is
112 ['_type == "executable"', {
127 # executable target which changes to a shared library if the target OS is
141 ['_type == "executable"', {
161 # executable target which changes to a shared library if the target OS is
175 ['_type == "executable"', {
  /frameworks/compile/libbcc/tools/bcc/
Android.mk 19 # Executable for host
42 # Executable for target
  /prebuilts/gcc/darwin-x86/host/i686-apple-darwin-4.2.1/lib/gcc/i686-apple-darwin10/4.2.1/include/
stdbool.h 22 the resulting executable to be covered by the GNU General Public
24 reasons why the executable file might be covered by the GNU General
  /prebuilts/gcc/darwin-x86/host/i686-apple-darwin-4.2.1/lib/gcc/i686-apple-darwin11/4.2.1/include/
stdbool.h 22 the resulting executable to be covered by the GNU General Public
24 reasons why the executable file might be covered by the GNU General
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_platform.py 20 real = os.path.realpath(sys.executable)
222 if os.path.isdir(sys.executable) and \
223 os.path.exists(sys.executable+'.exe'):
225 executable = sys.executable + '.exe'
227 executable = sys.executable
228 res = platform.libc_ver(executable)
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_platform.py 20 real = os.path.realpath(sys.executable)
222 if os.path.isdir(sys.executable) and \
223 os.path.exists(sys.executable+'.exe'):
225 executable = sys.executable + '.exe'
227 executable = sys.executable
228 res = platform.libc_ver(executable)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_platform.py 20 real = os.path.realpath(sys.executable)
222 if os.path.isdir(sys.executable) and \
223 os.path.exists(sys.executable+'.exe'):
225 executable = sys.executable + '.exe'
227 executable = sys.executable
228 res = platform.libc_ver(executable)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_platform.py 20 real = os.path.realpath(sys.executable)
222 if os.path.isdir(sys.executable) and \
223 os.path.exists(sys.executable+'.exe'):
225 executable = sys.executable + '.exe'
227 executable = sys.executable
228 res = platform.libc_ver(executable)
  /sdk/avdlauncher/
Android.mk 27 # Locate windres executable
34 # Link the Windows icon file as well into the executable, based on the technique
  /sdk/find_lock/
Android.mk 28 # Locate windres executable
35 # Link the Windows icon file as well into the executable, based on the technique
  /sdk/sdklauncher/
Android.mk 27 # Locate windres executable
34 # Link the Windows icon file as well into the executable, based on the technique
  /system/bt/service/
BUILD.gn 60 executable("bluetoothtbd") {
81 executable("service_unittests") {
  /system/connectivity/dhcp_client/
dhcp_client.gyp 72 'type': 'executable',
84 'type': 'executable',
  /toolchain/binutils/binutils-2.25/gold/testsuite/
protected_1.cc 35 // The function f2 is used to test that the executable can see the
36 // same function address for a protected function in the executable
  /external/autotest/client/site_tests/graphics_dEQP/
graphics_dEQP.py 123 def _bootstrap_new_test_cases(self, executable, test_filter):
130 @param executable: location '/usr/local/deqp/modules/gles2/deqp-gles2'.
149 # Now ask dEQP executable nicely for whole list of tests. Needs to be
150 # run in executable directory. Output file is plain text file named
154 '--deqp-surface-type=fbo ' % executable)
166 caselist_file = os.path.join(os.path.dirname(executable), caselist_name)
188 def _get_test_cases(self, executable, test_filter, subset):
193 this GPU family it will query the dEQP executable for a list of all
197 @param executable: location '/usr/local/deqp/modules/gles2/deqp-gles2'.
216 return self._bootstrap_new_test_cases(executable, test_filter
    [all...]
  /external/clang/include/clang/Driver/
Job.h 41 /// Command - An executable path/name and argument vector to
50 /// The executable to run.
51 const char *Executable;
54 /// argument, which will be the executable).
85 Command(const Action &Source, const Tool &Creator, const char *Executable,
114 const char *getExecutable() const { return Executable; }
  /external/webrtc/webrtc/tools/
compare_videos.py 38 help='Path to the frame analyzer executable.')
44 help=('The path to where the ffmpeg executable is located. '
48 help=('The path to where the zxing executable is located. '
71 parser.error('You must provide the path to the frame analyzer executable!')
73 parser.error('Cannot find frame analyzer executable at %s!' %
107 sys.executable,
  /toolchain/binutils/binutils-2.25/ld/testsuite/ld-sh/
tlsbinpic.s 29 ! GD -> IE because variable is not defined in executable
44 ! GD -> IE because variable is not defined in executable where
60 ! GD -> LE with global variable defined in executable
75 ! GD -> LE with local variable defined in executable
90 ! GD -> LE with hidden variable defined in executable
105 ! LD -> LE with local variable defined in executable
  /external/chromium-trace/catapult/third_party/py_vulcanize/third_party/rcssmin/_setup/py3/
shell.py 129 for arg in [_sys.executable, name]:
137 argv = [_sys.executable, name]
211 for arg in [_sys.executable, name]:
219 argv = [_sys.executable, name]
326 def frompath(executable):
327 """ Find executable in PATH """
334 ext = _os.path.splitext(executable)[1]
342 if not _os.path.isfile(executable + ext):
344 fname = _os.path.join(path, executable + ext)
349 return executable + ex
    [all...]
  /external/chromium-trace/catapult/third_party/py_vulcanize/third_party/rjsmin/_setup/py3/
shell.py 129 for arg in [_sys.executable, name]:
137 argv = [_sys.executable, name]
211 for arg in [_sys.executable, name]:
219 argv = [_sys.executable, name]
326 def frompath(executable):
327 """ Find executable in PATH """
334 ext = _os.path.splitext(executable)[1]
342 if not _os.path.isfile(executable + ext):
344 fname = _os.path.join(path, executable + ext)
349 return executable + ex
    [all...]
  /external/clang/lib/Driver/
Job.cpp 30 const char *Executable, const ArgStringList &Arguments,
32 : Source(Source), Creator(Creator), Executable(Executable),
131 Out.push_back(Executable);
139 Out.push_back(Executable);
158 printArg(OS, Executable, /*Quote=*/true);
164 Args = ArrayRef<const char *>(ArgsRespFile).slice(1); // no executable name
223 Argv.push_back(Executable);
227 return llvm::sys::ExecuteAndWait(Executable, Argv.data(), /*env*/ nullptr,
254 return llvm::sys::ExecuteAndWait(Executable, Argv.data(), /*env*/ nullptr
    [all...]
  /external/llvm/lib/Analysis/
SparsePropagation.cpp 92 DEBUG(dbgs() << "Marking Block Executable: " << BB->getName() << "\n");
93 BBExecutable.insert(BB); // Basic block is executable!
97 /// markEdgeExecutable - Mark a basic block as executable, adding it to the BB
98 /// work list if it is not already executable...
101 return; // This edge is already known to be executable!
103 DEBUG(dbgs() << "Marking Edge Executable: " << Source->getName()
107 // The destination is already executable, but we just made an edge
163 // Invoke instructions successors are always executable.
183 // All destinations are executable!
194 // All destinations are executable!
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/build/
RenderScriptLauncher.java 77 public void launch(File executable, List<String> arguments, Map<String, String> envVariableMap)
82 StringBuilder sb = new StringBuilder(executable.getAbsolutePath());
91 commandArray[0] = executable.getAbsolutePath();
146 executable.getName(), executable.getAbsolutePath());
155 executable.getName(), executable.getAbsolutePath());

Completed in 1262 milliseconds

<<11121314151617181920>>