| /third_party/musl/ |
| H A D | configure | 20 --bindir=DIR user executables [EPREFIX/bin]
|
| /third_party/mesa3d/src/gallium/drivers/r300/compiler/ |
| H A D | r500_fragprog_emit.c | 625 void r500BuildFragmentProgramHwCode(struct radeon_compiler *c, void *user) in r500BuildFragmentProgramHwCode() argument
|
| /third_party/node/deps/uv/src/unix/ |
| H A D | os390.c | 259 cpu_info->cpu_times.user = cpu_usage_avg; in uv_cpu_info()
|
| /third_party/rust/crates/libc/src/unix/linux_like/android/b64/x86_64/ |
| H A D | mod.rs | 81 pub struct user { structure names
|
| /third_party/rust/crates/libc/src/unix/linux_like/linux/gnu/b64/x86_64/ |
| H A D | mod.rs | 208 pub struct user { structure names
|
| /third_party/rust/crates/libc/src/unix/linux_like/linux/musl/b64/x86_64/ |
| H A D | mod.rs | 82 pub struct user { structure names
|
| /third_party/skia/third_party/externals/imgui/misc/freetype/ |
| H A D | imgui_freetype.cpp | 346 #ifndef STB_RECT_PACK_IMPLEMENTATION // in case the user already have an implementation in the _same_ compilation unit (e.g. unity builds) 372 const ImWchar* SrcRanges; // Ranges as requested by user (user is allowed to request too much, e.g. 0x0020..0xFFFF) 419 // Find index from cfg.DstFont (we allow the user to set cfg.DstFont. Also it makes casual debugging nicer than when storing indices) in ImFontAtlasBuildWithFreeTypeEx() 716 // Implement realloc() as we don't ask user to provide it. in FreeType_Realloc() 741 memory_rec.user = NULL; in ImFontAtlasBuildWithFreeType()
|
| /third_party/skia/third_party/externals/libpng/contrib/libtests/ |
| H A D | pngunknown.c | 640 /* Otherwise this will return the cached values set by any user callback */ in get_unknown() 655 # error No store support and no user chunk support, this will not work 1175 * instantiated by default. If 'save' is *not* supported then a user in main()
|
| /third_party/typescript/tests/baselines/reference/ |
| H A D | indexSignatures1.js | 239 "user": {} as Plugs, 449 "user": {},
624 user: Plugs;
|
| /third_party/selinux/libsepol/src/ |
| H A D | hierarchy.c | 552 /* The user bounds is defined as: a child user cannot have a role that 587 ERR(handle, "%d errors found during user bounds check", in bounds_check_users() 622 /* Orphan type/role/user */ \ 639 static add_hierarchy_callback_template(user) in add_hierarchy_callback_template()
|
| /third_party/node/deps/v8/src/compiler/backend/mips64/ |
| H A D | instruction-selector-mips64.cc | 2394 void InstructionSelector::VisitWordCompareZero(Node* user, Node* value, in VisitWordCompareZero() argument 2397 while (CanCover(user, value)) { in VisitWordCompareZero() 2401 user = value; in VisitWordCompareZero() 2406 user = value; in VisitWordCompareZero() 2415 if (CanCover(user, value)) { in VisitWordCompareZero()
|
| /third_party/node/deps/v8/src/compiler/backend/loong64/ |
| H A D | instruction-selector-loong64.cc | 2138 void InstructionSelector::VisitWordCompareZero(Node* user, Node* value, in VisitWordCompareZero() argument 2141 while (CanCover(user, value)) { in VisitWordCompareZero() 2145 user = value; in VisitWordCompareZero() 2150 user = value; in VisitWordCompareZero() 2159 if (CanCover(user, value)) { in VisitWordCompareZero()
|
| /third_party/node/deps/v8/src/compiler/backend/riscv64/ |
| H A D | instruction-selector-riscv64.cc | 2252 void InstructionSelector::VisitWordCompareZero(Node* user, Node* value, in VisitWordCompareZero() argument 2255 while (CanCover(user, value)) { in VisitWordCompareZero() 2259 user = value; in VisitWordCompareZero() 2264 user = value; in VisitWordCompareZero() 2273 if (CanCover(user, value)) { in VisitWordCompareZero()
|
| /third_party/python/Lib/test/ |
| H A D | test_nntplib.py | 230 user=baduser, password=badpw, usenetrc=False) 561 authinfo user Name|pass Password|generic <prog> <args> 781 elif cred_type == 'user': 890 ' authinfo user Name|pass Password|generic <prog> <args>', 1527 self.nntp_class('dummy', user=login, password=password)
|
| /third_party/mbedtls/library/ |
| H A D | psa_crypto.c | 5345 /* In case the operation fails and the user fails to check for failure or in psa_aead_finish() 8344 memcpy(user_id, inputs->user, inputs->user_len); in psa_crypto_driver_pake_get_user() 8510 operation->data.inputs.user = mbedtls_calloc(1, user_id_len); in psa_pake_set_user() 8511 if (operation->data.inputs.user == NULL) { in psa_pake_set_user() 8518 memcpy(operation->data.inputs.user, user_id, user_id_len); in psa_pake_set_user() 8661 mbedtls_free(inputs.user); in psa_pake_complete_inputs() 8710 * called by the user */ in psa_jpake_prologue() 8971 if (operation->data.inputs.user != NULL) { in psa_pake_abort() 8972 mbedtls_free(operation->data.inputs.user); in psa_pake_abort() 9034 /** Copy from a local output buffer into a user [all...] |
| /third_party/node/deps/v8/src/compiler/ |
| H A D | js-call-reducer.cc | 759 // The contract is that we don't leak "the hole" into "user JavaScript", in MaybeSkipHole() 1520 accumulator = Argument(1); // Initial value specified by the user. 1522 // The initial value was not specified by the user. In this case, the first 4014 // Check if {node} is the only value user of {arguments_list} (except for 4018 Node* const user = edge.from(); 4019 switch (user->opcode()) { 4028 DCHECK_EQ(arguments_list, user->InputAt(0)); 4029 FieldAccess const& access = FieldAccessOf(user->op()); 4041 if (IsSafeArgumentsElements(user)) continue; 4047 JSCallWithArrayLikeNode n(user); [all...] |
| H A D | verifier.cc | 2145 Node* const user = edge.from(); in VerifyNode() local 2146 DCHECK(!user->IsDead()); in VerifyNode() 2182 // Check that the user does not misuse the replacement. in VerifyEdgeInputReplacement()
|
| /third_party/libdrm/ |
| H A D | xf86drm.c | 789 uid_t user = DRM_DEV_UID; in drmOpenDevice() local 824 chown_check_return(buf, user, group); in drmOpenDevice() 868 chown_check_return(buf, user, group); in drmOpenDevice() 1350 * Get version information for the DRM user space library. 1711 * \param address will contain the user-space virtual address where the mapping 4057 // Fetch the device info if the user has requested it in drmProcessPciDevice()
|
| /third_party/rust/crates/libc/src/unix/solarish/ |
| H A D | mod.rs | 2916 user: *mut ::c_void, in port_associate() 2927 pub fn port_send(port: ::c_int, events: ::c_int, user: *mut ::c_void) -> ::c_int; in port_send() 2933 user: *mut ::c_void, in port_sendn()
|
| /third_party/node/deps/v8/src/compiler/backend/ia32/ |
| H A D | instruction-selector-ia32.cc | 1770 void InstructionSelector::VisitWordCompareZero(Node* user, Node* value, in VisitWordCompareZero() argument 1773 while (value->opcode() == IrOpcode::kWord32Equal && CanCover(user, value)) { in VisitWordCompareZero() 1777 user = value; in VisitWordCompareZero() 1782 if (CanCover(user, value)) { in VisitWordCompareZero()
|
| /third_party/libwebsockets/lib/roles/http/server/ |
| H A D | server.c | 64 check_extant(struct lws_dll2 *d, void *user) in check_extant() argument 67 struct vh_sock_args *a = (struct vh_sock_args *)user; in check_extant() 598 /* prioritize user-defined mimetypes */ in lws_get_mimetype() 608 lwsl_info("%s: match to user mimetype: %s\n", __func__, in lws_get_mimetype() 2007 * If we don't give the user code the empty HTTP_BODY callback, in lws_http_action()
|
| /third_party/curl/include/curl/ |
| H A D | curl.h | 319 char *user; member 455 * curl_global_init_mem() function to set user defined memory management 484 void *userptr); /* whatever the user please */ 586 CURLE_LOGIN_DENIED, /* 67 - user, password or similar was not 594 CURLE_TFTP_NOSUCHUSER, /* 74 - No such user */ 907 servers, a user can this way allow the vulnerability back. */ 1110 /* "user:password;options" to use when fetching. */ 1113 /* "user:password" to use with proxy. */ 1271 /* Specify whether to read the user+password from the .netrc or the URL. 1469 /* Continue to send authentication (user [all...] |
| /third_party/cups-filters/filter/pdftopdf/ |
| H A D | pdftopdf.cc | 826 if (param.collate) { // collate requested by user in calculate() 1064 fprintf(stderr,"Usage: %s job-id user title copies options [file]\n",argv[0]); in main() 1098 param.user=argv[2]; in main()
|
| /third_party/libwebsockets/lib/core/ |
| H A D | context.c | 825 /* directly use the user-provided policy object list */ in lws_create_context() 913 /* if user provided fops, tack them on the end of the list */ in lws_create_context() 1079 /* user smd participant */ in lws_create_context() 1274 context->user_space = info->user; in lws_create_context() 1370 * insert user notifiers here so they can participate with vetoing us in lws_create_context() 1459 /* user code set the policy objects directly, no parsing step */ in lws_create_context() 1488 * OPERATIONAL now. But we have to return from here first so the user in lws_create_context() 1733 * lws_context_destroy() expects to be called at the end of the user code's 1735 * service and exit the outer user service loop, and then complete in the 1746 * - stop any further user protoco [all...] |
| /third_party/libwebsockets/lib/jose/jws/ |
| H A D | jws.c | 66 struct jws_cb_args *args = (struct jws_cb_args *)ctx->user; in lws_jws_json_cb() 1291 * generated pages still when the auth token is expiring (and the user in lws_jwt_token_sanity()
|