/external/zlib/src/contrib/blast/ |
H A D | blast.h | 38 typedef unsigned (*blast_in)(void *how, unsigned char **buf); 39 typedef int (*blast_out)(void *how, unsigned char *buf, unsigned len); 52 * The input function is invoked: len = infun(how, &buf), where buf is set by 58 * The output function is invoked: err = outfun(how, buf, len), where the bytes
|
/external/valgrind/include/ |
H A D | pub_tool_libcsignal.h | 48 extern Int VG_(sigprocmask) ( Int how, const vki_sigset_t* set,
|
/external/python/cpython2/Demo/pysvr/ |
H A D | pysvr.py | 95 except SystemExit, how: 96 if how: 98 how = str(how) 100 how = "" 101 stdout.write("Exit %s\n" % how) 112 except SystemExit, how: 113 raise SystemExit, how, sys.exc_info()[2]
|
/external/clang/test/SemaCXX/ |
H A D | switch.cpp | 46 template <En how> void foo() { 49 switch (how) { //expected-warning {{no case matching constant switch condition '2'}}
|
/external/volley/ |
H A D | README.md | 6 For more about Volley and how to use it, visit the [Android developer training
|
/external/icu/icu4c/source/samples/ |
H A D | readme.txt | 10 break - demonstrates how to use BreakIterators in C and C++. 14 case - demonstrates how to do Unicode case conversion in C and C++. 32 strsrch - demonstrates how to search for patterns in Unicode text using the usearch interface. 36 uciter8.c - demonstrates how to leniently read 8-bit Unicode text.
|
/external/valgrind/none/tests/scripts/ |
H A D | shell.stderr.exp | 5 Add more stringent tests in PRE(sys_execve), or work out how to recover.
|
/external/python/cpython2/Lib/idlelib/ |
H A D | rpc.py | 25 See the Idle run.main() docstring for further information on how this was 169 how, (oid, methodname, args, kwargs) = request 187 if how == 'CALL': 192 elif how == 'QUEUE': 196 return ("ERROR", "Unsupported message type: %s" % how) 245 how, what = response 246 if how == "OK": 248 if how == "QUEUED": 250 if how == "EXCEPTION": 253 if how [all...] |
/external/python/cpython2/Lib/ |
H A D | posixfile.py | 153 def lock(self, how, *args): 156 if 'w' in how: l_type = fcntl.F_WRLCK 157 elif 'r' in how: l_type = fcntl.F_RDLCK 158 elif 'u' in how: l_type = fcntl.F_UNLCK 161 if '|' in how: cmd = fcntl.F_SETLKW 162 elif '?' in how: cmd = fcntl.F_GETLK 197 if '?' in how:
|
/external/openssh/openbsd-compat/ |
H A D | sigact.h | 82 int sigprocmask (int how, sigset_t *mask, sigset_t *omask);
|
/external/libxml2/ |
H A D | xzlib.c | 44 /* values for xz_state how */ 65 int how; /* 0: get header, 1: copy, 2: decompress */ member in struct:__anon12296 127 state->how = LOOK; /* look for gzip header */ 197 switch (state->how) { 448 state->how = LZMA; 503 state->how = GZIP; 524 state->how = COPY; 554 if (state->how == GZIP) { 575 } else /* state->how == LZMA */ 602 if (state->how [all...] |
/external/bison/lib/ |
H A D | signal.in.h | 134 (int how, const sigset_t *new_mask, sigset_t *old_mask)); 136 (int how, const sigset_t *new_mask, sigset_t *old_mask)); 140 (int how, const sigset_t *new_mask, sigset_t *old_mask)); 143 (int how, const sigset_t *new_mask, sigset_t *old_mask));
|
/external/compiler-rt/lib/esan/ |
H A D | esan_interceptors.cpp | 427 INTERCEPTOR(int, sigprocmask, int how, __sanitizer_sigset_t *set, argument 430 COMMON_INTERCEPTOR_ENTER(ctx, sigprocmask, how, set, oldset); 432 if (processSigprocmask(how, set, oldset)) 433 res = REAL(sigprocmask)(how, set, oldset); 444 INTERCEPTOR(int, pthread_sigmask, int how, __sanitizer_sigset_t *set, argument 447 COMMON_INTERCEPTOR_ENTER(ctx, pthread_sigmask, how, set, oldset); 449 if (processSigprocmask(how, set, oldset)) 450 res = REAL(sigprocmask)(how, set, oldset);
|
/external/curl/docs/cmdline-opts/ |
H A D | continue-at.d | 12 Use "-C -" to tell curl to automatically find out where/how to resume the
|
H A D | netrc.d | 13 A quick and very simple example of how to setup a \fI.netrc\fP to allow curl
|
H A D | proto-redir.d | 7 --proto are not overridden by this option. See --proto for how protocols are
|
/external/libyuv/files/tools_libyuv/valgrind/ |
H A D | libyuv_tests.bat | 50 echo "See http://www.chromium.org/developers/how-tos/using-valgrind/dr-memory"
51 echo "for the instructions on how to get them."
66 echo "See http://www.chromium.org/developers/how-tos/using-valgrind/threadsanitizer/threadsanitizer-on-windows"
67 echo "for the instructions on how to get them."
|
/external/pdfium/third_party/zlib_v128/ |
H A D | gzread.c | 78 If this is the first time in, allocate required memory. state->how will be 139 state->how = GZIP; 162 state->how = COPY; 169 data. If the gzip stream completes, state->how is reset to LOOK to look for 214 state->how = LOOK; 222 file depending on state->how. If state->how is LOOK, then a gzip header is 224 otherwise 0. gz_fetch() will leave state->how as COPY or GZIP unless the 232 switch(state->how) { 236 if (state->how [all...] |
/external/python/cpython2/Modules/zlib/ |
H A D | gzread.c | 78 If this is the first time in, allocate required memory. state->how will be 139 state->how = GZIP; 162 state->how = COPY; 169 data. If the gzip stream completes, state->how is reset to LOOK to look for 214 state->how = LOOK; 222 file depending on state->how. If state->how is LOOK, then a gzip header is 224 otherwise 0. gz_fetch() will leave state->how as COPY or GZIP unless the 232 switch(state->how) { 236 if (state->how [all...] |
/external/strace/tests/ |
H A D | sigprocmask.c | 44 k_sigprocmask(const kernel_ulong_t how, const kernel_ulong_t new_set, argument 47 const long rc = syscall(__NR_sigprocmask, how, new_set, old_set);
|
/external/strace/tests-m32/ |
H A D | sigprocmask.c | 44 k_sigprocmask(const kernel_ulong_t how, const kernel_ulong_t new_set, argument 47 const long rc = syscall(__NR_sigprocmask, how, new_set, old_set);
|
/external/strace/tests-mx32/ |
H A D | sigprocmask.c | 44 k_sigprocmask(const kernel_ulong_t how, const kernel_ulong_t new_set, argument 47 const long rc = syscall(__NR_sigprocmask, how, new_set, old_set);
|
/external/zlib/src/ |
H A D | gzread.c | 78 If this is the first time in, allocate required memory. state->how will be 139 state->how = GZIP; 162 state->how = COPY; 169 data. If the gzip stream completes, state->how is reset to LOOK to look for 214 state->how = LOOK; 222 file depending on state->how. If state->how is LOOK, then a gzip header is 224 otherwise 0. gz_fetch() will leave state->how as COPY or GZIP unless the 232 switch(state->how) { 236 if (state->how [all...] |
/external/v8/src/snapshot/ |
H A D | deserializer.cc | 497 #define CASE_STATEMENT(where, how, within, space_number) \ 498 case where + how + within + space_number: \ 500 STATIC_ASSERT((how & ~kHowToCodeMask) == 0); \ 504 #define CASE_BODY(where, how, within, space_number_if_any) \ 511 if (where == kNewObject && how == kPlain && within == kStartOfObject) { \ 568 if (how == kFromCode) { \ 598 #define ALL_SPACES(where, how, within) \ 599 CASE_STATEMENT(where, how, within, NEW_SPACE) \ 600 CASE_BODY(where, how, within, NEW_SPACE) \ 601 CASE_STATEMENT(where, how, withi [all...] |
/external/brotli/research/ |
H A D | README.md | 3 In this directory we publish simple tools to analyze backward reference distance distributions in LZ77 compression. We developed these tools to be able to make more efficient encoding of distances in large-window brotli. In large-window compression the average cost of a backward reference distance is higher, and this may allow for more advanced encoding strategies, such as delta coding or an increase in context size, to bring significant compression density improvements. Our tools visualize the backward references as histogram images, i.e., one pixel in the image shows how many distances of a certain range exist at a certain locality in the data. The human visual system is excellent at pattern detection, so we tried to roughly identify patterns visually before going into more quantitative analysis. These tools can turn out to be useful in development of other LZ77-based compressors and we hope you try them out. 57 Here's an example of how to read from `*.dist` file:
|