Home
last modified time | relevance | path

Searched full:the (Results 1 – 25 of 19922) sorted by relevance

12345678910>>...797

/third_party/pcre2/pcre2/testdata/
Dgrepinput2 that the pcregrep command is working correctly. The file must be more than
4 features should be added at the end, because some of the tests involve the
7 PATTERN at the start of a line.
8 In the middle of a line, PATTERN appears.
12 Here follows a whole lot of stuff that makes the file over 24KiB long.
15 The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the
16 lazy dog. The quick brown fox jumps over the lazy dog. The quick brown fox
17 jumps over the lazy dog. The quick brown fox jumps over the lazy dog. The quick
18 brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.
20 The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the
[all …]
/third_party/skia/third_party/externals/brotli/tests/testdata/
Dquickfox_repeated1 The quick brown fox jumps over the lazy dogThe quick brown fox jumps over the lazy dogThe quick bro…
/third_party/boost/libs/asio/example/cpp03/http/doc_root/
Ddata_8K.html4 Distributed under the Boost Software License, Version 1.0. (See accompanying
10 The quick brown fox jumps over the lazy dog<br/>
11 The quick brown fox jumps over the lazy dog<br/>
12 The quick brown fox jumps over the lazy dog<br/>
13 The quick brown fox jumps over the lazy dog<br/>
14 The quick brown fox jumps over the lazy dog<br/>
15 The quick brown fox jumps over the lazy dog<br/>
16 The quick brown fox jumps over the lazy dog<br/>
17 The quick brown fox jumps over the lazy dog<br/>
18 The quick brown fox jumps over the lazy dog<br/>
[all …]
Ddata_4K.html4 Distributed under the Boost Software License, Version 1.0. (See accompanying
10 The quick brown fox jumps over the lazy dog<br/>
11 The quick brown fox jumps over the lazy dog<br/>
12 The quick brown fox jumps over the lazy dog<br/>
13 The quick brown fox jumps over the lazy dog<br/>
14 The quick brown fox jumps over the lazy dog<br/>
15 The quick brown fox jumps over the lazy dog<br/>
16 The quick brown fox jumps over the lazy dog<br/>
17 The quick brown fox jumps over the lazy dog<br/>
18 The quick brown fox jumps over the lazy dog<br/>
[all …]
/third_party/cef/tests/cefclient/resources/
Dresponse_filter.html6 <p>The text shown below in <font color="red">red</font> has been replaced by the filter. This docum…
8the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
9the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
10the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
11the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
12the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
13the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
14the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
15the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
16the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishn…
[all …]
/third_party/boost/boost/vmd/
Delem.hpp3 // Use, modification and distribution are subject to the Boost Software License,
19 The succeeding comments in this file are in doxygen format.
33 The first variadic parameter is required and is the sequence to access.
36 With no further variadic parameters the macro returns the particular element
37 in the sequence. If the element number is outside the bounds of the sequence
38 macro access fails and the macro turns emptiness.
41 accessed as well as what data is returned by the macro.
43 Filters: specifying a VMD type tells the macro to return the element only
44 if it is of the VMD type specified, else macro access fails. If more than
45 one VMD type is specified as an optional parameter the last one
[all …]
/third_party/wayland-protocols_standard/stable/xdg-shell/
Dxdg-shell.xml13 copy of this software and associated documentation files (the "Software"),
14 to deal in the Software without restriction, including without limitation
15 the rights to use, copy, modify, merge, publish, distribute, sublicense,
16 and/or sell copies of the Software, and to permit persons to whom the
17 Software is furnished to do so, subject to the following conditions:
19 The above copyright notice and this permission notice (including the next
20 paragraph) shall be included in all copies or substantial portions of the
23 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
24 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
26 THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
[all …]
/third_party/openmax/api/1.1.2/
DOMX_Core.h2 * Copyright (c) 2016 The Khronos Group Inc.
5 * a copy of this software and associated documentation files (the
6 * "Software"), to deal in the Software without restriction, including
7 * without limitation the rights to use, copy, modify, merge, publish,
8 * distribute, sublicense, and/or sell copies of the Software, and to
9 * permit persons to whom the Software is furnished to do so, subject
10 * to the following conditions:
11 * The above copyright notice and this permission notice shall be included
12 * in all copies or substantial portions of the Software.
14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
[all …]
/third_party/e2fsprogs/debugfs/
Ddebugfs.8.in3 .\" This file may be copied under the terms of the GNU Public License.
44 examine and change the state of an ext2, ext3, or ext4 file system.
47 is a block device (e.g., /dev/sdXX) or a file containing the file system.
51 Specifies that the file system should be opened in read-write mode.
52 Without this option, the file system is opened in read-only mode.
56 you believe the metadata to be correct despite the complaints of
60 Specifies that the file system should be opened in catastrophic mode, in
61 which the inode and group bitmaps are not read initially. This can be
63 catastrophic mode forces the file system to be opened read-only.
68 represents an ext2 image file created by the
[all …]
/third_party/skia/third_party/externals/egl-registry/extensions/KHR/
DEGL_KHR_stream_fifo.txt19 Copyright (c) 2011-2013 The Khronos Group Inc. Copyright terms at
25 Approved by the Khronos Board of Promoters on December 2, 2011.
38 Requires the EGL_KHR_stream extension.
40 This extension is written based on the wording of the EGL 1.2
43 The EGL_KHR_stream_producer_eglsurface and
44 EGL_NV_stream_producer_eglsurface extensions affect the wording of
47 The EGL_KHR_stream_producer_aldatalocator and
48 EGL_NV_stream_producer_aldatalocator extensions affect the wording
51 The EGL_KHR_stream_consumer_gltexture and
52 EGL_NV_stream_consumer_gltexture extensions affect the wording
[all …]
/third_party/EGL/extensions/KHR/
DEGL_KHR_stream_fifo.txt19 Copyright (c) 2011-2013 The Khronos Group Inc. Copyright terms at
25 Approved by the Khronos Board of Promoters on December 2, 2011.
38 Requires the EGL_KHR_stream extension.
40 This extension is written based on the wording of the EGL 1.2
43 The EGL_KHR_stream_producer_eglsurface and
44 EGL_NV_stream_producer_eglsurface extensions affect the wording of
47 The EGL_KHR_stream_producer_aldatalocator and
48 EGL_NV_stream_producer_aldatalocator extensions affect the wording
51 The EGL_KHR_stream_consumer_gltexture and
52 EGL_NV_stream_consumer_gltexture extensions affect the wording
[all …]
/third_party/wayland-protocols_standard/unstable/xdg-shell/
Dxdg-shell-unstable-v6.xml11 copy of this software and associated documentation files (the "Software"),
12 to deal in the Software without restriction, including without limitation
13 the rights to use, copy, modify, merge, publish, distribute, sublicense,
14 and/or sell copies of the Software, and to permit persons to whom the
15 Software is furnished to do so, subject to the following conditions:
17 The above copyright notice and this permission notice (including the next
18 paragraph) shall be included in all copies or substantial portions of the
21 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
22 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24 THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
[all …]
Dxdg-shell-unstable-v5.xml11 copy of this software and associated documentation files (the "Software"),
12 to deal in the Software without restriction, including without limitation
13 the rights to use, copy, modify, merge, publish, distribute, sublicense,
14 and/or sell copies of the Software, and to permit persons to whom the
15 Software is furnished to do so, subject to the following conditions:
17 The above copyright notice and this permission notice (including the next
18 paragraph) shall be included in all copies or substantial portions of the
21 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
22 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24 THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
[all …]
/third_party/boost/libs/log/doc/
Dextension.qbk3 Distributed under the Boost Software License, Version 1.0.
10 [section:extension Extending the library]
16 …described in the [link log.design Design overview] section, sinks consist of two parts: frontend a…
24 …der to work with sink backends, frontends use the `frontend_requirements` type defined by all back…
26the backend has this requirement, it expects log records to be passed from frontend in synchronize…
27 …nized_feeding] by allowing different threads to feed records concurrently. The backend implements …
28The backend expects formatted log records. The frontend implements formatting to a string with cha…
29The backend supports flushing its internal buffers. If the backend indicates this requirement it h…
31 [tip By choosing either of the thread synchronization requirements you effectively allow or prohibi…
33 Multiple requirements can be combined into `frontend_requirements` type with the [class_sinks_combi…
[all …]
/third_party/grpc/src/python/grpcio/grpc/framework/interfaces/face/
Dface.py3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
10 # distributed under the License is distributed on an "AS IS" BASIS,
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
14 """Interfaces defining the Face layer of RPC Framework."""
37 group: The group of the unrecognized method.
38 name: The name of the unrecognized method.
45 group: The group identifier of the unrecognized RPC name.
[all …]
/third_party/boost/boost/beast/http/
Dread.hpp4 // Distributed under the Boost Software License, Version 1.0. (See accompanying
29 instance of @ref basic_parser. The call will block until one of the
37 This operation is implemented in terms of one or more calls to the stream's
38 `read_some` function. The implementation may read additional bytes from
39 the stream that lie past the end of the message being read. These additional
40 bytes are stored in the dynamic buffer, which must be preserved for
43 If the end of file error is received while reading from the stream, then
44 the error returned from this function will be:
48 @li @ref error::partial_message if any bytes were parsed but the
51 @li A successful result. The next attempt to read will return
[all …]
/third_party/boost/libs/beast/include/boost/beast/http/
Dread.hpp4 // Distributed under the Boost Software License, Version 1.0. (See accompanying
29 instance of @ref basic_parser. The call will block until one of the
37 This operation is implemented in terms of one or more calls to the stream's
38 `read_some` function. The implementation may read additional bytes from
39 the stream that lie past the end of the message being read. These additional
40 bytes are stored in the dynamic buffer, which must be preserved for
43 If the end of file error is received while reading from the stream, then
44 the error returned from this function will be:
48 @li @ref error::partial_message if any bytes were parsed but the
51 @li A successful result. The next attempt to read will return
[all …]
/third_party/skia/third_party/externals/opengl-registry/extensions/SGIX/
DSGIX_mpeg2.txt28 Most of the additions specified by this extension exist to permit
29 the handling of fields of images, which is required by MPEG2 but
30 not by MPEG1. This extension adds the capability to update or
31 read from only the top or bottom fields of a predictor frame. The
32 extension also allows the compression and decompression of fields
35 Support of this extension does not imply conformance to the MPEG2
36 standard (ISO 13818), although the following guarantees are made:
38 - During decode, the picture_structure field of the picture
40 The treatment of the resulting value is discussed below.
42 - During encode, the picture_structure field of the picture
[all …]
/third_party/openGLES/extensions/SGIX/
DSGIX_mpeg2.txt28 Most of the additions specified by this extension exist to permit
29 the handling of fields of images, which is required by MPEG2 but
30 not by MPEG1. This extension adds the capability to update or
31 read from only the top or bottom fields of a predictor frame. The
32 extension also allows the compression and decompression of fields
35 Support of this extension does not imply conformance to the MPEG2
36 standard (ISO 13818), although the following guarantees are made:
38 - During decode, the picture_structure field of the picture
40 The treatment of the resulting value is discussed below.
42 - During encode, the picture_structure field of the picture
[all …]
/third_party/iptables/iptables/
Debtables-nft.84 .\" It is based on the iptables man page.
6 .\" The man page was edited, February 25th 2003, by
12 .\" it under the terms of the GNU General Public License as published by
13 .\" the Free Software Foundation; either version 2 of the License, or
16 .\" This program is distributed in the hope that it will be useful,
17 .\" but WITHOUT ANY WARRANTY; without even the implied warranty of
18 .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 .\" You should have received a copy of the GNU General Public License
22 .\" along with this program; if not, write to the Free Software
56 is an application program used to set up and maintain the
[all …]
/third_party/e2fsprogs/misc/
Dmke2fs.conf.5.in3 .\" This file may be copied under the terms of the GNU Public License.
10 is the configuration file for
12 It controls the default parameters used by
23 An example of the INI-style format used by this configuration file
53 at the beginning of the comment, and are terminated by the end of
57 spaces. Within a quoted string, the standard backslash interpretations
58 apply: "\en" (for the newline character),
59 "\et" (for the tab character), "\eb" (for the backspace character),
60 and "\e\e" (for the backslash character).
62 Some relations expect a boolean value. The parser is quite liberal on
[all …]
/third_party/mbedtls/docs/proposed/
Dpsa-driver-interface.md4the PSA cryptography API. This interface complements the [PSA Cryptography API specification](http…
6the reference implementation of the PSA Cryptography API. At this stage, Arm does not expect major…
10 ### Purpose of the driver interface
12 The PSA Cryptography API defines an interface that allows applications to perform cryptographic ope…
14 The driver interface allows implementations of the PSA Cryptography API to be built compositionally…
16 Functions in the PSA Cryptography API invoke functions in the core. Code from the core calls driver…
20 The PSA Cryptography driver interface supports two types of cryptoprocessors, and accordingly two t…
22the beginning of each operation. They are typically used for hardware **accelerators**. When a tra…
23 …er is invoked for the specific [key location](#lifetimes-and-locations) that the driver is registe…
27 The present specification was designed to fulfill the following high-level requirements.
[all …]
/third_party/icu/icu4j/perf-tests/data/collation/
D2drvb10.txt4 Copyright laws are changing all over the world, be sure to check
5 the copyright laws for your country before posting these files!!
7 Please take a look at the important information in this header.
9 electronic path open for the next readers. Do not remove this.
12 **Welcome To The World of Free Plain Vanilla Electronic Texts**
22 The Holy Bible
26 Volume II: The Second Part of the Old Testament (Psalms - 2 Machabees)
43 all of which are in the Public Domain in the United States, unless a
49 of the official release dates, for time for better editing.
52 midnight of the last day of the month of any such announcement.
[all …]
/third_party/pcre2/pcre2/doc/
Dpcre2api.38 description of all its native functions. See the
12 document for an overview of all the PCRE2 documentation.
278 backward compatibility. They should not be used in new code. The first is
279 replaced by \fBpcre2_set_depth_limit()\fP; the second is no longer needed and
311 POSIX basic and extended patterns can be converted. Details are given in the
323 This contains the function prototypes and other definitions for all three
325 systems the libraries are called \fBlibpcre2-8\fP, \fBlibpcre2-16\fP, and
326 \fBlibpcre2-32\fP, and they can also co-exist with the original PCRE libraries.
329 unsigned integers in code units of the appropriate width. Every PCRE2 function
341 The UCHAR types define unsigned code units of the appropriate widths. For
[all …]
/third_party/skia/third_party/externals/opengl-registry/extensions/APPLE/
DAPPLE_object_purgeable.txt39 The extension is written against the OpenGL 1.5 Specification.
43 This extension provides the ability to mark the storage of OpenGL
46 Many of today's modern virtual memory systems include the concept of
47 purgeability in order to avoid unnecessary paging when the object
50 significant storage requirements. By default, the OpenGL is
51 required to preserve the contents of these objects regardless of
53 shortage. Often this is accomplished by temporarily paging the
56 computational expense in the cases where the data is not going to be
57 used again or where the content can be reproduced by the application
58 with less expense than the paging operation would require.
[all …]

12345678910>>...797