/external/pdfium/third_party/yasm/ |
D | BUILD.gn | 71 "source/patched-yasm", 81 "source/patched-yasm/tools/genmacro/genmacro.c", 98 "source/patched-yasm/libyasm/genmodule.c", 115 "source/patched-yasm/tools/genperf/genperf.c", 116 "source/patched-yasm/tools/genperf/perfect.c", 141 "source/patched-yasm/libyasm/phash.c", 142 "source/patched-yasm/libyasm/xmalloc.c", 143 "source/patched-yasm/libyasm/xstrdup.c", 159 "source/patched-yasm/genstring.c", 176 "source/patched-yasm/modules/preprocs/nasm/genversion.c", [all …]
|
/external/antlr/runtime/Python3/ |
D | ez_setup.py | 215 patched = True 217 patched = False 219 patched = False 224 if patched: 273 patched = _patch_egg_dir(pkg_info) 275 patched = _patch_file(pkg_info, SETUPTOOLS_PKG_INFO) 277 if not patched:
|
/external/v8/src/s390/ |
D | assembler-s390-inl.h | 308 bool patched = false; in set_target_address_at() local 320 patched = true; in set_target_address_at() 349 patched = true; in set_target_address_at() 363 patched = true; in set_target_address_at() 367 if (!patched) UNREACHABLE(); in set_target_address_at()
|
/external/python/mock/mock/tests/ |
D | testwith.py | 140 with patch('%s.open' % __name__, mock, create=True) as patched: 141 self.assertIs(patched, mock) 178 with patch('%s.open' % __name__, mock, create=True) as patched: 179 self.assertIs(patched, mock)
|
/external/python/cpython3/Lib/unittest/test/testmock/ |
D | testwith.py | 149 with patch('%s.open' % __name__, mock, create=True) as patched: 150 self.assertIs(patched, mock) 187 with patch('%s.open' % __name__, mock, create=True) as patched: 188 self.assertIs(patched, mock)
|
/external/tremolo/ |
D | README | 2 0.07. It has been patched against publicly known vulnerabilities
|
/external/grpc-grpc/tools/distrib/ |
D | build_ruby_environment_macos.sh | 27 +++ patched 2018-04-10 11:40:25.000000000 -0700
|
/external/grpc-grpc/examples/android/helloworld/ |
D | README.md | 6 protobuf release, but until then must be manually patched in to
|
/external/python/cpython3/Mac/BuildScript/ |
D | tk868_on_10_8_10_9.patch | 9 +++ tk8.6.8-patched/macosx/tkMacOSXXStubs.c 2018-01-06 19:34:17.000000000 -0600
|
/external/python/cpython2/Mac/BuildScript/ |
D | tk868_on_10_8_10_9.patch | 9 +++ tk8.6.8-patched/macosx/tkMacOSXXStubs.c 2018-01-06 19:34:17.000000000 -0600
|
/external/libpcap/doc/ |
D | README.hpux | 27 >must me "patched" (poked) in order to see outbound data in promiscuous mode. 62 What you are seeing is expected, un-patched, behaviour for an HP-UX 85 > What you are seeing is expected, un-patched, behaviour for an HP-UX 92 10.20 and 11.00. The machines where patched up before y2k so did not
|
/external/autotest/client/site_tests/kernel_CryptoAPI/ |
D | control | 13 Test whether crypto user API is loaded, and whether it is patched to prevent
|
/external/pdfium/third_party/eu-strip/ |
D | README.pdfium | 13 Ubuntu-patched version of elfutils):
|
/external/mesa3d/src/gallium/state_trackers/nine/ |
D | README | 17 *** Clone and build a patched wine 22 *** And finally we create some symlinks to our patched wine files:
|
/external/tensorflow/tensorflow/security/advisory/ |
D | tfsa-2018-002.md | 23 We have patched the vulnerability in GitHub commit
|
D | tfsa-2018-006.md | 23 We have patched the vulnerability in GitHub commit
|
D | tfsa-2018-001.md | 24 We have patched the vulnerability in GitHub commit
|
D | tfsa-2018-005.md | 24 We have patched the vulnerability in GitHub commit
|
D | tfsa-2018-004.md | 24 We have patched the vulnerability in GitHub commit
|
/external/grpc-grpc/src/android/test/interop/ |
D | README.md | 6 protobuf release, but until then must be manually patched in to
|
/external/cldr/tools/cldr-unittest/src/org/unicode/cldr/unittest/ |
D | TestCheckCLDR.java | 253 CLDRFile patched = nativeFile; // new CLDRFile(override); in checkLocale() local 256 for (String path : patched) { in checkLocale() 270 final String resolvedValue = dummyValue == null ? patched in checkLocale() 272 test.handleCheck(path, patched.getFullXPath(path), resolvedValue, in checkLocale()
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/SystemZ/ |
D | stackmap-shadow-optimization.ll | 8 ; Note that in order for a thread to not return in to the patched space
|
/external/python/cpython2/RISCOS/ |
D | README | 27 DLK (patched version)
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/X86/ |
D | stackmap-shadow-optimization.ll | 8 ; Note that in order for a thread to not return in to the patched space
|
/external/llvm/test/CodeGen/X86/ |
D | stackmap-shadow-optimization.ll | 8 ; Note that in order for a thread to not return in to the patched space
|