| /external/pcre/testdata/ |
| D | grepinput | 2 that the pcregrep command is working correctly. The file must be more than 4 features should be added at the end, because some of the tests involve the 7 PATTERN at the start of a line. 8 In the middle of a line, PATTERN appears. 12 Here follows a whole lot of stuff that makes the file over 24KiB long. 15 The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the 16 lazy dog. The quick brown fox jumps over the lazy dog. The quick brown fox 17 jumps over the lazy dog. The quick brown fox jumps over the lazy dog. The quick 18 brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog. 20 The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the [all …]
|
| /external/brotli/tests/testdata/ |
| D | quickfox_repeated | 1 The quick brown fox jumps over the lazy dogThe quick brown fox jumps over the lazy dogThe quick bro…
|
| /external/owasp/sanitizer/lib/htmlparser-1.3/doc/ |
| D | tree-construction.txt | 14 The input to the tree construction stage is a sequence of tokens from 15 the tokenization stage. The tree construction stage is associated with 16 a DOM Document object when a parser is created. The "output" of this 21 to render the Document so that it is available to the user, or when it 24 As each token is emitted from the tokeniser, the user agent must 25 process the token according to the rules given in the section 26 corresponding to the current insertion mode. 28 When the steps below require the UA to insert a character into a node, 29 if that node has a child immediately before where the character is to 30 be inserted, and that child is a Text node, and that Text node was the [all …]
|
| D | tokenization.txt | 14 Implementations must act as if they used the following state machine to 15 tokenise HTML. The state machine must start in the data state. Most 17 and either switches the state machine to a new state to reconsume the 18 same character, or switches it to a new state (to consume the next 19 character), or repeats the same state (to consume the next character). 23 The exact behavior of certain states depends on a content model flag 24 that is set after certain tokens are emitted. The flag has several 26 the PCDATA state. In the RCDATA and CDATA states, a further escape flag 27 is used to control the behavior of the tokeniser. It is either true or 28 false, and initially must be set to the false state. The insertion mode [all …]
|
| /external/one-true-awk/testdir/ |
| D | bib | 1 In the beginning God created the heaven and the earth. 2 And the earth was without form, and void; and darkness was upon the face of the deep. And the Spiri… 4 And God saw the light, that it was good: and God divided the light from the darkness. 5 And God called the light Day, and the darkness he called Night. And the evening and the morning wer… 6 And God said, Let there be a firmament in the midst of the waters, and let it divide the waters fro… 7 And God made the firmament, and divided the waters which were under the firmament from the waters w… 8 And God called the firmament Heaven. And the evening and the morning were the second day. 9 And God said, Let the waters under the heaven be gathered together unto one place, and let the dry … 10 And God called the dry land Earth; and the gathering together of the waters called he Seas: and God… 11 …id, Let the earth bring forth grass, the herb yielding seed, and the fruit tree yielding fruit aft… [all …]
|
| /external/wayland-protocols/freedesktop.org/stable/xdg-shell/ |
| D | xdg-shell.xml | 13 copy of this software and associated documentation files (the "Software"), 14 to deal in the Software without restriction, including without limitation 15 the rights to use, copy, modify, merge, publish, distribute, sublicense, 16 and/or sell copies of the Software, and to permit persons to whom the 17 Software is furnished to do so, subject to the following conditions: 19 The above copyright notice and this permission notice (including the next 20 paragraph) shall be included in all copies or substantial portions of the 23 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 24 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 26 THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER [all …]
|
| /external/liburing/man/ |
| D | io_uring_enter.2 | 21 is used to initiate and complete I/O using the shared submission and 29 is the file descriptor returned by 32 specifies the number of I/Os to submit from the submission queue. 34 is a bitmask of the following values: 37 If this flag is set, then the system call will wait for the specificied 45 If the ring has been created with 47 then this flag asks the kernel to wakeup the SQ kernel thread to submit IO. 50 If the ring has been created with 52 then the application has no real insight into when the SQ kernel thread has 53 consumed entries from the SQ ring. This can lead to a situation where the [all …]
|
| /external/cronet/net/docs/ |
| D | life-of-a-url-request.md | 3 This document gives an overview of the browser's lower-layers for networking. 5 Networking in the browser ranges from high level Javascript APIs like 6 `fetch()`, all the way down to writing encrypted bytes on a socket. 8 This document assumes that requests for URLs are mediated through the browser's 9 [Network Service](../../services/network/README.md), and focuses on all the 10 layers below the Network Service, including key points of integration. 12 It's particularly targeted at people new to the Chrome network stack, but 13 should also be useful for team members who may be experts at some parts of the 15 through how a basic request issued by another process works its way through the 22 # Anatomy of the Network Stack [all …]
|
| /external/licenseclassifier/licenses/ |
| D | EUPL-1.1.txt | 3 EUPL (c) the European Community 2007 5 This European Union Public Licence (the "EUPL") applies to the Work or 6 Software (as defined below) which is provided under the terms of this Licence. 7 Any use of the Work, other than as authorised under this Licence is prohibited 8 (to the extent such use is covered by a right of the copyright holder of the 11 The Original Work is provided under the terms of this Licence when the 12 Licensor (as defined below) has placed the following notice immediately 13 following the copyright notice for the Original Work: 15 Licensed under the EUPL V.1.1 17 or has expressed by any other mean his willingness to license under the EUPL. [all …]
|
| D | EUPL-1.0.txt | 3 EUPL (c) the European Community 2007 5 This European Union Public Licence (the “EUPL”) applies to the Work or 6 Software (as defined below) which is provided under the terms of this Licence. 7 Any use of the Work, other than as authorised under this Licence is prohibited 8 (to the extent such use is covered by a right of the copyright holder of the 11 The Original Work is provided under the terms of this Licence when the 12 Licensor (as defined below) has placed the following notice immediately 13 following the copyright notice for the Original Work: 15 Licensed under the EUPL V.1.0 17 or has expressed by any other mean his willingness to license under the EUPL. [all …]
|
| /external/licenseclassifier/v2/assets/License/EUPL-1.1/ |
| D | license.txt | 3 EUPL (c) the European Community 2007 5 This European Union Public Licence (the "EUPL") applies to the Work or 6 Software (as defined below) which is provided under the terms of this Licence. 7 Any use of the Work, other than as authorised under this Licence is prohibited 8 (to the extent such use is covered by a right of the copyright holder of the 11 The Original Work is provided under the terms of this Licence when the 12 Licensor (as defined below) has placed the following notice immediately 13 following the copyright notice for the Original Work: 15 Licensed under the EUPL V.1.1 17 or has expressed by any other mean his willingness to license under the EUPL. [all …]
|
| /external/wayland-protocols/freedesktop.org/unstable/xdg-shell/ |
| D | xdg-shell-unstable-v6.xml | 11 copy of this software and associated documentation files (the "Software"), 12 to deal in the Software without restriction, including without limitation 13 the rights to use, copy, modify, merge, publish, distribute, sublicense, 14 and/or sell copies of the Software, and to permit persons to whom the 15 Software is furnished to do so, subject to the following conditions: 17 The above copyright notice and this permission notice (including the next 18 paragraph) shall be included in all copies or substantial portions of the 21 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 22 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 24 THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER [all …]
|
| /external/licenseclassifier/v2/assets/License/CECILL-2.1/ |
| D | license.txt | 4 …oftware license agreement that is the result of discussions between its authors in order to ensure… 6 firstly, compliance with the principles governing the distribution of Free Software: access to sour… 7 …the election of a governing law, French law, with which it is conformant, both as regards the law … 8 The authors of the CeCILL1 license are: 17 The purpose of this Free Software license agreement is to grant users the right to modify and redis… 19 The exercising of this right is conditional upon certain obligations for users so as to preserve th… 21 …the source code and the rights to copy, modify and redistribute granted by the license, users are … 23 …the risks associated with loading, using, modifying and/or developing or reproducing the software … 25 …ement may apply to any or all software for which the holder of the economic rights decides to subm… 27 Frequently asked questions can be found on the official website of the CeCILL licenses family (http… [all …]
|
| /external/licenseclassifier/v2/assets/License/EUPL-1.0/ |
| D | license.txt | 3 EUPL (c) the European Community 2007 5 This European Union Public Licence (the “EUPL”) applies to the Work or 6 Software (as defined below) which is provided under the terms of this Licence. 7 Any use of the Work, other than as authorised under this Licence is prohibited 8 (to the extent such use is covered by a right of the copyright holder of the 11 The Original Work is provided under the terms of this Licence when the 12 Licensor (as defined below) has placed the following notice immediately 13 following the copyright notice for the Original Work: 15 Licensed under the EUPL V.1.0 17 or has expressed by any other mean his willingness to license under the EUPL. [all …]
|
| /external/e2fsprogs/debugfs/ |
| D | debugfs.8.in | 3 .\" This file may be copied under the terms of the GNU Public License. 44 examine and change the state of an ext2, ext3, or ext4 file system. 47 is a block device (e.g., /dev/sdXX) or a file containing the file system. 51 Specifies that the file system should be opened in read-write mode. 52 Without this option, the file system is opened in read-only mode. 56 you believe the metadata to be correct despite the complaints of 60 Specifies that the file system should be opened in catastrophic mode, in 61 which the inode and group bitmaps are not read initially. This can be 63 catastrophic mode forces the file system to be opened read-only. 68 represents an ext2 image file created by the [all …]
|
| /external/grpc-grpc/src/python/grpcio/grpc/framework/interfaces/face/ |
| D | face.py | 3 # Licensed under the Apache License, Version 2.0 (the "License"); 4 # you may not use this file except in compliance with the License. 5 # You may obtain a copy of the License at 10 # distributed under the License is distributed on an "AS IS" BASIS, 12 # See the License for the specific language governing permissions and 13 # limitations under the License. 14 """Interfaces defining the Face layer of RPC Framework.""" 37 group: The group of the unrecognized method. 38 name: The name of the unrecognized method. 45 group: The group identifier of the unrecognized RPC name. [all …]
|
| /external/arm-trusted-firmware/docs/design/ |
| D | interrupt-framework-design.rst | 5 allows EL3 software to configure the interrupt routing behavior. Its main 6 objective is to implement the following two requirements. 10 (normal world). The framework should then take care of handing control of 11 the interrupt to either software in EL3 or Secure-EL1 depending upon the 12 software configuration and the GIC implementation. This requirement ensures 13 that secure interrupts are under the control of the secure software with 14 respect to their delivery and handling without the possibility of 18 non-secure software (Non-secure interrupts) to the last executed exception 19 level in the normal world when the execution is in secure world at 20 exception levels lower than EL3. This could be done with or without the [all …]
|
| /external/selinux/ |
| D | NOTICE | 11 The licenses for most software are designed to take away your 12 freedom to share and change it. By contrast, the GNU General Public 14 software--to make sure the software is free for all its users. This 15 General Public License applies to most of the Free Software 18 the GNU Library General Public License instead.) You can apply it to 23 have the freedom to distribute copies of free software (and charge for 25 if you want it, that you can change the software or use pieces of it 29 anyone to deny you these rights or to ask you to surrender the rights. 31 distribute copies of the software, or if you modify it. 34 gratis or for a fee, you must give the recipients all the rights that [all …]
|
| /external/ppp/pppd/ |
| D | pppd.8 | 12 .\" purpose with or without fee is hereby granted, provided that the above 15 .\" THIS SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES 17 .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 21 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 33 PPP is the protocol used for establishing internet links over dial-up 35 links. The \fIpppd\fR daemon works together with the kernel PPP 37 (called the \fIpeer\fR) and to negotiate Internet Protocol (IP) 38 addresses for each end of the link. Pppd can also authenticate the 39 peer and/or supply authentication information to the peer. PPP can be 45 Use the serial port called \fIttyname\fR to communicate with the [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | slides_v1.presentations.html | 80 <p class="firstline">Returns the pages Resource.</p> 84 …the presentation. Each request is validated before being applied. If any request is not valid, the… 90 …the title given in the request. If a `presentationId` is provided, it is used as the ID of the new… 93 <p class="firstline">Gets the latest version of the specified presentation.</p> 97 …the presentation. Each request is validated before being applied. If any request is not valid, the… 100 presentationId: string, The presentation to apply the updates to. (required) 101 body: object, The request body. 102 The object takes the form of: 105 "requests": [ # A list of updates to apply to the presentation. 108 …the API may modify the values of both `size` and `transform`, but the visual size will be unchange… [all …]
|
| D | slides_v1.presentations.pages.html | 82 <p class="firstline">Gets the latest version of the specified page in the presentation.</p> 85 …rstline">Generates a thumbnail of the latest version of the specified page in the presentation and… 94 <pre>Gets the latest version of the specified page in the presentation. 97 presentationId: string, The ID of the presentation to retrieve. (required) 98 pageObjectId: string, The object ID of the page to retrieve. (required) 105 An object of the form: 108 …"layoutProperties": { # The properties of Page are only relevant for pages with page_typ… 109 "displayName": "A String", # The human-readable name of the layout. 110 …"masterObjectId": "A String", # The object ID of the master that this layout i… 111 "name": "A String", # The name of the layout. [all …]
|
| D | docs_v1.documents.html | 79 …the document. Each request is validated before being applied. If any request is not valid, then th… 85 …nk document using the title given in the request. Other fields in the request, including any provi… 88 <p class="firstline">Gets the latest version of the specified document.</p> 92 …the document. Each request is validated before being applied. If any request is not valid, then th… 95 documentId: string, The ID of the document to update. (required) 96 body: object, The request body. 97 The object takes the form of: 100 "requests": [ # A list of updates to apply to the document. 102 …The new footer is applied to the SectionStyle at the location of the SectionBreak if specificed, o… 103 …the document. # The location of the SectionBreak immediately preceding the section whose SectionSt… [all …]
|
| /external/icu/icu4j/perf-tests/data/collation/ |
| D | 2drvb10.txt | 4 Copyright laws are changing all over the world, be sure to check 5 the copyright laws for your country before posting these files!! 7 Please take a look at the important information in this header. 9 electronic path open for the next readers. Do not remove this. 12 **Welcome To The World of Free Plain Vanilla Electronic Texts** 22 The Holy Bible 26 Volume II: The Second Part of the Old Testament (Psalms - 2 Machabees) 43 all of which are in the Public Domain in the United States, unless a 49 of the official release dates, for time for better editing. 52 midnight of the last day of the month of any such announcement. [all …]
|
| /external/trace-cmd/Documentation/trace-cmd/ |
| D | trace-cmd.dat.v7.5.txt | 14 The trace-cmd(1) utility produces a "trace.dat" file. The file may also 15 be named anything depending if the user specifies a different output name, 16 but it must have a certain binary format. The file is used 18 the trace from it at a later point (see *trace-cmd-report(1)*). 24 The first three bytes contain the magic value: 28 The next 7 bytes contain the characters: 32 The next set of characters contain a null '\0' terminated string 33 that contains the version of the file: 37 The next 1 byte contains the flags for the file endianess: 42 The next byte contains the number of bytes per "long" value: [all …]
|
| /external/libiio/src/ |
| D | Doxyfile.in | 5 # Using the PROJECT_BRIEF tag one can provide an optional one line description 6 # for a project that appears at the top of each page and should give viewer a 7 # quick idea about the purpose of the project. Keep the description short. 11 # With the PROJECT_LOGO tag one can specify an logo or icon that is included in 12 # the documentation. The maximum height of the logo should not exceed 55 pixels 13 # and the maximum width should not exceed 200 pixels. Doxygen will copy the logo 14 # to the output directory. 18 # The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute) path 19 # into which the generated documentation will be written. If a relative path is 20 # entered, it will be relative to the location where doxygen was started. If [all …]
|