/macosx-10.9.5/mDNSResponder-522.92.1/mDNSWindows/SystemService/ |
H A D | Firewall.h | 54 LPWSTR executable,
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/fumagic/ |
H A D | mimetypes.tcl | 78 switch -- [Nv s 0 ] 1538 {emit application/x-alan-adventure-game} 387 {emit application/x-executable-file} -147 {emit application/data} -155 {emit application/data} -5536 {emit application/x-arj} -138 {emit application/data} -394 {emit application/data} -650 {emit application/x-lzh} 387 {emit application/x-executable-file} 392 {emit application/x-executable-file} 399 {emit application/x-object-file} -13230 {emit {RLE image data,}} 322 {emit {basic-16 executable}} 323 {emit {basic-16 executable \(TV\)}} 328 {emit application/x-executable-file} 329 {emit application/x-executable-file} 330 {emit application/x-executable-file} 338 {emit application/x-executable-file} 332 {emit application/x-executable [all...] |
H A D | filetypes.tcl | 91 if {[N S 18 & 0x10]} {emit executable} 98 } 369 {emit {WE32000 COFF executable \(TV\)} 125 switch -- [Nv S 18 &0x0002] 0 {emit object} 2 {emit executable} 127 } 351 {emit {370 XA sysV executable} 131 } 346 {emit {370 XA sysV pure executable} 135 } 22529 {emit {370 sysV pure executable} 137 } 23041 {emit {370 XA sysV pure executable} 139 } 23809 {emit {370 sysV executable} 141 } 24321 {emit {370 XA sysV executable} 143 } 345 {emit {SVR2 executable \(Amdah [all...] |
/macosx-10.9.5/JavaScriptCore-7537.78.1/runtime/ |
H A D | FunctionExecutableDump.h | 36 explicit FunctionExecutableDump(FunctionExecutable* executable) argument 37 : m_executable(executable)
|
H A D | CodeCache.cpp | 85 UnlinkedCodeBlockType* CodeCache::generateBytecode(VM& vm, JSScope* scope, ExecutableType* executable, const SourceCode& source, JSParserStrictness strictness, DebuggerMode debuggerMode, ProfilerMode profilerMode, ParserError& error) argument 91 executable->recordParse(rootNode->features(), rootNode->hasCapturedVariables(), rootNode->lineNo(), rootNode->lastLine(), rootNode->startColumn()); 93 UnlinkedCodeBlockType* unlinkedCode = UnlinkedCodeBlockType::create(&vm, executable->executableInfo()); 104 UnlinkedCodeBlockType* CodeCache::getCodeBlock(VM& vm, JSScope* scope, ExecutableType* executable, const SourceCode& source, JSParserStrictness strictness, DebuggerMode debuggerMode, ProfilerMode profilerMode, ParserError& error) argument 109 return generateBytecode<UnlinkedCodeBlockType, ExecutableType>(vm, scope, executable, source, strictness, debuggerMode, profilerMode, error); 120 executable->recordParse(unlinkedCode->codeFeatures(), unlinkedCode->hasCapturedVariables(), firstLine, firstLine + unlinkedCode->lineCount(), startColumn); 123 UnlinkedCodeBlockType* unlinkedCode = generateBytecode<UnlinkedCodeBlockType, ExecutableType>(vm, scope, executable, source, strictness, debuggerMode, profilerMode, error); 134 UnlinkedProgramCodeBlock* CodeCache::getProgramCodeBlock(VM& vm, ProgramExecutable* executable, const SourceCode& source, JSParserStrictness strictness, DebuggerMode debuggerMode, ProfilerMode profilerMode, ParserError& error) argument 136 return getCodeBlock<UnlinkedProgramCodeBlock>(vm, 0, executable, source, strictness, debuggerMode, profilerMode, error); 139 UnlinkedEvalCodeBlock* CodeCache::getEvalCodeBlock(VM& vm, JSScope* scope, EvalExecutable* executable, cons argument [all...] |
H A D | Executable.h | 276 NativeExecutable* executable; local 278 executable = new (NotNull, allocateCell<NativeExecutable>(vm.heap)) NativeExecutable(vm, function, constructor); 279 executable->finishCreation(vm, JITCode(), JITCode(), intrinsic); 281 executable = new (NotNull, allocateCell<NativeExecutable>(vm.heap)) NativeExecutable(vm, function, constructor); 282 executable->finishCreation(vm, JITCode::HostFunction(callThunk), JITCode::HostFunction(constructThunk), intrinsic); 284 return executable; 292 NativeExecutable* executable = new (NotNull, allocateCell<NativeExecutable>(vm.heap)) NativeExecutable(vm, function, constructor); local 293 executable->finishCreation(vm); 294 return executable; 459 EvalExecutable* executable local 502 ProgramExecutable* executable = new (NotNull, allocateCell<ProgramExecutable>(*exec->heap())) ProgramExecutable(exec, source); local 581 FunctionExecutable* executable = new (NotNull, allocateCell<FunctionExecutable>(vm.heap)) FunctionExecutable(vm, source, unlinkedExecutable, firstLine, lastLine, startColumn); local 782 JSFunction(VM& vm, FunctionExecutable* executable, JSScope* scope) argument 822 clearCodeVirtual(ExecutableBase* executable) argument [all...] |
/macosx-10.9.5/cxxfilt-11/cxxfilt/libiberty/ |
H A D | pex-one.c | 24 pex_one (int flags, const char *executable, char * const *argv, argument 32 errmsg = pex_run (obj, flags, executable, argv, outname, errname, err);
|
H A D | pex-win32.c | 66 /* Ensure that the executable pathname uses Win32 backslashes. This 69 that calls CreateProcess) *iff* the executable pathname (argv[0]) 150 /* Tack the executable on the end of a (possibly slash terminated) buffer 153 tack_on_executable (char *buf, const char *executable) argument 158 backslashify (strcat (buf, executable)); 184 mingw_rootify (const char *executable) argument 197 return executable; 205 return executable; 217 return executable; 240 return executable; 287 msys_rootify(const char *executable) argument 526 win32_spawn(const char *executable, BOOL search, char *const *argv, char *const *env, DWORD dwCreationFlags, LPSTARTUPINFO si, LPPROCESS_INFORMATION pi) argument 623 spawn_script(const char *executable, char *const *argv, char* const *env, DWORD dwCreationFlags, LPSTARTUPINFO si, LPPROCESS_INFORMATION pi) argument 700 pex_win32_exec_child(struct pex_obj *obj ATTRIBUTE_UNUSED, int flags, const char *executable, char * const * argv, char* const* env, int in, int out, int errdes, int toclose ATTRIBUTE_UNUSED, const char **errmsg, int *err) argument [all...] |
H A D | pex-unix.c | 339 pex_child_error (struct pex_obj *obj, const char *executable, argument 345 writeerr (executable); 359 pex_unix_exec_child (struct pex_obj *obj, int flags, const char *executable, argument 394 pex_child_error (obj, executable, "dup2", errno); 396 pex_child_error (obj, executable, "close", errno); 401 pex_child_error (obj, executable, "dup2", errno); 403 pex_child_error (obj, executable, "close", errno); 408 pex_child_error (obj, executable, "dup2", errno); 410 pex_child_error (obj, executable, "close", errno); 415 pex_child_error (obj, executable, "clos [all...] |
/macosx-10.9.5/JavaScriptCore-7537.78.1/jit/ |
H A D | ClosureCallStubRoutine.cpp | 42 Structure* structure, ExecutableBase* executable, const CodeOrigin& codeOrigin) 45 , m_executable(vm, owner, executable) 40 ClosureCallStubRoutine( const MacroAssemblerCodeRef& code, VM& vm, const JSCell* owner, Structure* structure, ExecutableBase* executable, const CodeOrigin& codeOrigin) argument
|
H A D | ClosureCallStubRoutine.h | 47 ExecutableBase* executable() const { return m_executable.get(); } function in class:JSC::ClosureCallStubRoutine
|
/macosx-10.9.5/JavaScriptCore-7537.78.1/bytecode/ |
H A D | CodeOrigin.cpp | 68 out.print(frame->briefFunctionInformation(), ":<", RawPointer(frame->executable.get()), "> "); 87 return executable->hashFor(specializationKind()); 92 return jsCast<FunctionExecutable*>(executable.get())->inferredName().string(); 97 return jsCast<FunctionExecutable*>(executable.get())->baselineCodeBlockFor(specializationKind()); 107 out.print(briefFunctionInformation(), ":<", RawPointer(executable.get()), ", bc#", caller.bytecodeIndex, ", ", specializationKind());
|
H A D | CallLinkStatus.h | 60 CallLinkStatus(ExecutableBase* executable, Structure* structure) argument 61 : m_executable(executable) 66 ASSERT(!!executable == !!structure); 114 ExecutableBase* executable() const { return m_executable; } function in class:JSC::CallLinkStatus
|
H A D | CallLinkStatus.cpp | 51 m_executable = jsCast<JSFunction*>(value.asCell())->executable(); 111 return CallLinkStatus(callLinkInfo.stub->executable(), callLinkInfo.stub->structure()); 118 return CallLinkStatus(target->executable(), target->structure());
|
H A D | UnlinkedCodeBlock.cpp | 50 static UnlinkedFunctionCodeBlock* generateFunctionCodeBlock(VM& vm, JSScope* scope, UnlinkedFunctionExecutable* executable, const SourceCode& source, CodeSpecializationKind kind, DebuggerMode debuggerMode, ProfilerMode profilerMode, ParserError& error) argument 52 RefPtr<FunctionBodyNode> body = parse<FunctionBodyNode>(&vm, source, executable->parameters(), executable->name(), executable->isInStrictContext() ? JSParseStrict : JSParseNormal, JSParseFunctionCode, error); 59 if (executable->forceUsesArguments()) 61 body->finishParsing(executable->parameters(), executable->name(), executable->functionNameIsInScopeToggle()); 62 executable->recordParse(body->features(), body->hasCapturedVariables(), body->lineNo(), body->lastLine()); 135 UnlinkedFunctionExecutable* executable local [all...] |
/macosx-10.9.5/vim-53/runtime/autoload/ |
H A D | netrwFileHandlers.vim | 80 if executable("mozilla") 83 elseif executable("netscape") 103 if executable("mozilla") 106 elseif executable("netscape") 123 if executable("gimp") 125 elseif executable(expand("$SystemRoot")."/SYSTEM32/MSPAINT.EXE") 142 if executable("gimp") 144 elseif executable(expand("$SystemRoot")."/SYSTEM32/MSPAINT.EXE") 160 if executable("gimp") 162 elseif executable(expan [all...] |
/macosx-10.9.5/JavaScriptCore-7537.78.1/debugger/ |
H A D | Debugger.cpp | 72 if (function->executable()->isHostFunction()) 75 FunctionExecutable* executable = function->jsExecutable(); 79 if (!m_functionExecutables.add(executable).isNewEntry) 83 executable->clearCodeIfNotCompiling(); 84 executable->clearUnlinkedCodeForRecompilationIfNotCompiling(); 86 m_sourceProviders.add(executable->source().provider(), exec);
|
/macosx-10.9.5/emacs-92/emacs/lisp/progmodes/ |
H A D | executable.el | 0 ;;; executable.el --- base functionality for executable interpreter scripts -*- byte-compile-dynamic: t -*- 28 ;; executable.el is used by certain major modes to insert a suitable 32 ;; Unless it has a magic number, a Unix file with executable mode is passed to 36 ;; executable script. Such a magic number is made up by the characters `#!' 44 ;; makes the file executable if it wasn't, as soon as it's saved. 49 ;; Modes that use this should nconc `executable-map' to the end of their own 50 ;; keymap and `executable-font-lock-keywords' to the end of their own font 52 ;; `executable-set-magic'. 56 (defgroup executable ni function [all...] |
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_commands_uninstall_command.rb | 16 @executable = File.join(@gemhome, 'bin', 'executable') 40 assert_equal "Removing executable", output.shift 55 assert File.exist?(@executable) 57 assert File.symlink?(@executable) 61 FileUtils.rm_f @executable 63 open @executable, "wb+" do |f| f.puts "binary" end 72 assert_match(/Removing executable/, output.shift) 74 assert_equal false, File.exist?(@executable) 79 FileUtils.rm_f @executable # Wis [all...] |
/macosx-10.9.5/DiskArbitration-266/diskarbitrationd/ |
H A D | DACommand.h | 46 extern void DACommandExecute( CFURLRef executable,
|
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | dirscanner.cpp | 93 bool executable = ent->fts_statp->st_mode & (S_IXUSR | S_IXGRP | S_IXOTH); local 98 rule = match(relpath, file, executable); 107 rule = match(relpath, symlink, executable, target); 114 rule = match(relpath, directory, executable); 136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) argument 141 && !(executable && (rule->flags & noexec))
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | dirscanner.cpp | 93 bool executable = ent->fts_statp->st_mode & (S_IXUSR | S_IXGRP | S_IXOTH); local 98 rule = match(relpath, file, executable); 107 rule = match(relpath, symlink, executable, target); 114 rule = match(relpath, directory, executable); 136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) argument 141 && !(executable && (rule->flags & noexec))
|
/macosx-10.9.5/swig-10/Lib/perl5/ |
H A D | perlmain.i | 14 Perl executable. This will be necessary on systems that do 19 Perl executable. Thus, it may be necessary (or desirable)
|
/macosx-10.9.5/ruby-104/ruby/nacl/ |
H A D | nacl-config.rb | 33 ].find{|path| File.executable?(path)} or raise "No sel_ldr found" 37 ].find{|path| File.executable?(path)} or raise "No irt_core found"
|
/macosx-10.9.5/tcl-102/tcl_ext/sdx/sdx/lib/app-sdx/ |
H A D | addtoc.tcl | 20 if {[file executable $x]} { append s " x" }
|