/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican_test.c | 66 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 79 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_test.c | 73 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 87 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
/external/e2fsprogs/lib/blkid/ |
getsize.c | 50 #define BLKGETSIZE _IO(0x12,96) /* return device size */ 54 #define BLKGETSIZE64 _IOR(0x12,114,size_t) /* return device size in bytes (u64 *arg) */
|
/external/e2fsprogs/lib/ext2fs/ |
getsize.c | 50 #define BLKGETSIZE _IO(0x12,96) /* return device size */ 54 #define BLKGETSIZE64 _IOR(0x12,114,size_t) /* return device size in bytes (u64 *arg) */
|
/external/sonivox/jet_tools/JetCreator/ |
img_Copy.py | 21 \x90N\x91\x12\x11r\xb9\x9c\xdb\xff?\x8b\xd0\x9f\x82\xb4B\x08\x11\x0f@\x95\
29 \xf1\xad\x01\x011\x030L\xa3y\xeb\xceM\xe5\xff\x02\xa2\x19T\x12\xbb\x89\x08\
|
img_New.py | 27 \x12`\\%z\x12\x8b41\xd2\x04\x99\x00\x99E\xcc\x03\x08>\xeeN,\x88\xf9\x03\xa4\
|
img_Save.py | 24 ?\xa3}\xff\xd6\xd3o>s\xee\xd3\x02X\xd3\'\x12\x8dk\x9e\x98Q\x95\xb8k\xf0|\xae\
32 \xa4\xb5\xfeY$\x12\xf9\xbcm\xdbS G\xfd\x04\xe3\xd7-b\xd5\xd2\x0e\x86\x86\xf3\
65 \xbf~\xbd\xed\xba.B\x88P\xc6\xc7\xc7\xf1}\x9f\xf2\xf2r\x12\x89\x04\xd1h\x14!\
|
/frameworks/base/media/libstagefright/codecs/m4v_h263/enc/src/ |
vlc_enc_tab.h | 269 {0x12, 6}, {0x0a, 10}, {0x00, 0}, {0x00, 0} 349 {0x13, 7}, {0x12, 7}, {0x11, 7}, {0x10, 7}, 353 {0x14, 9}, {0x13, 9}, {0x12, 9}, {0x11, 9}, 370 {0x0c, 5}, {0x15, 6}, {0x13, 6}, {0x12, 6}, 413 {0x12, 7}, {0x1b, 9}, {0x54, 12}, {0x00, 0}, 484 {0x14, 9}, {0x13, 9}, {0x12, 9}, {0x11, 9}, 712 { 0x12, 5}, 1029 { 0x12, 5},
|
/external/elfutils/libdw/ |
dwarf.h | 32 DW_TAG_string_type = 0x12, 98 DW_AT_high_pc = 0x12, 196 DW_FORM_ref2 = 0x12, 219 DW_OP_dup = 0x12, 541 DW_CFA_def_cfa_sf = 0x12,
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 52 "\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12" 56 "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9" 103 "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9" 156 "\x32\x12\x4E\xF0\x23\x6E\x5D\x1E\x3B\x7E\x28\xFA\xE7\xAA\x04\x0A" 161 "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9"
|
/external/protobuf/java/src/test/java/com/google/protobuf/ |
CodedInputStreamTest.java | 164 (0x3e << 0) | (0x77 << 7) | (0x12 << 14) | (0x04 << 21) | 170 (0x3e << 0) | (0x77 << 7) | (0x12 << 14) | (0x04 << 21) | 234 assertReadLittleEndian32(bytes(0x78, 0x56, 0x34, 0x12), 0x12345678); 238 bytes(0xf0, 0xde, 0xbc, 0x9a, 0x78, 0x56, 0x34, 0x12), 241 bytes(0x78, 0x56, 0x34, 0x12, 0xf0, 0xde, 0xbc, 0x9a),
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
boxes-fst.dat | 64 {0x0e,0x07,0x07,0x09}, {0x24,0x12,0x12,0x36}, {0x1b,0x80,0x80,0x9b}, {0xdf,0xe2,0xe2,0x3d}, 66 {0x12,0x09,0x09,0x1b}, {0x1d,0x83,0x83,0x9e}, {0x58,0x2c,0x2c,0x74}, {0x34,0x1a,0x1a,0x2e}, 103 {0x90,0x48,0x48,0xd8}, {0x06,0x03,0x03,0x05}, {0xf7,0xf6,0xf6,0x01}, {0x1c,0x0e,0x0e,0x12}, 134 {0x09,0x0e,0x07,0x07}, {0x36,0x24,0x12,0x12}, {0x9b,0x1b,0x80,0x80}, {0x3d,0xdf,0xe2,0xe2}, 136 {0x1b,0x12,0x09,0x09}, {0x9e,0x1d,0x83,0x83}, {0x74,0x58,0x2c,0x2c}, {0x2e,0x34,0x1a,0x1a}, 173 {0xd8,0x90,0x48,0x48}, {0x05,0x06,0x03,0x03}, {0x01,0xf7,0xf6,0xf6}, {0x12,0x1c,0x0e,0x0e}, 204 {0x07,0x09,0x0e,0x07}, {0x12,0x36,0x24,0x12}, {0x80,0x9b,0x1b,0x80}, {0xe2,0x3d,0xdf,0xe2} [all...] |
/packages/apps/Email/src/com/android/exchange/adapter/ |
Tags.java | 69 public static final int SYNC_COLLECTION_ID = SYNC_PAGE + 0x12; 117 public static final int CONTACTS_BUSINESS_FAX_NUMBER = CONTACTS_PAGE + 0x12; 175 public static final int CALENDAR_END_TIME = CALENDAR_PAGE + 0x12; 215 public static final int FOLDER_SYNC_KEY = FOLDER_PAGE + 0x12; 248 public static final int EMAIL_IMPORTANCE = EMAIL_PAGE + 0x12; 308 public static final int TASK_RECURRENCE_UNTIL = TASK_PAGE + 0x12; 374 public static final int SEARCH_VALUE = SEARCH_PAGE + 0x12; 474 public static final int BASE_METHOD = BASE_PAGE + 0x12; [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_test.c | 117 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 123 0x35, 0xe8, 0xcf, 0x12, 0x1d, 0xcb, 0x30, 0xbc }, 144 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
/external/openssl/crypto/aes/ |
aes_wrap.c | 191 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 203 0x1f, 0xa6, 0x8b, 0x0a, 0x81, 0x12, 0xb4, 0x47, 228 0xa8, 0xf9, 0xbc, 0x16, 0x12, 0xc6, 0x8b, 0x3f,
|
/external/openssl/crypto/des/ |
speed.c | 183 static DES_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0}; 184 static DES_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12}; 185 static DES_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
|
/bionic/libc/kernel/arch-arm/asm/arch/ |
fpga.h | 26 #define H2P2_DBG_FPGA_BOARD_REV (H2P2_DBG_FPGA_BASE + 0x12)
|
/bionic/libc/kernel/common/linux/ |
fd.h | 164 #define FDGETDRVSTAT _IOR(2, 0x12, struct floppy_drive_struct)
|
msdos_fs.h | 95 #define VFAT_IOCTL_GET_VOLUME_ID _IOR('r', 0x12, __u32)
|
msm_kgsl.h | 129 #define IOCTL_KGSL_CMDSTREAM_FREEMEMONTIMESTAMP _IOR(KGSL_IOC_TYPE, 0x12, struct kgsl_cmdstream_freememontimestamp)
|
/bionic/libc/stdlib/ |
tolower_.c | 16 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
toupper_.c | 17 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
/cts/tests/tests/content/src/android/content/pm/cts/ |
SignatureTest.java | 35 private static final byte[] mSignatureByteArray = { (byte) 0x12, (byte) 0x34, (byte) 0x56,
|
/development/ndk/platforms/android-3/arch-arm/include/asm/arch/ |
fpga.h | 26 #define H2P2_DBG_FPGA_BOARD_REV (H2P2_DBG_FPGA_BASE + 0x12)
|
/development/ndk/platforms/android-3/include/linux/ |
fd.h | 164 #define FDGETDRVSTAT _IOR(2, 0x12, struct floppy_drive_struct)
|