HomeSort by relevance Sort by last modified time
    Searched refs:At (Results 1 - 24 of 24) sorted by null

  /external/v8/test/mjsunit/
for-in-null-or-undefined.js 28 // At least Spidermonkey and IE allow for-in iteration over null and
unicode-test.js     [all...]
  /external/v8/src/arm/
constants-arm.h 92 // Manual" from July 2005 (available at http://www.arm.com/miscPDFs/14128.pdf)
191 // Example: Test whether the instruction at ptr does set the condition code
195 // Instr* instr = Instr::At(ptr);
310 // Use the At(pc) function to create references to Instr.
311 static Instr* At(byte* pc) { return reinterpret_cast<Instr*>(pc); }
  /external/openssl/apps/
CA.com 9 $! At the end of that grab newreq.pem and newcert.pem (one has the key
makeapps.com 22 $! Specify which compiler at P2 to try to compile under.
176 $! Check To See If We Are At The End Of The File List.
220 $! Check To See If We Are At The End Of The File List.
976 $! Set up the logical name OPENSSL to point at the include directory
  /external/v8/src/mips/
constants-mips.h 432 // Return the fields at their original place in the instruction encoding.
499 // Use the At(pc) function to create references to Instruction.
500 static Instruction* At(byte_* pc) {
  /sdk/files/
find_java.bat 6 rem You may obtain a copy of the License at
82 echo Java was found at %full_path%.
86 echo At the end of the "Path" entry in "User variables", add the following:
  /external/openssl/crypto/
crypto-lib.com 28 $! Specify which compiler at P3 to try to compile under.
332 $! Check To See If We Are At The End Of The Module List.
337 $! We Are At The End Of The Module List, Go To MODULE_DONE.
449 $! Check To See If We Are At The End Of The File List.
454 $! We Are At The End Of The File List, Change State Or Goto FILE_DONE.
1177 $! Build a MACRO command for the architecture at hand
    [all...]
  /external/tremolo/Tremolo/
bitwiseARM.s 87 @ At this point, r10 contains the first r5 bits of the result
279 @ At this point, r10 contains the first r5 bits of the result
  /external/zlib/contrib/masm686/
match.asm 295 ;/* Test the strings for equality, 8 bytes at a time. At the end,
298 ; * We already know at this point that the first three bytes of the
  /system/core/libpixelflinger/
scanline.cpp 7 ** You may obtain a copy of the License at
500 // All iterated values are sampled at the pixel center
658 uint32_t At = texel.c[0];
676 Cf += ((Ct - Cf) * (At + (At>>(sat-1)))) >> sat;
    [all...]
  /external/zlib/contrib/pascal/
example.pas 287 (* At this point, uncompr is still mostly zeroes, so it should compress
  /external/clearsilver/ruby/
install.rb 910 value = (/\Ay(es)?|\At(rue)/i === value) ? 'yes' : 'no'
  /external/blktrace/btt/doc/
btt.tex 10 % (at your option) any later version.
77 all devices that were traced (or at least on all devices that you
220 Looking at the following example:
291 queue at the time of an unplug or unplug due to a timeout. The following
319 \item[Active Requests At Q Information]
331 ==================== Active Requests At Q Information ====================
472 histogram output for the amount of IOs released at unplug time.
685 command at that time (either Q2D, D2C or Q2C).
769 will indicate the number of seeks per second at that point.
775 value is the number of seeks present at that time
    [all...]
  /external/iproute2/doc/
ip-tunnels.tex 266 work. At least, I did not test it, did not debug it and
291 Also you may look at statistics:
466 rooted at \verb|1:ABC| and attach to subroot set of rules parsing
ip-cref.tex 39 bugs and design drawbacks. They may be skipped at the first reading.
368 unique at every given moment. However, the interface may disappear from the
551 to a network device. Each device must have at least one address
    [all...]
  /external/zlib/contrib/masmx64/
gvmat64.asm 129 ;;; program to crash horribly, without so much as a warning at
417 ;;; Test the strings for equality, 8 bytes at a time. At the end,
420 ;;; We already know at this point that the first three bytes of the
  /external/zlib/contrib/masmx86/
match686.asm 144 ;;; program to crash horribly, without so much as a warning at
165 ;;; You can look at http://www.muppetlabs.com/~breadbox/software/assembly.html
355 ;;; Test the strings for equality, 8 bytes at a time. At the end,
358 ;;; We already know at this point that the first three bytes of the
gvmat32.asm 13 ; and in VC++2003 toolkit at http://msdn.microsoft.com/visualc/vctoolkit2003/
432 mov edx,[esi+3] ; compare manually dword at match+3
461 mov ecx,(MAX_MATCH-(2+4))/4 ; scan for at most MAX_MATCH bytes
638 ;;; program to crash horribly, without so much as a warning at
659 ;;; You can look at http://www.muppetlabs.com/~breadbox/software/assembly.html
842 ;;; Test the strings for equality, 8 bytes at a time. At the end,
845 ;;; We already know at this point that the first three bytes of the
  /external/blktrace/doc/
blktrace.tex 9 % (at your option) any later version.
79 Note that you may skip this step, if you kernel is at least 2.6.17-rc1.
91 At this point you may (optionally) remove linux-2.6.13.tar.bz2 and
94 At this point you should configure the Linux kernel for your specific
119 \item Add an entry into /etc/fstab, and have it done automatically at
227 go run you test cases. Stop the trace, and at your leisure utilize
424 specific disk location at a given size. These requests typically
529 request is fully formed at this time.
531 \item[Q -- queued] This notes intent to queue io at the given location.
574 normal boundary conditions. dm is notably bad at this and will clon
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex 123 The library was designed such that new ciphers/hashes/PRNGs can be added at run-time and the existing API
150 that can be used to make a program automatically pick between ciphers, hashes and PRNGs at run-time. That means your
546 keys (mainly for test vectors anyways). Ideally, your application should be making at least 256 bit keys. This is not
594 For a plugin to be compliant it must provide at least each function listed before the accelerators begin. Accelerators are optional,
657 Note that \textit{Twofish} has additional configuration options (Figure \ref{fig:twofishopts}) that take place at build time. These options are found in
730 as there is no more room (it can have 32 ciphers at most) it will return {\bf{-1}}. If you try to add the same cipher more
    [all...]
  /external/grub/docs/
texinfo.tex 14 % published by the Free Software Foundation; either version 2, or (at
216 % \vadjust-items are inserted at the left edge of the type. So
272 % Dimensions to add cropmarks at corners.
437 % We prepended an \empty token at the very beginning and we expand it now,
469 % space in the output. Don't allow a line break at this space, as this
501 % At runtime, environments start with this:
630 % at the beginning of a line will start with \penalty -- and
658 % @w prevents a word break. Without the \leavevmode, @w at the
674 % explicit \vfill so that the extra space is at the bottom. The
724 % TeX puts in an \escapechar (i.e., `@') at the beginning of the hel
    [all...]
  /external/dropbear/libtommath/
bn.tex 155 LibTomMath can configured at build time in three phases we shall call ``depends'', ``tweaks'' and ``trims''.
181 They can be enabled at any pass of the configuration phase.
453 at once. If the function returns MP\_OKAY then all of the mp\_int variables are ready to use, otherwise none of them
455 from the heap at the same time.
644 domain of a digit can change (it's always at least $0 \ldots 127$).
    [all...]
  /external/bison/
configure 107 # Find who we are. Look in the path if we contain no path at all
163 # substitution so that $LINENO is not a special case at line end.
208 # Don't use ln at all; we don't have any links
    [all...]

Completed in 649 milliseconds