/external/llvm/lib/Target/X86/Disassembler/ |
X86DisassemblerDecoder.c | 328 case 0x36: /* SS segment override -OR- Branch taken */ 337 case 0x36: [all...] |
/external/stlport/src/ |
ctype.cpp | 208 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 244 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
/external/webkit/Source/WebKit2/Shared/mac/ |
WebEventFactory.mm | 792 case '6': case '^': return 0x36; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_internal.c | 102 k_pad[i] ^= 0x36; 120 k_pad[i] ^= 0x36;
|
md5.c | 59 * ipad is the byte 0x36 repeated 64 times 69 k_pad[i] ^= 0x36;
|
/ndk/sources/cxx-stl/stlport/src/ |
ctype.cpp | 208 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 244 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
/packages/inputmethods/OpenWnn/libs/libwnnEngDic/ |
WnnEngDic.c | 21 0x00, 0x00, 0x00, 0x36, 0x00, 0x00, 0x00, 0x1e, 0x00, 0x00, 0x00, 0x1e, 0x80, 0x00, 0x00, 0x00, 40 0x1f, 0x8a, 0x80, 0x42, 0x26, 0x8b, 0x00, 0x42, 0x30, 0x8c, 0x00, 0x42, 0x36, 0x8c, 0x80, 0xb1, 63 0x22, 0x45, 0x0d, 0x82, 0x00, 0x45, 0x25, 0x04, 0x00, 0x45, 0x36, 0x86, 0x00, 0xc5, 0x49, 0x09, 72 0x8d, 0x00, 0xb3, 0x70, 0x76, 0x36, 0x12, 0x24, 0x2a, 0x0e, 0x46, 0x3b, 0x01, 0x80, 0x46, 0x3d, 139 0x00, 0x49, 0x31, 0x04, 0x80, 0x49, 0x36, 0x05, 0x00, 0x49, 0x37, 0x07, 0x80, 0x49, 0x39, 0x08, 172 0x07, 0x80, 0x69, 0xcd, 0x95, 0x72, 0x11, 0x49, 0xcf, 0x0a, 0x80, 0xb2, 0x2b, 0x36, 0x2e, 0x30, 242 0x5e, 0x98, 0x36, 0x18, 0x0c, 0x24, 0x4b, 0x0c, 0x83, 0x00, 0x4b, 0x0e, 0x03, 0x80, 0x4b, 0x0f, 252 0x1a, 0xb0, 0x64, 0xfa, 0x36, 0x2e, 0x4b, 0x3f, 0x03, 0x00, 0x4b, 0x43, 0x84, 0x80, 0x4b, 0x44, 266 0x6b, 0x51, 0x36, 0x0a, 0x08, 0x4b, 0x52, 0x05, 0x00, 0x4b, 0x53, 0x87, 0x80, 0xcb, 0x53, 0x8b, 267 0x80, 0x4b, 0x55, 0x84, 0x00, 0x4b, 0x59, 0x86, 0x00, 0x4b, 0x5b, 0x09, 0x80, 0xeb, 0x5b, 0x36, [all...] |
/external/llvm/test/MC/ARM/ |
basic-arm-instructions.s | 694 @ CHECK: ldc2 p5, c3, [r6], #-72 @ encoding: [0x12,0x35,0x36,0xfc] [all...] |
/packages/inputmethods/OpenWnn/libs/libwnnJpnDic/ |
WnnJpnDic.c | 21 0x00, 0x00, 0x00, 0x36, 0x00, 0x00, 0x00, 0x12, 0x00, 0x00, 0x00, 0x14, 0x80, 0x00, 0x00, 0x00, 28 0x00, 0x31, 0x00, 0x32, 0x00, 0x34, 0x00, 0x36, 0x00, 0x37, 0x00, 0x38, 0x00, 0x3a, 0x00, 0x3b, 44 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x30, 0x41, 0x30, 0x42, 0x30, 0x43, 89 0x00, 0xc7, 0xf8, 0x13, 0x40, 0x20, 0x35, 0x90, 0x40, 0x20, 0x35, 0xe0, 0x50, 0x20, 0x36, 0x70, 113 0x26, 0xd3, 0x80, 0x48, 0x27, 0xc0, 0x80, 0x48, 0x28, 0x01, 0x00, 0x68, 0x36, 0x82, 0xc6, 0xc1, 114 0xc0, 0x48, 0x36, 0x02, 0xc0, 0x68, 0x36, 0x02, 0xcc, 0x03, 0x00, 0x48, 0x39, 0xc4, 0x80, 0x68, 164 0xd2, 0x00, 0x21, 0xcc, 0xb4, 0x90, 0x68, 0xb1, 0xc7, 0x36, 0xd2, 0x80, 0x68, 0xb1, 0x47, 0x3c, 224 0x77, 0x4f, 0x80, 0x23, 0x36, 0xb3, 0xf0, 0x49, 0x79, 0x50, 0x80, 0x49, 0x79, 0x51, 0x00, 0x49, 281 0x4c, 0x92, 0x36, 0x12, 0xc0, 0x6a, 0x4d, 0x52, 0x3b, 0x93, 0x40, 0xca, 0x4e, 0xd3, 0x80, 0x6a [all...] |
/external/icu4c/test/cintltst/ |
ncnvtst.c | 210 0x36, 0x21, 272 0x7E, 0x7B, 0x36, 0x21, [all...] |
/external/openssl/crypto/des/ |
destest.c | 228 {0x95,0xBA,0xA9,0x4E,0x87,0x36,0xF2,0x89}, 243 0x37,0x36,0x35,0x34,0x33,0x32,0x31,0x20, 301 0xF3,0x09,0x87,0x87,0x7F,0x57, 0xF7,0x3C,0x36,0xB6,0xDB,0x70,
|
/external/quake/quake/src/QW/client/ |
common.c | [all...] |
/external/freetype/src/sfnt/ |
ttload.c | 230 * The table length should be 0x36, but certain font tools make it 238 if ( table.Length < 0x36 ) [all...] |
/external/grub/netboot/ |
3c90x.c | 66 regCountdown_w = 0x36, /** Universal **/
|
/external/icu4c/common/ |
uinvchar.c | 82 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
/external/libxml2/ |
xmlstring.c | 232 0x30,0x31,0x32,0x33,0x34,0x35,0x36,0x37,
|
/external/llvm/include/llvm/Support/ |
ELF.h | 523 R_ARM_THM_PC12 = 0x36, [all...] |
/external/wpa_supplicant/ |
md5.c | 59 * ipad is the byte 0x36 repeated 64 times 69 k_pad[i] ^= 0x36;
|
/external/wpa_supplicant/tests/ |
test_sha1.c | 30 0x36, 0x0B, 0x03, 0x7C, 0xD1, 0x85, 0xE4, 0x14
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 30 0x36, 0x0B, 0x03, 0x7C, 0xD1, 0x85, 0xE4, 0x14
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 51 0xC2,0x00,0x7C,0xB8,0xA1,0x63,0xBF,0x05,0x98,0xDA,0x48,0x36,
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
WspTypeDecoder.java | 98 WELL_KNOWN_MIME_TYPES.put(0x36, "application/vnd.wap.connectivity-wbxml");
|
/frameworks/media/libvideoeditor/vss/video_filters/src/ |
M4VIFI_Clip.c | 102 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b,
|
/external/chromium/webkit/glue/ |
webcursor_gtk_data.h | 227 0xc0, 0x36, 0x00, 0x00, 0x20, 0xc9, 0x00, 0x00, 0x20, 0x40, 0x01, 0x00, 239 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc0, 0x36, 0x00, 0x00,
|
/external/openssl/crypto/aes/asm/ |
aes-586.pl | [all...] |