HomeSort by relevance Sort by last modified time
    Searched refs:x88 (Results 26 - 50 of 363) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/apache-harmony/archive/src/test/java/org/apache/harmony/archive/tests/java/util/jar/
ManifestTest.java 298 (byte) 0xd1, (byte) 0x88, (byte) 0xd0, (byte) 0xb0 };
300 final byte[] bSpec = new byte[] { (byte) 0xe1, (byte) 0x88,
301 (byte) 0xb0, (byte) 0xe1, (byte) 0x88, (byte) 0x8b,
302 (byte) 0xe1, (byte) 0x88, (byte) 0x9d, ' ', (byte) 0xe1,
332 (byte) 0x88, (byte) 0xd0, (byte) 0xb0, (byte) 0xd1,
368 (byte) 0xe0, (byte) 0xaf, (byte) 0x88, (byte) 0xe0,
380 (byte) 0xe1, (byte) 0x88, (byte) 0xb0, (byte) 0xe1,
381 (byte) 0x88, (byte) 0x8b, (byte) 0xe1, (byte) 0x88,
  /external/wpa_supplicant/tests/
test_aes.c 124 { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0,
184 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
192 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
201 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
213 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
237 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_aes.c 124 { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0,
186 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
194 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
203 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
215 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
239 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  /dalvik/tests/027-arithmetic/src/
Main.java 11 0x11, 0x22, 0x33, 0x44, 0x88, 0x99, 0xaa, 0xbb
46 long h = 0x88;
  /bootable/bootloader/legacy/include/msm7k/
gpio.h 88 #define GPIO_INT_EN_3 GPIO1_REG(0x88)
  /external/libvpx/libmkv/
EbmlIDs.h 96 FlagDefault = 0x88,
  /external/skia/samplecode/
SampleLayers.cpp 55 p.setAlpha(0x88);
176 p.setAlpha(0x88);
193 p.setAlpha(0x88);
  /external/sonivox/jet_tools/JetCreator/
img_Undo.py 12 |\x08d\x88\x00\x00\x05\xaaIDATX\x85\xd5\x97klT\xc7\x15\xc7\x7fs\xef\xdd\xf5\
13 \xda^\xdb\x18;\x88\xf2\x067\x01\x1a\'$\xc4T\x8aM)\xc1\xc9\x07\xac\xa8\xe9\
14 \x87\x88$R\xe2\x00!\tAj\x91"%RZ\xa2\xaa\x8f\xa8\xfd\x10\xa9B\xfeDKx\xb6Q\xde\
23 L\xb7\xa0e\x1f\x08\xeb\xba\x88\x8f\x0b\xd0\xbc\x8b5\xe4\x85\xdf^Z\xfd\xa7\
50 j\xa4\x12r[O>\xdbS\xf1\xf8\xb7C\xdf\x9d\xd7\xc2\x9c\x81\xc0@\x88\x04ZS6e\x00\
52 \xcd\xdfR\xb1~W\x88 \x18\x05\xa4\x87\xfb\x11\x82\xf6\xa9\x02\x88\xd1X\xf3\
57 J\xbdb\tV~\x88\xcd\xa5e\x96\xad\xb4J\xf6\x9e\xed3l\xa5^\\\xf381\xfc\xda\xcc\
img_Print.py 12 \x08d\x88\x00\x00\x03\xacIDATX\x85\xe5\x97\xcfK+W\x14\xc7?\x93d\x921&5\xc4TD\
26 \xb1SSS\xa8\xaa\xda\xe0\x13B\xb4G@\xd7uR\xa9\x94;o>n^\xdc\xdc\xdc \x84h\x88\
27 \t\x85\x1e.\xf1\xe0\xaaa\x18\xeeE\xe4M\xaa(\x8a\xab\x84\xd7_,\x16[\x88\xf6\
47 \xde\x9a\xc3\xa8\x0b\x88:\xa4\x9e\xe3_\x91\x17\xa6\x93\xd3\x04\xae\x80s\xe0\
img_Cut.py 12 \x08d\x88\x00\x00\x07\xe4IDATX\x85\xad\x97{PU\xc7\x1d\xc7\xbf\xbb{\xce\xb9\
15 \xb1\xc9\xc4\xcc\xb4\xd3\xd6\x17\xad\xd1&\x05\xb5>\x88\x164 p\x91\xc7\xe5\
36 RJ0F\xd0t\xf2D\xdc\x88\xf2\x1fL\xa4\x7fW\x00\x00\x88\xc7\xf8\xe3M\'N\xc4\x15\
49 G\r\xc7\x81\x86\xb2?\xf5\xf4\x88\xa9h*Sq~\xc3\x86E\xeaG\xef{\x06=y8u\xb2\x11\
53 \xd2\'UB\xd6q)\xb3A\xa0Q\x83)\x16\xc2\x88>0\x00\xe3\\S\x04 \x1fv\x04\x87\xbe\
64 \xd4\x0fS%h\xef\xba\x12\x88\xc5b\x0fs\xc3\x98\xdd;4\xb4\xe5_\xcd\xcd\xc3\x1d\
66 \x14\xd8\xdb\xbb\xbb\xc3\x83\x81@\xa3[\x88\x82\xc7\x80\xfde@D\x13\xf8c8\x16\
77 6\x00B\x88\t\x00\xba\xcd\xc6\x08P\xf8\x14\x90\xf4&\xb0\xce\xc1X[fj\xea\x82y\
img_splash.py 22 \x0c\x01\x0b\x13P\x80\xa6\xe3\xad]R\xfd\x07ko\xfaT+\xa6WM\x88\x90\x1d,\xf9?\
33 \x80P\xde\x14\xccL\x98<\x10%J\xfc\xb95dP\xaf\x0c\x88"f\x8b\xc7\xff\xe6\x8d1\
44 \xed$\xe9\xf5\xf4*\xb4\x85\x00\xd0\x803?\x8c\x18\x88\x87\x9c\xd3\xe0\xf7Z\
46 f\xfd\xab\xbb\xc0aL\x02R^\x1dB0\xba\x88\xe3\x0e\xb7\xe5]RkA\x84\x10D\xe2\\\
47 \xbc\xfc- \x88\x17\xa6\xa8\xd0n\xb9\x05J\x98\xf3\x8e\x1a\x0b\n\xa2\xb0\x17>\
58 \xa6\x07:\x87\xc5\xda\xfc\x98kli\xfeH\xc8\xbe\x88\xab\xfa\xf7\xf2\x92\xb0\
59 \x88\xabH\xe2`\xe35\x8d\xc4{3$\x01\x94D/\xdb)\n\xef\xe0\xee`\x98\xaaF?>]\x7f\
85 \x88;\xa04\xeb\xb6d\xb3\xf9V+\xbc\xde\xe1;\x0f\xf1#\x04W%[\x8cx\x81\x12\x02w\
96 \xfdq\xb2\x12*Is!}\x13i\x0e\xa9\x8d\xedks\xb6%\xbc\xf5\xd8*\xe5p\x88\x82mB\
106 \xe2|\xdf\xbaJw:y\x07\x85|\xebMG\x83B\xabpw&\x95\x88\xc1rw>\x98\xba\x12\xba\
    [all...]
  /external/chromium/sdch/open-vcdiff/src/
varint_bigendian_test.cc 178 ExpectEncodedByte(0x88);
295 const char parse_data_32_bits[] = { 0x88, 0x80, 0x80, 0x80, 0x00 };
303 const char parse_data_32_bits[] = { 0x88, 0x80, 0x80, 0x80, 0x00 };
  /external/libnfc-nxp/src/
phFriNfc_MifareStdMap.h 131 #define PH_FRINFC_MIFARESTD_ACS_BYTE8 0x88 /*!< Access Bit for Byte 8 in
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
radiotap.c 178 [IEEE80211_RADIOTAP_TSFT] = 0x88,
  /external/wpa_supplicant_8/src/utils/
radiotap.c 178 [IEEE80211_RADIOTAP_TSFT] = 0x88,
  /libcore/luni/src/test/java/libcore/javax/crypto/spec/
AlgorithmParametersTestDSA.java 56 (byte) 0x2D, (byte) 0x42, (byte) 0xDF, (byte) 0xC2, (byte) 0x88,
  /libcore/luni/src/test/java/tests/targets/security/
KeyStoreTestPKCS12.java 92 (byte) 0x88, (byte) 0xC0, (byte) 0x13, (byte) 0xBA, (byte) 0xBE,
100 (byte) 0x88, (byte) 0xCA, (byte) 0x69, (byte) 0xA3, (byte) 0xB0,
144 (byte) 0x88, (byte) 0xFA, (byte) 0xF3, (byte) 0x15, (byte) 0x67,
226 (byte) 0x14, (byte) 0x88, (byte) 0x50, (byte) 0xA4, (byte) 0x03,
279 (byte) 0x19, (byte) 0xCB, (byte) 0xEE, (byte) 0x88, (byte) 0xB9,
282 (byte) 0x88, (byte) 0xDE, (byte) 0x47, (byte) 0xE6, (byte) 0x8F,
289 (byte) 0x11, (byte) 0x95, (byte) 0xE3, (byte) 0x88, (byte) 0x40,
403 (byte) 0x83, (byte) 0x0D, (byte) 0x0E, (byte) 0x88, (byte) 0x04,
425 (byte) 0x5C, (byte) 0x23, (byte) 0xCF, (byte) 0x88, (byte) 0x52,
    [all...]
  /packages/inputmethods/OpenWnn/libs/libwnnJpnDic/
WnnJpnDic.c 53 0x30, 0x86, 0x30, 0x87, 0x30, 0x88, 0x30, 0x89, 0x30, 0x8a, 0x30, 0x8b, 0x30, 0x8c, 0x30, 0x8d,
82 0x80, 0x67, 0xf1, 0x80, 0x6e, 0xc8, 0x40, 0x47, 0xf4, 0x88, 0x80, 0x20, 0x20, 0xa2, 0x60, 0x47,
95 0xfb, 0x47, 0x80, 0x67, 0xfc, 0x41, 0x2b, 0x88, 0x00, 0x47, 0xff, 0x48, 0x40, 0x68, 0x04, 0x81,
108 0x80, 0x68, 0x0c, 0x41, 0xf5, 0x88, 0x00, 0x48, 0x11, 0x88, 0x40, 0x48, 0x14, 0xc8, 0x80, 0x68,
117 0x40, 0x68, 0x3b, 0x42, 0xfb, 0x88, 0x80, 0x68, 0x3b, 0x03, 0x00, 0x09, 0xc0, 0x48, 0x3b, 0x4a,
138 0x7c, 0x04, 0xde, 0x47, 0x80, 0x48, 0x7b, 0x87, 0xc0, 0x21, 0x39, 0x72, 0x00, 0x48, 0x7a, 0x88,
168 0x48, 0xb3, 0x87, 0x40, 0x48, 0xb3, 0x87, 0x80, 0x48, 0xb3, 0x88, 0x40, 0x48, 0xb3, 0xcb, 0x00,
177 0x08, 0x80, 0x48, 0xcc, 0x89, 0xc0, 0x68, 0xcc, 0x88, 0x38, 0x8a, 0x40, 0x22, 0x0f, 0x43, 0x10,
181 0x92, 0x40, 0x68, 0xd7, 0x88, 0x90, 0x92, 0x80, 0x68, 0xd9, 0x48, 0x97, 0x92, 0xc0, 0x48, 0xd8
    [all...]
  /external/chromium/net/base/
dnssec_unittest.cc 75 0x76, 0x07, 0x5b, 0x88, 0x39, 0xd8, 0x60, 0x81, 0x9f, 0x36, 0xfc, 0x9c, 0x17,
178 0xbb, 0xfa, 0x27, 0xfa, 0x02, 0x76, 0x07, 0x5b, 0x88, 0x39, 0xd8, 0x60, 0x81,
181 0xd4, 0xfc, 0x83, 0x51, 0x02, 0x00, 0x88, 0x01, 0x00, 0x03, 0x08, 0x03, 0x01,
220 0xfb, 0xe9, 0x4a, 0x17, 0x88, 0x91, 0x55, 0xe5, 0xb3, 0x5f, 0xee, 0x73, 0xd7,
224 0x8c, 0x19, 0x88, 0x02, 0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0x02, 0x01, 0x10,
240 0xf8, 0x0e, 0x1d, 0x6e, 0x1a, 0x88, 0x0b, 0x98, 0xa5, 0x21, 0xdc, 0x43, 0x75,
246 0x00, 0x88, 0x01, 0x00, 0x03, 0x07, 0x03, 0x01, 0x00, 0x01, 0x9c, 0xf3, 0x56,
247 0x70, 0x44, 0x1d, 0x37, 0x51, 0xf9, 0x88, 0xa4, 0xf7, 0xf9, 0x1f, 0x60, 0x1b,
256 0x20, 0xf8, 0x7a, 0xf7, 0xa2, 0x2c, 0xf3, 0xfd, 0x00, 0x88, 0x01, 0x00, 0x03,
278 0x42, 0x0f, 0xfc, 0xc2, 0xef, 0xfc, 0xbe, 0x04, 0xd3, 0x69, 0x88, 0xe7, 0x67
    [all...]
x509_certificate.cc 576 {0xe9,0x02,0x8b,0x95,0x78,0xe4,0x15,0xdc,0x1a,0x71,0x0a,0x2b,0x88,0x15,0x44,0x47},
588 {0x3e,0x75,0xce,0xd4,0x6b,0x69,0x30,0x21,0x21,0x88,0x30,0xae,0x86,0xa8,0x2a,0x71},
605 {0xe3,0xb6,0x00,0xb1,0x07,0x39,0xb0,0x94,0xab,0x47,0x4c,0x88,0x8d,0x97,0x25,0x0d},
621 {0x88,0x82,0xc0,0xa1,0xd6,0x4b,0xab,0xb7,0xdb,0x82,0x07,0x3e,0xcd,0x77,0x72,0x2f},
638 {0x94,0x53,0x95,0x11,0x88,0x67,0x56,0x53,0x13,0xa2,0x66,0x98,0xb9,0x5f,0x1e,0x3e},
652 {0x26,0xc6,0x83,0xa0,0x88,0x71,0x2b,0x79,0x3f,0xf4,0x1d,0x8a,0x0c,0x0e,0xc0,0x45},
660 {0x27,0xdf,0x84,0xc1,0x2b,0xf8,0x37,0xac,0x68,0x1f,0xfd,0x26,0x63,0x93,0x88,0xf7},
669 {0xb0,0x62,0x55,0xfa,0xe2,0x88,0xba,0xa6,0x6c,0x83,0xcb,0xf0,0x3f,0x5d,0x16,0x09},
692 {0xb8,0x05,0x89,0x79,0xa8,0x42,0x6d,0x1b,0xbc,0x23,0x3d,0xa0,0xf7,0x6d,0x59,0x88},
693 {0x88,0x60,0xfc,0xbf,0xda,0x75,0xf4,0x3e,0x6f,0x9a,0x1c,0x57,0x6b,0x27,0x23,0x3a}
    [all...]
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_test.c 43 { 0x59, 0x70, 0x47, 0x14, 0xf5, 0x57, 0x47, 0x8c, 0xd7, 0x79, 0xe8, 0x0f, 0x54, 0x88, 0x79, 0x44 },
52 { 0x59, 0x70, 0x47, 0x14, 0xf5, 0x57, 0x47, 0x8c, 0xd7, 0x79, 0xe8, 0x0f, 0x54, 0x88, 0x79, 0x44 },
  /external/iproute2/examples/diffserv/
Edge31-cb-chains 88 #AF41 (0x88 is 0x22 shifted to the right by two bits)
91 value 0x88
  /external/openssl/apps/
testdsa.h 31 0x83,0x3E,0x88,0xE5,0xC5,0x89,0x73,0xCE,0x3B,0x6C,0x01,0x49,
78 0x7E,0x86,0x4B,0x53,0x5B,0x59,0xCF,0x71,0x65,0x19,0x88,0x6E,
79 0xCE,0x66,0xAE,0x6B,0x88,0x36,0xFB,0xEC,0x28,0xDC,0xC2,0xD7,
92 0x98,0xBB,0x28,0x86,0x48,0xFC,0xDE,0x99,0x04,0x3F,0x5F,0x88,
126 0xe0,0x61,0x88,0x88,0x21,0xcc,0x74,0x5d,0xce,0x4c,0x51,0x47,
135 0x2c,0xae,0x2e,0xe7,0x49,0x88,0x5f,0x93,0x57,0x27,0x99,0x36,
165 0x12,0x2C,0x42,0xFF,0xD2,0x88,0xBB,0xD3,0x92,0xA0,0xF9,0xC8,
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/gle2/
SwtDrawingStyle.java 82 OUTLINE(new RGB(0x88, 0xFF, 0x88), 160, SWT.LINE_SOLID),
  /external/dropbear/libtomcrypt/testprof/
rsa_test.c 13 0xdd, 0x26, 0xa5, 0xeb, 0xff, 0x0b, 0x5e, 0xd4, 0x88, 0x38, 0x49, 0x2a, 0x6e, 0x5b, 0xbf, 0x12,
19 0x9e, 0x1a, 0xcf, 0x30, 0x1e, 0x0a, 0x88, 0x45, 0x86, 0x29, 0x30, 0xa3, 0x4d, 0x9f, 0x61, 0x65,
31 0x04, 0x08, 0x84, 0x21, 0x60, 0xf0, 0x0e, 0x0d, 0x88, 0xfd, 0x1e, 0x36, 0x10, 0x65, 0x4f, 0x1e,
35 0x2e, 0xf0, 0x5e, 0xa4, 0x88, 0x31, 0x05, 0x29, 0x00, 0x8a, 0xd1, 0x95, 0x29, 0x9b, 0x83, 0xcf,
39 0x90, 0x88, 0xfa, 0x60, 0x08, 0x29, 0x50, 0x9a, 0x43, 0x8b, 0xa0, 0x50, 0xcc, 0xd8, 0x5a, 0xfe,
57 0x12, 0x8a, 0xdd, 0x26, 0xa5, 0xeb, 0xff, 0x0b, 0x5e, 0xd4, 0x88, 0x38, 0x49, 0x2a, 0x6e, 0x5b,
70 0x12, 0x8a, 0xdd, 0x26, 0xa5, 0xeb, 0xff, 0x0b, 0x5e, 0xd4, 0x88, 0x38, 0x49, 0x2a, 0x6e, 0x5b,

Completed in 410 milliseconds

12 3 4 5 6 7 8 91011>>