/external/llvm/lib/Support/ |
ThreadLocal.cpp | 30 void **pd = reinterpret_cast<void**>(&data); local 31 *pd = const_cast<void*>(d); 34 void **pd = reinterpret_cast<void**>(&data); local 35 return *pd;
|
/external/libvpx/libvpx/vp9/common/ |
vp9_reconinter.h | 70 struct macroblockd_plane *pd = &xd->plane[i]; local 71 setup_pred_plane(&pd->dst, buffers[i], strides[i], mi_row, mi_col, NULL, 72 pd->subsampling_x, pd->subsampling_y); 88 struct macroblockd_plane *pd = &xd->plane[j]; local 89 setup_pred_plane(&pd->pre[i], buffers[j], strides[j], 90 mi_row, mi_col, sf, pd->subsampling_x, pd->subsampling_y);
|
/libcore/luni/src/main/java/java/security/ |
SecureClassLoader.java | 135 ProtectionDomain pd; local 137 if ((pd = pds.get(cs)) != null) { 138 return pd; 141 pd = new ProtectionDomain(cs, perms, this, null); 142 pds.put(cs, pd); 144 return pd;
|
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
AccessControlContextTest.java | 41 final ProtectionDomain pd = new ProtectionDomain(null, col); local 43 new ProtectionDomain[] { pd }); 54 new ProtectionDomain[] { pd });
|
DomainCombinerTest.java | 56 ProtectionDomain pd; local 60 pd = new ProtectionDomain(executionDomains[0] 63 pd = new ProtectionDomain(parentDomains[0].getCodeSource(), 66 return new ProtectionDomain[] { pd };
|
/external/yaffs2/yaffs2/ |
yaffs_qsort.c | 81 char *pa, *pb, *pc, *pd, *pl, *pm, *pn; local 109 pc = pd = (char *)a + (n - 1) * es; 122 swap(pc, pd); 123 pd -= es; 145 r = min((long)(pd - pc), (long)(pn - pd - es)); 149 if ((r = pd - pc) > es) {
|
/cts/tests/tests/app/src/android/app/cts/ |
ProgressDialogTest.java | 79 MockProgressDialog pd = new MockProgressDialog(mContext); local 81 assertFalse(pd.mIsOnCreateCalled); 82 assertFalse(pd.mIsOnStartCalled); 83 pd.show(); 84 assertTrue(pd.mIsOnCreateCalled); 85 assertTrue(pd.mIsOnStartCalled); 87 assertFalse(pd.mIsOnStopCalled); 88 pd.dismiss(); 89 assertTrue(pd.mIsOnStopCalled);
|
/bionic/libc/upstream-freebsd/lib/libc/stdlib/ |
qsort.c | 113 char *pa, *pb, *pc, *pd, *pl, *pm, *pn; local 143 pc = pd = (char *)a + (n - 1) * es; 156 swap(pc, pd); 157 pd -= es; 180 r = min(pd - pc, pn - pd - es); 188 if ((r = pd - pc) > es) {
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/lang/reflect/ |
ProxyTest.java | 224 ProtectionDomain pd = pc.getProtectionDomain(); local 226 assertTrue(pd.implies(new AllPermission())); 227 assertSame(od.getClassLoader(), pd.getClassLoader()); 228 assertEquals(od.toString(), pd.toString()); 237 ProtectionDomain pd = pc.getProtectionDomain(); local 239 assertTrue(pd.implies(new AllPermission())); 240 assertSame(od.getClassLoader(), pd.getClassLoader()); 241 assertEquals(od.toString(), pd.toString());
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SecureClassLoader2Test.java | 68 ProtectionDomain pd = c.getProtectionDomain(); local 69 assertNotNull("Expected dynamic policy", pd.getClassLoader()); 70 assertNull("Expected null permissions", pd.getPermissions());
|
ProtectionDomainTest.java | 139 ProtectionDomain pd = new ProtectionDomain(null, null, null, principals); local 140 Principal[] got = pd.getPrincipals(); 143 assertNotSame(got, pd.getPrincipals()); 168 // null set of permissions [must] force the PD to use Policy - for 170 ProtectionDomain pd = new ProtectionDomain(cs, null); local 171 policy.setTrackPD(pd); 174 pd.implies(allperm); 187 ProtectionDomain pd = new ProtectionDomain(cs, null, ClassLoader local 189 policy.setTrackPD(pd); 192 pd.implies(allperm) [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
base64.cc | 26 static const unsigned char pd = 0xFD; // Padding member in namespace:talk_base 47 il,pd,il,il,il, 0, 1, 2, 3, 4, // 60 - 69 129 if ((il == qbuf[byte_len]) || (illegal_pads && (pd == qbuf[byte_len]))) { 137 } else if (pd == qbuf[byte_len]) {
|
/external/smack/src/org/apache/harmony/javax/security/auth/ |
SubjectDomainCombiner.java | 96 ProtectionDomain[] pd = new ProtectionDomain[len]; local 111 pd[cur] = newPD; 118 System.arraycopy(assignedDomains, 0, pd, cur, assignedDomains.length); 121 return pd;
|
/external/stlport/test/unit/ |
uninitialized_test.cpp | 217 derived *pd = &d; local 218 //base **ppb = &pd; 219 vector<derived*> src(10, pd); 223 CPPUNIT_ASSERT( (*it) == pd );
|
/ndk/tests/device/test-gnustl-full/unit/ |
uninitialized_test.cpp | 217 derived *pd = &d; local 218 //base **ppb = &pd; 219 vector<derived*> src(10, pd); 223 CPPUNIT_ASSERT( (*it) == pd );
|
/ndk/tests/device/test-stlport/unit/ |
uninitialized_test.cpp | 217 derived *pd = &d; local 218 //base **ppb = &pd; 219 vector<derived*> src(10, pd); 223 CPPUNIT_ASSERT( (*it) == pd );
|
/cts/suite/cts/deviceTests/simplecpu/jni/ |
CpuNativeJni.cpp | 77 char *pa, *pb, *pc, *pd, *pl, *pm, *pn; local 105 pc = pd = (char *)a + (n - 1) * es; 118 swap(pc, pd); 119 pd -= es; 141 r = min(pd - pc, pn - pd - (int)es); 145 if ((r = pd - pc) > (int)es) {
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/ |
SubjectDomainCombinerTest.java | 83 ProtectionDomain[] pd; local 105 pd = combiner.combine(new ProtectionDomain[] { domain }, null); 107 assertSame("CodeSource", source, pd[0].getCodeSource()); 108 assertSame("PermissionCollection", permissions, pd[0] 110 assertSame("ClassLoader", classLoader, pd[0].getClassLoader()); 112 assertEquals("Size", 1, pd[0].getPrincipals().length); 113 assertSame("Principal", principal, (pd[0].getPrincipals())[0]); 116 pd = combiner.combine(null, new ProtectionDomain[] { domain }); 117 assertSame("Inherited domain", domain, pd[0]);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
base64.cc | 29 static const unsigned char pd = 0xFD; // Padding member in namespace:talk_base 50 il,pd,il,il,il, 0, 1, 2, 3, 4, // 60 - 69 145 if ((il == qbuf[byte_len]) || (illegal_pads && (pd == qbuf[byte_len]))) { 153 } else if (pd == qbuf[byte_len]) {
|
/external/clang/test/CodeGenCXX/ |
ptr-to-datamember.cpp | 85 double A::* pd = &A::d; member in class:A 95 printf("%d, %f, %f \n", a1.*pa, a1.*pf, a1.*pd);
|
/external/libvpx/libvpx/vp9/decoder/ |
vp9_onyxd_if.c | 112 struct macroblockd_plane *const pd = xd->plane; local 116 pd[i].qcoeff = pbi->qcoeff[i]; 117 pd[i].dqcoeff = pbi->dqcoeff[i]; 118 pd[i].eobs = pbi->eobs[i];
|
/frameworks/base/services/java/com/android/server/power/ |
ShutdownThread.java | 215 ProgressDialog pd = new ProgressDialog(context); local 216 pd.setTitle(context.getText(com.android.internal.R.string.power_off)); 217 pd.setMessage(context.getText(com.android.internal.R.string.shutdown_progress)); 218 pd.setIndeterminate(true); 219 pd.setCancelable(false); 220 pd.getWindow().setType(WindowManager.LayoutParams.TYPE_KEYGUARD_DIALOG); 222 pd.show();
|
/external/chromium_org/ash/wm/ |
window_manager_unittest.cc | 377 aura::test::TestWindowDelegate pd; local 379 &pd, aura::client::WINDOW_TYPE_PANEL, -1, gfx::Rect(10, 10, 50, 50)));
|
/external/clang/test/CXX/expr/expr.unary/expr.unary.noexcept/ |
sema.cpp | 136 D *pd = 0; local 137 P(dynamic_cast<V&>(*pd)); 138 P(dynamic_cast<V*>(pd));
|
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/ |
nfc_hal_nci.c | 58 UINT8 *ps, *pd; local 110 pd = (UINT8 *) (nfc_hal_cb.ncit_cb.p_frag_msg + 1) + nfc_hal_cb.ncit_cb.p_frag_msg->offset + nfc_hal_cb.ncit_cb.p_frag_msg->len; 111 memcpy (pd, ps, p_msg->len); 114 pd = (UINT8 *) (nfc_hal_cb.ncit_cb.p_frag_msg + 1) + nfc_hal_cb.ncit_cb.p_frag_msg->offset + 2; 115 *pd = (UINT8) (nfc_hal_cb.ncit_cb.p_frag_msg->len - NCI_MSG_HDR_SIZE); 713 UINT8 *ps, *pd; local 779 pd = (UINT8 *) (p_buf + 1) + p_buf->offset; 781 memcpy (pd, hdr, NCI_MSG_HDR_SIZE); 782 pd += 2; 783 *pd = (UINT8) (p_buf->len - NCI_MSG_HDR_SIZE) [all...] |