/external/clang/test/CXX/temp/temp.param/ |
p7.cpp | 8 template<double* pd> class Y; //OK
|
/external/tcpdump/ |
decode_prefix.h | 38 extern int decode_prefix6(const u_char *pd, char *buf, u_int buflen);
|
tcpdump.c | 106 static void show_dlts_and_exit(pcap_t *pd) __attribute__((noreturn)); 287 static pcap_t *pd; variable 299 pcap_t *pd; member in struct:dump_info 304 show_dlts_and_exit(pcap_t *pd) 310 n_dlts = pcap_list_datalinks(pd, &dlts); 312 error("%s", pcap_geterr(pd)); 851 pd = pcap_open_offline(RFileName, ebuf); 852 if (pd == NULL) 854 dlt = pcap_datalink(pd); 888 pd = pcap_open_live(device, snaplen, !pflag, 1000, ebuf) [all...] |
/libcore/luni/src/main/java/java/security/ |
SecureClassLoader.java | 135 ProtectionDomain pd; local 137 if ((pd = pds.get(cs)) != null) { 138 return pd; 141 pd = new ProtectionDomain(cs, perms, this, null); 142 pds.put(cs, pd); 144 return pd;
|
/external/libvpx/libvpx/vp9/encoder/ |
vp9_encodemb.c | 47 const struct macroblockd_plane *const pd = &xd->plane[plane]; local 48 const int bw = plane_block_width(bsize, pd); 49 const int bh = plane_block_height(bsize, pd); 53 pd->dst.buf, pd->dst.stride); 120 struct macroblockd_plane *pd = &xd->plane[plane]; local 127 int eob = pd->eobs[block], final_eob, sz = 0; 133 PLANE_TYPE type = pd->plane_type; 139 const int16_t *dequant_ptr = pd->dequant; 143 dqcoeff_ptr = BLOCK_OFFSET(pd->dqcoeff, block) 330 const struct macroblockd_plane* const pd = &xd->plane[plane]; local 348 struct macroblockd_plane *const pd = &xd->plane[plane]; local 421 struct macroblockd_plane *const pd = &xd->plane[plane]; local 476 struct macroblockd_plane *const pd = &xd->plane[plane]; local 528 struct macroblockd_plane *const pd = &xd->plane[plane]; local [all...] |
vp9_tokenize.c | 91 struct macroblockd_plane *pd = &xd->plane[plane]; local 94 set_contexts(xd, pd, plane_bsize, tx_size, pd->eobs[block] > 0, aoff, loff); 104 struct macroblockd_plane *pd = &xd->plane[plane]; local 109 const int eob = pd->eobs[block]; 110 const PLANE_TYPE type = pd->plane_type; 111 const int16_t *qcoeff_ptr = BLOCK_OFFSET(pd->qcoeff, block); 125 pt = get_entropy_context(tx_size, pd->above_context + aoff, 126 pd->left_context + loff); 162 set_contexts(xd, pd, plane_bsize, tx_size, c > 0, aoff, loff) [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/ |
SubjectDomainCombinerTest.java | 83 ProtectionDomain[] pd; local 105 pd = combiner.combine(new ProtectionDomain[] { domain }, null); 107 assertSame("CodeSource", source, pd[0].getCodeSource()); 108 assertSame("PermissionCollection", permissions, pd[0] 110 assertSame("ClassLoader", classLoader, pd[0].getClassLoader()); 112 assertEquals("Size", 1, pd[0].getPrincipals().length); 113 assertSame("Principal", principal, (pd[0].getPrincipals())[0]); 116 pd = combiner.combine(null, new ProtectionDomain[] { domain }); 117 assertSame("Inherited domain", domain, pd[0]);
|
/ndk/tests/device/test-stlport_shared-exception/jni/ |
eh18.cpp | 22 class pD : private virtual VB { 25 pD(int i1, int i2) : VB(i2) { j = i1; } 33 pD pd(3621, 9527); 35 VB *pvb = &pd.vb(); 53 // printf("Throwing D at %d (VB at %d)\n", &pd, pvb); 54 throw pd;
|
/ndk/tests/device/test-stlport_static-exception/jni/ |
eh18.cpp | 22 class pD : private virtual VB { 25 pD(int i1, int i2) : VB(i2) { j = i1; } 33 pD pd(3621, 9527); 35 VB *pvb = &pd.vb(); 53 // printf("Throwing D at %d (VB at %d)\n", &pd, pvb); 54 throw pd;
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
DigestChallenge.java | 132 * @param pd ParsedDirective 138 ParsedDirective pd) throws SaslException 143 m_nonce = pd.getValue(); 149 * @param pd ParsedDirective 152 ParsedDirective pd) 154 m_realms.add(pd.getValue()); 164 * @param pd ParsedDirective 170 ParsedDirective pd) throws SaslException 178 parser = new TokenParser(pd.getValue()); 198 * @param pd ParsedDirectiv [all...] |
/external/smack/src/com/novell/sasl/client/ |
DigestChallenge.java | 132 * @param pd ParsedDirective 138 ParsedDirective pd) throws SaslException 143 m_nonce = pd.getValue(); 149 * @param pd ParsedDirective 152 ParsedDirective pd) 154 m_realms.add(pd.getValue()); 164 * @param pd ParsedDirective 170 ParsedDirective pd) throws SaslException 178 parser = new TokenParser(pd.getValue()); 198 * @param pd ParsedDirectiv [all...] |
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
DomainCombinerTest.java | 56 ProtectionDomain pd; local 60 pd = new ProtectionDomain(executionDomains[0] 63 pd = new ProtectionDomain(parentDomains[0].getCodeSource(), 66 return new ProtectionDomain[] { pd };
|
AccessControlContextTest.java | 41 final ProtectionDomain pd = new ProtectionDomain(null, col); local 43 new ProtectionDomain[] { pd }); 54 new ProtectionDomain[] { pd });
|
/external/llvm/lib/Support/ |
ThreadLocal.cpp | 30 void **pd = reinterpret_cast<void**>(&data); local 31 *pd = const_cast<void*>(d); 34 void **pd = reinterpret_cast<void**>(&data); local 35 return *pd;
|
/external/smack/src/org/apache/harmony/javax/security/auth/ |
SubjectDomainCombiner.java | 96 ProtectionDomain[] pd = new ProtectionDomain[len]; local 111 pd[cur] = newPD; 118 System.arraycopy(assignedDomains, 0, pd, cur, assignedDomains.length); 121 return pd;
|
/external/srec/seti/sltsEngine/include/ |
fsm_dictionary.h | 43 SWIsltsResult load_fsm_dictionary(const char *dict_file, FSM_DICTIONARY ** pd);
|
/external/libvpx/libvpx/vp9/common/ |
vp9_reconinter.h | 70 struct macroblockd_plane *pd = &xd->plane[i]; local 71 setup_pred_plane(&pd->dst, buffers[i], strides[i], mi_row, mi_col, NULL, 72 pd->subsampling_x, pd->subsampling_y); 88 struct macroblockd_plane *pd = &xd->plane[j]; local 89 setup_pred_plane(&pd->pre[i], buffers[j], strides[j], 90 mi_row, mi_col, sf, pd->subsampling_x, pd->subsampling_y);
|
vp9_blockd.h | 283 const struct macroblockd_plane *pd) { 284 BLOCK_SIZE bs = ss_size_lookup[bsize][pd->subsampling_x][pd->subsampling_y]; 307 const struct macroblockd_plane *const pd = &xd->plane[plane]; 314 const BLOCK_SIZE plane_bsize = get_plane_block_size(bsize, pd); 332 max_blocks_wide += (xd->mb_to_right_edge >> (5 + pd->subsampling_x)); 335 max_blocks_high += (xd->mb_to_bottom_edge >> (5 + pd->subsampling_y)); 414 struct macroblockd_plane *const pd = &xd->plane[plane]; 415 uint8_t *const buf = pd->dst.buf; 416 const int stride = pd->dst.stride [all...] |
vp9_entropy.h | 112 struct macroblockd_plane *const pd = &xd->plane[i]; local 113 const BLOCK_SIZE plane_bsize = get_plane_block_size(bsize, pd); 114 vpx_memset(pd->above_context, 0, sizeof(ENTROPY_CONTEXT) * 116 vpx_memset(pd->left_context, 0, sizeof(ENTROPY_CONTEXT) *
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SecureClassLoader2Test.java | 68 ProtectionDomain pd = c.getProtectionDomain(); local 69 assertNotNull("Expected dynamic policy", pd.getClassLoader()); 70 assertNull("Expected null permissions", pd.getPermissions());
|
ProtectionDomainTest.java | 139 ProtectionDomain pd = new ProtectionDomain(null, null, null, principals); local 140 Principal[] got = pd.getPrincipals(); 143 assertNotSame(got, pd.getPrincipals()); 168 // null set of permissions [must] force the PD to use Policy - for 170 ProtectionDomain pd = new ProtectionDomain(cs, null); local 171 policy.setTrackPD(pd); 174 pd.implies(allperm); 187 ProtectionDomain pd = new ProtectionDomain(cs, null, ClassLoader local 189 policy.setTrackPD(pd); 192 pd.implies(allperm) [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/vega/ |
path.c | 818 struct path_for_each_data *pd) 820 struct transform_data *td = (struct transform_data *)pd->user_data; 821 VGint num_coords = num_elements_for_segments(&pd->segment, 1); 822 VGubyte segment = SEGMENT_COMMAND(pd->segment);/* abs bit is 0 */ 826 memcpy(data, pd->coords, sizeof(VGfloat) * num_coords); 875 pd->ox, pd->oy, data[3], data[4], 897 array_append_data(td->segments, &pd->segment, 1); 954 static INLINE VGubyte normalize_coords(struct path_iter_data *pd, 958 VGint command = SEGMENT_COMMAND(pd->segment) [all...] |
/external/mesa3d/src/gallium/state_trackers/vega/ |
path.c | 818 struct path_for_each_data *pd) 820 struct transform_data *td = (struct transform_data *)pd->user_data; 821 VGint num_coords = num_elements_for_segments(&pd->segment, 1); 822 VGubyte segment = SEGMENT_COMMAND(pd->segment);/* abs bit is 0 */ 826 memcpy(data, pd->coords, sizeof(VGfloat) * num_coords); 875 pd->ox, pd->oy, data[3], data[4], 897 array_append_data(td->segments, &pd->segment, 1); 954 static INLINE VGubyte normalize_coords(struct path_iter_data *pd, 958 VGint command = SEGMENT_COMMAND(pd->segment) [all...] |
/external/yaffs2/yaffs2/ |
yaffs_qsort.c | 81 char *pa, *pb, *pc, *pd, *pl, *pm, *pn; local 109 pc = pd = (char *)a + (n - 1) * es; 122 swap(pc, pd); 123 pd -= es; 145 r = min((long)(pd - pc), (long)(pn - pd - es)); 149 if ((r = pd - pc) > es) {
|
/external/ipsec-tools/src/racoon/ |
policy.h | 112 #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _priority, _created, idx) \ 117 (idx)->prefd = (pd); \ 125 #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _created, idx) \ 130 (idx)->prefd = (pd); \
|