HomeSort by relevance Sort by last modified time
    Searched refs:ad (Results 1 - 25 of 209) sorted by null

1 2 3 4 5 6 7 8 9

  /ndk/tests/device/test-stlport_shared-exception/jni/
dtor1.cpp 8 int ad; variable
12 ~A() { ++ad; }
26 if (!ad)
  /ndk/tests/device/test-stlport_static-exception/jni/
dtor1.cpp 8 int ad; variable
12 ~A() { ++ad; }
26 if (!ad)
  /bootable/recovery/minadbd/
fuse_adb_provider.c 32 struct adb_data* ad = (struct adb_data*)cookie; local
36 if (writex(ad->sfd, buf, 8) < 0) {
41 if (readx(ad->sfd, buffer, fetch_size) < 0) {
50 struct adb_data* ad = (struct adb_data*)cookie; local
52 writex(ad->sfd, "DONEDONE", 8);
56 struct adb_data ad; local
59 ad.sfd = sfd;
60 ad.file_size = file_size;
61 ad.block_size = block_size;
66 return run_fuse_sideload(&vtab, &ad, file_size, block_size)
    [all...]
  /external/chromium_org/ui/gfx/animation/
animation_unittest.cc 86 TestAnimationDelegate ad; local
87 RunAnimation a1(150, &ad);
92 EXPECT_TRUE(ad.finished());
93 EXPECT_FALSE(ad.canceled());
97 TestAnimationDelegate ad; local
98 CancelAnimation a2(2000, 150, &ad);
102 EXPECT_TRUE(ad.finished());
103 EXPECT_TRUE(ad.canceled());
109 TestAnimationDelegate ad; local
110 EndAnimation a2(2000, 150, &ad);
    [all...]
  /external/chromium_org/third_party/WebKit/Source/wtf/dtoa/
diy-fp.cc 49 uint64_t ad = a * d; local
51 uint64_t tmp = (bd >> 32) + (ad & kM32) + (bc & kM32);
55 uint64_t result_f = ac + (ad >> 32) + (bc >> 32) + (tmp >> 32);
  /external/chromium_org/v8/src/
diy-fp.cc 25 uint64_t ad = a * d; local
27 uint64_t tmp = (bd >> 32) + (ad & kM32) + (bc & kM32);
31 uint64_t result_f = ac + (ad >> 32) + (bc >> 32) + (tmp >> 32);
  /system/keymaster/
ae.h 94 int ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad,
105 * ad - Pointer to associated data.
106 * ad_len - number of bytes pointed to by ad.
115 * ad_len<0, then use same ad as last message.
124 int ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad,
135 * ad - Pointer to associated data.
136 * ad_len - number of bytes pointed to by ad.
146 * ad_len<0, then use same ad as last message.
  /external/chromium_org/third_party/openssl/openssl/crypto/
ex_data.c 161 CRYPTO_EX_DATA *ad);
167 CRYPTO_EX_DATA *ad);
184 CRYPTO_EX_DATA *ad);
188 CRYPTO_EX_DATA *ad);
400 * the global "ex_data" state (ie. class definitions), not thread-safe on 'ad'
403 CRYPTO_EX_DATA *ad)
412 ad->sk = NULL;
434 ptr = CRYPTO_get_ex_data(ad, i);
435 storage[i]->new_func(obj,ptr,ad,i,
492 CRYPTO_EX_DATA *ad)
    [all...]
  /external/openssl/crypto/
ex_data.c 161 CRYPTO_EX_DATA *ad);
167 CRYPTO_EX_DATA *ad);
184 CRYPTO_EX_DATA *ad);
188 CRYPTO_EX_DATA *ad);
400 * the global "ex_data" state (ie. class definitions), not thread-safe on 'ad'
403 CRYPTO_EX_DATA *ad)
412 ad->sk = NULL;
434 ptr = CRYPTO_get_ex_data(ad, i);
435 storage[i]->new_func(obj,ptr,ad,i,
492 CRYPTO_EX_DATA *ad)
    [all...]
  /external/chromium-trace/trace-viewer/third_party/gl-matrix/src/gl-matrix/
mat2d.js 118 var aa = a[0], ab = a[1], ac = a[2], ad = a[3],
121 var det = aa * ad - ab * ac;
127 out[0] = ad * det;
131 out[4] = (ac * aty - ad * atx) * det;
155 var aa = a[0], ab = a[1], ac = a[2], ad = a[3],
162 out[2] = ac*ba + ad*bc;
163 out[3] = ac*bb + ad*bd;
188 ad = a[3],
196 out[2] = ac*ct + ad*st;
197 out[3] = -ac*st + ct*ad;
    [all...]
  /external/bluetooth/bluedroid/stack/avdt/
avdt_ad.c 110 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl;
111 memset(&avdt_cb.ad, 0, sizeof(tAVDT_AD));
137 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl;
206 idx = avdt_cb.ad.lcid_tbl[lcid - L2CAP_BASE_APPL_CID];
210 return &avdt_cb.ad.tc_tbl[idx];
234 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl;
267 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl;
302 AVDT_TRACE_DEBUG("avdt_ad_tc_tbl_to_idx: %d", (p_tbl - avdt_cb.ad.tc_tbl));
304 return (UINT8) (p_tbl - avdt_cb.ad.tc_tbl);
346 p_scb = avdt_scb_by_hdl(avdt_cb.ad.rt_tbl[p_tbl->ccb_idx][p_tbl->tcid].scb_hdl)
    [all...]