/ndk/tests/device/test-stlport_shared-exception/jni/ |
dtor1.cpp | 8 int ad; variable 12 ~A() { ++ad; } 26 if (!ad)
|
/ndk/tests/device/test-stlport_static-exception/jni/ |
dtor1.cpp | 8 int ad; variable 12 ~A() { ++ad; } 26 if (!ad)
|
/bootable/recovery/minadbd/ |
fuse_adb_provider.c | 32 struct adb_data* ad = (struct adb_data*)cookie; local 36 if (writex(ad->sfd, buf, 8) < 0) { 41 if (readx(ad->sfd, buffer, fetch_size) < 0) { 50 struct adb_data* ad = (struct adb_data*)cookie; local 52 writex(ad->sfd, "DONEDONE", 8); 56 struct adb_data ad; local 59 ad.sfd = sfd; 60 ad.file_size = file_size; 61 ad.block_size = block_size; 66 return run_fuse_sideload(&vtab, &ad, file_size, block_size) [all...] |
/external/chromium_org/ui/gfx/animation/ |
animation_unittest.cc | 86 TestAnimationDelegate ad; local 87 RunAnimation a1(150, &ad); 92 EXPECT_TRUE(ad.finished()); 93 EXPECT_FALSE(ad.canceled()); 97 TestAnimationDelegate ad; local 98 CancelAnimation a2(2000, 150, &ad); 102 EXPECT_TRUE(ad.finished()); 103 EXPECT_TRUE(ad.canceled()); 109 TestAnimationDelegate ad; local 110 EndAnimation a2(2000, 150, &ad); [all...] |
/external/chromium_org/third_party/WebKit/Source/wtf/dtoa/ |
diy-fp.cc | 49 uint64_t ad = a * d; local 51 uint64_t tmp = (bd >> 32) + (ad & kM32) + (bc & kM32); 55 uint64_t result_f = ac + (ad >> 32) + (bc >> 32) + (tmp >> 32);
|
/external/chromium_org/v8/src/ |
diy-fp.cc | 25 uint64_t ad = a * d; local 27 uint64_t tmp = (bd >> 32) + (ad & kM32) + (bc & kM32); 31 uint64_t result_f = ac + (ad >> 32) + (bc >> 32) + (tmp >> 32);
|
/system/keymaster/ |
ae.h | 94 int ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad, 105 * ad - Pointer to associated data. 106 * ad_len - number of bytes pointed to by ad. 115 * ad_len<0, then use same ad as last message. 124 int ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad, 135 * ad - Pointer to associated data. 136 * ad_len - number of bytes pointed to by ad. 146 * ad_len<0, then use same ad as last message.
|
/external/chromium_org/third_party/openssl/openssl/crypto/ |
ex_data.c | 161 CRYPTO_EX_DATA *ad); 167 CRYPTO_EX_DATA *ad); 184 CRYPTO_EX_DATA *ad); 188 CRYPTO_EX_DATA *ad); 400 * the global "ex_data" state (ie. class definitions), not thread-safe on 'ad' 403 CRYPTO_EX_DATA *ad) 412 ad->sk = NULL; 434 ptr = CRYPTO_get_ex_data(ad, i); 435 storage[i]->new_func(obj,ptr,ad,i, 492 CRYPTO_EX_DATA *ad) [all...] |
/external/openssl/crypto/ |
ex_data.c | 161 CRYPTO_EX_DATA *ad); 167 CRYPTO_EX_DATA *ad); 184 CRYPTO_EX_DATA *ad); 188 CRYPTO_EX_DATA *ad); 400 * the global "ex_data" state (ie. class definitions), not thread-safe on 'ad' 403 CRYPTO_EX_DATA *ad) 412 ad->sk = NULL; 434 ptr = CRYPTO_get_ex_data(ad, i); 435 storage[i]->new_func(obj,ptr,ad,i, 492 CRYPTO_EX_DATA *ad) [all...] |
/external/chromium-trace/trace-viewer/third_party/gl-matrix/src/gl-matrix/ |
mat2d.js | 118 var aa = a[0], ab = a[1], ac = a[2], ad = a[3], 121 var det = aa * ad - ab * ac; 127 out[0] = ad * det; 131 out[4] = (ac * aty - ad * atx) * det; 155 var aa = a[0], ab = a[1], ac = a[2], ad = a[3], 162 out[2] = ac*ba + ad*bc; 163 out[3] = ac*bb + ad*bd; 188 ad = a[3], 196 out[2] = ac*ct + ad*st; 197 out[3] = -ac*st + ct*ad; [all...] |
/external/bluetooth/bluedroid/stack/avdt/ |
avdt_ad.c | 110 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl; 111 memset(&avdt_cb.ad, 0, sizeof(tAVDT_AD)); 137 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl; 206 idx = avdt_cb.ad.lcid_tbl[lcid - L2CAP_BASE_APPL_CID]; 210 return &avdt_cb.ad.tc_tbl[idx]; 234 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl; 267 tAVDT_TC_TBL *p_tbl = avdt_cb.ad.tc_tbl; 302 AVDT_TRACE_DEBUG("avdt_ad_tc_tbl_to_idx: %d", (p_tbl - avdt_cb.ad.tc_tbl)); 304 return (UINT8) (p_tbl - avdt_cb.ad.tc_tbl); 346 p_scb = avdt_scb_by_hdl(avdt_cb.ad.rt_tbl[p_tbl->ccb_idx][p_tbl->tcid].scb_hdl) [all...] |