Searched defs:and (Results 1 - 25 of 28) sorted by last modified time

12

/external/webkit/PerformanceTests/SunSpider/tests/v8-v4/
H A Dv8-crypto.js6 * a copy of this software and associated documentation files (the
9 * distribute, sublicense, and/or sell copies of the Software, and to
13 * The above copyright notice and this permission notice shall be
29 * and disclaimer.
66 // am1: use a single mult and divide to get the high bits,
80 // am2 avoids a big mult-and-extract completely.
194 // (protected) set from string and radix
442 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20)
529 // should reduce x and
[all...]
/external/webkit/PerformanceTests/SunSpider/tests/v8-v5/
H A Dv8-crypto.js6 * a copy of this software and associated documentation files (the
9 * distribute, sublicense, and/or sell copies of the Software, and to
13 * The above copyright notice and this permission notice shall be
29 * and disclaimer.
66 // am1: use a single mult and divide to get the high bits,
80 // am2 avoids a big mult-and-extract completely.
194 // (protected) set from string and radix
442 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20)
529 // should reduce x and
[all...]
/external/webkit/PerformanceTests/SunSpider/tests/v8-v6/
H A Dv8-crypto.js6 * a copy of this software and associated documentation files (the
9 * distribute, sublicense, and/or sell copies of the Software, and to
13 * The above copyright notice and this permission notice shall be
29 * and disclaimer.
66 // am1: use a single mult and divide to get the high bits,
80 // am2 avoids a big mult-and-extract completely.
194 // (protected) set from string and radix
442 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20)
529 // should reduce x and
[all...]
/external/v8/benchmarks/
H A Dcrypto.js6 * a copy of this software and associated documentation files (the
9 * distribute, sublicense, and/or sell copies of the Software, and to
13 * The above copyright notice and this permission notice shall be
29 * and disclaimer.
74 // am1: use a single mult and divide to get the high bits,
88 // am2 avoids a big mult-and-extract completely.
202 // (protected) set from string and radix
450 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20)
537 // should reduce x and
[all...]
/external/proguard/lib/
H A Dproguard.jar ... SHIFT_RIGHT public static final byte UNSIGNED_SHIFT_RIGHT public static final byte AND public static final byte OR public static final byte XOR ...
/external/proguard/src/proguard/evaluation/value/
H A DIntegerValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
82 * Returns the generalization of this IntegerValue and the given other
88 * Returns the sum of this IntegerValue and the given IntegerValue.
93 * Returns the difference of this IntegerValue and the given IntegerValue.
98 * Returns the difference of the given IntegerValue and this IntegerValue.
103 * Returns the product of this IntegerValue and the given IntegerValue.
109 * Returns the quotient of this IntegerValue and the given IntegerValue.
115 * Returns the quotient of the given IntegerValue and this IntegerValue.
182 * Returns the logical <i>and</
185 public abstract IntegerValue and(IntegerValue other); method in class:IntegerValue
408 public IntegerValue and(UnknownIntegerValue other) method in class:IntegerValue
652 public IntegerValue and(SpecificIntegerValue other) method in class:IntegerValue
896 public IntegerValue and(ParticularIntegerValue other) method in class:IntegerValue
[all...]
H A DLongValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
68 * Returns the generalization of this LongValue and the given other
77 * Returns the sum of this LongValue and the given LongValue.
85 * Returns the difference of this LongValue and the given LongValue.
93 * Returns the difference of the given LongValue and this LongValue.
101 * Returns the product of this LongValue and the given LongValue.
110 * Returns the quotient of this LongValue and the given LongValue.
119 * Returns the quotient of the given LongValue and this LongValue.
173 * Returns the logical <i>and</
176 public LongValue and(LongValue other) method in class:LongValue
330 public LongValue and(SpecificLongValue other) method in class:LongValue
486 public LongValue and(ParticularLongValue other) method in class:LongValue
[all...]
H A DParticularIntegerValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
196 public IntegerValue and(IntegerValue other) method in class:ParticularIntegerValue
198 return other.and(this);
324 public IntegerValue and(ParticularIntegerValue other) method in class:ParticularIntegerValue
H A DParticularLongValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
139 public LongValue and(LongValue other) method in class:ParticularLongValue
141 return other.and(this);
227 public LongValue and(ParticularLongValue other) method in class:ParticularLongValue
H A DSpecificIntegerValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
164 public IntegerValue and(IntegerValue other) method in class:SpecificIntegerValue
166 return other.and(this);
296 public IntegerValue and(SpecificIntegerValue other) method in class:SpecificIntegerValue
H A DSpecificLongValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
119 public LongValue and(LongValue other) method in class:SpecificLongValue
121 return other.and(this);
211 public LongValue and(SpecificLongValue other) method in class:SpecificLongValue
H A DUnknownIntegerValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
166 public IntegerValue and(IntegerValue other) method in class:UnknownIntegerValue
H A DUnknownLongValue.java2 * ProGuard -- shrinking, optimization, obfuscation, and preverification
7 * This program is free software; you can redistribute it and/or modify it
120 public LongValue and(LongValue other) method in class:UnknownLongValue
/external/llvm/test/MC/ARM/
H A Darm-arithmetic-aliases.s26 and r2, r2, #6 label
27 and r2, #6 label
28 and r2, r2, r3 label
29 and r2, r3 label
31 @ CHECK: and r2, r2, #6 @ encoding: [0x06,0x20,0x02,0xe2]
32 @ CHECK: and r2, r2, #6 @ encoding: [0x06,0x20,0x02,0xe2]
33 @ CHECK: and r2, r2, r3 @ encoding: [0x03,0x20,0x02,0xe0]
34 @ CHECK: and r2, r2, r3 @ encoding: [0x03,0x20,0x02,0xe0]
67 @ Also check that we handle the predicate and cc_out operands.
/external/iproute2/doc/
H A Dapi-ip6-flowlabels.tex24 prefer this term) and 20 bits of flow label. Currently there exist
56 Flows with coinciding source address and flow label must have identical
57 destination address and not-fragmentable extensions headers (i.e.\
58 hop by hop options and all the headers up to and including routing header,
68 NB notes here and below reflect only my personal opinion,
74 Flow labels have finite lifetime and source is not allowed to reuse
100 It contradicts both to IETF spirit and the letter. Before RFC2553
109 and have to mangle it, even if we are not interested in flowinfo subtleties.
115 is followed by attempts to patch the hole and mor
[all...]
H A Dip-cref.tex28 However, the document is self-contained and the reader, provided they have a
30 and examples to understand and configure Linux-2.2 IP and IPv6
34 and options, decrypting \verb|ip| output and containing a few examples.
35 More voluminous examples and some topics, which require more elaborate
39 bugs and design drawbacks. They may be skipped at the first reading.
49 begin with the character \verb|'-'| and may be used in either long or abbreviated
55 --- print the version of the \verb|ip| utility and exi
[all...]
H A Dip-tunnels.tex52 ``network unreachable'' and after this I found a strange direct route
74 that between \verb|route add| and \verb|route del| host 193.233.7.65 is
78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module.
82 and for all IPIP tunnel devices.
93 and you are not afraid of
102 \paragraph{Summary of differences between 2.2 and 2.0.}
107 and got set of 4 devices \verb|tunl0| ... \verb|tunl3| or,
108 alternatively, compile it as module and load new module
113 tunnel device \verb|tunl0| and another tunnels may be created with command
133 kinds and gatewa
[all...]
/external/libpcap/
H A Dgrammar.y6 * Redistribution and use in source and binary forms, with or without
8 * retain the above copyright notice and this paragraph in its entirety, (2)
9 * distributions including binary code include the above copyright notice and
11 * provided with the distribution, and (3) all advertising materials mentioning
14 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
159 %type <blk> and or paren not null prog
219 | expr and term { gen_and($1.b, $3.b); $$ = $3; }
220 | expr and id { gen_and($1.b, $3.b); $$ = $3; }
224 and label
[all...]
/external/easymock/src/org/easymock/
H A DEasyMock.java13 * See the License for the specific language governing permissions and
108 * is disabled by default, and the mock object will return <code>0</code>,
124 * is disabled by default, and the mock object will return <code>0</code>,
159 * Creates a control, order checking is disabled by default, and the mock
704 public static boolean and(boolean first, boolean second) { method in class:EasyMock
718 public static byte and(byte first, byte second) { method in class:EasyMock
732 public static char and(char first, char second) { method in class:EasyMock
746 public static double and(double first, double second) { method in class:EasyMock
760 public static float and(float first, float second) { method in class:EasyMock
774 public static int and(in method in class:EasyMock
788 public static long and(long first, long second) { method in class:EasyMock
802 public static short and(short first, short second) { method in class:EasyMock
818 public static <T> T and(T first, T second) { method in class:EasyMock
[all...]
/external/guava/src/com/google/common/base/
H A DCharMatcher.java13 * See the License for the specific language governing permissions and
31 * encouraged to be side-effect-free and immutable.
40 * using surrogate pairs, and a {@code CharMatcher} treats these just as two
191 * PARAGRAPH_SEPARATOR, CONTROL, FORMAT, SURROGATE, and PRIVATE_USE according
281 @Override public CharMatcher and(CharMatcher other) {
345 @Override public CharMatcher and(CharMatcher other) {
377 @Override public CharMatcher and(CharMatcher other) {
407 @Override public CharMatcher and(CharMatcher other) {
408 return other.matches(match) ? super.and(other) : other;
553 * and {
555 public CharMatcher and(CharMatcher other) { method in class:CharMatcher
575 @Override public CharMatcher and(CharMatcher other) { method in class:CharMatcher.And
[all...]
H A DPredicates.java13 * License for the specific language governing permissions and limitations under
95 * order, and evaluation will be "short-circuited" as soon as a false
101 public static <T> Predicate<T> and( method in class:Predicates
109 * order, and evaluation will be "short-circuited" as soon as a false
115 public static <T> Predicate<T> and(Predicate<? super T>... components) { method in class:Predicates
122 * order, and evaluation will be "short-circuited" as soon as a false
125 public static <T> Predicate<T> and(Predicate<? super T> first, method in class:Predicates
134 * order, and evaluation will be "short-circuited" as soon as as soon as a
148 * order, and evaluation will be "short-circuited" as soon as as soon as a
161 * order, and evaluatio
[all...]
/external/clang/lib/Headers/
H A Diso646.h6 * of this software and associated documentation files (the "Software"), to deal
8 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 * copies of the Software, and to permit persons to whom the Software is
12 * The above copyright notice and this permission notice shall be included in
30 #define and && macro
/external/clang/test/Preprocessor/
H A Dcxx_oper_keyword.cpp5 #define and foo macro
/external/dropbear/libtomcrypt/
H A Dcrypt.tex31 \def\And{{\rm\ and\ }}
92 This document is part of the LibTomCrypt package and is hereby released into the public domain.
121 public key cryptography (via PKCS \#1 RSA, DH or ECCDH), and a plethora of support routines.
123 The library was designed such that new ciphers/hashes/PRNGs can be added at run-time and the existing API
124 (and helper API functions) are able to use the new designs automatically. There exists self-check functions for each
125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library
139 \item I am too lazy to figure out someone else's API. I'd rather invent my own simpler API and use that.
144 {\bf own} crypto library and hopefully along the way others will appreciate the work.
146 With this library all core functions (ciphers, hashes, prngs, and bignu
[all...]
/external/dropbear/libtommath/
H A Dbn.tex29 \def\And{{\rm\ and\ }}
55 This text, the library and the accompanying textbook are all hereby placed in the public domain. This book has been
75 LibTomMath is a library of source code which provides a series of efficient and carefully written functions for manipulating
81 universities, commercial and open source software developers. It has been used on a variety of platforms ranging from
82 Linux and Windows based x86 to ARM based Gameboys and PPC based MacOS machines.
105 command. This will build the library and archive the object files in ``libtommath.a''. Now you link against
106 that and include ``tommath.h'' within your programs. Alternatively to build with MSVC issue the following
111 This will build the library and archive the object files in ``tommath.lib''. This has been tested with MSVC
120 and stati
[all...]

Completed in 484 milliseconds

12