/external/webkit/PerformanceTests/SunSpider/tests/v8-v4/ |
H A D | v8-crypto.js | 6 * a copy of this software and associated documentation files (the 9 * distribute, sublicense, and/or sell copies of the Software, and to 13 * The above copyright notice and this permission notice shall be 29 * and disclaimer. 66 // am1: use a single mult and divide to get the high bits, 80 // am2 avoids a big mult-and-extract completely. 194 // (protected) set from string and radix 442 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20) 529 // should reduce x and [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v5/ |
H A D | v8-crypto.js | 6 * a copy of this software and associated documentation files (the 9 * distribute, sublicense, and/or sell copies of the Software, and to 13 * The above copyright notice and this permission notice shall be 29 * and disclaimer. 66 // am1: use a single mult and divide to get the high bits, 80 // am2 avoids a big mult-and-extract completely. 194 // (protected) set from string and radix 442 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20) 529 // should reduce x and [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v6/ |
H A D | v8-crypto.js | 6 * a copy of this software and associated documentation files (the 9 * distribute, sublicense, and/or sell copies of the Software, and to 13 * The above copyright notice and this permission notice shall be 29 * and disclaimer. 66 // am1: use a single mult and divide to get the high bits, 80 // am2 avoids a big mult-and-extract completely. 194 // (protected) set from string and radix 442 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20) 529 // should reduce x and [all...] |
/external/v8/benchmarks/ |
H A D | crypto.js | 6 * a copy of this software and associated documentation files (the 9 * distribute, sublicense, and/or sell copies of the Software, and to 13 * The above copyright notice and this permission notice shall be 29 * and disclaimer. 74 // am1: use a single mult and divide to get the high bits, 88 // am2 avoids a big mult-and-extract completely. 202 // (protected) set from string and radix 450 // (protected) divide this by m, quotient and remainder to q, r (HAC 14.20) 537 // should reduce x and [all...] |
/external/proguard/lib/ |
H A D | proguard.jar | ... SHIFT_RIGHT public static final byte UNSIGNED_SHIFT_RIGHT public static final byte AND public static final byte OR public static final byte XOR ... |
/external/proguard/src/proguard/evaluation/value/ |
H A D | IntegerValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 82 * Returns the generalization of this IntegerValue and the given other 88 * Returns the sum of this IntegerValue and the given IntegerValue. 93 * Returns the difference of this IntegerValue and the given IntegerValue. 98 * Returns the difference of the given IntegerValue and this IntegerValue. 103 * Returns the product of this IntegerValue and the given IntegerValue. 109 * Returns the quotient of this IntegerValue and the given IntegerValue. 115 * Returns the quotient of the given IntegerValue and this IntegerValue. 182 * Returns the logical <i>and</ 185 public abstract IntegerValue and(IntegerValue other); method in class:IntegerValue 408 public IntegerValue and(UnknownIntegerValue other) method in class:IntegerValue 652 public IntegerValue and(SpecificIntegerValue other) method in class:IntegerValue 896 public IntegerValue and(ParticularIntegerValue other) method in class:IntegerValue [all...] |
H A D | LongValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 68 * Returns the generalization of this LongValue and the given other 77 * Returns the sum of this LongValue and the given LongValue. 85 * Returns the difference of this LongValue and the given LongValue. 93 * Returns the difference of the given LongValue and this LongValue. 101 * Returns the product of this LongValue and the given LongValue. 110 * Returns the quotient of this LongValue and the given LongValue. 119 * Returns the quotient of the given LongValue and this LongValue. 173 * Returns the logical <i>and</ 176 public LongValue and(LongValue other) method in class:LongValue 330 public LongValue and(SpecificLongValue other) method in class:LongValue 486 public LongValue and(ParticularLongValue other) method in class:LongValue [all...] |
H A D | ParticularIntegerValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 196 public IntegerValue and(IntegerValue other) method in class:ParticularIntegerValue 198 return other.and(this); 324 public IntegerValue and(ParticularIntegerValue other) method in class:ParticularIntegerValue
|
H A D | ParticularLongValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 139 public LongValue and(LongValue other) method in class:ParticularLongValue 141 return other.and(this); 227 public LongValue and(ParticularLongValue other) method in class:ParticularLongValue
|
H A D | SpecificIntegerValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 164 public IntegerValue and(IntegerValue other) method in class:SpecificIntegerValue 166 return other.and(this); 296 public IntegerValue and(SpecificIntegerValue other) method in class:SpecificIntegerValue
|
H A D | SpecificLongValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 119 public LongValue and(LongValue other) method in class:SpecificLongValue 121 return other.and(this); 211 public LongValue and(SpecificLongValue other) method in class:SpecificLongValue
|
H A D | UnknownIntegerValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 166 public IntegerValue and(IntegerValue other) method in class:UnknownIntegerValue
|
H A D | UnknownLongValue.java | 2 * ProGuard -- shrinking, optimization, obfuscation, and preverification 7 * This program is free software; you can redistribute it and/or modify it 120 public LongValue and(LongValue other) method in class:UnknownLongValue
|
/external/llvm/test/MC/ARM/ |
H A D | arm-arithmetic-aliases.s | 26 and r2, r2, #6 label 27 and r2, #6 label 28 and r2, r2, r3 label 29 and r2, r3 label 31 @ CHECK: and r2, r2, #6 @ encoding: [0x06,0x20,0x02,0xe2] 32 @ CHECK: and r2, r2, #6 @ encoding: [0x06,0x20,0x02,0xe2] 33 @ CHECK: and r2, r2, r3 @ encoding: [0x03,0x20,0x02,0xe0] 34 @ CHECK: and r2, r2, r3 @ encoding: [0x03,0x20,0x02,0xe0] 67 @ Also check that we handle the predicate and cc_out operands.
|
/external/iproute2/doc/ |
H A D | api-ip6-flowlabels.tex | 24 prefer this term) and 20 bits of flow label. Currently there exist 56 Flows with coinciding source address and flow label must have identical 57 destination address and not-fragmentable extensions headers (i.e.\ 58 hop by hop options and all the headers up to and including routing header, 68 NB notes here and below reflect only my personal opinion, 74 Flow labels have finite lifetime and source is not allowed to reuse 100 It contradicts both to IETF spirit and the letter. Before RFC2553 109 and have to mangle it, even if we are not interested in flowinfo subtleties. 115 is followed by attempts to patch the hole and mor [all...] |
H A D | ip-cref.tex | 28 However, the document is self-contained and the reader, provided they have a 30 and examples to understand and configure Linux-2.2 IP and IPv6 34 and options, decrypting \verb|ip| output and containing a few examples. 35 More voluminous examples and some topics, which require more elaborate 39 bugs and design drawbacks. They may be skipped at the first reading. 49 begin with the character \verb|'-'| and may be used in either long or abbreviated 55 --- print the version of the \verb|ip| utility and exi [all...] |
H A D | ip-tunnels.tex | 52 ``network unreachable'' and after this I found a strange direct route 74 that between \verb|route add| and \verb|route del| host 193.233.7.65 is 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 82 and for all IPIP tunnel devices. 93 and you are not afraid of 102 \paragraph{Summary of differences between 2.2 and 2.0.} 107 and got set of 4 devices \verb|tunl0| ... \verb|tunl3| or, 108 alternatively, compile it as module and load new module 113 tunnel device \verb|tunl0| and another tunnels may be created with command 133 kinds and gatewa [all...] |
/external/libpcap/ |
H A D | grammar.y | 6 * Redistribution and use in source and binary forms, with or without 8 * retain the above copyright notice and this paragraph in its entirety, (2) 9 * distributions including binary code include the above copyright notice and 11 * provided with the distribution, and (3) all advertising materials mentioning 14 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 159 %type <blk> and or paren not null prog 219 | expr and term { gen_and($1.b, $3.b); $$ = $3; } 220 | expr and id { gen_and($1.b, $3.b); $$ = $3; } 224 and label [all...] |
/external/easymock/src/org/easymock/ |
H A D | EasyMock.java | 13 * See the License for the specific language governing permissions and
108 * is disabled by default, and the mock object will return <code>0</code>,
124 * is disabled by default, and the mock object will return <code>0</code>,
159 * Creates a control, order checking is disabled by default, and the mock
704 public static boolean and(boolean first, boolean second) {
method in class:EasyMock 718 public static byte and(byte first, byte second) {
method in class:EasyMock 732 public static char and(char first, char second) {
method in class:EasyMock 746 public static double and(double first, double second) {
method in class:EasyMock 760 public static float and(float first, float second) {
method in class:EasyMock 774 public static int and(in method in class:EasyMock 788 public static long and(long first, long second) { method in class:EasyMock 802 public static short and(short first, short second) { method in class:EasyMock 818 public static <T> T and(T first, T second) { method in class:EasyMock [all...] |
/external/guava/src/com/google/common/base/ |
H A D | CharMatcher.java | 13 * See the License for the specific language governing permissions and 31 * encouraged to be side-effect-free and immutable. 40 * using surrogate pairs, and a {@code CharMatcher} treats these just as two 191 * PARAGRAPH_SEPARATOR, CONTROL, FORMAT, SURROGATE, and PRIVATE_USE according 281 @Override public CharMatcher and(CharMatcher other) { 345 @Override public CharMatcher and(CharMatcher other) { 377 @Override public CharMatcher and(CharMatcher other) { 407 @Override public CharMatcher and(CharMatcher other) { 408 return other.matches(match) ? super.and(other) : other; 553 * and { 555 public CharMatcher and(CharMatcher other) { method in class:CharMatcher 575 @Override public CharMatcher and(CharMatcher other) { method in class:CharMatcher.And [all...] |
H A D | Predicates.java | 13 * License for the specific language governing permissions and limitations under 95 * order, and evaluation will be "short-circuited" as soon as a false 101 public static <T> Predicate<T> and( method in class:Predicates 109 * order, and evaluation will be "short-circuited" as soon as a false 115 public static <T> Predicate<T> and(Predicate<? super T>... components) { method in class:Predicates 122 * order, and evaluation will be "short-circuited" as soon as a false 125 public static <T> Predicate<T> and(Predicate<? super T> first, method in class:Predicates 134 * order, and evaluation will be "short-circuited" as soon as as soon as a 148 * order, and evaluation will be "short-circuited" as soon as as soon as a 161 * order, and evaluatio [all...] |
/external/clang/lib/Headers/ |
H A D | iso646.h | 6 * of this software and associated documentation files (the "Software"), to deal 8 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 * copies of the Software, and to permit persons to whom the Software is 12 * The above copyright notice and this permission notice shall be included in 30 #define and && macro
|
/external/clang/test/Preprocessor/ |
H A D | cxx_oper_keyword.cpp | 5 #define and foo macro
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 31 \def\And{{\rm\ and\ }} 92 This document is part of the LibTomCrypt package and is hereby released into the public domain. 121 public key cryptography (via PKCS \#1 RSA, DH or ECCDH), and a plethora of support routines. 123 The library was designed such that new ciphers/hashes/PRNGs can be added at run-time and the existing API 124 (and helper API functions) are able to use the new designs automatically. There exists self-check functions for each 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library 139 \item I am too lazy to figure out someone else's API. I'd rather invent my own simpler API and use that. 144 {\bf own} crypto library and hopefully along the way others will appreciate the work. 146 With this library all core functions (ciphers, hashes, prngs, and bignu [all...] |
/external/dropbear/libtommath/ |
H A D | bn.tex | 29 \def\And{{\rm\ and\ }} 55 This text, the library and the accompanying textbook are all hereby placed in the public domain. This book has been 75 LibTomMath is a library of source code which provides a series of efficient and carefully written functions for manipulating 81 universities, commercial and open source software developers. It has been used on a variety of platforms ranging from 82 Linux and Windows based x86 to ARM based Gameboys and PPC based MacOS machines. 105 command. This will build the library and archive the object files in ``libtommath.a''. Now you link against 106 that and include ``tommath.h'' within your programs. Alternatively to build with MSVC issue the following 111 This will build the library and archive the object files in ``tommath.lib''. This has been tested with MSVC 120 and stati [all...] |