/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
H A D | arithsmall.asm | 2 and eax, 3584 label 3 and eax, 35 label 4 and eax, strict dword 3584 label 5 and eax, strict dword 35 label 6 and eax, strict byte 3584 label 7 and eax, strict byte 35 label 8 and ebx, 3584 label 9 and ebx, 35 label 10 and ebx, strict dword 3584 label 11 and eb label 12 and ebx, strict byte 3584 label 13 and ebx, strict byte 35 label [all...] |
/external/clang/test/Preprocessor/ |
H A D | cxx_oper_keyword.cpp | 5 #define and foo macro
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/lc3b/tests/ |
H A D | lc3b-basic.asm | 4 and r2, r1, r0 label 5 and r2, r5, 5 label
|
/external/libvorbis/doc/ |
H A D | 05-comment.tex | 4 \section{comment field and header specification} \label{vorbis:spec:comment} 12 greater structure and machine parseability. 16 remember the disc by and explain it to others; a short, to-the-point 22 Honest Bob and the Factory-to-Dealer-Incentives, \textit{``I'm Still 34 number of vectors is bounded to $2^{32}-1$ and the length of each vector 41 The vector lengths and number of vectors are stored lsb first, according 67 That is, comment fields consist of a field name and a corresponding value and 77 The field name is case-insensitive and may consist of ASCII 0x20 117 The artist(s) who performed the work. In classical music this would be the conductor, orchestra, soloists. In an audio book it would be the actor who did the reading. In popular music this is typically the same as the ARTIST and i [all...] |
H A D | 03-codebook.tex | 4 \section{Probability Model and Codebooks} \label{vorbis:spec:codebook} 10 decoding configuration, VQ and Huffman, into the bitstream itself in 20 the codebooks themselves and the codewords they decode are unrolled 44 16 bit \varname{[codebook_dimensions]} and 24 bit \varname{[codebook_entries]} fields: 67 We now read the list of codeword lengths and store these lengths in 74 length ordered and the decoder needs to read each codeword length 122 2) [current_length] = read a five bit unsigned integer and add 1; 160 Lookup types one and two are similar, differing only in the 171 3) [codebook_value_bits] = read 4 bits as an unsigned integer and add 1 189 and indicate [all...] |
H A D | 06-floor0.tex | 4 \section{Floor type 0 setup and decode} \label{vorbis:spec:floor0} 13 coding; LSP representation may be converted to LPC representation and 20 Floor zero configuration consists of six integer fields and a list of 36 6) [floor0_number_of_books] = read an unsigned integer of four bits and add 1 51 decoding the curve amplitude and \varname{[floor0_order]} LSP 52 coefficient values from the bitstream, and then computing the floor 86 1 ) bits. Nevertheless, the above specification is correct and values 93 \varname{[codebook_dimensions]} value of three and 97 condition, and care must be taken not to allow a buffer overflow in 98 decode. The extra values are not used and ma [all...] |
H A D | 07-floor1.tex | 4 \section{Floor type 1 setup and decode} \label{vorbis:spec:floor1} 10 mechanically on a linear frequency axis and a logarithmic (dB) 27 from x_0,y_0 to x_1,y_1 where in the base case x_0=0 and x_1=[n], the 31 logical line segment and produces a y_new value at that point computed 32 from the existing line's y value at x_new (as plotted by the line) and 36 x_0,y_0 to x_new,y_new and from x_new,y_new to x_1,y_1. This step is 53 0,16,32,48,64,80,96,112 and 128. In list order, the values interleave 54 as 0, 128, 64, 32, 96, 16, 48, 80 and 112. The corresponding 56 -45, 0, -25, -10, 30 and -10. We compute the floor in the following 64 We now draw new logical lines to reflect the correction to new_Y, and [all...] |
H A D | 04-codec.tex | 5 \section{Codec Setup and Packet Decode} \label{vorbis:spec:codec} 12 provided in \xref{vorbis:spec:intro}. \xref{vorbis:spec:bitpacking} covers reading and writing bit fields from 13 and to bitstream packets. 17 \subsection{Header decode and decode setup} 21 and the setup header. All are required for decode compliance. An 37 is type 1, the comment header type 3 and the setup header type 5 47 to declare the stream definitively as Vorbis, and provide a few externally 64 with this document. Both \varname{[audio_channels]} and 66 blocksize values are 64, 128, 256, 512, 1024, 2048, 4096 and 8192 in 78 \item Maximum and o [all...] |
H A D | 02-bitpacking.tex | 10 bitstream in which bits are coded one-by-one by the encoder and then 19 \subsubsection{octets, bytes and words} 23 seven, ten, eleven and sixteen bit 'bytes' have been used. For 33 octet (eight bits) and a word to be a group of two, four or eight 56 which the lowest value byte comes first) and less commonly 3-1-2-0 and 59 The Vorbis bitpacking convention specifies storage and bitstream 63 Logically, bytes are always coded and decoded in order from byte zero 81 the next-least significant bit of the source integer and so on up to 84 byte and writin [all...] |
H A D | 08-residue.tex | 4 \section{Residue setup and decode} \label{vorbis:spec:residue} 10 curve and performs any channel coupling. A residue vector may 16 residue vectors into the bitstream packet, and then reconstructs the 18 variants (numbered 0, 1 and 2) of the same basic vector encoding 26 classifies each chunk, encodes the chunk classifications and finally 29 The exact interleaving and partitioning vary by residue encoding number, 30 however the high-level process used to classify and encode the residue 35 encoded and simply trusting that it is, is as follows: 40 \emph{n}, a partition size \emph{residue_partition_size}, and a total 79 Residue 0 and [all...] |
/external/bison/doc/ |
H A D | refcard.tex | 10 % per page and reduce to 80%. 26 % This program is free software: you can redistribute it and/or modify 48 % You will still need to cut and paste. 61 % Thanks to Paul Rubin, Bob Chassell, Len Tower, and Richard Mlynarik 64 % We only change the following to change the version numbers and 85 \centerline{designed by Brendan Kehoe and Gavin Nicol} 89 Permission is granted to make and distribute copies of this card 90 provided the copyright notice and this permission notice 110 \centerline{designed by Brendan Kehoe and Gavin Nicol} 114 Permission is granted to make and distribut [all...] |
/external/iproute2/doc/ |
H A D | api-ip6-flowlabels.tex | 24 prefer this term) and 20 bits of flow label. Currently there exist 56 Flows with coinciding source address and flow label must have identical 57 destination address and not-fragmentable extensions headers (i.e.\ 58 hop by hop options and all the headers up to and including routing header, 68 NB notes here and below reflect only my personal opinion, 74 Flow labels have finite lifetime and source is not allowed to reuse 100 It contradicts both to IETF spirit and the letter. Before RFC2553 109 and have to mangle it, even if we are not interested in flowinfo subtleties. 115 is followed by attempts to patch the hole and mor [all...] |
H A D | ip-tunnels.tex | 52 ``network unreachable'' and after this I found a strange direct route 74 that between \verb|route add| and \verb|route del| host 193.233.7.65 is 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 82 and for all IPIP tunnel devices. 93 and you are not afraid of 102 \paragraph{Summary of differences between 2.2 and 2.0.} 107 and got set of 4 devices \verb|tunl0| ... \verb|tunl3| or, 108 alternatively, compile it as module and load new module 113 tunnel device \verb|tunl0| and another tunnels may be created with command 133 kinds and gatewa [all...] |
/external/mesa3d/src/glsl/ |
H A D | Android.gen.mk | 7 # copy of this software and associated documentation files (the "Software"), 10 # and/or sell copies of the Software, and to permit persons to whom the 13 # The above copyright notice and this permission notice shall be included 55 define local-y-to-c-and-h 61 define local-yy-to-cpp-and-h 77 $(call local-yy-to-cpp-and-h,.cpp) 83 $(call local-y-to-c-and-h)
|
/external/chromium_org/chrome/test/functional/chromoting/ |
H A D | chromoting_base.py | 18 import pyauto_functional # Must come before chromoting and pyauto. namespace
|
/external/chromium_org/third_party/openssl/openssl/crypto/poly1305/ |
H A D | poly1305_arm_asm.S | 2 # SUPERCOP by D. J. Bernstein and Peter Schwabe. 160 and sp,sp,#0xffffffe0 label
|
/external/chromium_org/tools/site_compare/drivers/win32/ |
H A D | keyboard.py | 10 including special characters to represent modifier keys like CTRL and ALT 14 import win32api # for keybd_event and VkKeyCode namespace 22 # is just plain ugly, and win32con is a huge import for just a handful of 73 \ escapes {}[] and treats these values as literal 104 if use_modifiers and not next_escaped: 106 if char == "{" and not alt_held: 109 elif char == "}" and alt_held: 112 elif char == "[" and not ctrl_held: 115 elif char == "]" and ctrl_held: 123 if next_escaped and cha [all...] |
/external/clang/lib/Headers/ |
H A D | iso646.h | 6 * of this software and associated documentation files (the "Software"), to deal 8 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 * copies of the Software, and to permit persons to whom the Software is 12 * The above copyright notice and this permission notice shall be included in 30 #define and && macro
|
/external/clang/lib/include/ |
H A D | iso646.h | 6 * of this software and associated documentation files (the "Software"), to deal 8 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 * copies of the Software, and to permit persons to whom the Software is 12 * The above copyright notice and this permission notice shall be included in 30 #define and && macro
|
/external/junit/src/org/junit/internal/matchers/ |
H A D | CombinableMatcher.java | 26 public CombinableMatcher<T> and(Matcher<? extends T> matcher) { method in class:CombinableMatcher
|
/external/llvm/test/MC/ARM/ |
H A D | arm-arithmetic-aliases.s | 26 and r2, r2, #6 label 27 and r2, #6 label 28 and r2, r2, r3 label 29 and r2, r3 label 31 @ CHECK: and r2, r2, #6 @ encoding: [0x06,0x20,0x02,0xe2] 32 @ CHECK: and r2, r2, #6 @ encoding: [0x06,0x20,0x02,0xe2] 33 @ CHECK: and r2, r2, r3 @ encoding: [0x03,0x20,0x02,0xe0] 34 @ CHECK: and r2, r2, r3 @ encoding: [0x03,0x20,0x02,0xe0] 67 @ Also check that we handle the predicate and cc_out operands.
|
/external/dropbear/libtommath/ |
H A D | bn.tex | 29 \def\And{{\rm\ and\ }} 55 This text, the library and the accompanying textbook are all hereby placed in the public domain. This book has been 75 LibTomMath is a library of source code which provides a series of efficient and carefully written functions for manipulating 81 universities, commercial and open source software developers. It has been used on a variety of platforms ranging from 82 Linux and Windows based x86 to ARM based Gameboys and PPC based MacOS machines. 105 command. This will build the library and archive the object files in ``libtommath.a''. Now you link against 106 that and include ``tommath.h'' within your programs. Alternatively to build with MSVC issue the following 111 This will build the library and archive the object files in ``tommath.lib''. This has been tested with MSVC 120 and stati [all...] |
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/misc/ |
H A D | IntSet.java | 6 * Redistribution and use in source and binary forms, with or without 10 * notice, this list of conditions and the following disclaimer. 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 35 * which is a compressed bitset and is useful for ints that 36 * are small, for example less than 500 or so, and w/o many ranges. For 55 IntSet and(IntSet a); method in interface:IntSet
|
/external/mesa3d/src/mesa/ |
H A D | Android.gen.mk | 7 # copy of this software and associated documentation files (the "Software"), 10 # and/or sell copies of the Software, and to permit persons to whom the 13 # The above copyright notice and this permission notice shall be included 32 # This is the list of auto-generated files: sources and headers 78 define local-y-to-c-and-h 107 $(local-y-to-c-and-h)
|
/external/mockito/src/org/mockito/ |
H A D | AdditionalMatchers.java | 25 * It is recommended to use matchers from {@link Matchers} and keep stubbing and verification simple. 27 * Example of using logical and(), not(), or() matchers: 33 * //not "ejb" and not "michael jackson" 34 * mock.someMethod(and(not(eq("ejb")), not(eq("michael jackson")))); 438 * have the same type, length, and each element has to be equal. 454 * have the same length, and each element has to be equal. 468 * the same length, and each element has to be equal. 482 * the same length, and each element has to be equal. 496 * have the same length, and eac 575 public static boolean and(boolean first, boolean second) { method in class:AdditionalMatchers 590 public static byte and(byte first, byte second) { method in class:AdditionalMatchers 605 public static char and(char first, char second) { method in class:AdditionalMatchers 620 public static double and(double first, double second) { method in class:AdditionalMatchers 635 public static float and(float first, float second) { method in class:AdditionalMatchers 650 public static int and(int first, int second) { method in class:AdditionalMatchers 665 public static long and(long first, long second) { method in class:AdditionalMatchers 680 public static short and(short first, short second) { method in class:AdditionalMatchers 697 public static <T> T and(T first, T second) { method in class:AdditionalMatchers [all...] |