/external/clang/test/Sema/ |
H A D | static-assert.c | 42 typedef UNION(float, 0.5f) U4; // expected-error {{expected a type}} typedef
|
/external/compiler-rt/lib/asan/tests/ |
H A D | asan_test_utils.h | 60 typedef uint32_t U4; typedef
|
/external/chromium_org/third_party/libsrtp/srtp/tables/ |
H A D | aes_tables.c | 139 uint32_t U0[256], U1[256], U2[256], U3[256], U4[256]; variable 183 U4[i] = tmp.value; 241 printf("uint32_t U4 = {"); 245 printf("0x%x, ", U4[i]); 283 printf("uint32_t U4 = {"); 287 printf("0x%lx, ", U4[i]);
|
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
H A D | rijndael.py | 160 U4 = [] variable 178 U4.append(mul4(t, iG[3])) 274 U4[ tt & 0xFF]
|
/external/srtp/crypto/cipher/ |
H A D | aes.c | 52 * the tables U0, U1, U2, and U4 to compute its inverse 1141 * the following tables (aes_sbox, aes_inv_sbox, T4, U4) are 1288 static uint32_t U4[256] = { variable 1751 tmp0 = (U4[(state->v32[0] >> 24)] & 0xff000000) 1752 ^ (U4[(state->v32[3] >> 16) & 0xff] & 0x00ff0000) 1753 ^ (U4[(state->v32[2] >> 8) & 0xff] & 0x0000ff00) 1754 ^ (U4[(state->v32[1] ) & 0xff] & 0x000000ff) 1757 tmp1 = (U4[(state->v32[1] >> 24)] & 0xff000000) 1758 ^ (U4[(state->v32[0] >> 16) & 0xff] & 0x00ff0000) 1759 ^ (U4[(stat [all...] |
/external/srtp/tables/ |
H A D | aes_tables.c | 139 uint32_t U0[256], U1[256], U2[256], U3[256], U4[256]; variable 183 U4[i] = tmp.value; 243 printf("uint32_t U4 = {"); 247 printf("0x%x, ", U4[i]); 285 printf("uint32_t U4 = {"); 289 printf("0x%lx, ", U4[i]);
|
/external/valgrind/main/memcheck/tests/ |
H A D | sh-mem.c | 14 typedef unsigned int U4; typedef 68 void check_all(U4 x, U4 y, U1 expected_byte, U1 expected_byte_alt, 108 assert(4 == sizeof(U4)); 212 DO(4, U4, U4, /*isF4*/0); 213 DO(4, F4, U4, /*isF4*/1);
|
H A D | sh-mem-random.c | 15 typedef unsigned int U4; typedef 92 static inline U4 randomU4 ( void ) 94 static U4 n = 0; 113 U4 mv1 = 0, mv2 = 0, mv4 = 0, mv8 = 0, mv4f = 0, mv8f = 0; 128 U4 ty, src, dst; 146 case 2: { // U4 149 *(U4*)(arr+dst) = *(U4*)(arr+src);
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/ |
H A D | aes.c | 52 * the tables U0, U1, U2, and U4 to compute its inverse 1141 * the following tables (aes_sbox, aes_inv_sbox, T4, U4) are 1288 static uint32_t U4[256] = { variable 1840 tmp0 = (U4[(state->v32[0] >> 24)] & 0xff000000) 1841 ^ (U4[(state->v32[3] >> 16) & 0xff] & 0x00ff0000) 1842 ^ (U4[(state->v32[2] >> 8) & 0xff] & 0x0000ff00) 1843 ^ (U4[(state->v32[1] ) & 0xff] & 0x000000ff) 1846 tmp1 = (U4[(state->v32[1] >> 24)] & 0xff000000) 1847 ^ (U4[(state->v32[0] >> 16) & 0xff] & 0x00ff0000) 1848 ^ (U4[(stat [all...] |
/external/clang/test/CXX/class/class.union/ |
H A D | p1.cpp | 99 union U4 { union 102 int U4::i1 = 10;
|
/external/clang/test/CXX/dcl.dcl/dcl.spec/dcl.constexpr/ |
H A D | p1.cpp | 52 union U4 {} constexpr u4 = {}; union
|
/external/valgrind/main/memcheck/tests/common/ |
H A D | sh-mem-vec128.tmpl.c | 24 typedef unsigned int U4; typedef 36 volatile U4 w32 = 0x88776655; 49 static inline U4 randomU4 ( void ) 51 static U4 n = 0; 77 U4 r = VALGRIND_GET_VBITS(&x, &res, 1); 101 static void apply ( void(*fn)(U4,Bool), U4 arg1, Bool arg2 ) 156 static void do_partial_load_case ( U4 nInitialValid, Bool aligned ) 166 U4 j; 175 U4 [all...] |
/external/clang/test/CodeGen/ |
H A D | xcore-stringtype.c | 139 // CHECK: !31 = metadata !{void (%union.U4*)* @unionType4, metadata 140 // CHECK: !"f{0}(u(U4){m(u1){u(U1){m(pu2){p(u(U2){m(pu3){p(u(U3){m(u1){u(U1){}}})}})}}}})"} 151 union U4{union U1 u1;}; union 155 void unionType4(union U4 u4) {}
|
/external/compiler-rt/lib/msan/tests/ |
H A D | msan_test.cc | 76 typedef unsigned int U4; typedef 88 U4 origin = __msan_get_origin(&x); 143 T *GetPoisonedO(int i, U4 origin, T val = 0) { 212 EXPECT_POISONED(*GetPoisoned<U4>()); 326 U4 *p = GetPoisoned<U4>(); 357 EXPECT_NOT_POISONED(applyNot<U4>(0x0, 0x0)); 358 EXPECT_NOT_POISONED(applyNot<U4>(0xFFFFFFFF, 0x0)); 359 EXPECT_POISONED(applyNot<U4>(0xFFFFFFFF, 0xFFFFFFFF)); 360 EXPECT_NOT_POISONED(applyNot<U4>( [all...] |