/external/antlr/antlr-3.4/lib/ |
H A D | antlr-3.4-complete.jar | META-INF/ META-INF/MANIFEST.MF org/ org/antlr/ org/antlr/analysis/ org/antlr/codegen/ org/ ... |
/external/antlr/antlr-3.4/runtime/ActionScript/project/lib/ |
H A D | FlexAntTasks.jar | META-INF/ META-INF/MANIFEST.MF com/ com/adobe/ com/adobe/ac/ com/adobe/ac/ant/ ... |
/external/antlr/antlr-3.4/tool/src/main/antlr3/org/antlr/grammar/v3/ |
H A D | ANTLR.g | 567 | p2='public' //{modifier=$p2.tree;} 591 $p1? $p2? $p3? $p4?
|
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | Cipher_ImplTest.java | 44 private Provider p2; field in class:Cipher_ImplTest 56 p2 = new MyProvider2(); 58 Security.insertProviderAt(p2, 1); 93 assertSame(p2, c.getProvider()); 108 assertSame("Case2:", p2, c.getProvider()); 175 assertSame("Case1:", p2, c.getProvider()); 178 assertSame("Case2:", p2, c.getProvider()); 188 Cipher.getInstance("DES/CBC/", p2); 194 Cipher.getInstance("DES//PKCS5Padding", p2); 200 Cipher.getInstance("DES/CBC/IncorrectPadding", p2); [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
H A D | ECPointTest.java | 157 ECPoint p2 = null, p1 = 163 p2 = new ECPoint(BigInteger.valueOf(-23456L), BigInteger.valueOf(1L)); 164 assertTrue(p1.equals(p2) && p2.equals(p1)); 168 p2 = ECPoint.POINT_INFINITY; 169 assertTrue(p1.equals(p2) && p2.equals(p1)); 180 ECPoint p2 = null, p1 = 182 assertFalse(p1.equals(p2)); 186 p2 [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/ |
H A D | Signature_Impl2Test.java | 102 Provider p2 = new MyProvider(); 103 Signature sig = Signature.getInstance("CBA", p2); 104 checkSig2(sig, p2);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | PKIXParameters_ImplTest.java | 206 PKIXParameters p2 = (PKIXParameters) p1.clone(); 210 p2.getPolicyQualifiersRejected()); 212 p2.isAnyPolicyInhibited()); 214 p2.isExplicitPolicyRequired()); 216 p2.isPolicyMappingInhibited()); 218 p2.isRevocationEnabled()); 219 assertEquals("check6", p1.getSigProvider(), p2.getSigProvider()); 222 assertNotNull("check7", p2.getTargetCertConstraints()); 224 assertEquals("check8", p1.getCertStores(), p2.getCertStores()); 227 assertFalse("check9", p2 [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
H A D | Support_TimeZone.java | 74 public int getOffset(int p1, int p2, int p3, int p4, int p5, int p6) { argument
|
/external/bison/lib/ |
H A D | c-strcasecmp.c | 30 register const unsigned char *p2 = (const unsigned char *) s2; local 33 if (p1 == p2) 39 c2 = c_tolower (*p2); 45 ++p2;
|
H A D | c-strncasecmp.c | 30 register const unsigned char *p2 = (const unsigned char *) s2; local 33 if (p1 == p2 || n == 0) 39 c2 = c_tolower (*p2); 45 ++p2;
|
H A D | strverscmp.c | 64 const unsigned char *p2 = (const unsigned char *) s2; local 95 if (p1 == p2) 99 c2 = *p2++; 107 c2 = *p2++; 120 if (!ISDIGIT (*p2++)) 123 return ISDIGIT (*p2) ? -1 : diff;
|
H A D | vasnprintf.c | 346 const mp_limb_t *p2; local 355 p2 = src2.limbs; 362 p2 = src1.limbs; 390 mp_limb_t digit2 = p2[j];
|
/external/bison/tests/ |
H A D | testsuite | [all...] |
/external/blktrace/ |
H A D | blkparse.c | 1701 static int ppi_name_compare(const void *p1, const void *p2) argument 1704 struct per_process_info *ppi2 = *((struct per_process_info **) p2);
|
H A D | strverscmp.c | 92 const unsigned char *p2 = (const unsigned char *) s2;
local 123 if (p1 == p2)
127 c2 = *p2++;
135 c2 = *p2++;
148 if (!isdigit (*p2++))
151 return isdigit (*p2) ? -1 : diff;
|
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_act.c | 6049 UINT8 *p2; local 6052 p2 = p_data->remote_bda; 6058 ((p2[0])<<24)+((p2[1])<<16)+((p2[2])<<8)+(p2[3]), 6059 ((p2[4])<<8)+ p2[5]);
|
/external/bluetooth/bluedroid/bta/hf_client/ |
H A D | bta_hf_client_at.c | 1259 char *p1, *p2; local 1262 p2 = dump; 1268 strlcpy(p2, "<cr>", 4); 1269 p2 += 4; 1273 strlcpy(p2, "<lf>", 4); 1274 p2 += 4; 1278 *p2 = *p1; 1279 p2++; 1284 *p2 = '\0';
|
/external/bluetooth/bluedroid/bta/hh/ |
H A D | bta_hh_le.c | 1443 UINT8 *p2; local 1450 p2 = p_data->remote_bda; 1453 ((p2[0])<<24)+((p2[1])<<16)+((p2[2])<<8)+(p2[3]), 1454 ((p2[4])<<8)+ p2[5],p_data->status);
|
/external/bluetooth/bluedroid/stack/hcic/ |
H A D | hcicmds.c | 38 #define btu_hcif_send_cmd(p1, p2) HCI_CMD_TO_LOWER((p2))
|
/external/bluetooth/bluedroid/stack/l2cap/ |
H A D | l2c_int.h | 609 UINT8 rem_id,UINT16 p1, UINT16 p2);
|
H A D | l2c_utils.c | 424 UINT16 p1, UINT16 p2) 453 UINT16_TO_STREAM (p, p2); 423 l2cu_send_peer_cmd_reject(tL2C_LCB *p_lcb, UINT16 reason, UINT8 rem_id, UINT16 p1, UINT16 p2) argument
|
/external/bluetooth/bluedroid/stack/smp/ |
H A D | aes.c | 232 { uint_8t p1 = x, p2 = BPOLY, n1 = hibit(x), n2 = 0x80, v1 = 1, v2 = 0; local 240 while(n2 >= n1) /* divide polynomial p2 by p1 */ 243 p2 ^= (p1 * n2) & 0xff; /* and remove from larger one */ 245 n2 = hibit(p2); /* add into result */ 254 p1 ^= p2 * n1;
|
H A D | smp_keys.c | 503 ** p2 = padding || ia || ra 508 void smp_gen_p2_4_confirm( tSMP_CB *p_cb, BT_OCTET16 p2) argument 510 UINT8 *p = (UINT8 *)p2; 516 SMP_TRACE_ERROR("can not generate confirm p2 for unknown device"); 539 SMP_TRACE_DEBUG("p2 = padding || ia || ra"); 540 smp_debug_print_nbyte_little_endian(p2, (const UINT8 *)"p2", 16); 591 BT_OCTET16 p2; local 601 smp_gen_p2_4_confirm(p_cb, p2); 603 /* calculate p2 [all...] |
/external/bluetooth/bluedroid/test/suite/support/ |
H A D | property.c | 76 bool property_equals(const bt_property_t *p1, const bt_property_t *p2) { argument 79 if (!p1 || !p2 || p1->type != p2->type) { 91 if (p1->type == BT_PROPERTY_BDNAME && p1->len != p2->len) { 92 const bt_property_t *shorter = p1, *longer = p2; 93 if (p1->len > p2->len) { 94 shorter = p2; 100 return p1->len == p2->len && !memcmp(p1->val, p2->val, p1->len);
|
H A D | property.h | 29 bool property_equals(const bt_property_t *p1, const bt_property_t *p2);
|