/external/webrtc/webrtc/base/ |
H A D | winfirewall_unittest.cc | 20 WinFirewall fw; local 24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 25 EXPECT_TRUE(fw.Initialize(&hr)); 28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized)); 34 fw.Shutdown(); 35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
|
/external/fdlibm/ |
H A D | k_rem_pio2.c | 171 double z,fw,f[20],fq[20],q[20]; local 188 for(j=0,fw=0.0;j<=jx;j++) fw += x[j]*f[jx+i-j]; q[i] = fw; 195 fw = (double)((int)(twon24* z)); 196 iq[i] = (int)(z-two24*fw); 197 z = q[j-1]+fw; 247 for(j=0,fw=0.0;j<=jx;j++) fw += x[j]*f[jx+i-j]; 248 q[i] = fw; [all...] |
/external/testng/src/main/java/org/testng/reporters/ |
H A D | IBuffer.java | 7 void toWriter(Writer fw); argument
|
H A D | Files.java | 39 FileWriter fw = new FileWriter(f); 40 BufferedWriter bw = new BufferedWriter(fw); 43 fw.close();
|
H A D | FileStringBuffer.java | 69 public void toWriter(Writer fw) { argument 70 if (fw == null) { 74 BufferedWriter bw = new BufferedWriter(fw); 120 try (FileWriter fw = new FileWriter(m_file, true /* append */)) { 121 fw.append(m_sb);
|
/external/libcxx/test/std/numerics/rand/rand.dis/rand.dist.samp/rand.dist.samp.discrete/ |
H A D | ctor_func.pass.cpp | 17 // UnaryOperation fw); 22 double fw(double x) function 31 D d(0, 0, 1, fw); 38 D d(1, 0, 1, fw); 45 D d(2, 0.5, 1.5, fw); 53 D d(4, 0, 2, fw);
|
H A D | param_ctor_func.pass.cpp | 17 // UnaryOperation fw); 22 double fw(double x) function 32 P pa(0, 0, 1, fw); 40 P pa(1, 0, 1, fw); 48 P pa(2, 0.5, 1.5, fw); 57 P pa(4, 0, 2, fw);
|
/external/autotest/client/site_tests/firmware_TouchMTB/tests/ |
H A D | firmware_summary_unittest.py | 57 def _get_score(self, fw=None, gesture=None, validator=None): 59 result= self.slog.get_result(fw=fw, gesture=gesture, 68 Tests were conducted with both fw 11.23 and 11.26, and in combination of 78 for fw, fw_expected_scores in expected_scores.items(): 80 actual_score = self._get_score(fw=fw, 204 for fw, fw_expected_scores in expected_scores.items(): 206 actual_score = self._get_score(fw=fw, validato [all...] |
/external/vboot_reference/scripts/image_signing/ |
H A D | unpack_firmwarefd.sh | 43 fw${i}_vblock_offset="$offset" 46 fw${i}_vblock_size="$size" 52 fw${i}_offset="$offset" 55 fw${i}_size="$size"
|
/external/libcxx/test/std/numerics/rand/rand.dis/rand.dist.samp/rand.dist.samp.pconst/ |
H A D | ctor_func.pass.cpp | 17 // result_type xmax, UnaryOperation fw); 22 double fw(double x) function 31 D d(0, 0, 1, fw); 42 D d(1, 10, 12, fw); 53 D d(2, 6, 14, fw);
|
H A D | param_ctor_func.pass.cpp | 17 // UnaryOperation fw); 22 double fw(double x) function 32 P pa(0, 0, 1, fw); 44 P pa(1, 10, 12, fw); 56 P pa(2, 6, 14, fw);
|
/external/libcxx/test/std/numerics/rand/rand.dis/rand.dist.samp/rand.dist.samp.plinear/ |
H A D | ctor_func.pass.cpp | 17 // result_type xmax, UnaryOperation fw); 24 double fw(double x) function 33 D d(0, 0, 1, fw); 45 D d(1, 10, 12, fw); 57 D d(2, 6, 14, fw);
|
H A D | param_ctor_func.pass.cpp | 17 // UnaryOperation fw); 22 double fw(double x) function 32 P pa(0, 0, 1, fw); 45 P pa(1, 10, 12, fw); 58 P pa(2, 6, 14, fw);
|
/external/iptables/iptables/ |
H A D | iptables.c | 489 /* e is called `fw' here for historical reasons */ 491 print_firewall(const struct ipt_entry *fw, argument 508 t = ipt_get_target((struct ipt_entry *)fw); 509 flags = fw->ip.flags; 515 xtables_print_num(fw->counters.pcnt, format); 516 xtables_print_num(fw->counters.bcnt, format); 522 fputc(fw->ip.invflags & XT_INV_PROTO ? '!' : ' ', stdout); 524 const char *pname = proto_to_name(fw->ip.proto, format&FMT_NUMERIC); 528 printf(FMT("%-5hu", "%hu "), fw->ip.proto); 534 fputc(fw 616 print_firewall_line(const struct ipt_entry *fw, struct xtc_handle *const h) argument 626 append_entry(const xt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct xtc_handle *handle) argument 656 replace_entry(const xt_chainlabel chain, struct ipt_entry *fw, unsigned int rulenum, const struct in_addr *saddr, const struct in_addr *smask, const struct in_addr *daddr, const struct in_addr *dmask, int verbose, struct xtc_handle *handle) argument 675 insert_entry(const xt_chainlabel chain, struct ipt_entry *fw, unsigned int rulenum, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct xtc_handle *handle) argument 740 delete_entry(const xt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct xtc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 775 check_entry(const xt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr *saddrs, const struct in_addr *smasks, unsigned int ndaddrs, const struct in_addr *daddrs, const struct in_addr *dmasks, bool verbose, struct xtc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 1178 generate_entry(const struct ipt_entry *fw, struct xtables_rule_match *matches, struct xt_entry_target *target) argument [all...] |
H A D | ip6tables.c | 504 /* e is called `fw' here for historical reasons */ 506 print_firewall(const struct ip6t_entry *fw, argument 522 t = ip6t_get_target((struct ip6t_entry *)fw); 528 xtables_print_num(fw->counters.pcnt, format); 529 xtables_print_num(fw->counters.bcnt, format); 535 fputc(fw->ipv6.invflags & XT_INV_PROTO ? '!' : ' ', stdout); 537 const char *pname = proto_to_name(fw->ipv6.proto, format&FMT_NUMERIC); 541 printf(FMT("%-5hu", "%hu "), fw->ipv6.proto); 555 if (fw->ipv6.invflags & IP6T_INV_VIA_IN) { 561 if (fw 631 print_firewall_line(const struct ip6t_entry *fw, struct xtc_handle *const h) argument 641 append_entry(const xt_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct xtc_handle *handle) argument 671 replace_entry(const xt_chainlabel chain, struct ip6t_entry *fw, unsigned int rulenum, const struct in6_addr *saddr, const struct in6_addr *smask, const struct in6_addr *daddr, const struct in6_addr *dmask, int verbose, struct xtc_handle *handle) argument 690 insert_entry(const xt_chainlabel chain, struct ip6t_entry *fw, unsigned int rulenum, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct xtc_handle *handle) argument 755 delete_entry(const xt_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct xtc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 790 check_entry(const xt_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr *saddrs, const struct in6_addr *smasks, unsigned int ndaddrs, const struct in6_addr *daddrs, const struct in6_addr *dmasks, bool verbose, struct xtc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 1187 generate_entry(const struct ip6t_entry *fw, struct xtables_rule_match *matches, struct xt_entry_target *target) argument [all...] |
/external/autotest/client/site_tests/firmware_TouchMTB/tools/ |
H A D | print_log.py | 26 fw, date, glogs = pickle.load(open(filename)) 28 print prefix_spaces + 'fw: ', fw
|
/external/autotest/client/site_tests/firmware_TouchMTB/ |
H A D | firmware_log.py | 10 includes: fw, and round_name (i.e., the date time of the round 19 key: (fw, round_name, gesture_name, variation_name, validator_name) 36 (fw, round_name, gesture_name, variation_name, validator_name). 427 def __init__(self, test_version, fw=None, round_name=None): 429 self._fw = fw 555 for fw, validators in self.fw_validators.items(): 556 self.ext_validator_weights[fw] = \ 591 for fw in self.fws: 592 self.fw_validators[fw] = sorted(list(self.fw_validators[fw])) [all...] |
H A D | firmware_summary.py | 175 for fw in self.slog.fws: 176 result = self.slog.get_result(fw=fw, gesture=gesture, 268 for fw in fws: 269 result = self.slog.get_result(fw=fw, gesture=gesture, 274 fw_stats_values[metric_name][fw] = \ 281 for fw in fws: 282 value = fw_values_dict.get(fw, '') 306 # metric.key which is (fw, roun [all...] |
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/univariate/ |
H A D | BrentOptimizer.java | 112 double fw = fx; 128 q = (x - v) * (fx - fw); 199 fv = fw; 201 fw = fx; 210 if (fu <= fw || w == x) { 212 fv = fw; 214 fw = fu;
|
/external/iproute2/examples/diffserv/ |
H A D | Edge32-cb-chains | 35 # tag the rest of incoming packets from subnet 10.2.0.0/24 to fw value 1 36 # tag all incoming packets from any other subnet to fw tag 2 52 # anything with fw tag of 1 is passed on with a tcindex value 1 55 $TC filter add dev $INDEV parent ffff: protocol ip prio 1 handle 1 fw \ 58 $TC filter add dev $INDEV parent ffff: protocol ip prio 2 handle 1 fw \ 65 $TC filter add dev $INDEV parent ffff: protocol ip prio 3 handle 1 fw \ 68 $TC filter add dev $INDEV parent ffff: protocol ip prio 4 handle 1 fw \ 75 $TC filter add dev $INDEV parent ffff: protocol ip prio 5 handle 1 fw \ 78 $TC filter add dev $INDEV parent ffff: protocol ip prio 6 handle 1 fw \ 85 $TC filter add dev $INDEV parent ffff: protocol ip prio 7 handle 2 fw \ [all...] |
H A D | Edge1 | 50 $TC filter add $EGDEV parent 1:0 protocol ip prio 4 handle 1 fw classid 1:1 51 $TC filter add $EGDEV parent 1:0 protocol ip prio 4 handle 2 fw classid 1:2 52 $TC filter add $EGDEV parent 1:0 protocol ip prio 4 handle 3 fw classid 1:3
|
H A D | Edge2 | 35 # attach a fw classifier to the ingress which polices anything marked 43 $TC filter add dev $INDEV parent ffff: protocol ip prio 50 handle 3 fw \ 66 $TC filter add $EGDEV parent 1:0 protocol ip prio 4 handle 1 fw classid 1:1 67 $TC filter add $EGDEV parent 1:0 protocol ip prio 4 handle 2 fw classid 1:2 68 $TC filter add $EGDEV parent 1:0 protocol ip prio 4 handle 3 fw classid 1:3
|
H A D | Edge31-cb-chains | 32 # tag the rest of incoming packets from subnet 10.2.0.0/24 to fw value 1 33 # tag all incoming packets from any other subnet to fw tag 2 49 # anything with fw tag of 1 is passed on with a tcindex value 1 52 $TC filter add dev $INDEV parent ffff: protocol ip prio 4 handle 1 fw \ 59 $TC filter add dev $INDEV parent ffff: protocol ip prio 5 handle 1 fw \ 66 $TC filter add dev $INDEV parent ffff: protocol ip prio 6 handle 1 fw \ 73 $TC filter add dev $INDEV parent ffff: protocol ip prio 6 handle 2 fw \ 104 # replaced it with the fw classifier instead)
|
/external/mesa3d/src/gallium/drivers/svga/ |
H A D | svga_state_framebuffer.c | 186 float fw = viewport->scale[0] * 2; local 200 fw, 215 if (fw < 0) { 217 prescale.translate[0] += -fw; 218 fw = -fw; 232 prescale.scale[0] *= fw / (fw + fx); 233 fw += fx; 249 if (fx + fw > fb_widt [all...] |
/external/v8/src/compiler/ |
H A D | jump-threading.cc | 37 TRACE(" fw %d -> %d (recurse)\n", from.ToInt(), to.ToInt()); 42 TRACE(" fw %d -> %d (cycle)\n", from.ToInt(), to.ToInt()); 46 TRACE(" fw %d -> %d (forward)\n", from.ToInt(), to.ToInt()); 76 RpoNumber fw = block->rpo_number(); local 102 fw = code->InputRpo(instr, 0); 114 if (next < code->InstructionBlockCount()) fw = RpoNumber::FromInt(next); 116 state.Forward(fw); 163 TRACE("jt-fw nop @%d\n", i); 178 RpoNumber fw = result[rpo.ToInt()]; local 179 if (!(fw [all...] |