/external/clang/test/CodeGenCXX/ |
H A D | exceptions-seh.cpp | 14 int padding; member in struct:HasCleanup
|
H A D | arm-swiftcall.cpp | 43 struct_empty padding[2]; member in struct:__anon2357
|
/external/clang/test/Sema/ |
H A D | offsetof-64.c | 8 char padding[Size]; member in struct:Chunk1 16 char padding[Size][Size][Size]; // expected-error 2{{array is too large}} member in struct:Chunk2
|
/external/clang/test/SemaCXX/ |
H A D | non-empty-class-size-zero.cpp | 14 X padding; member in struct:Y
|
/external/icu/icu4c/source/stubdata/ |
H A D | stubdata.c | 31 char padding[8]; member in struct:__anon7408
|
/external/libmojo/mojo/public/cpp/bindings/lib/ |
H A D | message_internal.h | 25 // Unused padding to make the struct size a multiple of 8 bytes. 26 uint32_t padding; member in struct:mojo::internal::MessageHeader
|
/external/sfntly/cpp/src/sfntly/math/ |
H A D | font_math.h | 35 // Calculates the amount of padding needed. The values provided need to be in 38 // @param size the size of the data that may need padding 42 int32_t padding = alignment_size - (size % alignment_size); local 43 return padding == alignment_size ? 0 : padding;
|
/external/sfntly/cpp/src/sfntly/table/ |
H A D | subtable.h | 52 // Sets the amount of padding that is part of the data being used by this 54 void set_padding(int32_t padding) { padding_ = padding; } argument
|
/external/valgrind/memcheck/tests/ |
H A D | leak-tree.c | 23 char padding[16 - 2*sizeof(struct _Node*)]; member in struct:_Node
|
H A D | leak-cycle.c | 10 char padding[ 2 * (8 - sizeof(struct n*)) ]; member in struct:n
|
H A D | leak-cases.c | 45 char padding[8 - sizeof(struct _Node*)]; member in struct:_Node
|
/external/boringssl/include/openssl/ |
H A D | thread.h | 71 char padding; /* Empty structs have different sizes in C and C++. */ member in struct:crypto_mutex_st 90 uint8_t padding[3*sizeof(int) + 5*sizeof(unsigned) + 16 + 8]; member in union:crypto_mutex_st
|
/external/boringssl/src/include/openssl/ |
H A D | thread.h | 71 char padding; /* Empty structs have different sizes in C and C++. */ member in struct:crypto_mutex_st 90 uint8_t padding[3*sizeof(int) + 5*sizeof(unsigned) + 16 + 8]; member in union:crypto_mutex_st
|
/external/eigen/unsupported/test/ |
H A D | cxx11_tensor_convolution.cpp | 82 Eigen::array<std::pair<ptrdiff_t, ptrdiff_t>, 1> padding; local 86 padding[0] = std::make_pair(0, 0); 88 valid = input.pad(padding).convolve(kernel, dims); 94 padding[0] = std::make_pair(1, 1); 96 same = input.pad(padding).convolve(kernel, dims); 104 padding[0] = std::make_pair(2, 2); 106 full = input.pad(padding).convolve(kernel, dims);
|
/external/libmojo/mojo/edk/system/ |
H A D | broker_messages.h | 23 uint32_t padding; member in struct:mojo::edk::BrokerMessageHeader 44 header->padding = 0; 58 header->padding = 0;
|
/external/swiftshader/src/OpenGL/libGL/ |
H A D | Buffer.cpp | 55 const int padding = 1024; // For SIMD processing of vertices local 56 mContents = new sw::Resource(size + padding);
|
/external/swiftshader/src/OpenGL/libGLES_CM/ |
H A D | Buffer.cpp | 56 const int padding = 1024; // For SIMD processing of vertices local 57 mContents = new sw::Resource(size + padding);
|
/external/webrtc/webrtc/common_audio/ |
H A D | fir_filter_neon.cc | 33 size_t padding = coefficients_length_ - coefficients_length; local 34 memset(coefficients_.get(), 0.f, padding * sizeof(coefficients_[0])); 38 coefficients_[i + padding] = coefficients[coefficients_length - i - 1];
|
H A D | fir_filter_sse.cc | 33 size_t padding = coefficients_length_ - coefficients_length; local 34 memset(coefficients_.get(), 0, padding * sizeof(coefficients_[0])); 38 coefficients_[i + padding] = coefficients[coefficients_length - i - 1];
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/ |
H A D | PaddedBufferedBlockCipher.java | 13 * a piecemeal fashion with padding. The PaddedBufferedBlockCipher 16 * The default padding mechanism used is the one outlined in PKCS5/PKCS7. 21 BlockCipherPadding padding; field in class:PaddedBufferedBlockCipher 24 * Create a buffered block cipher with the desired padding. 27 * @param padding the padding type. 31 BlockCipherPadding padding) 34 this.padding = padding; 41 * Create a buffered block cipher PKCS7 padding 29 PaddedBufferedBlockCipher( BlockCipher cipher, BlockCipherPadding padding) argument [all...] |
/external/fio/crc/ |
H A D | md5.c | 133 int padding = 56 - (offset + 1); local 136 if (padding < 0) { 137 memset(p, 0x00, padding + sizeof (uint64_t)); 140 padding = 56; 143 memset(p, 0, padding);
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/lang/ |
H A D | TestUScriptRun.java | 56 private static final String padding = "This string is used for padding..."; field in class:TestUScriptRun 402 String paddedTestString = padding + testString + padding; 403 int startOffset = padding.length();
|
/external/swiftshader/src/OpenGL/libGLESv2/ |
H A D | Buffer.cpp | 60 const int padding = 1024; // For SIMD processing of vertices local 61 mContents = new sw::Resource(size + padding);
|
/external/avb/libavb/ |
H A D | avb_crypto.h | 61 * For signatures with RSA keys, PKCS v1.5 padding is used. The public 106 /* Holds algorithm-specific data. The |padding| is needed by avb_rsa_verify. */ 108 const uint8_t* padding; member in struct:__anon514
|
/external/boringssl/src/crypto/asn1/ |
H A D | a_bitstr.c | 135 int padding; local 149 padding = *(p++); 150 if (padding > 7) { 160 ret->flags |= (ASN1_STRING_FLAG_BITS_LEFT | padding); /* set */ 169 s[len - 1] &= (0xff << padding);
|