/external/ImageMagick/MagickCore/ |
H A D | quantum-private.h | 57 pad; member in struct:_QuantumInfo
|
H A D | quantum.c | 704 quantum=(quantum_info->pad+6)*(quantum_info->depth+7)/8; 908 % SetQuantumPad() sets the quantum pad. 913 % QuantumInfo *quantum_info,const size_t pad) 921 % o pad: the quantum pad. 925 QuantumInfo *quantum_info,const size_t pad) 933 quantum_info->pad=pad; 903 SetQuantumPad(const Image *image, QuantumInfo *quantum_info,const size_t pad) argument
|
/external/ImageMagick/coders/ |
H A D | cals.c | 404 pad[128]; 426 (void) ResetMagickMemory(pad,' ',(size_t) i); 427 count=WriteBlob(image,(size_t) i,(const unsigned char *) pad); 397 pad[128]; local
|
H A D | cin.c | 302 MagickBooleanType pad) 324 if (pad == MagickFalse) 335 if (pad == MagickFalse) 295 GetBytesPerRow(size_t columns, size_t samples_per_pixel,size_t bits_per_pixel, MagickBooleanType pad) argument
|
H A D | dpx.c | 406 const MagickBooleanType pad) 428 if (pad == MagickFalse) 439 if (pad == MagickFalse) 450 if (pad == MagickFalse) 398 GetBytesPerRow(const size_t columns, const size_t samples_per_pixel,const size_t bits_per_pixel, const MagickBooleanType pad) argument
|
H A D | palm.c | 278 pad, 340 pad=ReadBlobMSBShort(image); 341 (void) pad; 272 pad, local
|
H A D | tiff.c | 1112 pad; 1617 pad=(size_t) MagickMax((size_t) samples_per_pixel-1,0); 1624 pad=(size_t) MagickMax((size_t) samples_per_pixel-2,0); 1629 pad=(size_t) MagickMax((size_t) samples_per_pixel-2,0); 1636 pad=(size_t) MagickMax((size_t) samples_per_pixel-1,0); 1638 status=SetQuantumPad(image,quantum_info,pad*pow(2,ceil(log( 1679 pad=(size_t) MagickMax((size_t) samples_per_pixel-3,0); 1684 pad=(size_t) MagickMax((size_t) samples_per_pixel-4,0); 1688 pad=(size_t) MagickMax((size_t) samples_per_pixel-4,0); 1693 pad 1106 pad; local [all...] |
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/test/ |
H A D | core-extensions.rb | 234 # [0,1,2].pad(6,"a") #=> [0,1,2,"a","a","a"] 239 # [0,1,2].pad(-6,"a") #=> ["a","a","a",0,1,2] 243 def pad( len, val=nil ) method in class:Array 252 # Like #pad but changes the array in place. 255 # a.pad!(6,"x") 260 def pad!( len, val=nil )
|
/external/autotest/client/tests/tsc/src/ |
H A D | checktsc.c | 130 char pad[CACHE_LINE_SIZE]; member in union:state
|
/external/bison/lib/ |
H A D | vasnprintf.c | 3361 size_t pad = width - (p - tmp); local 3362 DCHAR_T *end = p + pad; 3367 for (; pad > 0; pad--) 3377 for (; pad > 0; pad--) 3387 for (; pad > 0; pad--) 4547 size_t pad = width - (p - tmp); local 4548 DCHAR_T *end = p + pad; 5430 size_t pad = width - w; local [all...] |
/external/blktrace/btt/ |
H A D | misc.c | 141 char *make_dev_hdr(char *pad, size_t len, struct d_info *dip, int add_parens) argument 144 snprintf(pad, len, "%s", dip->devmap); 146 snprintf(pad, len, "(%3d,%3d)", 149 snprintf(pad, len, "%d,%d", 152 return pad;
|
/external/boringssl/src/crypto/asn1/ |
H A D | a_int.c | 99 * encoding, except if the first byte is >= 0x80 we need to add a zero pad. 111 * Padding is a little trickier too. If the first bytes is > 0x80 then we pad 113 * is non-zero we pad with 0xff. The reason for this distinction is that 0x80 119 int pad = 0, ret, i, neg; local 133 pad = 1; 137 pad = 1; 141 * Special case: if any other bytes non zero we pad: 146 pad = 1; 152 ret += pad; 158 if (pad) [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
H A D | e_ssl3.c | 52 uint8_t pad[48]; local 54 OPENSSL_memset(pad, 0x36, pad_len); 56 !EVP_DigestUpdate(&md_ctx, pad, pad_len) || 65 OPENSSL_memset(pad, 0x5c, pad_len); 67 !EVP_DigestUpdate(&md_ctx, pad, pad_len) ||
|
/external/boringssl/src/crypto/evp/ |
H A D | internal.h | 231 uint8_t pad[32]; member in struct:__anon658::__anon659::__anon660
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
H A D | cipher.c | 546 int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad) { argument 547 if (pad) {
|
/external/boringssl/src/crypto/fipsmodule/hmac/ |
H A D | hmac.c | 111 uint8_t pad[EVP_MAX_MD_BLOCK_SIZE]; local 135 pad[i] = 0x36 ^ key_block[i]; 138 !EVP_DigestUpdate(&ctx->i_ctx, pad, EVP_MD_block_size(md))) { 143 pad[i] = 0x5c ^ key_block[i]; 146 !EVP_DigestUpdate(&ctx->o_ctx, pad, EVP_MD_block_size(md))) {
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | padding.c | 113 size_t pad; local 114 for (pad = 2 /* header */; pad < from_len; pad++) { 115 if (from[pad] == 0x00) { 119 if (from[pad] != 0xff) { 125 if (pad == from_len) { 130 if (pad < 2 /* header */ + 8) { 136 pad++; 138 if (from_len - pad > max_ou [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | HMac.java | 230 private static void xorPad(byte[] pad, int len, byte n) argument 234 pad[i] ^= n;
|
/external/bzip2/ |
H A D | bzip2.c | 908 void pad ( Char *s ) function 1288 pad ( inName ); 1465 pad ( inName ); 1586 pad ( inName );
|
/external/clang/lib/StaticAnalyzer/Core/ |
H A D | CheckerRegistry.cpp | 166 int pad = optionFieldWidth - i->FullName.size(); local 169 if (pad < 0) { 171 pad = optionFieldWidth + initialPad; 173 out.indent(pad + 2) << i->Desc;
|
/external/clang/test/CodeGen/ |
H A D | 2008-01-04-WideBitfield.c | 5 unsigned char pad : 4; member in struct:X
|
/external/clang/test/CodeGenCXX/ |
H A D | debug-info-template.cpp | 7 char pad[8]; // make the member pointer to 'e' a bit more interesting (nonzero) member in struct:foo
|
/external/clang/test/SemaCXX/ |
H A D | builtin-object-size-cxx14.cpp | 52 int pad; member in struct:in_enable_if::LargeStruct 58 int pad; member in struct:in_enable_if::SmallStruct
|
/external/compiler-rt/test/asan/TestCases/Posix/ |
H A D | asan-symbolize-sanity-test.cc | 51 int pad[10]; variable
|
H A D | shared-lib-test.cc | 45 int pad[10]; variable
|