Searched refs:opcode (Results 226 - 250 of 375) sorted by relevance

1234567891011>>

/external/proguard/src/proguard/optimize/evaluation/
H A DEvaluationShrinker.java200 if (instruction.opcode == InstructionConstants.OP_GOTO &&
483 switch (constantInstruction.opcode)
566 switch (simpleInstruction.opcode)
618 if (variableInstruction.opcode < InstructionConstants.OP_ISTORE)
632 if (constantInstruction.opcode == InstructionConstants.OP_NEW)
646 if (branchInstruction.opcode == InstructionConstants.OP_JSR ||
647 branchInstruction.opcode == InstructionConstants.OP_JSR_W)
1053 byte oldOpcode = instruction.opcode;
1313 * Returns the opcode of a push instruction corresponding to the given
1329 throw new IllegalArgumentException("No push opcode fo
[all...]
H A DEvaluationSimplifier.java161 switch (simpleInstruction.opcode)
244 switch (variableInstruction.opcode)
303 switch (constantInstruction.opcode)
335 switch (branchInstruction.opcode)
/external/bluetooth/bluedroid/stack/gatt/
H A Dgatt_cl.c33 #define GATT_WRITE_LONG_HDR_SIZE 5 /* 1 opcode + 2 handle + 2 offset */
539 void gatt_proc_disc_error_rsp(tGATT_TCB *p_tcb, tGATT_CLCB *p_clcb, UINT8 opcode, argument
544 GATT_TRACE_DEBUG2("gatt_proc_disc_error_rsp reason: %02x cmd_code %04x", reason, opcode);
546 switch (opcode)
559 GATT_TRACE_ERROR1("Incorrect discovery opcode %04x", opcode);
579 UINT8 opcode, reason, * p= p_data; local
584 STREAM_TO_UINT8(opcode, p);
590 gatt_proc_disc_error_rsp(p_tcb, p_clcb, opcode, handle, reason);
596 (opcode
[all...]
/external/bluetooth/bluedroid/stack/include/
H A Dsmp_api.h155 UINT16 opcode; member in struct:__anon1343
H A Davrc_api.h150 typedef void (tAVRC_MSG_CBACK) (UINT8 handle, UINT8 label, UINT8 opcode,
/external/javassist/src/main/javassist/bytecode/
H A DCodeIterator.java174 * (not the operand following the current opcode).
733 * Calculates the index of the next opcode.
738 int opcode;
740 opcode = code[index] & 0xff;
743 throw new BadBytecode("invalid opcode address");
747 int len = opcodeLength[opcode];
750 else if (opcode == WIDE)
757 if (opcode == LOOKUPSWITCH) {
761 else if (opcode == TABLESWITCH) {
767 // throw new BadBytecode(opcode);
1413 int opcode(int op) { method in class:CodeIterator.If16
[all...]
/external/javassist/src/test/test/javassist/bytecode/analysis/
H A DAnalyzerTest.java79 private static int findOpcode(MethodInfo info, int opcode) throws BadBytecode { argument
86 if (iter.byteAt(pos) == opcode)
142 private static void addJump(Bytecode code, int opcode, int pos) { argument
144 code.addOpcode(opcode);
H A DScannerTest.java180 private static void addJump(Bytecode code, int opcode, int pos) { argument
182 code.addOpcode(opcode);
/external/llvm/lib/Target/MBlaze/Disassembler/
H A DMBlazeDisassembler.cpp465 unsigned opcode = mblazeBinary2Opcode[ (insn>>26)&0x3F ]; local
466 switch (opcode) {
491 default: return opcode;
524 // Get the MCInst opcode from the binary instruction and make sure
526 unsigned opcode = getOPCODE(insn); local
527 if (opcode == UNSUPPORTED)
530 instr.setOpcode(opcode);
537 uint64_t tsFlags = MBlazeInsts[opcode].TSFlags;
569 switch (opcode) {
599 switch (opcode) {
[all...]
/external/proguard/src/proguard/classfile/editor/
H A DVariableRemapper.java135 new VariableInstruction(variableInstruction.opcode,
/external/proguard/src/proguard/optimize/
H A DDuplicateInitializerInvocationFixer.java103 if (constantInstruction.opcode == InstructionConstants.OP_INVOKESPECIAL)
/external/tcpdump/
H A Dprint-eigrp.c43 u_int8_t opcode; member in struct:eigrp_common_header
247 tok2str(eigrp_opcode_values, "unknown (%u)",eigrp_com_header->opcode),
257 printf("\n\tEIGRP v%u, opcode: %s (%u), chksum: 0x%04x, Flags: [%s]\n\tseq: 0x%08x, ack: 0x%08x, AS: %u, length: %u",
259 tok2str(eigrp_opcode_values, "unknown, type: %u",eigrp_com_header->opcode),
260 eigrp_com_header->opcode,
/external/v8/src/mips/
H A Dassembler-mips.h535 // Takes a branch opcode (cc) and a label (L) and generates
595 // Difference between address of current opcode and target address offset.
627 // Difference between address of current opcode and value read from pc
1141 void GenInstrRegister(Opcode opcode,
1148 void GenInstrRegister(Opcode opcode,
1155 void GenInstrRegister(Opcode opcode,
1162 void GenInstrRegister(Opcode opcode,
1169 void GenInstrRegister(Opcode opcode,
1176 void GenInstrImmediate(Opcode opcode,
1180 void GenInstrImmediate(Opcode opcode,
[all...]
/external/bluetooth/bluedroid/btif/src/
H A Dbluetooth.c336 int dut_mode_send(uint16_t opcode, uint8_t* buf, uint8_t len) argument
344 return btif_dut_mode_send(opcode, buf, len);
/external/proguard/src/proguard/evaluation/
H A DProcessor.java79 switch (simpleInstruction.opcode)
550 throw new IllegalArgumentException("Unknown simple instruction ["+simpleInstruction.opcode+"]");
559 switch (constantInstruction.opcode)
629 throw new IllegalArgumentException("Unknown constant pool instruction ["+constantInstruction.opcode+"]");
638 switch (variableInstruction.opcode)
741 throw new IllegalArgumentException("Unknown variable instruction ["+variableInstruction.opcode+"]");
750 switch (branchInstruction.opcode)
851 throw new IllegalArgumentException("Unknown branch instruction ["+branchInstruction.opcode+"]");
/external/llvm/utils/TableGen/
H A DX86DisassemblerTables.cpp263 /// to an opcode modifier type.
640 uint8_t opcode) {
670 errs() << "Opcode " << (uint16_t)opcode << "\n";
683 uint8_t opcode,
696 setTableFields(decision.opcodeDecisions[index].modRMDecisions[opcode],
699 opcode);
/external/qemu/target-mips/
H A Dtranslate.c45 /* indirect opcode tables */
117 /* Reserved major opcode */
465 uint32_t opcode; member in struct:DisasContext
507 ctx->pc, ctx->opcode , ## __VA_ARGS__)
516 MIPS_DEBUG("Invalid %s %03x %03x %03x", op, ctx->opcode >> 26, \
517 ctx->opcode & 0x3F, ((ctx->opcode >> 16) & 0x1F)); \
835 opcode tables. */
1434 switch ((ctx->opcode >> 21) & 0x1f) {
1484 switch ((ctx->opcode >> 2
[all...]
/external/openssl/crypto/aes/asm/
H A Daesni-sha1-x86_64.pl120 { my $opcode = $AUTOLOAD; $opcode =~ s/.*:://;
123 $code .= "\t$opcode\t".join(',',$arg,reverse @_)."\n";
1219 local *opcode=shift;
1225 push @opcode,$rex|0x40 if($rex);
1230 my @opcode=(0x66);
1237 rex(\@opcode,$3,$2);
1238 push @opcode,0x0f,0x38,$opcodelet{$1};
1239 push @opcode,0xc0|($2&7)|(($3&7)<<3); # ModR/M
1240 return ".byte\t".join(',',@opcode);
[all...]
/external/proguard/src/proguard/classfile/util/
H A DInstructionSequenceMatcher.java437 // Check the opcode.
438 return instruction1.opcode == instruction2.opcode ||
439 instruction1.canonicalOpcode() == instruction2.opcode;
/external/proguard/src/proguard/preverify/
H A DCodePreverifier.java603 * Returns whether the given instruction opcode represents a dup or swap
606 private boolean isDupOrSwap(int opcode) argument
608 return opcode >= InstructionConstants.OP_DUP &&
609 opcode <= InstructionConstants.OP_SWAP;
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
H A Dextensions.py228 common.is_control_opcode(frame.opcode)):
252 if frame.rsv1 != 1 or common.is_control_opcode(frame.opcode):
592 if frame.rsv1 == 1 and not common.is_control_opcode(frame.opcode):
598 common.is_control_opcode(frame.opcode)):
/external/freetype/src/truetype/
H A Dttinterp.h149 FT_Byte opcode; /* current opcode */ member in struct:TT_ExecContextRec_
150 FT_Int length; /* length of current opcode */
297 /* is the main function of the TrueType opcode interpreter. */
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/
H A Dnfc_hal_nci.c394 UINT16 opcode, old_opcode; local
411 STREAM_TO_UINT16 (opcode, p);
414 if (opcode == old_opcode)
431 p += 1; /* skip opcode */
435 STREAM_TO_UINT16 (vcs_cplt_params.opcode, p);
/external/libnfc-nci/src/nfa/int/
H A Dnfa_snep_int.h269 void nfa_snep_send_msg (UINT8 opcode, UINT8 dlink);
/external/llvm/lib/Transforms/Scalar/
H A DGVN.cpp77 uint32_t opcode; member in struct:__anon9088::Expression
81 Expression(uint32_t o = ~2U) : opcode(o) { }
84 if (opcode != other.opcode)
86 if (opcode == ~0U || opcode == ~1U)
96 return hash_combine(Value.opcode, Value.type,
163 e.opcode = I->getOpcode();
184 e.opcode = (C->getOpcode() << 8) | Predicate;
209 e.opcode
[all...]

Completed in 588 milliseconds

1234567891011>>