Searched refs:M_2 (Results 1 – 7 of 7) sorted by relevance
/external/clang/test/Preprocessor/ |
D | macro_disable.c | 28 #define M_2(x) x + M_1(1) macro 29 #define M_3(x) x + M_2(2)
|
/external/libxaac/decoder/armv7/ |
D | ixheaacd_qmf_dec_armv7.c | 266 WORD32 M_2; in ixheaacd_esbr_cos_sin_mod() local 277 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_esbr_cos_sin_mod()
|
D | ixheaacd_esbr_cos_sin_mod_loop2.s | 38 MOV R4, R2, ASR #1 @M_2 = ixheaacd_shr32(M, 1);
|
/external/eigen/doc/ |
D | QuickReference.dox | 668 \f$ M_2 := L_1^{-1} M_2 \f$ \n 702 \f$ upper(M_1) \mathrel{{+}{=}} s_1 M_2 M_2^* \f$ \n 703 \f$ lower(M_1) \mathbin{{-}{=}} M_2^* M_2 \f$ 715 Solving linear equations:\n(\f$ M_2 := M_1^{-1} M_2 \f$)
|
/external/libxaac/decoder/generic/ |
D | ixheaacd_qmf_dec_generic.c | 263 WORD32 i, M_2; in ixheaacd_cos_sin_mod() local 276 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_cos_sin_mod() 288 for (i = (M_2 >> 1) - 1; i >= 0; i--) { in ixheaacd_cos_sin_mod() 425 for (i = (M_2 - 2); i >= 0; i--) { in ixheaacd_cos_sin_mod() 1044 WORD32 i, M_2; in ixheaacd_esbr_cos_sin_mod() local 1058 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_esbr_cos_sin_mod() 1072 for (i = (M_2 >> 1) - 1; i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod() 1285 for (i = (M_2 - 2); i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod()
|
/external/ukey2/ |
D | README.md | 265 Let `M_2` = the serialized (including framing) raw bytes of the first message sent by 282 Then `AUTH_STRING = HKDF-Expand(PRK_AUTH, M_1|M_2, L_auth)` 284 Then `NEXT_SECRET = HKDF-Expand(PRK_NEXT, M_1|M_2, L_next)` 304 in `M_2` and `M_3` and are also used to derive the DHS. Though the "proof" may
|
/external/libxaac/decoder/armv8/ |
D | ixheaacd_qmf_dec_armv8.c | 799 WORD32 i, M_2; in ixheaacd_esbr_cos_sin_mod() local 813 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_esbr_cos_sin_mod() 827 for (i = (M_2 >> 1) - 1; i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod() 1045 for (i = (M_2 - 2); i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod()
|