Home
last modified time | relevance | path

Searched refs:M_2 (Results 1 – 7 of 7) sorted by relevance

/external/clang/test/Preprocessor/
Dmacro_disable.c28 #define M_2(x) x + M_1(1) macro
29 #define M_3(x) x + M_2(2)
/external/libxaac/decoder/armv7/
Dixheaacd_qmf_dec_armv7.c266 WORD32 M_2; in ixheaacd_esbr_cos_sin_mod() local
277 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_esbr_cos_sin_mod()
Dixheaacd_esbr_cos_sin_mod_loop2.s38 MOV R4, R2, ASR #1 @M_2 = ixheaacd_shr32(M, 1);
/external/eigen/doc/
DQuickReference.dox668 \f$ M_2 := L_1^{-1} M_2 \f$ \n
702 \f$ upper(M_1) \mathrel{{+}{=}} s_1 M_2 M_2^* \f$ \n
703 \f$ lower(M_1) \mathbin{{-}{=}} M_2^* M_2 \f$
715 Solving linear equations:\n(\f$ M_2 := M_1^{-1} M_2 \f$)
/external/libxaac/decoder/generic/
Dixheaacd_qmf_dec_generic.c263 WORD32 i, M_2; in ixheaacd_cos_sin_mod() local
276 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_cos_sin_mod()
288 for (i = (M_2 >> 1) - 1; i >= 0; i--) { in ixheaacd_cos_sin_mod()
425 for (i = (M_2 - 2); i >= 0; i--) { in ixheaacd_cos_sin_mod()
1044 WORD32 i, M_2; in ixheaacd_esbr_cos_sin_mod() local
1058 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_esbr_cos_sin_mod()
1072 for (i = (M_2 >> 1) - 1; i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod()
1285 for (i = (M_2 - 2); i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod()
/external/ukey2/
DREADME.md265 Let `M_2` = the serialized (including framing) raw bytes of the first message sent by
282 Then `AUTH_STRING = HKDF-Expand(PRK_AUTH, M_1|M_2, L_auth)`
284 Then `NEXT_SECRET = HKDF-Expand(PRK_NEXT, M_1|M_2, L_next)`
304 in `M_2` and `M_3` and are also used to derive the DHS. Though the "proof" may
/external/libxaac/decoder/armv8/
Dixheaacd_qmf_dec_armv8.c799 WORD32 i, M_2; in ixheaacd_esbr_cos_sin_mod() local
813 M_2 = ixheaacd_shr32(M, 1); in ixheaacd_esbr_cos_sin_mod()
827 for (i = (M_2 >> 1) - 1; i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod()
1045 for (i = (M_2 - 2); i >= 0; i--) { in ixheaacd_esbr_cos_sin_mod()