/external/aac/libPCMutils/src/ |
D | limiter.cpp | 116 unsigned int attack, release; in pcmLimiter_Create() local 121 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in pcmLimiter_Create() 129 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in pcmLimiter_Create() 131 (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in pcmLimiter_Create() 139 exponent = invFixp(attack + 1); in pcmLimiter_Create() 152 limiter->attack = attack; in pcmLimiter_Create() 180 unsigned int attack = limiter->attack; in pcmLimiter_Apply() local 195 scaleValuesSaturate(delayBuf, attack * channels, in pcmLimiter_Apply() 197 scaleValuesSaturate(maxBuf, attack + 1, limiter->scaling - scaling); in pcmLimiter_Apply() 240 for (j = 1; j <= attack; j++) { in pcmLimiter_Apply() [all …]
|
/external/libxaac/decoder/drc_src/ |
D | impd_drc_peak_limiter.c | 39 UWORD32 attack; in impd_peak_limiter_init() local 40 attack = (UWORD32)(attack_time * sample_rate / 1000); in impd_peak_limiter_init() 42 if (attack < 1) return 0; in impd_peak_limiter_init() 45 peak_limiter->delayed_input = buffer + attack * 4 + 32; in impd_peak_limiter_init() 50 peak_limiter->attack_time_samples = attack; in impd_peak_limiter_init() 51 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_peak_limiter_init()
|
D | impd_drc_parametric_dec.c | 215 UWORD32 attack, sec_len; in impd_init_parametric_drc_lim() local 252 attack = (UWORD32)(hParametricDrcTypeLimBs->parametric_lim_attack * in impd_init_parametric_drc_lim() 255 sec_len = (UWORD32)sqrt(attack + 1); in impd_init_parametric_drc_lim() 258 pstr_parametric_lim_type_drc_params->num_max_buf_sec = (attack + 1) / sec_len; in impd_init_parametric_drc_lim() 260 (attack + 1)) in impd_init_parametric_drc_lim() 272 pstr_parametric_lim_type_drc_params->attack = attack; in impd_init_parametric_drc_lim() 274 (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_init_parametric_drc_lim() 1044 WORD32 attack_time_samples = pstr_parametric_lim_type_drc_params->attack; in impd_parametric_lim_type_drc_process()
|
/external/python/cpython2/Lib/test/ |
D | test_fpformat.py | 72 attack = '+0' + ('0' * 1000000) + '++' 76 self.assertEqual(fpformat.fix(attack, digs), attack) 79 fpformat.sci(attack, digs)
|
/external/aac/libAACenc/src/ |
D | block_switch.cpp | 250 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching() 275 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching() 292 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 305 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 312 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 315 if ((blockSwitchingControl->attack == FALSE) && in FDKaacEnc_BlockSwitching() 323 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 331 [blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching() 336 chgWndSq[blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
|
D | block_switch.h | 128 INT attack; member
|
/external/libevent/test/ |
D | regress_rpc.c | 737 struct kill *attack = NULL; in rpc_test() local 751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test() 755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test() 756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test() 758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test() 864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
|
D | regress.rpc | 6 optional struct[kill] attack = 3;
|
/external/rust/crates/codespan-reporting/tests/snapshots/ |
D | term__tabbed__tab_width_default_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_6_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_3_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
/external/jackson-databind/src/test/java/com/fasterxml/jackson/databind/jsontype/ext/ |
D | ExternalTypeIdWithCreatorTest.java | 23 public Attack attack; field in ExternalTypeIdWithCreatorTest.Character 95 assertNotNull(character.attack); in testFails() 106 assertNotNull(character.attack); in testWorks()
|
/external/adhd/cras-config/ |
D | dsp.ini.sample | 30 input_10=0.02 ; attack 38 input_18=0.02 ; attack 46 input_26=0.001 ; attack
|
/external/autotest/client/site_tests/security_SysVIPC/ |
D | control | 7 DOC = "Security tripwire for SysV IPC attack surfaces" 9 PURPOSE = "Detect emergence of new attack surfaces in SysV IPC"
|
/external/libwebsockets/scripts/ |
D | travis_control.sh | 19 ../scripts/attack.sh && 44 ../scripts/attack.sh
|
/external/python/cpython3/Doc/library/ |
D | xml.rst | 83 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 90 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 92 with a couple of thousand chars over and over again. The attack isn't as 114 all known attack vectors with examples and references.
|
/external/wycheproof/doc/ |
D | rsa.md | 45 information leakage. Smart even describes an attack that only needs about 40 62 Due to the nature of unit tests not every attack can be detected this way. Some 73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are 74 implementations that were susceptible to Mangers attack, e.g. [CVE-2012-5081]. 104 \[M01]: J. Manger, "A chosen ciphertext attack on RSA optimal asymmetric 106 paper shows that OAEP is susceptible to a chosen ciphertext attack if error
|
/external/python/cpython2/Doc/library/ |
D | xml.rst | 77 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 84 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 86 with a couple of thousand chars over and over again. The attack isn't as 109 all known attack vectors with examples and references.
|
/external/webrtc/modules/audio_processing/test/py_quality_assessment/quality_assessment/ |
D | sound_level.cc | 71 const float attack = in main() local 111 level_prev = smooth(level_curr > level_prev ? attack : decay); in main()
|
/external/adhd/scripts/audio_tuning/ |
D | conf2ini2.py | 119 attack = d[prefix + 'attack'] 128 n+5, attack,
|
/external/replicaisland/src/com/replica/replicaisland/ |
D | GameObjectFactory.java | 1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2); 1389 attack.addFrame(new AnimationFrame( 1392 attack.addFrame(new AnimationFrame( 1401 staticData.add(attack); 1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal()); 1473 if (attack != null) { 1474 gun.setDelayBeforeFirstSet(attack.getLength()); 1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10); 1597 attack.addFrame(attack1); 1598 attack.addFrame(attack2); [all …]
|
/external/rust/crates/ahash/ |
D | FAQ.md | 10 … hashes such as murmurhash confidence in their quality, but could be undone by a deliberate attack. 20 …ame input. - This means that if there is a way to attack one of them it likely won't be able to at… 42 …ns that even a provably irreversible hash would not offer protection from a DOS attack in a hashmap 55 …d rounds of AES as opposed to the standard of 10. Things like the SQUARE attack apply to part of t…
|
/external/kernel-headers/original/uapi/sound/ |
D | asound_fm.h | 54 unsigned char attack; /* 4 bits: attack rate */ member
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.6.rst | 7 Fix directory traversal attack on CGIHttpRequestHandler.
|
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
D | AntiSamyTest.java | 594 String attack = "[if lte 8]<script>"; 601 for (int i = 0; i < attack.length(); i++) { 602 sb.append(attack.charAt(i));
|