Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 219) sorted by relevance

123456789

/external/aac/libPCMutils/src/
Dlimiter.cpp116 unsigned int attack, release; in pcmLimiter_Create() local
121 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in pcmLimiter_Create()
129 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in pcmLimiter_Create()
131 (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in pcmLimiter_Create()
139 exponent = invFixp(attack + 1); in pcmLimiter_Create()
152 limiter->attack = attack; in pcmLimiter_Create()
180 unsigned int attack = limiter->attack; in pcmLimiter_Apply() local
195 scaleValuesSaturate(delayBuf, attack * channels, in pcmLimiter_Apply()
197 scaleValuesSaturate(maxBuf, attack + 1, limiter->scaling - scaling); in pcmLimiter_Apply()
240 for (j = 1; j <= attack; j++) { in pcmLimiter_Apply()
[all …]
/external/libxaac/decoder/drc_src/
Dimpd_drc_peak_limiter.c39 UWORD32 attack; in impd_peak_limiter_init() local
40 attack = (UWORD32)(attack_time * sample_rate / 1000); in impd_peak_limiter_init()
42 if (attack < 1) return 0; in impd_peak_limiter_init()
45 peak_limiter->delayed_input = buffer + attack * 4 + 32; in impd_peak_limiter_init()
50 peak_limiter->attack_time_samples = attack; in impd_peak_limiter_init()
51 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_peak_limiter_init()
Dimpd_drc_parametric_dec.c215 UWORD32 attack, sec_len; in impd_init_parametric_drc_lim() local
252 attack = (UWORD32)(hParametricDrcTypeLimBs->parametric_lim_attack * in impd_init_parametric_drc_lim()
255 sec_len = (UWORD32)sqrt(attack + 1); in impd_init_parametric_drc_lim()
258 pstr_parametric_lim_type_drc_params->num_max_buf_sec = (attack + 1) / sec_len; in impd_init_parametric_drc_lim()
260 (attack + 1)) in impd_init_parametric_drc_lim()
272 pstr_parametric_lim_type_drc_params->attack = attack; in impd_init_parametric_drc_lim()
274 (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_init_parametric_drc_lim()
1044 WORD32 attack_time_samples = pstr_parametric_lim_type_drc_params->attack; in impd_parametric_lim_type_drc_process()
/external/python/cpython2/Lib/test/
Dtest_fpformat.py72 attack = '+0' + ('0' * 1000000) + '++'
76 self.assertEqual(fpformat.fix(attack, digs), attack)
79 fpformat.sci(attack, digs)
/external/aac/libAACenc/src/
Dblock_switch.cpp250 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching()
275 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching()
292 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching()
305 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching()
312 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching()
315 if ((blockSwitchingControl->attack == FALSE) && in FDKaacEnc_BlockSwitching()
323 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching()
331 [blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
336 chgWndSq[blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
Dblock_switch.h128 INT attack; member
/external/libevent/test/
Dregress_rpc.c737 struct kill *attack = NULL; in rpc_test() local
751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test()
755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test()
756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test()
758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test()
809 !EVTAG_HAS(msg2, attack)) { in rpc_test()
813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test()
860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test()
864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
Dregress.rpc6 optional struct[kill] attack = 3;
/external/rust/crates/codespan-reporting/tests/snapshots/
Dterm__tabbed__tab_width_default_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
Dterm__tabbed__tab_width_6_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
Dterm__tabbed__tab_width_3_no_color.snap11 warning: unknown condition `attack-cooldown`
14 4 │ ReloadingCondition: attack-cooldown
/external/jackson-databind/src/test/java/com/fasterxml/jackson/databind/jsontype/ext/
DExternalTypeIdWithCreatorTest.java23 public Attack attack; field in ExternalTypeIdWithCreatorTest.Character
95 assertNotNull(character.attack); in testFails()
106 assertNotNull(character.attack); in testWorks()
/external/adhd/cras-config/
Ddsp.ini.sample30 input_10=0.02 ; attack
38 input_18=0.02 ; attack
46 input_26=0.001 ; attack
/external/autotest/client/site_tests/security_SysVIPC/
Dcontrol7 DOC = "Security tripwire for SysV IPC attack surfaces"
9 PURPOSE = "Detect emergence of new attack surfaces in SysV IPC"
/external/libwebsockets/scripts/
Dtravis_control.sh19 ../scripts/attack.sh &&
44 ../scripts/attack.sh
/external/python/cpython3/Doc/library/
Dxml.rst83 The `Billion Laughs`_ attack -- also known as exponential entity expansion --
90 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses
92 with a couple of thousand chars over and over again. The attack isn't as
114 all known attack vectors with examples and references.
/external/wycheproof/doc/
Drsa.md45 information leakage. Smart even describes an attack that only needs about 40
62 Due to the nature of unit tests not every attack can be detected this way. Some
73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are
74 implementations that were susceptible to Mangers attack, e.g. [CVE-2012-5081].
104 \[M01]: J. Manger, "A chosen ciphertext attack on RSA optimal asymmetric
106 paper shows that OAEP is susceptible to a chosen ciphertext attack if error
/external/python/cpython2/Doc/library/
Dxml.rst77 The `Billion Laughs`_ attack -- also known as exponential entity expansion --
84 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses
86 with a couple of thousand chars over and over again. The attack isn't as
109 all known attack vectors with examples and references.
/external/webrtc/modules/audio_processing/test/py_quality_assessment/quality_assessment/
Dsound_level.cc71 const float attack = in main() local
111 level_prev = smooth(level_curr > level_prev ? attack : decay); in main()
/external/adhd/scripts/audio_tuning/
Dconf2ini2.py119 attack = d[prefix + 'attack']
128 n+5, attack,
/external/replicaisland/src/com/replica/replicaisland/
DGameObjectFactory.java1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2);
1389 attack.addFrame(new AnimationFrame(
1392 attack.addFrame(new AnimationFrame(
1401 staticData.add(attack);
1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal());
1473 if (attack != null) {
1474 gun.setDelayBeforeFirstSet(attack.getLength());
1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10);
1597 attack.addFrame(attack1);
1598 attack.addFrame(attack2);
[all …]
/external/rust/crates/ahash/
DFAQ.md10 … hashes such as murmurhash confidence in their quality, but could be undone by a deliberate attack.
20 …ame input. - This means that if there is a way to attack one of them it likely won't be able to at…
42 …ns that even a provably irreversible hash would not offer protection from a DOS attack in a hashmap
55 …d rounds of AES as opposed to the standard of 10. Things like the SQUARE attack apply to part of t…
/external/kernel-headers/original/uapi/sound/
Dasound_fm.h54 unsigned char attack; /* 4 bits: attack rate */ member
/external/python/cpython2/Misc/NEWS.d/
D2.7.6.rst7 Fix directory traversal attack on CGIHttpRequestHandler.
/external/owasp/sanitizer/src/tests/org/owasp/html/
DAntiSamyTest.java594 String attack = "[if lte 8]<script>";
601 for (int i = 0; i < attack.length(); i++) {
602 sb.append(attack.charAt(i));

123456789