/external/aac/libPCMutils/src/ |
D | limiter.cpp | 116 unsigned int attack, release; in pcmLimiter_Create() local 121 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in pcmLimiter_Create() 129 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in pcmLimiter_Create() 131 (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in pcmLimiter_Create() 139 exponent = invFixp(attack + 1); in pcmLimiter_Create() 152 limiter->attack = attack; in pcmLimiter_Create() 180 unsigned int attack = limiter->attack; in pcmLimiter_Apply() local 195 scaleValuesSaturate(delayBuf, attack * channels, in pcmLimiter_Apply() 197 scaleValuesSaturate(maxBuf, attack + 1, limiter->scaling - scaling); in pcmLimiter_Apply() 240 for (j = 1; j <= attack; j++) { in pcmLimiter_Apply() [all …]
|
/external/libxaac/decoder/drc_src/ |
D | impd_drc_peak_limiter.c | 39 UWORD32 attack; in impd_peak_limiter_init() local 40 attack = (UWORD32)(attack_time * sample_rate / 1000); in impd_peak_limiter_init() 42 if (attack < 1) return 0; in impd_peak_limiter_init() 45 peak_limiter->delayed_input = buffer + attack * 4 + 32; in impd_peak_limiter_init() 50 peak_limiter->attack_time_samples = attack; in impd_peak_limiter_init() 51 peak_limiter->attack_constant = (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_peak_limiter_init()
|
D | impd_drc_parametric_dec.c | 215 UWORD32 attack, sec_len; in impd_init_parametric_drc_lim() local 252 attack = (UWORD32)(hParametricDrcTypeLimBs->parametric_lim_attack * in impd_init_parametric_drc_lim() 255 sec_len = (UWORD32)sqrt(attack + 1); in impd_init_parametric_drc_lim() 258 pstr_parametric_lim_type_drc_params->num_max_buf_sec = (attack + 1) / sec_len; in impd_init_parametric_drc_lim() 260 (attack + 1)) in impd_init_parametric_drc_lim() 272 pstr_parametric_lim_type_drc_params->attack = attack; in impd_init_parametric_drc_lim() 274 (FLOAT32)pow(0.1, 1.0 / (attack + 1)); in impd_init_parametric_drc_lim() 1044 WORD32 attack_time_samples = pstr_parametric_lim_type_drc_params->attack; in impd_parametric_lim_type_drc_process()
|
/external/python/cpython2/Lib/test/ |
D | test_fpformat.py | 72 attack = '+0' + ('0' * 1000000) + '++' 76 self.assertEqual(fpformat.fix(attack, digs), attack) 79 fpformat.sci(attack, digs)
|
/external/aac/libAACenc/src/ |
D | block_switch.cpp | 250 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching() 275 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching() 292 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 305 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 312 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 315 if ((blockSwitchingControl->attack == FALSE) && in FDKaacEnc_BlockSwitching() 323 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 331 [blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching() 336 chgWndSq[blockSwitchingControl->attack] in FDKaacEnc_BlockSwitching()
|
D | block_switch.h | 128 INT attack; member
|
/external/libevent/test/ |
D | regress_rpc.c | 737 struct kill *attack = NULL; in rpc_test() local 751 if (EVTAG_GET(msg, attack, &attack) == -1) { in rpc_test() 755 EVTAG_ASSIGN(attack, weapon, "feather"); in rpc_test() 756 EVTAG_ASSIGN(attack, action, "tickle"); in rpc_test() 758 if (EVTAG_ARRAY_ADD_VALUE(attack, how_often, i) == NULL) { in rpc_test() 809 !EVTAG_HAS(msg2, attack)) { in rpc_test() 813 if (EVTAG_GET(msg2, attack, &attack) == -1) { in rpc_test() 860 tt_int_op(EVTAG_ARRAY_LEN(attack, how_often), ==, 3); in rpc_test() 864 if (EVTAG_ARRAY_GET(attack, how_often, i, &res) == -1) { in rpc_test()
|
D | regress.rpc | 6 optional struct[kill] attack = 3;
|
/external/jackson-databind/src/test/java/com/fasterxml/jackson/databind/jsontype/ext/ |
D | ExternalTypeIdWithCreatorTest.java | 23 public Attack attack; field in ExternalTypeIdWithCreatorTest.Character 95 assertNotNull(character.attack); in testFails() 106 assertNotNull(character.attack); in testWorks()
|
/external/rust/crates/codespan-reporting/tests/snapshots/ |
D | term__tabbed__tab_width_default_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_3_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
D | term__tabbed__tab_width_6_no_color.snap | 11 warning: unknown condition `attack-cooldown` 14 4 │ ReloadingCondition: attack-cooldown
|
/external/autotest/client/site_tests/security_SysVIPC/ |
D | control | 7 DOC = "Security tripwire for SysV IPC attack surfaces" 9 PURPOSE = "Detect emergence of new attack surfaces in SysV IPC"
|
/external/libwebsockets/scripts/ |
D | travis_control.sh | 19 ../scripts/attack.sh && 44 ../scripts/attack.sh
|
/external/python/cpython3/Doc/library/ |
D | xml.rst | 87 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 94 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 96 with a couple of thousand chars over and over again. The attack isn't as 118 all known attack vectors with examples and references.
|
/external/wycheproof/doc/ |
D | rsa.md | 45 information leakage. Smart even describes an attack that only needs about 40 62 Due to the nature of unit tests not every attack can be detected this way. Some 73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are 74 implementations that were susceptible to Mangers attack, e.g. [CVE-2012-5081]. 104 \[M01]: J. Manger, "A chosen ciphertext attack on RSA optimal asymmetric 106 paper shows that OAEP is susceptible to a chosen ciphertext attack if error
|
/external/python/cpython2/Doc/library/ |
D | xml.rst | 77 The `Billion Laughs`_ attack -- also known as exponential entity expansion -- 84 A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses 86 with a couple of thousand chars over and over again. The attack isn't as 109 all known attack vectors with examples and references.
|
/external/webrtc/modules/audio_processing/test/py_quality_assessment/quality_assessment/ |
D | sound_level.cc | 71 const float attack = in main() local 111 level_prev = smooth(level_curr > level_prev ? attack : decay); in main()
|
/external/replicaisland/src/com/replica/replicaisland/ |
D | GameObjectFactory.java | 1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2); 1389 attack.addFrame(new AnimationFrame( 1392 attack.addFrame(new AnimationFrame( 1401 staticData.add(attack); 1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal()); 1473 if (attack != null) { 1474 gun.setDelayBeforeFirstSet(attack.getLength()); 1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10); 1597 attack.addFrame(attack1); 1598 attack.addFrame(attack2); [all …]
|
D | InputGameInterface.java | 293 public void setKeys(int left, int right, int jump, int attack) { in setKeys() argument 297 mAttackKeyCode = attack; in setKeys()
|
/external/rust/crates/ahash/ |
D | FAQ.md | 10 … hashes such as murmurhash confidence in their quality, but could be undone by a deliberate attack. 20 …ame input. - This means that if there is a way to attack one of them it likely won't be able to at… 42 …ns that even a provably irreversible hash would not offer protection from a DOS attack in a hashmap 55 …d rounds of AES as opposed to the standard of 10. Things like the SQUARE attack apply to part of t…
|
/external/kernel-headers/original/uapi/sound/ |
D | asound_fm.h | 54 unsigned char attack; /* 4 bits: attack rate */ member
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.6.rst | 7 Fix directory traversal attack on CGIHttpRequestHandler.
|
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
D | AntiSamyTest.java | 594 String attack = "[if lte 8]<script>"; 601 for (int i = 0; i < attack.length(); i++) { 602 sb.append(attack.charAt(i));
|
/external/arm-trusted-firmware/docs/threat_model/ |
D | threat_model_spm.rst | 54 assumed to expose small attack surface. 306 | | types of attack. | 315 | ``Threat Agent`` | Hardware attack | 328 | | type of attack. It can be addressed by the use of | 509 | ``Threat Agent`` | Hardware attack | 524 | | attack and this is left to the integrator. | 532 | | side-channel attack techniques.** |
|