/external/oprofile/libpp/ |
D | diff_container.cpp | 109 : pc1(c1), pc2(c2), in diff_container() 110 total1(pc1.samples_count()), total2(pc2.samples_count()) in diff_container() 129 symbol_container::symbols_t::iterator it2 = pc2.begin_symbol(); in get_symbols() 130 symbol_container::symbols_t::iterator end2 = pc2.end_symbol(); in get_symbols()
|
D | diff_container.h | 25 profile_container const & pc2); 41 profile_container const & pc2; variable
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
D | PKIXCertPathCheckerTest.java | 53 PKIXCertPathChecker pc2 = (PKIXCertPathChecker) pc1.clone(); in testClone() local 54 assertNotSame("notSame", pc1, pc2); in testClone()
|
/external/chromium/chrome/browser/prerender/ |
D | prerender_manager_unittest.cc | 253 DummyPrerenderContents* pc2 = in TEST_F() local 256 prerender_manager_->SetNextPrerenderContents(pc2); in TEST_F() 259 EXPECT_TRUE(pc2->has_started()); in TEST_F() 262 ASSERT_EQ(pc2, prerender_manager_->GetEntry(url2)); in TEST_F() 265 pc2->set_final_status(FINAL_STATUS_USED); in TEST_F() 266 delete pc2; in TEST_F()
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
D | DES.java | 110 …static byte[] pc2 = { 13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9, 22, 18, 11, 3, 25, 7, 15, 6, 26, … field in DES 248 if (pcr[pc2[j]]) in generateWorkingKey() 253 if (pcr[pc2[j + 24]]) in generateWorkingKey()
|
/external/qemu/ |
D | d3des.c | 60 static const unsigned char pc2[48] = { variable 94 if( pcr[pc2[j]] ) kn[m] |= bigbyte[j]; in deskey() 95 if( pcr[pc2[j+24]] ) kn[n] |= bigbyte[j]; in deskey()
|
/external/javassist/src/main/javassist/compiler/ |
D | CodeGen.java | 385 int pc2 = 0; in atIfStmnt() local 397 pc2 = bytecode.currentPc(); in atIfStmnt() 406 bytecode.write16bit(pc2, bytecode.currentPc() - pc2 + 1); in atIfStmnt() 428 int pc2 = bytecode.currentPc(); in atWhileStmnt() local 437 bytecode.addIndex(pc2 - bytecode.currentPc() + 1); in atWhileStmnt() 471 int pc2 = 0; in atForStmnt() local 474 pc2 = bytecode.currentPc(); in atForStmnt() 490 bytecode.write16bit(pc2, pc4 - pc2 + 1); in atForStmnt() 669 int pc2 = bc.currentPc(); in atSyncStmnt() local 678 if (pc < pc2) { // if the body is not empty in atSyncStmnt() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
D | DESEngine.java | 139 private static final byte[] pc2 = field in DESEngine 365 if (pcr[pc2[j]]) in generateWorkingKey() 370 if (pcr[pc2[j + 24]]) in generateWorkingKey()
|
/external/wpa_supplicant_8/src/crypto/ |
D | des-internal.c | 80 static const u8 pc2[48] = { variable 307 if ((int) pcr[(int) pc2[j]] != 0) in deskey() 309 if ((int) pcr[(int) pc2[j + 24]] != 0) in deskey()
|
/external/oprofile/pp/ |
D | opreport.cpp | 416 profile_container const & pc2, bool multiple_apps) in output_diff_symbols() argument 418 diff_container dc(pc1, pc2); in output_diff_symbols() 549 profile_container pc2(options::debug_info, options::details, in opreport() local 556 populate_for_image(pc2, *it2, in opreport() 559 output_diff_symbols(pc1, pc2, multiple_apps); in opreport()
|
/external/clang/test/SemaCXX/ |
D | namespace-alias.cpp | 109 N::C2 *pc2 = 0; variable
|
/external/chromium/net/base/ |
D | cookie_monster_unittest.cc | 291 CookieMonster::ParsedCookie pc2(blankpairs + ";secure"); in TEST() local 292 EXPECT_TRUE(pc2.IsValid()); in TEST() 293 EXPECT_FALSE(pc2.IsSecure()); in TEST() 309 CookieMonster::ParsedCookie pc2(maxstr + "A"); in TEST() local 310 EXPECT_FALSE(pc2.IsValid()); in TEST() 320 CookieMonster::ParsedCookie pc2("AAA=BB\rZYX"); in TEST() local 325 EXPECT_TRUE(pc2.IsValid()); in TEST() 326 EXPECT_EQ("AAA", pc2.Name()); in TEST() 327 EXPECT_EQ("BB", pc2.Value()); in TEST()
|
/external/clang/test/CodeGenCXX/ |
D | member-function-pointers.cpp | 28 void (C::*pc2)() = &C::f; variable
|
/external/dropbear/libtomcrypt/src/ciphers/ |
D | des.c | 84 static const unsigned char pc2[48] = { variable 1345 if ((int)pcr[(int)pc2[j]] != 0) { in _deskey() 1348 if ((int)pcr[(int)pc2[j+24]] != 0) { in _deskey()
|