Searched refs:additive (Results 1 – 20 of 20) sorted by relevance
/external/skia/src/effects/ |
D | SkEmbossMask.cpp | 97 uint8_t* additive = multiply + planeSize; in Emboss() local 151 additive[x] = SkToU8(add); in Emboss() 160 additive += rowBytes; in Emboss()
|
/external/chromium_org/third_party/skia/src/effects/ |
D | SkEmbossMask.cpp | 97 uint8_t* additive = multiply + planeSize; in Emboss() local 151 additive[x] = SkToU8(add); in Emboss() 160 additive += rowBytes; in Emboss()
|
/external/deqp/doc/testspecs/GLES2/ |
D | functional.rasterization.txt | 43 Fill rules are tested using additive blend so that pixels on shared
|
D | performance.txt | 94 preferred way to do this is to enable simple additive blending. The extra
|
/external/chromium_org/third_party/WebKit/Source/core/svg/ |
D | SVGAttributeNames.in | 7 additive
|
/external/chromium_org/third_party/codesighs/ |
D | maptsvdifftool.c | 385 int additive = 0; in difftool() local 401 additive = __LINE__; in difftool() 606 if(additive) in difftool()
|
/external/chromium_org/third_party/WebKit/Source/platform/scroll/ |
D | ScrollbarThemeMacCommon.mm | 173 // Prefer non-additive shadows, but degrade to additive shadows if there is vertical overhang.
|
/external/deqp/doc/testspecs/GLES3/ |
D | performance.txt | 94 preferred way to do this is to enable simple additive blending. The extra
|
/external/llvm/include/llvm/Target/ |
D | TargetSchedule.td | 213 // SchedWrites with additive latency. This allows a single operand to 346 // operand and assumed to execute sequentially with additive 350 // operands. In this case, latency is not additive. If the current Variant
|
/external/libvpx/libvpx/vp9/common/x86/ |
D | vp9_loopfilter_mmx.asm | 509 pandn mm4, mm5 ; high edge variance additive
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/common/x86/ |
D | vp9_loopfilter_mmx.asm | 509 pandn mm4, mm5 ; high edge variance additive
|
/external/chromium_org/third_party/libsrtp/srtp/doc/ |
D | draft-irtf-cfrg-icm-00.txt | 75 using a block cipher [CTR]. The keystream can be used for additive
|
D | rfc3711.txt | 142 transforms are described, based on an additive stream cipher for 1688 introduced to protect against some attacks on additive stream 2083 additive stream cipher is vulnerable to attacks that use statistical 2337 additive stream cipher, an attacker will always be able to change
|
/external/srtp/doc/ |
D | draft-irtf-cfrg-icm-00.txt | 75 using a block cipher [CTR]. The keystream can be used for additive
|
D | rfc3711.txt | 142 transforms are described, based on an additive stream cipher for 1688 introduced to protect against some attacks on additive stream 2083 additive stream cipher is vulnerable to attacks that use statistical 2337 additive stream cipher, an attacker will always be able to change
|
/external/libvorbis/doc/ |
D | 08-residue.tex | 60 codebook design dictates that each vector is encoded as the additive
|
/external/llvm/lib/Target/ARM/ |
D | ARMScheduleA9.td | 2022 // Define A9WriteAdr1-8 as a sequence of A9WriteAdr with additive 2125 // A9WriteLfpOps with additive latency that takes a single issue slot. 2233 // additive latency.
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/common/x86/ |
D | loopfilter_mmx.asm | 509 pandn mm4, mm5 ; high edge variance additive
|
/external/libvpx/libvpx/vp8/common/x86/ |
D | loopfilter_mmx.asm | 509 pandn mm4, mm5 ; high edge variance additive
|
/external/llvm/lib/Target/Mips/ |
D | MipsInstrInfo.td | 218 // FIXME: I'd prefer to use additive predicates to build the instruction sets
|