Home
last modified time | relevance | path

Searched refs:additive (Results 1 – 20 of 20) sorted by relevance

/external/skia/src/effects/
DSkEmbossMask.cpp97 uint8_t* additive = multiply + planeSize; in Emboss() local
151 additive[x] = SkToU8(add); in Emboss()
160 additive += rowBytes; in Emboss()
/external/chromium_org/third_party/skia/src/effects/
DSkEmbossMask.cpp97 uint8_t* additive = multiply + planeSize; in Emboss() local
151 additive[x] = SkToU8(add); in Emboss()
160 additive += rowBytes; in Emboss()
/external/deqp/doc/testspecs/GLES2/
Dfunctional.rasterization.txt43 Fill rules are tested using additive blend so that pixels on shared
Dperformance.txt94 preferred way to do this is to enable simple additive blending. The extra
/external/chromium_org/third_party/WebKit/Source/core/svg/
DSVGAttributeNames.in7 additive
/external/chromium_org/third_party/codesighs/
Dmaptsvdifftool.c385 int additive = 0; in difftool() local
401 additive = __LINE__; in difftool()
606 if(additive) in difftool()
/external/chromium_org/third_party/WebKit/Source/platform/scroll/
DScrollbarThemeMacCommon.mm173 // Prefer non-additive shadows, but degrade to additive shadows if there is vertical overhang.
/external/deqp/doc/testspecs/GLES3/
Dperformance.txt94 preferred way to do this is to enable simple additive blending. The extra
/external/llvm/include/llvm/Target/
DTargetSchedule.td213 // SchedWrites with additive latency. This allows a single operand to
346 // operand and assumed to execute sequentially with additive
350 // operands. In this case, latency is not additive. If the current Variant
/external/libvpx/libvpx/vp9/common/x86/
Dvp9_loopfilter_mmx.asm509 pandn mm4, mm5 ; high edge variance additive
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/common/x86/
Dvp9_loopfilter_mmx.asm509 pandn mm4, mm5 ; high edge variance additive
/external/chromium_org/third_party/libsrtp/srtp/doc/
Ddraft-irtf-cfrg-icm-00.txt75 using a block cipher [CTR]. The keystream can be used for additive
Drfc3711.txt142 transforms are described, based on an additive stream cipher for
1688 introduced to protect against some attacks on additive stream
2083 additive stream cipher is vulnerable to attacks that use statistical
2337 additive stream cipher, an attacker will always be able to change
/external/srtp/doc/
Ddraft-irtf-cfrg-icm-00.txt75 using a block cipher [CTR]. The keystream can be used for additive
Drfc3711.txt142 transforms are described, based on an additive stream cipher for
1688 introduced to protect against some attacks on additive stream
2083 additive stream cipher is vulnerable to attacks that use statistical
2337 additive stream cipher, an attacker will always be able to change
/external/libvorbis/doc/
D08-residue.tex60 codebook design dictates that each vector is encoded as the additive
/external/llvm/lib/Target/ARM/
DARMScheduleA9.td2022 // Define A9WriteAdr1-8 as a sequence of A9WriteAdr with additive
2125 // A9WriteLfpOps with additive latency that takes a single issue slot.
2233 // additive latency.
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/common/x86/
Dloopfilter_mmx.asm509 pandn mm4, mm5 ; high edge variance additive
/external/libvpx/libvpx/vp8/common/x86/
Dloopfilter_mmx.asm509 pandn mm4, mm5 ; high edge variance additive
/external/llvm/lib/Target/Mips/
DMipsInstrInfo.td218 // FIXME: I'd prefer to use additive predicates to build the instruction sets