/external/aac/libPCMutils/src/ |
D | limiter.cpp | 95 unsigned int attack; member 123 unsigned int attack, release; in createLimiter() local 128 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in createLimiter() 136 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in createLimiter() 137 limiter->delayBuf = (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in createLimiter() 145 exponent = invFixp(attack+1); in createLimiter() 158 limiter->attack = attack; in createLimiter() 189 FDKmemset(limiter->maxBuf, 0, (limiter->attack + 1) * sizeof(FIXP_DBL) ); in resetLimiter() 190 FDKmemset(limiter->delayBuf, 0, limiter->attack * limiter->channels * sizeof(FIXP_DBL) ); in resetLimiter() 236 unsigned int attack = limiter->attack; in applyLimiter() local [all …]
|
/external/aac/libAACenc/src/ |
D | block_switch.cpp | 229 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching() 248 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching() 262 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 273 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 281 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 284 if((blockSwitchingControl->attack == FALSE) && (blockSwitchingControl->lastattack == TRUE)) { in FDKaacEnc_BlockSwitching() 290 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 301 …chgWndSqLkAhd[blockSwitchingControl->lastattack][blockSwitchingControl->attack][blockSwitchingCont… in FDKaacEnc_BlockSwitching() 307 chgWndSq[blockSwitchingControl->attack][blockSwitchingControl->lastWindowSequence]; in FDKaacEnc_BlockSwitching()
|
D | block_switch.h | 114 INT attack; member
|
/external/replicaisland/src/com/replica/replicaisland/ |
D | GameObjectFactory.java | 1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2); 1389 attack.addFrame(new AnimationFrame( 1392 attack.addFrame(new AnimationFrame( 1401 staticData.add(attack); 1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal()); 1473 if (attack != null) { 1474 gun.setDelayBeforeFirstSet(attack.getLength()); 1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10); 1597 attack.addFrame(attack1); 1598 attack.addFrame(attack2); [all …]
|
D | InputGameInterface.java | 293 public void setKeys(int left, int right, int jump, int attack) { in setKeys() argument 297 mAttackKeyCode = attack; in setKeys()
|
/external/kernel-headers/original/uapi/sound/ |
D | asound_fm.h | 53 unsigned char attack; /* 4 bits: attack rate */ member
|
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
D | AntiSamyTest.java | 594 String attack = "[if lte 8]<script>"; 601 for (int i = 0; i < attack.length(); i++) { 602 sb.append(attack.charAt(i));
|
/external/nanopb-c/docs/ |
D | security.rst | 66 several possible attack vectors that the application author must consider. 76 stop a denial of service attack from using an infinite message.
|
/external/srtp/doc/ |
D | draft-irtf-cfrg-icm-00.txt | 310 attacks, such as the key collision attack and Hellman's time-memory 311 tradeoff attack; see McGrew and Fluhrer [MF00] for a description of
|
D | rfc3711.txt | 2276 that of the signal under attack, since otherwise the adversary would 2288 Null authentication MUST NOT be used when a replay attack, in which 2291 successful replay attack is the storing of the output of a 2304 surveillance. Encryption does not protect against this attack, and 2321 This attack is essentially a denial of service attack, though in the 2325 data are accepted as valid video data. This denial of service attack 2332 of attack, but for other, more complex applications these attacks may 2366 integrity. The attack [V02] shows that this is indeed the case for
|
/external/openssh/ |
D | LICENCE | 79 The 32-bit CRC compensation attack detector in deattack.c was 82 * Cryptographic attack detector for ssh - source code
|
D | PROTOCOL | 152 request "no-more-sessions@openssh.com" to mitigate this attack. 167 (that is impossible), but it thwarts a simple attack.
|
D | PROTOCOL.certkeys | 10 relating to simplicity of configuration and minimisation of attack
|
D | sshd_config.0 | 879 display server may be exposed to attack when the SSH client 883 attack by unwittingly requesting X11 forwarding, which can
|
/external/expat/ |
D | Changes | 19 #3496608: CVE-2012-0876 - Hash DOS attack.
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | README | 254 middle attack). Do not ask the user to verify any of these
|
/external/chromium-trace/trace-viewer/third_party/WebOb/docs/ |
D | comment-example.txt | 252 <http://en.wikipedia.org/wiki/Cross-site_scripting>`_ attack. Fixing
|
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/data/rbbi/ |
D | words.txt | 201 attack
|
/external/libogg/doc/ |
D | rfc5334.txt | 317 kind of attack.
|
/external/dnsmasq/po/ |
D | it.po | 797 msgid "possible DNS-rebind attack detected"
|
D | pt_BR.po | 797 msgid "possible DNS-rebind attack detected"
|
D | fi.po | 797 msgid "possible DNS-rebind attack detected"
|
D | de.po | 840 msgid "possible DNS-rebind attack detected"
|
D | id.po | 945 msgid "possible DNS-rebind attack detected"
|
/external/icu/icu4j/main/shared/data/ |
D | Transliterator_Han_Latin_Definition.txt | 214 矛頭指向 < target\-someone\-or\-something\-\(for\-attack\,\-criticism\,\-etc\.\); 679 側鋒 < oblique\-attack\-\(brush\-movement\-in\-painting\); 724 正鋒 < frontal\-attack\-\(brush\-movement\-in\-painting\); 1103 䎒 < flying\-quickly\-and\-to\-attack\-suddenly; 1234 抄後路 < to\-outflank\-and\-attack\-from\-the\-rear; 1454 暴病 < sudden\-attack\-of\-a\-serious\-illness; 1850 抨擊 < attack\-\(verbally\-or\-in\-writing\); 2002 空襲 < \(military\)\-attack\-from\-the\-air; 2898 抗擊 < resist\-\(a\-military\-attack\); 3347 襲擊 < \(make\-a\)\-surprise\-attack; [all …]
|