Home
last modified time | relevance | path

Searched refs:v2 (Results 1 – 12 of 12) sorted by relevance

/system/core/libmemtrack/
Dmemtrack_test.c114 size_t v2; in main() local
130 v2 = DIV_ROUND_UP(memtrack_proc_graphics_pss(p), 1024); in main()
136 if (v1 | v2 | v3 | v4 | v5 | v6) { in main()
138 v1, v2, v3, v4, v5, v6, cmdline); in main()
/system/extras/perfprofd/quipper/base/
Dlogging.h251 std::string* MakeCheckOpString(const t1& v1, const t2& v2, const char* names) { in MakeCheckOpString() argument
253 ss << names << " (" << v1 << " vs. " << v2 << ")"; in MakeCheckOpString()
284 inline std::string* Check##name##Impl(const t1& v1, const t2& v2, \
286 if (v1 op v2) return NULL; \
287 else return MakeCheckOpString(v1, v2, names); \
289 inline std::string* Check##name##Impl(int v1, int v2, const char* names) { \
290 if (v1 op v2) return NULL; \
291 else return MakeCheckOpString(v1, v2, names); \
/system/core/libpixelflinger/
Dtrap.cpp97 const GGLcoord* v2 ) in triangle_dump_points() argument
105 v2[0]*tri, v2[1]*tri, v2[0], v2[1] ); in triangle_dump_points()
463 const GGLcoord* v0, const GGLcoord* v1, const GGLcoord* v2) in trianglex_debug() argument
467 aa_trianglex(con,v0,v1,v2); in trianglex_debug()
469 trianglex_big(con,v0,v1,v2); in trianglex_debug()
474 linex(con, v1, v2, TRI_ONE); in trianglex_debug()
475 linex(con, v2, v0, TRI_ONE); in trianglex_debug()
480 const GGLcoord* v0, const GGLcoord* v1, const GGLcoord* v2) in trianglex_xor() argument
482 trianglex_big(con,v0,v1,v2); in trianglex_xor()
483 trianglex_small(con,v0,v1,v2); in trianglex_xor()
[all …]
/system/core/liblog/
Devent_tag_map.c394 static int compareEventTags(const void* v1, const void* v2) in compareEventTags() argument
397 const EventTag* tag2 = (const EventTag*) v2; in compareEventTags()
/system/core/libpixelflinger/include/pixelflinger/
Dpixelflinger.h211 GGLcoord const* v0, GGLcoord const* v1, GGLcoord const* v2);
/system/ca-certificates/google/files/
D2afc57aa.072 URI:http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
/system/bt/stack/smp/
Daes.c235 { uint_8t p1 = x, p2 = BPOLY, n1 = hibit(x), n2 = 0x80, v1 = 1, v2 = 0; in gf_inv() local
247 v2 ^= (v1 * n2); /* shift accumulated value and */ in gf_inv()
258 v1 ^= v2 * n1; in gf_inv()
262 return v2; in gf_inv()
/system/keymaster/
Docb.c427 #define EXPAND_ASSIST(v1, v2, v3, v4, shuff_const, aes_const) \ argument
428 v2 = _mm_aeskeygenassist_si128(v4, aes_const); \
433 v2 = _mm_shuffle_epi32(v2, shuff_const); \
434 v1 = _mm_xor_si128(v1, v2)
/system/tpm/trunks/generator/
Draw_structures.txt2899 RSA a signature algorithm according to PKCS#1v2.1, 8.2
2907 RSA a padding algorithm according to PKCS#1v2.1, 7.2
2916 PKCS#1v2.1, 8.1
2925 PKCS#1v2.1, 7.1
13123 the PKCS#1v2.1 PSS scheme
13480 the PKCS#1v2.1 PSS scheme
13484 the PKCS#1v2.1 RSAES scheme
13493 the PKSC#1v2.1 OAEP scheme
14161 a PKCS#1v2.1PSS signature
Draw_structures_fixed.txt2893 RSA a signature algorithm according to PKCS#1v2.1, 8.2
2901 RSA a padding algorithm according to PKCS#1v2.1, 7.2
2910 PKCS#1v2.1, 8.1
2919 PKCS#1v2.1, 7.1
13140 the PKCS#1v2.1 PSS scheme
13499 the PKCS#1v2.1 PSS scheme
13507 the PKSC#1v2.1 OAEP scheme
14176 a PKCS#1v2.1PSS signature
Draw_commands.txt8223 This command performs RSA encryption using the indicated padding scheme according to PKCS#1v2.1
8237 1) TPM_ALG_OAEP – Data is OAEP padded as described in 7.1 of PKCS#1 v2.1. The only
8239 2) TPM_ALG_RSAES – Data is padded as described in 7.2 of PKCS#1 v2.1.
8306 After padding, the data is RSAEP encrypted according to 5.1.1 of PKCS#1v2.1.
8652 This command performs RSA decryption using the indicated padding scheme according to PKCS#1v2.1
8660 keyHandle (this is described in PKCS#1v2.1, clause 5.1.2). It will then validate the padding accord…
Draw_commands_fixed.txt8234 This command performs RSA encryption using the indicated padding scheme according to PKCS#1v2.1
8248 1) TPM_ALG_OAEP – Data is OAEP padded as described in 7.1 of PKCS#1 v2.1. The only
8250 2) TPM_ALG_RSAES – Data is padded as described in 7.2 of PKCS#1 v2.1.
8317 After padding, the data is RSAEP encrypted according to 5.1.1 of PKCS#1v2.1.
8663 This command performs RSA decryption using the indicated padding scheme according to PKCS#1v2.1
8671 keyHandle (this is described in PKCS#1v2.1, clause 5.1.2). It will then validate the padding accord…