Home
last modified time | relevance | path

Searched refs:reconstruct (Results 1 – 25 of 61) sorted by relevance

123

/external/fonttools/Tests/ttLib/
Dwoff2_test.py630 glyfTable.reconstruct(self.transformedGlyfData, self.font)
638 glyfTable.reconstruct(self.transformedGlyfData, self.font)
646 glyfTable.reconstruct(self.transformedGlyfData, self.font)
655 glyfTable.reconstruct(self.transformedGlyfData, self.font)
662 glyfTable.reconstruct(self.transformedGlyfData, self.font)
670 glyfTable.reconstruct(self.transformedGlyfData, self.font)
680 glyfTable.reconstruct(self.transformedGlyfData, self.font)
690 glyfTable.reconstruct(self.transformedGlyfData, self.font)
697 WOFF2GlyfTable().reconstruct(b"", self.font)
702 WOFF2GlyfTable().reconstruct(self.transformedGlyfData + b"\x00", self.font)
[all …]
/external/libunwind/src/arm/
Dgetcontext.S42 @ reconstruct r13 at call site, then store
/external/shflags/lib/
Dshlib9 # reconstruct the proper absolute path.
/external/llvm/test/DebugInfo/PDB/
Dpdbdump-write.test3 ; to YAML. Then it tries to reconstruct as much of the original PDB as
/external/swiftshader/third_party/llvm-7.0/llvm/test/DebugInfo/PDB/
Dpdbdump-write.test3 ; to YAML. Then it tries to reconstruct as much of the original PDB as
/external/icu/icu4c/source/data/unidata/
DNormalizationCorrections.txt25 # safely reconstruct the exact state of the data tables at
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/data/unicode/
DNormalizationCorrections.txt25 # safely reconstruct the exact state of the data tables at
/external/icu/android_icu4j/src/main/tests/android/icu/dev/data/unicode/
DNormalizationCorrections.txt25 # safely reconstruct the exact state of the data tables at
/external/python/cpython3/Doc/library/
Dcopyreg.rst35 can be used to reconstruct the object when called with the tuple of arguments
Dpprint.rst124 used to reconstruct the value using :func:`eval`. This always returns ``False``
179 used to reconstruct the value using :func:`eval`. Note that this returns
/external/python/cpython2/Doc/library/
Dcopy_reg.rst39 can be used to reconstruct the object when called with the tuple of arguments
Dpprint.rst114 used to reconstruct the value using :func:`eval`. This always returns ``False``
169 used to reconstruct the value using :func:`eval`. Note that this returns
/external/wycheproof/doc/
Decdh.md49 * reconstruct the public key explicitly using the parameters of the private
/external/swiftshader/third_party/LLVM/test/Transforms/IndVarSimplify/
Daddrec-gep.ll9 ; be able to reconstruct the full getelementptr, despite it having a few
/external/llvm/test/Transforms/LoopStrengthReduce/
Daddrec-gep.ll11 ; be able to reconstruct the full getelementptr, despite it having a few
Daddrec-gep-address-space.ll17 ; be able to reconstruct the full getelementptr, despite it having a few
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/LoopStrengthReduce/
Daddrec-gep.ll11 ; be able to reconstruct the full getelementptr, despite it having a few
Daddrec-gep-address-space.ll17 ; be able to reconstruct the full getelementptr, despite it having a few
/external/llvm/test/MC/ARM/
Deh-directive-setfp.s9 @ then libunwind will reconstruct the stack pointer from the frame pointer.
/external/swiftshader/third_party/llvm-7.0/llvm/test/MC/ARM/
Deh-directive-setfp.s9 @ then libunwind will reconstruct the stack pointer from the frame pointer.
/external/libxcam/
DChangeLog59 band, then reconstruct stitching image from pyramid level.
136 - reconstruct image from scaled low-pass and high-pass images.
/external/tensorflow/tensorflow/core/protobuf/
Dsaved_object_graph.proto110 // be used to reconstruct the full structure from pure tensors.
/external/python/pyasn1/docs/source/
Dexample-use-case.rst106 # Undo DER serialisation, reconstruct SSH key structure
/external/python/cpython2/Objects/
Dlnotab_notes.txt52 The above is sufficient to reconstruct line numbers for tracebacks, but not for
/external/libexif/
DNEWS164 * If someone wants to reconstruct past changes and log them here,

123