/external/aac/libPCMutils/src/ |
D | limiter.cpp | 95 unsigned int attack; member 123 unsigned int attack, release; in createLimiter() local 128 attack = (unsigned int)(maxAttackMs * maxSampleRate / 1000); in createLimiter() 136 limiter->maxBuf = (FIXP_DBL*)FDKcalloc(attack + 1, sizeof(FIXP_DBL)); in createLimiter() 137 limiter->delayBuf = (FIXP_DBL*)FDKcalloc(attack * maxChannels, sizeof(FIXP_DBL)); in createLimiter() 145 exponent = invFixp(attack+1); in createLimiter() 158 limiter->attack = attack; in createLimiter() 189 FDKmemset(limiter->maxBuf, 0, (limiter->attack + 1) * sizeof(FIXP_DBL) ); in resetLimiter() 190 FDKmemset(limiter->delayBuf, 0, limiter->attack * limiter->channels * sizeof(FIXP_DBL) ); in resetLimiter() 236 unsigned int attack = limiter->attack; in applyLimiter() local [all …]
|
/external/aac/libAACenc/src/ |
D | block_switch.cpp | 229 blockSwitchingControl->lastattack = blockSwitchingControl->attack; in FDKaacEnc_BlockSwitching() 248 if (blockSwitchingControl->attack == TRUE) in FDKaacEnc_BlockSwitching() 262 blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 273 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 281 if (enMax < minAttackNrg) blockSwitchingControl->attack = FALSE; in FDKaacEnc_BlockSwitching() 284 if((blockSwitchingControl->attack == FALSE) && (blockSwitchingControl->lastattack == TRUE)) { in FDKaacEnc_BlockSwitching() 290 blockSwitchingControl->attack = TRUE; in FDKaacEnc_BlockSwitching() 301 …chgWndSqLkAhd[blockSwitchingControl->lastattack][blockSwitchingControl->attack][blockSwitchingCont… in FDKaacEnc_BlockSwitching() 307 chgWndSq[blockSwitchingControl->attack][blockSwitchingControl->lastWindowSequence]; in FDKaacEnc_BlockSwitching()
|
D | block_switch.h | 114 INT attack; member
|
/external/autotest/client/site_tests/security_SysVIPC/ |
D | control | 7 DOC = "Security tripwire for SysV IPC attack surfaces" 9 PURPOSE = "Detect emergence of new attack surfaces in SysV IPC"
|
/external/autotest/client/site_tests/security_DbusMap/ |
D | control | 8 This test enforces a known/vetted list of vetted dbus attack surface 12 PURPOSE = "To ensure un-vetted attack surface doesn't make it into the system"
|
/external/replicaisland/src/com/replica/replicaisland/ |
D | GameObjectFactory.java | 1388 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 2); 1389 attack.addFrame(new AnimationFrame( 1392 attack.addFrame(new AnimationFrame( 1401 staticData.add(attack); 1472 final SpriteAnimation attack = sprite.findAnimation(EnemyAnimations.ATTACK.ordinal()); 1473 if (attack != null) { 1474 gun.setDelayBeforeFirstSet(attack.getLength()); 1569 SpriteAnimation attack = new SpriteAnimation(EnemyAnimations.ATTACK.ordinal(), 10); 1597 attack.addFrame(attack1); 1598 attack.addFrame(attack2); [all …]
|
D | InputGameInterface.java | 293 public void setKeys(int left, int right, int jump, int attack) { in setKeys() argument 297 mAttackKeyCode = attack; in setKeys()
|
/external/curl/docs/ |
D | SSL-PROBLEMS | 60 BEAST is the name of a TLS 1.0 attack that surfaced 2011. When adding means 61 to mitigate this attack, it turned out that some broken servers out there in
|
/external/kernel-headers/original/uapi/sound/ |
D | asound_fm.h | 53 unsigned char attack; /* 4 bits: attack rate */ member
|
/external/autotest/client/site_tests/security_StatefulPermissions/ |
D | control | 11 PURPOSE = "To maintain a vetted, minimized set of attack surfaces in stateful."
|
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
D | AntiSamyTest.java | 594 String attack = "[if lte 8]<script>"; 601 for (int i = 0; i < attack.length(); i++) { 602 sb.append(attack.charAt(i));
|
/external/autotest/client/site_tests/security_DbusOwners/ |
D | control | 11 PURPOSE = "To maintain a minimal attack surface of chronos-owned interfaces"
|
/external/autotest/client/site_tests/security_NetworkListeners/ |
D | control | 11 PURPOSE = "To maintain a minimal set of network-facing attack surface"
|
/external/nanopb-c/docs/ |
D | security.rst | 66 several possible attack vectors that the application author must consider. 76 stop a denial of service attack from using an infinite message.
|
/external/cros/system_api/dbus/cryptohome/ |
D | rpc.proto | 247 // The current dictionary attack counter value. 249 // The current dictionary attack counter threshold. 251 // Whether the TPM is in some form of dictionary attack lockout.
|
/external/autotest/test_suites/ |
D | control.security | 17 security related functionality -- Dbus attack surface, kernel restrictions,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
D | index.rst | 26 still possible vectors of attack. Just to name one example, it doesn't
|
/external/srtp/doc/ |
D | draft-irtf-cfrg-icm-00.txt | 310 attacks, such as the key collision attack and Hellman's time-memory 311 tradeoff attack; see McGrew and Fluhrer [MF00] for a description of
|
D | rfc3711.txt | 2276 that of the signal under attack, since otherwise the adversary would 2288 Null authentication MUST NOT be used when a replay attack, in which 2291 successful replay attack is the storing of the output of a 2304 surveillance. Encryption does not protect against this attack, and 2321 This attack is essentially a denial of service attack, though in the 2325 data are accepted as valid video data. This denial of service attack 2332 of attack, but for other, more complex applications these attacks may 2366 integrity. The attack [V02] shows that this is indeed the case for
|
/external/expat/ |
D | Changes | 34 #3496608: CVE-2012-0876 - Hash DOS attack.
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | README | 254 middle attack). Do not ask the user to verify any of these
|
/external/chromium-trace/catapult/third_party/WebOb/docs/ |
D | comment-example.txt | 252 <http://en.wikipedia.org/wiki/Cross-site_scripting>`_ attack. Fixing
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/data/rbbi/ |
D | words.txt | 201 attack
|
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/data/rbbi/ |
D | words.txt | 201 attack
|
/external/libogg/doc/ |
D | rfc5334.txt | 317 kind of attack.
|