Home
last modified time | relevance | path

Searched full:thus (Results 1 – 25 of 25071) sorted by relevance

12345678910>>...1003

/aosp_15_r20/external/brotli/tests/testdata/
H A Dplrabn12.txt153 Breaking the horrid silence, thus began:--
197 And him thus answered soon his bold compeer:--
207 In horrible destruction laid thus low,
262 Thus Satan, talking to his nearest mate,
336 Lie thus astonished on th' oblivious pool,
342 Thus answered:--"Leader of those armies bright
398 Thus drooping, or with linked thunderbolts
629 From mortal or immortal minds. Thus they,
657 By Fontarabbia. Thus far these beyond
816 On Lemnos, th' Aegaean isle. Thus they relate,
[all …]
/aosp_15_r20/external/oj-libjdwp/src/share/classes/com/sun/jdi/request/
H A DEventRequestManager.java241 * after the first step is detected. Thus a next line method
406 * This list is a live view of these requests and thus changes as requests
414 * This list is a live view of these requests and thus changes as requests
422 * This list is a live view of these requests and thus changes as requests
430 * This list is a live view of these requests and thus changes as requests
438 * This list is a live view of these requests and thus changes as requests
446 * This list is a live view of these requests and thus changes as requests
454 * This list is a live view of these requests and thus changes as requests
463 * This list is a live view of these requests and thus changes as requests
472 * This list is a live view of these requests and thus changes as requests
[all …]
/aosp_15_r20/art/runtime/
H A Dmutator_gc_coord.md41 ensure that such code, which does not execute "suspend points", and can thus not
63 When a Java thread starts to execute native code, and may thus not respond
84 rules of our normal static thread-safety analysis. Thus a function that is
97 `ReaderWriterMutex` in shared mode. Thus any thread acquiring the lock in exclusive mode
106 the explicit mutator mutex in shared mode, thus blocking others from acquiring it
179 release. This may also prevent higher level mutexes from getting released. Thus
202 reenabled, and threads have been notified. Thus the waiting thread's inability
211 cannot yet be waiting for weak-reference access. Thus there is no danger of
227 running the garbage collector and conceivably thus cause it to block. This
232 Thus we ensure that the GC, together with anything else that can block GCs,
[all …]
/aosp_15_r20/external/webrtc/modules/rtp_rtcp/source/
H A Dflexfec_header_reader_writer.cc98 "support this, thus discarding the packet."; in ReadFecHeader()
105 "not yet support this, thus discarding packet."; in ReadFecHeader()
112 "yet support this, thus discarding packet."; in ReadFecHeader()
124 // the packed packet masks out-of-band, thus leaving the FlexFEC header as is. in ReadFecHeader()
140 // The first K-bit is set, and the packet mask is thus only 2 bytes long. in ReadFecHeader()
150 // to the left, thus removing K-bit 0. We will now shift the next four bytes in ReadFecHeader()
161 // mask is thus 6 bytes long. We have now read the entire FEC header, in ReadFecHeader()
172 // The packet mask is thus 14 bytes long. We have now read the entire in ReadFecHeader()
277 tmp_mask_part0 >>= 1; // Shift, thus clearing K-bit 0. in FinalizeFecHeader()
280 tmp_mask_part1 >>= 2; // Shift, thus clearing K-bit 1 and bit 15. in FinalizeFecHeader()
[all …]
/aosp_15_r20/frameworks/av/media/codec2/vndk/include/util/
H A DC2InterfaceUtils.h669 * Restrict (and thus define) the supported values to none.
677 * Restrict (and thus define) the supported values to |value| alone.
682 * Restrict (and thus define) the supported values to values greater than |value|.
689 * Restrict (and thus define) the supported values to values greater than or equal to |value|.
696 * Restrict (and thus define) the supported values to values greater than or equal to |value|.
703 * Restrict (and thus define) the supported values to values less than or equal to |value|.
710 * Restrict (and thus define) the supported values to values less than or equal to |value|.
717 * Restrict (and thus define) the supported values to values less than |value|.
724 * Restrict (and thus define) the supported values to values in the range of [ |min|, |max| ]
733 * Restrict (and thus define) the supported values to values in the geometric series starting
[all …]
/aosp_15_r20/external/cronet/third_party/boringssl/src/crypto/fipsmodule/
H A DFIPS.md34 …break-hash.go` can be used to corrupt the FIPS module inside a binary and thus trigger a failure o…
46 …suggesting that there is any security advantage at all to doing this, and thus recommend that Andr…
48 The CTR-DRBG is reseeded every 4096 calls to `RAND_bytes`. Thus the process will randomly crash abo…
54 …to stop all other threads from using the RNG once this process has begun. Thus the main thread exi…
60 …ibraries and ASLR, some relocations can only be resolved at run-time, and thus targets of those re…
74 …that causes them is when we have a static `EVP_MD` or `EVP_CIPHER` object thus, inside the module,…
80 The static build cannot depend on the shared-object link to resolve relocations and thus must take …
90Thus calls to these functions are rewritten into an IP-relative jump to a redirector function. The…
106 …dule and thus not hashed. A relocation record is emitted to instruct the linker to poke the final …
/aosp_15_r20/external/boringssl/src/crypto/fipsmodule/
H A DFIPS.md35 …break-hash.go` can be used to corrupt the FIPS module inside a binary and thus trigger a failure o…
47 …suggesting that there is any security advantage at all to doing this, and thus recommend that Andr…
49 The CTR-DRBG is reseeded every 4096 calls to `RAND_bytes`. Thus the process will randomly crash abo…
55 …to stop all other threads from using the RNG once this process has begun. Thus the main thread exi…
61 …ibraries and ASLR, some relocations can only be resolved at run-time, and thus targets of those re…
75 …that causes them is when we have a static `EVP_MD` or `EVP_CIPHER` object thus, inside the module,…
81 The static build cannot depend on the shared-object link to resolve relocations and thus must take …
91Thus calls to these functions are rewritten into an IP-relative jump to a redirector function. The…
107 …dule and thus not hashed. A relocation record is emitted to instruct the linker to poke the final …
/aosp_15_r20/external/cpuinfo/deps/clog/src/
H A Dclog.c56 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_fatal()
74 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_fatal()
134 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_error()
152 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_error()
212 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_warning()
230 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_warning()
290 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_info()
308 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_info()
368 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_debug()
386 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_debug()
/aosp_15_r20/external/pytorch/aten/src/ATen/native/quantized/cpu/qnnpack/deps/clog/src/
H A Dclog.c61 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_fatal()
82 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_fatal()
155 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_error()
176 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_error()
249 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_warning()
273 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_warning()
346 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_info()
367 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_info()
440 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_debug()
461 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_debug()
/aosp_15_r20/external/tensorflow/tensorflow/core/api_def/base_api/
H A Dapi_def_LoadAllTPUEmbeddingParameters.pbtxt17 training loop updates. The shape of each entry is ignored (and thus can be
27 embedding training loop updates. The shape of each entry is ignored (and thus
37 training loop updates. The shape of each entry is ignored (and thus can be
47 embedding training loop updates. The shape of each entry is ignored (and thus
57 training loop updates. The shape of each entry is ignored (and thus can be
67 embedding training loop updates. The shape of each entry is ignored (and thus
77 training loop updates. The shape of each entry is ignored (and thus can be
/aosp_15_r20/external/gemmlowp/doc/
H A Dless-than-8-bit.md52 becomes very low). Thus, no particular work would be needed in the packing
100 data to less-than-8-bit depths by scaling them, thus shrinking the range of the
103 GEMM kernel to use narrower accumulators without risking overflow, thus
151 to be smaller than 2^M, each product is thus guaranteed to be smaller than
152 2^(M+N). Thus, one may accumulate 2^(16-(M+N)) such products and still be
153 guaranteed that such an accumulator will be smaller than 2^16, and thus can be
157 entries are on 5 bits (M=5), so each product fits in 12 bits and one can thus
253 occurs many times, the mean requantized value will thus tend to 3.8.
276 Thus, for fixed input values and bit depths, we expect that probabilistic
299 that minimizes the "clumpiness" of the random offsets (Thus, for example,
/aosp_15_r20/external/google-cloud-java/java-billing/proto-google-cloud-billing-v1/src/main/java/com/google/cloud/billing/v1/
H A DUpdateProjectBillingInfoRequest.java133 * thus, you can leave empty all fields except `billing_account_name`.
149 * thus, you can leave empty all fields except `billing_account_name`.
167 * thus, you can leave empty all fields except `billing_account_name`.
684 * thus, you can leave empty all fields except `billing_account_name`.
699 * thus, you can leave empty all fields except `billing_account_name`.
720 * thus, you can leave empty all fields except `billing_account_name`.
743 * thus, you can leave empty all fields except `billing_account_name`.
764 * thus, you can leave empty all fields except `billing_account_name`.
791 * thus, you can leave empty all fields except `billing_account_name`.
811 * thus, you can leave empty all fields except `billing_account_name`.
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/fipsmodule/ec/
Dutil.c132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/aosp_15_r20/external/boringssl/src/crypto/fipsmodule/ec/
H A Dutil.c132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/aosp_15_r20/external/rust/android-crates-io/crates/ring/crypto/fipsmodule/ec/
Dutil.h135 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
159 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
169 // terms thus far were zero.)
183 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
195 // Divide n into n_H + n_M + n_L similarly. We thus have:
217 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
224 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
232 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
Decp_nistz.h138 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
162 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
172 // terms thus far were zero.)
186 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
198 // Divide n into n_H + n_M + n_L similarly. We thus have:
220 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
227 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
235 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/aosp_15_r20/external/cronet/third_party/boringssl/src/crypto/fipsmodule/ec/
H A Dutil.c132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/ec/
Dutil.c132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/aosp_15_r20/external/guava/guava/src/com/google/common/util/concurrent/
H A DSmoothRateLimiter.java75 * a request actually arrives; this is also related to the point made in the last paragraph), thus
88 * deal with overflow, then stored permits could be given out /slower/ than fresh ones. Thus, we
95 * "permits / time", thus "1 / rate = time / permits". Thus, "1/rate" (time / permits) times
118 * of the function, thus time. Thus, the RateLimiter becomes /faster/ after a period of
120 * line, then it means that the area (time) is increased, thus storedPermits are more costly than
121 * fresh permits, thus the RateLimiter becomes /slower/ after a period of underutilization.
128 * task immediately, and postpone by 100 seconds future requests, thus we allow for work to get
/aosp_15_r20/external/guava/android/guava/src/com/google/common/util/concurrent/
H A DSmoothRateLimiter.java75 * a request actually arrives; this is also related to the point made in the last paragraph), thus
88 * deal with overflow, then stored permits could be given out /slower/ than fresh ones. Thus, we
95 * "permits / time", thus "1 / rate = time / permits". Thus, "1/rate" (time / permits) times
118 * of the function, thus time. Thus, the RateLimiter becomes /faster/ after a period of
120 * line, then it means that the area (time) is increased, thus storedPermits are more costly than
121 * fresh permits, thus the RateLimiter becomes /slower/ after a period of underutilization.
128 * task immediately, and postpone by 100 seconds future requests, thus we allow for work to get
/aosp_15_r20/cts/tests/tests/text/src/android/text/cts/
H A DPaintRunFlagTest.kt259 // In case of no flags, no letter space adjustment is applied, thus all advances should have in getTextRunAdvances_Latin()
269 // In case of left edge, the left most character should start from drawing origin 0, thus in getTextRunAdvances_Latin()
281 // In case of right edge, the right most character should not have right margin, thus the in getTextRunAdvances_Latin()
294 // origin 0 and the right most character should not have right margin, thus the half of in getTextRunAdvances_Latin()
322 // In case of no flags, no letter space adjustment is applied, thus all advances should have in getTextRunAdvances_Hebrew()
332 // In case of left edge, the left most character should start from drawing origin 0, thus in getTextRunAdvances_Hebrew()
345 // In case of right edge, the right most character should not have right margin, thus the in getTextRunAdvances_Hebrew()
359 // origin 0 and the right most character should not have right margin, thus the half of in getTextRunAdvances_Hebrew()
/aosp_15_r20/external/google-cloud-java/java-datacatalog/proto-google-cloud-datacatalog-v1beta1/src/main/java/com/google/cloud/datacatalog/v1beta1/
H A DUpdatePolicyTagRequest.java129 * parent_policy_tag can be updated and thus can be listed in the mask. If
150 * parent_policy_tag can be updated and thus can be listed in the mask. If
171 * parent_policy_tag can be updated and thus can be listed in the mask. If
772 * parent_policy_tag can be updated and thus can be listed in the mask. If
792 * parent_policy_tag can be updated and thus can be listed in the mask. If
818 * parent_policy_tag can be updated and thus can be listed in the mask. If
846 * parent_policy_tag can be updated and thus can be listed in the mask. If
871 * parent_policy_tag can be updated and thus can be listed in the mask. If
902 * parent_policy_tag can be updated and thus can be listed in the mask. If
927 * parent_policy_tag can be updated and thus can be listed in the mask. If
[all …]
/aosp_15_r20/external/google-cloud-java/java-containeranalysis/proto-google-cloud-containeranalysis-v1beta1/src/main/java/io/grafeas/v1beta1/vulnerability/
H A DVulnerability.java3179 * vulnerability. Note that there may be multiple hotfixes (and thus
3195 * vulnerability. Note that there may be multiple hotfixes (and thus
3211 * vulnerability. Note that there may be multiple hotfixes (and thus
3226 * vulnerability. Note that there may be multiple hotfixes (and thus
3244 * vulnerability. Note that there may be multiple hotfixes (and thus
4425 * vulnerability. Note that there may be multiple hotfixes (and thus
4445 * vulnerability. Note that there may be multiple hotfixes (and thus
4466 * vulnerability. Note that there may be multiple hotfixes (and thus
4484 * vulnerability. Note that there may be multiple hotfixes (and thus
4503 * vulnerability. Note that there may be multiple hotfixes (and thus
[all …]
/aosp_15_r20/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/
H A DMixedManagedProfileOwnerTest.java141 /** VPN tests don't require physical device for managed profile, thus overriding. */
149 /** VPN tests don't require physical device for managed profile, thus overriding. */
156 /** VPN tests don't require physical device for managed profile, thus overriding. */
164 /** VPN tests don't require physical device for managed profile, thus overriding. */
171 /** VPN tests don't require physical device for managed profile, thus overriding. */
178 /** VPN tests don't require physical device for managed profile, thus overriding. */
/aosp_15_r20/frameworks/rs/driver/runtime/
H A Drs_structs.h19 * information, we would not be able to inline the bitcode, thus resulting in
98 * information, we would not be able to inline the bitcode, thus resulting in
132 * information, we would not be able to inline the bitcode, thus resulting in
161 * information, we would not be able to inline the bitcode, thus resulting in
197 * information, we would not be able to inline the bitcode, thus resulting in
239 * information, we would not be able to inline the bitcode, thus resulting in
282 * information, we would not be able to inline the bitcode, thus resulting in

12345678910>>...1003