/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_div.c | 172 /* BN_div[_no_branch] computes dv := num / divisor, rounding towards 173 * zero, and sets up rm such that dv*divisor + rm = num holds. 175 * dv->neg == num->neg ^ divisor->neg (unless the result is zero) 176 * rm->neg == num->neg (unless the remainder is zero) 179 static int BN_div_no_branch(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, 181 int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, argument 191 * in the case of 'num', so don't just rely on bn_check_top() for this one 193 if (num->top > 0 && num->d[num 426 BN_div_no_branch(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, BN_CTX *ctx) argument [all...] |
/barrelfish-2018-10-04/usr/eclipseclp/Kernel/lib/ |
H A D | menu.tcl | 252 set num [get-value $machine sleep 1 $max_num] 253 if {[string compare $num cancel] != 0} { 254 if {$num > 0 && $awake_workers($machine) > $num} { 255 apply_sleep $machine $num 269 set num [get-value $machine wakeup 1 $sleeping_workers] 270 if {[string compare $num cancel] != 0} { 271 if {$num > 0 && $sleeping_workers >= $num} { 272 apply_wakeup $machine $num [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | e_des.c | 88 (DES_cblock *)ctx->iv, &ctx->num); 95 (DES_cblock *)ctx->iv, &ctx->num); 122 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); 129 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md4/ |
H A D | md4.h | 105 unsigned int num; member in struct:MD4state_st
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md5/ |
H A D | md5.h | 105 unsigned int num; member in struct:MD5state_st
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ripemd/ |
H A D | ripemd.h | 91 unsigned int num; member in struct:RIPEMD160state_st
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | md4.h | 105 unsigned int num; member in struct:MD4state_st
|
H A D | md5.h | 105 unsigned int num; member in struct:MD5state_st
|
H A D | ripemd.h | 91 unsigned int num; member in struct:RIPEMD160state_st
|
/barrelfish-2018-10-04/include/target/aarch64/barrelfish_kpi/ |
H A D | arm_core_data.h | 21 uint32_t num; member in struct:armv8_coredata_elf
|
/barrelfish-2018-10-04/lib/bomp_new/ |
H A D | bomp.c | 41 coreid_t num = bomp_node_exec(&tls->r.master.nodes[i], fn, data, tid_start, nthreads); local 42 assert(num <= nthreads); 44 nthreads -= num; 45 tid_current += num;
|
/barrelfish-2018-10-04/usr/tests/testdesc/ |
H A D | testdesc.c | 46 printf("fd %d fixed handle is: %p\n", fds->num, fds->handle); 69 printf("fd %d fixed handle is: %p\n", fds->num, fds->handle); 115 fds->num = i; 118 printf("added fd %d to fdtabs[%d]: %p as fd_store (%p: num: %d, " 120 i, *num_fds, &fdtab[*num_fds], fds, fds->num, fds->type,
|
H A D | testdesc.h | 75 int num; member in struct:fd_store
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_lib.c | 70 int TS_ASN1_INTEGER_print_bio(BIO *bio, const ASN1_INTEGER *num) argument 77 ASN1_INTEGER_to_BN(num, &num_bn);
|
/barrelfish-2018-10-04/lib/phoenix/ |
H A D | stddefines.h | 63 static inline void *CALLOC(size_t num, size_t size) argument 65 void * temp = calloc(num, size);
|
/barrelfish-2018-10-04/usr/eclipseclp/Alog/src/ |
H A D | mergelogs.c | 111 int num; local 114 num = argc - 1; 117 malloc(num * sizeof(struct list_struct *))) == NULL ) 123 for ( i=0 ; i < num ; i++ ) 187 for ( i=0 ; i < num ; i++ ) 209 while ( negflag && all_eof < num ); 217 while ( all_eof < num ) 225 for ( i=0 ; i < num ; i++ )
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | a_bytes.c | 256 int num; local 268 num=0; 290 if (!BUF_MEM_grow_clean(&b,num+os->length)) 295 memcpy(&(b.data[num]),os->data,os->length); 298 num+=os->length; 303 a->length=num;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ |
H A D | md32_common.h | 79 * unsigned int num; 299 n = c->num; 311 c->num = 0; 317 c->num += (unsigned int)len; 334 c->num = (unsigned int)len; 350 size_t n = c->num; 373 c->num=0;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_oaep.c | 94 const unsigned char *from, int flen, int num, 104 if (--num < 2 * SHA_DIGEST_LENGTH + 1) 105 /* 'num' is the length of the modulus, i.e. does not depend on the 109 lzero = num - flen; 119 flen = num; /* don't overflow the memcpy to padded_from */ 122 dblen = num - SHA_DIGEST_LENGTH; 123 db = OPENSSL_malloc(dblen + num); 93 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) argument
|
/barrelfish-2018-10-04/include/openssl/local/ |
H A D | md32_common.h | 79 * unsigned int num; 299 n = c->num; 311 c->num = 0; 317 c->num += (unsigned int)len; 334 c->num = (unsigned int)len; 350 size_t n = c->num; 373 c->num=0;
|
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/hw/mthca/ |
H A D | mthca_allocator.c | 78 int mthca_alloc_init(struct mthca_alloc *alloc, u32 num, u32 mask, argument 83 /* num must be a power of 2 */ 84 if (num != 1 << (ffs(num) - 1)) 89 alloc->max = num; 92 alloc->table = kmalloc(BITS_TO_LONGS(num) * sizeof (long), 97 bitmap_zero(alloc->table, num);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/asm/ |
H A D | sparcv9-mont.pl | 51 $num="%i5"; # int num); 92 sll $num,2,$num ! num*=4 96 and $num,$mask,$num 102 sub %o7,$num,%o7 141 cmp $j,$num 217 cmp $j,$num [all...] |
/barrelfish-2018-10-04/usr/eclipseclp/Opium/demo/ |
H A D | facts.pl | 8 % mee,mon,nte,num,org,pag,pub,sch,ser,tit,typ,vol,yea, 13 mee,mon,nte,num,org,pag,pub,sch,ser,tit,typ,vol,yea, 64 cap_attr_abbr('Number',num). 103 att_to_var(num,"Num"). 139 att_to_string(num,"num"). 180 prompted_atts(art,[[aut,m],[key,m],[tit,m],[jou,m],[vol,m],[num,o], 184 [edi,o],[ser,o],[vol,o],[num,o],[how,o],[yea,m], 191 [pub,m],[add,o],[edi,o],[ser,o],[vol,o],[num,o],[how,o], 194 [pub,m],[add,o],[ser,o],[vol,o],[num, [all...] |
/barrelfish-2018-10-04/usr/drivers/xeon_phi/ |
H A D | sysmem_caps.c | 150 * \param num number of elements in the array 152 static void sysmem_bench_generate_shuffle(size_t num) argument 158 elem_id = malloc(sizeof(uint32_t) * num + 1); 161 for (uint32_t i = 0; i < num; ++i) { 168 for (uint32_t i = 0; i < num; ++i) { 169 uint32_t idx = i + (rand() % (num - i)); 170 assert(idx < num + 1); 178 size_t num) 180 sysmem_bench_generate_shuffle(num); 184 for (uint32_t i = 1; i < num; 177 sysmem_bench_init_memory(struct elem *mem, size_t num) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/sha/asm/ |
H A D | sha512-ppc.pl | 96 $num="r5"; # zapped by $t0 184 $SHL $num,$num,`log(16*$SZ)/log(2)` 225 add $num,$inp,$num 226 $PUSH $num,`$FRAME-$SIZE_T*24`($sp) ; end pointer 268 $UCMP $num,$t1 270 subfc $num,$t1,$num 272 $PUSH $num,` [all...] |