Searched refs:num (Results 201 - 225 of 485) sorted by relevance

1234567891011>>

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/
H A Dbn_div.c172 /* BN_div[_no_branch] computes dv := num / divisor, rounding towards
173 * zero, and sets up rm such that dv*divisor + rm = num holds.
175 * dv->neg == num->neg ^ divisor->neg (unless the result is zero)
176 * rm->neg == num->neg (unless the remainder is zero)
179 static int BN_div_no_branch(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num,
181 int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, argument
191 * in the case of 'num', so don't just rely on bn_check_top() for this one
193 if (num->top > 0 && num->d[num
426 BN_div_no_branch(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, BN_CTX *ctx) argument
[all...]
/barrelfish-2018-10-04/usr/eclipseclp/Kernel/lib/
H A Dmenu.tcl252 set num [get-value $machine sleep 1 $max_num]
253 if {[string compare $num cancel] != 0} {
254 if {$num > 0 && $awake_workers($machine) > $num} {
255 apply_sleep $machine $num
269 set num [get-value $machine wakeup 1 $sleeping_workers]
270 if {[string compare $num cancel] != 0} {
271 if {$num > 0 && $sleeping_workers >= $num} {
272 apply_wakeup $machine $num
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/
H A De_des.c88 (DES_cblock *)ctx->iv, &ctx->num);
95 (DES_cblock *)ctx->iv, &ctx->num);
122 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
129 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md4/
H A Dmd4.h105 unsigned int num; member in struct:MD4state_st
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md5/
H A Dmd5.h105 unsigned int num; member in struct:MD5state_st
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ripemd/
H A Dripemd.h91 unsigned int num; member in struct:RIPEMD160state_st
/barrelfish-2018-10-04/include/openssl/
H A Dmd4.h105 unsigned int num; member in struct:MD4state_st
H A Dmd5.h105 unsigned int num; member in struct:MD5state_st
H A Dripemd.h91 unsigned int num; member in struct:RIPEMD160state_st
/barrelfish-2018-10-04/include/target/aarch64/barrelfish_kpi/
H A Darm_core_data.h21 uint32_t num; member in struct:armv8_coredata_elf
/barrelfish-2018-10-04/lib/bomp_new/
H A Dbomp.c41 coreid_t num = bomp_node_exec(&tls->r.master.nodes[i], fn, data, tid_start, nthreads); local
42 assert(num <= nthreads);
44 nthreads -= num;
45 tid_current += num;
/barrelfish-2018-10-04/usr/tests/testdesc/
H A Dtestdesc.c46 printf("fd %d fixed handle is: %p\n", fds->num, fds->handle);
69 printf("fd %d fixed handle is: %p\n", fds->num, fds->handle);
115 fds->num = i;
118 printf("added fd %d to fdtabs[%d]: %p as fd_store (%p: num: %d, "
120 i, *num_fds, &fdtab[*num_fds], fds, fds->num, fds->type,
H A Dtestdesc.h75 int num; member in struct:fd_store
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/
H A Dts_lib.c70 int TS_ASN1_INTEGER_print_bio(BIO *bio, const ASN1_INTEGER *num) argument
77 ASN1_INTEGER_to_BN(num, &num_bn);
/barrelfish-2018-10-04/lib/phoenix/
H A Dstddefines.h63 static inline void *CALLOC(size_t num, size_t size) argument
65 void * temp = calloc(num, size);
/barrelfish-2018-10-04/usr/eclipseclp/Alog/src/
H A Dmergelogs.c111 int num; local
114 num = argc - 1;
117 malloc(num * sizeof(struct list_struct *))) == NULL )
123 for ( i=0 ; i < num ; i++ )
187 for ( i=0 ; i < num ; i++ )
209 while ( negflag && all_eof < num );
217 while ( all_eof < num )
225 for ( i=0 ; i < num ; i++ )
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/
H A Da_bytes.c256 int num; local
268 num=0;
290 if (!BUF_MEM_grow_clean(&b,num+os->length))
295 memcpy(&(b.data[num]),os->data,os->length);
298 num+=os->length;
303 a->length=num;
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/
H A Dmd32_common.h79 * unsigned int num;
299 n = c->num;
311 c->num = 0;
317 c->num += (unsigned int)len;
334 c->num = (unsigned int)len;
350 size_t n = c->num;
373 c->num=0;
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/
H A Drsa_oaep.c94 const unsigned char *from, int flen, int num,
104 if (--num < 2 * SHA_DIGEST_LENGTH + 1)
105 /* 'num' is the length of the modulus, i.e. does not depend on the
109 lzero = num - flen;
119 flen = num; /* don't overflow the memcpy to padded_from */
122 dblen = num - SHA_DIGEST_LENGTH;
123 db = OPENSSL_malloc(dblen + num);
93 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) argument
/barrelfish-2018-10-04/include/openssl/local/
H A Dmd32_common.h79 * unsigned int num;
299 n = c->num;
311 c->num = 0;
317 c->num += (unsigned int)len;
334 c->num = (unsigned int)len;
350 size_t n = c->num;
373 c->num=0;
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/hw/mthca/
H A Dmthca_allocator.c78 int mthca_alloc_init(struct mthca_alloc *alloc, u32 num, u32 mask, argument
83 /* num must be a power of 2 */
84 if (num != 1 << (ffs(num) - 1))
89 alloc->max = num;
92 alloc->table = kmalloc(BITS_TO_LONGS(num) * sizeof (long),
97 bitmap_zero(alloc->table, num);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/asm/
H A Dsparcv9-mont.pl51 $num="%i5"; # int num);
92 sll $num,2,$num ! num*=4
96 and $num,$mask,$num
102 sub %o7,$num,%o7
141 cmp $j,$num
217 cmp $j,$num
[all...]
/barrelfish-2018-10-04/usr/eclipseclp/Opium/demo/
H A Dfacts.pl8 % mee,mon,nte,num,org,pag,pub,sch,ser,tit,typ,vol,yea,
13 mee,mon,nte,num,org,pag,pub,sch,ser,tit,typ,vol,yea,
64 cap_attr_abbr('Number',num).
103 att_to_var(num,"Num").
139 att_to_string(num,"num").
180 prompted_atts(art,[[aut,m],[key,m],[tit,m],[jou,m],[vol,m],[num,o],
184 [edi,o],[ser,o],[vol,o],[num,o],[how,o],[yea,m],
191 [pub,m],[add,o],[edi,o],[ser,o],[vol,o],[num,o],[how,o],
194 [pub,m],[add,o],[ser,o],[vol,o],[num,
[all...]
/barrelfish-2018-10-04/usr/drivers/xeon_phi/
H A Dsysmem_caps.c150 * \param num number of elements in the array
152 static void sysmem_bench_generate_shuffle(size_t num) argument
158 elem_id = malloc(sizeof(uint32_t) * num + 1);
161 for (uint32_t i = 0; i < num; ++i) {
168 for (uint32_t i = 0; i < num; ++i) {
169 uint32_t idx = i + (rand() % (num - i));
170 assert(idx < num + 1);
178 size_t num)
180 sysmem_bench_generate_shuffle(num);
184 for (uint32_t i = 1; i < num;
177 sysmem_bench_init_memory(struct elem *mem, size_t num) argument
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/sha/asm/
H A Dsha512-ppc.pl96 $num="r5"; # zapped by $t0
184 $SHL $num,$num,`log(16*$SZ)/log(2)`
225 add $num,$inp,$num
226 $PUSH $num,`$FRAME-$SIZE_T*24`($sp) ; end pointer
268 $UCMP $num,$t1
270 subfc $num,$t1,$num
272 $PUSH $num,`
[all...]

Completed in 244 milliseconds

1234567891011>>