/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_lcl.h | 319 #define sqr(r0,r1,a) { \ 323 (r1)=Hw(t); \ 348 #define sqr(r0,r1,a) { \ 350 BN_UMULT_LOHI(r0,r1,tmp,tmp); \ 377 #define sqr(r0,r1,a) { \ 380 (r1) = BN_UMULT_HIGH(tmp,tmp); \
|
H A D | bn_gf2m.c | 131 static void bn_GF2m_mul_1x1(BN_ULONG *r1, BN_ULONG *r0, const BN_ULONG a, const BN_ULONG b) argument 159 *r1 = h; *r0 = l; 163 static void bn_GF2m_mul_1x1(BN_ULONG *r1, BN_ULONG *r0, const BN_ULONG a, const BN_ULONG b) argument 199 *r1 = h; *r0 = l;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/sha/asm/ |
H A D | sha512-s390x.pl | 30 $t1="%r1"; 217 larl %r1,OPENSSL_s390xcap_P 218 lg %r0,0(%r1) 222 la %r1,16($sp) 228 lgr %r1,$ctx 239 lghi %r1,-$frame 243 la $sp,0(%r1,$sp)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_eay.c | 717 BIGNUM *r1,*m1,*vrfy; local 723 r1 = BN_CTX_get(ctx); 768 if (!BN_mod(r1,c,rsa->q,ctx)) goto err; 772 if (!BN_mod(r1,I,rsa->q,ctx)) goto err; 775 /* compute r1^dmq1 mod q */ 783 if (!rsa->meth->bn_mod_exp(m1,r1,dmq1,rsa->q,ctx, 791 if (!BN_mod(r1,c,rsa->p,ctx)) goto err; 795 if (!BN_mod(r1,I,rsa->p,ctx)) goto err; 798 /* compute r1^dmp1 mod p */ 806 if (!rsa->meth->bn_mod_exp(r0,r1,dmp [all...] |
H A D | rsa_lib.c | 349 BIGNUM *ret = NULL, *r0, *r1, *r2; local 356 r1 = BN_CTX_get(ctx); 361 if (!BN_sub(r1, p, BN_value_one())) goto err; 363 if (!BN_mul(r0, r1, r2, ctx)) goto err;
|
/barrelfish-master/lib/libc/iconv/ |
H A D | citrus_csmapper.c | 105 struct _region fr, r1, r2; local 128 ret = _db_get_entry(db2, i, &r1, &r2); 131 /* r1:pivot name, r2:norm among src and pivot */ 137 (int)_region_size(&r1), (char *)_region_head(&r1));
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ |
H A D | ppccpuid.pl | 35 mr r3,r1
|
/barrelfish-master/lib/barrelfish/arch/arm/ |
H A D | debug.c | 19 dpr(r0); dpr(r1); dpr(r2); dpr(r3);
|
/barrelfish-master/lib/msun/ld128/ |
H A D | k_expl.h | 84 * by r1 in expm1l() is exact, but it is rounded to 88 bits due to 240 long double q, r, r1, t; local 244 /* Reduce x to (k*ln2 + endpoint[n2] + r1 + r2). */ 258 r1 = x - fn * L1; 260 r = r1 + r2; 262 /* Evaluate expl(endpoint[n2] + r1 + r2) = tbl[n2] * expl(r1 + r2). */ 268 *lop = tbl[n2].lo + t * (q + r1);
|
H A D | e_lgammal_r.c | 150 r1 = 2.58037466655605285937112832039537492e+00L, variable 304 q = one+y*(r1+y*(r2+y*(r3+y*(r4+y*(r5+y*(r6+y*(r7+y*(r8+
|
/barrelfish-master/usr/eclipseclp/Shm/src/ |
H A D | lock.S | 102 jmp.n #r1
|
/barrelfish-master/include/ |
H A D | k_expl.h | 84 * by r1 in expm1l() is exact, but it is rounded to 88 bits due to 240 long double q, r, r1, t; local 244 /* Reduce x to (k*ln2 + endpoint[n2] + r1 + r2). */ 258 r1 = x - fn * L1; 260 r = r1 + r2; 262 /* Evaluate expl(endpoint[n2] + r1 + r2) = tbl[n2] * expl(r1 + r2). */ 268 *lop = tbl[n2].lo + t * (q + r1);
|
/barrelfish-master/include/arch/arm/barrelfish_kpi/ |
H A D | registers_arch.h | 68 uint32_t r0, r1, r2, r3; member in struct:registers_arm::registers_arm_named
|
/barrelfish-master/lib/msun/src/ |
H A D | e_lgammaf_r.c | 73 r1 = 6.79650068e-01, /* 0x3f2dfd8c */ variable 192 q = one+y*(r1+y*(r2+y*r3));
|
H A D | e_lgamma_r.c | 144 r1 = 1.39200533467621045958e+00, /* 0x3FF645A7, 0x62C4AB74 */ variable 276 q = one+y*(r1+y*(r2+y*(r3+y*(r4+y*(r5+y*r6)))));
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/asm/ |
H A D | s390x-mont.pl | 36 $num="%r1"; 216 la %r1,160+8+48($j,$sp) 217 lmg %r6,%r15,0(%r1)
|
/barrelfish-master/kernel/arch/arm/ |
H A D | exn.c | 80 resume_area.named.r1 = fault_address; 121 resume_area.named.r1 = ARM_EVECTOR_UNDEF;
|
/barrelfish-master/lib/cxx/unwind/ |
H A D | UnwindRegistersSave.S | 509 subi %r4, %r1, 16 569 stw %r1, 12(%r3) 648 subi %r4, %r1, 16 775 mov r1, r8 778 stm r0!, {r1-r3} 779 mov r1, r11 782 str r1, [r0, #0] @ r11 912 l.sw 4(r3), r1
|
/barrelfish-master/lib/msun/ld80/ |
H A D | k_expl.h | 222 long double fn, q, r, r1, r2, t, z; local 225 /* Reduce x to (k*ln2 + endpoint[n2] + r1 + r2). */ 228 r = x - fn * L1 - fn * L2; /* r = r1 + r2 done independently. */ 239 r1 = x - fn * L1; 242 /* Evaluate expl(endpoint[n2] + r1 + r2) = tbl[n2] * expl(r1 + r2). */ 251 *lop = tbl[n2].lo + t * (q + r1);
|
/barrelfish-master/usr/drivers/imx8x/sdhc/ |
H A D | sdhc.c | 316 uint32_t r1 = sdhc_cmd_rsp1_rd(&sd->dev); local 320 cmd->response[1] = (r2 << 8) | (r1 >> 24); 321 cmd->response[2] = (r1 << 8) | (r0 >> 24);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_x86core.c | 693 u32 r0, r1, r2; local 697 r1 = r0 & 0x80808080; 699 ((r1 - (r1 >> 7)) & 0x1b1b1b1b); 759 u32 r0, r1, r2; local 763 r1 = r0 & 0x80808080; 765 ((r1 - (r1 >> 7)) & 0x1b1b1b1b);
|
/barrelfish-master/include/vm/ |
H A D | swap_pager.c | 1974 daddr_t r1; local 1985 r1 = SWAPBLK_NONE; 1991 r1 = swap->swb_pages[idx]; 1993 if (r1 != SWAPBLK_NONE) { 1995 swp_pager_freeswapspace(r1, 1); 1996 r1 = SWAPBLK_NONE; 2009 return (r1);
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssltest.c | 1265 size_t r1, r2; local 1280 r1 = BIO_ctrl_pending(io1); 1283 num = r1; 1314 while (r1 && r2); 1321 r1 = BIO_ctrl_pending(io2); 1327 num = r1;
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | ssltest.c | 1265 size_t r1, r2; local 1280 r1 = BIO_ctrl_pending(io1); 1283 num = r1; 1314 while (r1 && r2); 1321 r1 = BIO_ctrl_pending(io2); 1327 num = r1;
|
/barrelfish-master/usr/eclipseclp/documents/intro_paper/ |
H A D | eclipse.tex | 419 $B_{r1}$, $B_{r2}$, and $B_t$, and using some large constant, say 424 $R_1 + 100000*B_{r1} + 100000*B_{r2} \geq R_2 +1$\\ 425 $R_2 + 100000*B_{r1} + 100000*(1-B_{r2}) \geq R_1 + 1$\\ 426 $S_1 + 100000*(1-B_{r1}) + 100000*B_t \geq E_2$\\ 427 $S_2 + 100000*(1-B_{r1}) + 100000*(1-B_t) \geq E_1$ 429 If $B_{r1}=0$ then the two 433 It is an exercise for the reader to prove that if $B_{r1}=0$ then the 435 Otherwise, if $B_{r1}=1$, then $B_t=0$ entails $S_1 \geq E_2$ and $B_t=1$ 1728 [S1,S2]::0..100, [R1,R2]::[r1,r2,r3], 1766 [eclipse 2]: propiaTR(S1, R1, S2, R2), R1#=r1, R [all...] |