/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_mont.c | 218 long long t2; local 221 t2 = 037777600000l; 222 t2 = n0 & t2; 224 t2 = (t3 * t2) & BN_MASK2; 225 t1 = t1 + t2; 287 BN_ULONG t1,t2,t3,t4; local 290 t2=nrp[i+1]; 294 rp[i+1]=t2; a 312 BN_ULONG t1,t2,t3,t4; local 350 BIGNUM *t1,*t2; local [all...] |
H A D | bn_div.c | 308 BN_ULLONG t2; local 328 t2=(BN_ULLONG)d1*q; 332 if (t2 <= ((((BN_ULLONG)rem)<<BN_BITS2)|wnump[-2])) 337 t2 -= d1; 362 mul64(t2l,t2h,ql,qh); /* t2=(BN_ULLONG)d1*q; */ 535 BN_ULLONG t2; local 555 t2=(BN_ULLONG)d1*q; 559 if (t2 <= ((((BN_ULLONG)rem)<<BN_BITS2)|wnump[-2])) 564 t2 -= d1; 589 mul64(t2l,t2h,ql,qh); /* t2 [all...] |
H A D | bn_lib.c | 659 BN_ULONG t1,t2,*ap,*bp; local 671 t2= bp[i]; 672 if (t1 != t2) 673 return((t1 > t2) ? 1 : -1); 682 BN_ULONG t1,t2; local 712 t2=b->d[i]; 713 if (t1 > t2) return(gt); 714 if (t1 < t2) return(lt);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/asm/ |
H A D | aes-sparcv9.pl | 61 $t2="%l6"; 196 ld [$key+8],$t2 204 xor $t2,$s2,$s2 207 ld [$key+24],$t2 288 xor $acc8,$t2,$t2 290 xor $acc9,$t2,$t2 292 xor $acc10,$t2,$t2 [all...] |
H A D | aes-s390x.pl | 57 $t2="%r2"; $inp="%r2"; 248 srlg $t2,$s0,`8-3` 253 nr $t2,$mask 267 l $t2,2($t2,$tbl) # Te2[s0>>8] 272 x $t2,1($i2,$tbl) # Te3[s1>>0] 297 xr $s2,$t2 317 srlg $t2,$s0,`8-3` 322 nr $t2,$mask 337 llgc $t2, [all...] |
H A D | aes-ppc.pl | 78 $t2="r14"; 397 lwz $t2,8($key) 406 xor $s2,$s2,$t2 419 lwz $t2,8($key) 445 xor $t2,$t2,$acc02 453 xor $t2,$t2,$acc06 457 xor $t2,$t2, [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_core.c | 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 805 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; 808 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; 809 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; 810 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; 811 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; 815 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14]; 818 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; 819 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; 820 s2 = Te0[t2 >> 2 976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/util/ |
H A D | mkstack.pl | 102 my $t2 = $type_thing->[1]; 105 #define sk_${t1}_new(cmp) ((STACK_OF($t1) *)sk_new(CHECKED_SK_CMP_FUNC($t2, cmp))) 107 #define sk_${t1}_push(st, val) sk_push(CHECKED_STACK_OF($t1, st), CHECKED_PTR_OF($t2, val)) 108 #define sk_${t1}_find(st, val) sk_find(CHECKED_STACK_OF($t1, st), CHECKED_PTR_OF($t2, val)) 112 #define sk_${t1}_insert(st, val, i) sk_insert(CHECKED_STACK_OF($t1, st), CHECKED_PTR_OF($t2, val), i) 114 #define sk_${t1}_set(st, i, val) sk_set(CHECKED_STACK_OF($t1, st), i, CHECKED_PTR_OF($t2, val)) 116 #define sk_${t1}_unshift(st, val) sk_unshift(CHECKED_STACK_OF($t1, st), CHECKED_PTR_OF($t2, val)) 117 #define sk_${t1}_find_ex(st, val) sk_find_ex((_STACK *)CHECKED_CONST_PTR_OF(STACK_OF($t1), st), CHECKED_CONST_PTR_OF($t2, val)) 119 #define sk_${t1}_delete_ptr(st, ptr) ($t1 *)sk_delete_ptr(CHECKED_STACK_OF($t1, st), CHECKED_PTR_OF($t2, ptr)) 121 ((int (*)(const $t2 * cons [all...] |
H A D | sp-diff.pl | 61 ($n,$t1,$t2)=($_ =~ /^([dr]sa\s+\d+)\s+bits\s+([.\d]+)s\s+([.\d]+)/); 63 $ret{$n,2}=$t2;
|
/barrelfish-master/lib/msun/src/ |
H A D | e_hypotl.c | 51 long double a=x,b=y,t1,t2,y1,y2,w; local 104 t2 = a-t1; 105 w = sqrtl(t1*t1-(b*(-b)-t2*(a+t1))); 114 t2 = a - t1; 115 w = sqrtl(t1*y1-(w*(-w)-(t1*y2+t2*b)));
|
H A D | e_log.c | 91 double hfsq,f,s,z,R,w,t1,t2,dk; local 132 t2= z*(Lg1+w*(Lg3+w*(Lg5+w*Lg7))); 134 R = t2+t1;
|
H A D | e_logf.c | 38 float hfsq,f,s,z,R,w,t1,t2,dk; local 78 t2= z*(Lg1+w*Lg3); 80 R = t2+t1;
|
H A D | e_pow.c | 100 double y1,t1,t2,r,s,t,u,v,w; local 205 t2 = v-(t1-u); 253 t2 = z_l-(((t1-t)-dp_h[k])-z_h); 256 /* split up y into y1+y2 and compute (y1+y2)*(t1+t2) */ 259 p_l = (y-y1)*t1+y*t2;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/jpake/ |
H A D | jpake.c | 219 BIGNUM *t2 = BN_new(); local 227 /* t2 = (g^x)^h = g^{hx} */ 228 BN_mod_exp(t2, p->gx, h, ctx->p.p, ctx->ctx); 229 /* t3 = t1 * t2 = g^{hx} * g^b = g^{hx+b} = g^r (allegedly) */ 230 BN_mod_mul(t3, t1, t2, ctx->p.p, ctx->ctx); 240 BN_free(t2); 348 BIGNUM *t2 = BN_new(); local 355 /* t2 = t1 * g^{xc} = g^{xa} * g^{xc} = g^{xa + xc} */ 356 BN_mod_mul(t2, t1, ctx->p.gxc, ctx->p.p, ctx->ctx); 357 /* t1 = t2 * 384 BIGNUM *t2 = BN_new(); local 417 BIGNUM *t2 = BN_new(); local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/sha/asm/ |
H A D | sha512-s390x.pl | 31 $ctx="%r2"; $t2="%r2"; 92 lgr $t2,$f 95 xgr $t2,$g 99 ngr $t2,$e 103 xgr $t2,$g # Ch(e,f,g) 106 algr $T1,$t2 # T1+=Ch(e,f,g) 109 lgr $t2,$a 113 ngr $t2,$b 115 ogr $t2,$t1 # Maj(a,b,c) 117 algr $h,$t2 # [all...] |
/barrelfish-master/lib/libc/db/test/ |
H A D | Makefile | 22 rm -f dbtest.core gmon.out ${OBJS} ${PROG} t1 t2 t3
|
/barrelfish-master/lib/tommath/ |
H A D | bn_mp_div.c | 105 mp_int q, x, y, t1, t2; local 135 if ((res = mp_init (&t2)) != MP_OKAY) { 223 t2.dp[0] = (i - 2 < 0) ? 0 : x.dp[i - 2]; 224 t2.dp[1] = (i - 1 < 0) ? 0 : x.dp[i - 1]; 225 t2.dp[2] = x.dp[i]; 226 t2.used = 3; 227 } while (mp_cmp_mag(&t1, &t2) == MP_GT); 280 LBL_T2:mp_clear (&t2);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/asm/ |
H A D | ppc64-mont.pl | 100 $t2="r18"; 249 extrdi $t2,$t3,16,16 253 std $t2,`$FRAME+16`($sp) 266 lwz $t2,12($ap) ; load a[j+1] as 32-bit word pair 282 std $t2,`$FRAME+80`($sp) 383 lwz $t2,12($ap) ; load a[j+1] as 32-bit word pair 391 std $t2,`$FRAME+80`($sp) 399 ld $t2,`$FRAME+16`($sp) 459 add $t2,$t2, [all...] |
/barrelfish-master/usr/eclipseclp/Kernel/src/ |
H A D | bip_arith.c | 751 p_min(value v1, type t1, value v2, type t2, value v, type t) argument 753 return binary_arith_op(v1, t1, v2, t2, v, t, ARITH_MIN); 757 p_max(value v1, type t1, value v2, type t2, value v, type t) argument 759 return binary_arith_op(v1, t1, v2, t2, v, t, ARITH_MAX); 763 p_gcd(value v1, type t1, value v2, type t2, value v, type t) argument 765 return binary_arith_op(v1, t1, v2, t2, v, t, ARITH_GCD); 769 p_gcd_ext(value v1, type t1, value v2, type t2, value s, type ts, value t, type tt, value g, type tg) argument 775 if (IsRef(t2)) { Bip_Error(PDELAY_2) } 777 Check_Integer_Or_Bignum(t2) 784 err = tag_desc[TagType(t2)] 796 p_lcm(value v1, type t1, value v2, type t2, value v, type t) argument 850 p_atan2(value v1, type t1, value v2, type t2, value v, type t) argument 1063 p_power(value v1, type t1, value v2, type t2, value v, type t) argument 1125 p_powm(value v1, type t1, value v2, type t2, value v3, type t3, value v, type t) argument 1152 p_lshift(value v1, type t1, value v2, type t2, value v, type t) argument 1209 p_rshift(value v1, type t1, value v2, type t2, value v, type t) argument 1482 bin_arith_op(value v1, type t1, value v2, type t2, pword *pres, int op) argument 1509 binary_arith_op(value v1, type t1, value v2, type t2, value v, type t, int op) argument 1535 arith_compare(value v1, type t1, value v2, type t2, int *res) argument [all...] |
H A D | manual_examples.c | 195 p_p2(value v1, type t1, value v2, type t2) argument 202 Check_Integer(t2); 228 p_diff_vars(value v1, type t1, value v2, type t2) argument 230 if (IsRef(t1) && IsRef(t2) && v1.ptr != v2.ptr)
|
H A D | sch_macros.h | 80 #define Sch_Event_Notify2(name, type, t1, t2) 81 #define Sch_Event_Notify3(name, type, t1, t2, t3) 93 #define Sch_Event_Notify2(name, type, t1, t2) { \ 97 (uword)Site(t2),(uword)Knot(t2),(uword)Edge(t2)); \ 99 #define Sch_Event_Notify3(name, type, t1, t2, t3) { \ 103 (uword)Site(t2),(uword)Knot(t2),(uword)Edge(t2), \ [all...] |
H A D | intervals.c | 1682 double t1, t2; local 1685 t2 = IvlLwb(v2.ptr); 1686 lwb = min(t1,t2); 1688 t2 = IvlUpb(v2.ptr); 1689 upb = min(t1,t2); 1698 double t1, t2; local 1701 t2 = IvlLwb(v2.ptr); 1702 lwb = max(t1,t2); 1704 t2 = IvlUpb(v2.ptr); 1705 upb = max(t1,t2); 1752 double t2 = -IvlLwb(v1.ptr); local 1846 double t1, t2; local 1887 double t1, t2; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/asm/ |
H A D | cmll-x86_64.pl | 50 $t0="%eax";$t1="%ebx";$t2="%ecx";$t3="%edx"; 82 mov $SBOX1_1110($Tbl,$i1,8),$t2 # t2=SBOX1_1110[1] 88 xor $SBOX4_4404($Tbl,$i1,8),$t2 # t2^=SBOX4_4404[1] 92 xor $SBOX3_3033($Tbl,$i1,8),$t2 # t2^=SBOX3_3033[1] 96 xor $SBOX2_0222($Tbl,$i1,8),$t2 # t2^=SBOX2_0222[1] 99 xor $t3,$t2 # t [all...] |
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | bntest.com | 43 $ t2 = f$extract( 5, 1000, line) 44 $ write sys$output "verify ''t2'"
|
/barrelfish-master/lib/lua/src/ |
H A D | lvm.h | 26 LUAI_FUNC int luaV_equalobj_ (lua_State *L, const TValue *t1, const TValue *t2);
|