/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | d1_srvr.c | 249 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 293 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A; 327 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 328 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 356 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 369 s->s3->tmp.use_rsa_tmp=1; 371 s->s3->tmp.use_rsa_tmp=0; 375 if (s->s3->tmp.use_rsa_tmp 385 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 386 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp [all...] |
H A D | s3_srvr.c | 300 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 349 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 350 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK) 351 && !(s->s3->tmp.new_cipher->algorithm_auth & SSL_aKRB5)) 378 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 391 s->s3->tmp.use_rsa_tmp=1; 393 s->s3->tmp.use_rsa_tmp=0; 407 if (s->s3->tmp.use_rsa_tmp 417 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) 418 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp [all...] |
H A D | s2_srvr.c | 404 n2s(p,i); s->s2->tmp.clear=i; 405 n2s(p,i); s->s2->tmp.enc=i; 426 len = 10 + (unsigned long)s->s2->tmp.clear + (unsigned long)s->s2->tmp.enc + (unsigned long)keya; 440 memcpy(s->session->key_arg,&(p[s->s2->tmp.clear+s->s2->tmp.enc]), 449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc, 450 &(p[s->s2->tmp.clear]),&(p[s->s2->tmp.clear]), 476 || (is_export && ((i != ek) || (s->s2->tmp [all...] |
H A D | t1_enc.c | 284 unsigned char *tmp, int num) 287 ret = tls1_PRF(s->s3->tmp.new_cipher->algorithm2, 293 km,tmp,num); 332 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 333 c=s->s3->tmp.new_sym_enc; 334 m=s->s3->tmp.new_hash; 335 mac_type = s->s3->tmp.new_mac_pkey_type; 337 comp=s->s3->tmp.new_compression; 343 s->s3->tmp.new_cipher->algorithm_mkey, 344 s->s3->tmp 283 tls1_generate_key_block(SSL *s, unsigned char *km, unsigned char *tmp, int num) argument [all...] |
H A D | s3_clnt.c | 307 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && 308 !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 361 if (s->s3->tmp.cert_req) 394 if (s->s3->tmp.cert_req == 1) 429 s->session->cipher=s->s3->tmp.new_cipher; 433 if (s->s3->tmp.new_compression == NULL) 437 s->s3->tmp.new_compression->id; 467 s->s3->tmp.next_state=SSL_ST_OK; 480 s->s3->tmp.next_state=SSL3_ST_CR_SESSION_TICKET_A; 484 s->s3->tmp 2472 unsigned char premaster_secret[32],shared_ukm[32], tmp[256]; local [all...] |
H A D | s3_both.c | 163 sender,slen,s->s3->tmp.finish_md); 164 s->s3->tmp.finish_md_len = i; 165 memcpy(p, s->s3->tmp.finish_md, i); 175 s->s3->tmp.finish_md, i); 182 s->s3->tmp.finish_md, i); 212 * change cipher spec message and is in s->s3->tmp.peer_finish_md 234 i = s->s3->tmp.peer_finish_md_len; 243 if (memcmp(p, s->s3->tmp.peer_finish_md, i) != 0) 256 s->s3->tmp.peer_finish_md, i); 263 s->s3->tmp [all...] |
/barrelfish-master/usr/eclipseclp/icparc_solvers/ |
H A D | ic.c | 283 word *tmp; \ 284 tmp = ConBufEntry((con_info)->data, 0); \ 285 tmp[CON_DATA_OFF_FLAGS] = (con_info)->flags; \ 286 tmp[CON_DATA_OFF_COUNT] = (con_info)->term_count; \ 287 *((double *) (tmp + CON_DATA_OFF_RHS_LO)) = (con_info)->c.l; \ 288 *((double *) (tmp + CON_DATA_OFF_RHS_HI)) = (con_info)->c.u; \ 541 pword *tmp; \ 543 tmp = attr + OFF_LO; \ 544 Dereference(tmp); \ 545 lwb = Dbl(tmp 777 pword *tmp; local 1663 pword tmp; local 1778 pword *tmp; local 1803 pword *tmp; local 2037 pword *tmp; local 2308 pword *tmp; local 2417 pword *tmp; local 2561 pword *tmp; local 2895 pword *tmp; local 3055 pword *pterm, *tmp; local 3558 pword *pterm, *tmp; local 3590 pword *pterm, *tmp; local 3739 pword *pterm, *tmp; local 4185 pword *tmp, *pterm; local 5415 pword *tmp; local [all...] |
/barrelfish-master/lib/msun/src/ |
H A D | e_jn.c | 158 double q0,q1,h,tmp; int32_t k,m; local 163 tmp = z*q1 - q0; 165 q1 = tmp; 179 tmp = n; 181 tmp = tmp*__ieee754_log(fabs(v*tmp)); 182 if(tmp<7.09782712893383973096e+02) {
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_lcl.h | 328 BN_ULONG high,low,ret,tmp=(a); \ 330 BN_UMULT_LOHI(low,high,w,tmp); \ 349 BN_ULONG tmp=(a); \ 350 BN_UMULT_LOHI(r0,r1,tmp,tmp); \ 355 BN_ULONG high,low,ret,tmp=(a); \ 357 high= BN_UMULT_HIGH(w,tmp); \ 359 low = (w) * tmp; \ 378 BN_ULONG tmp=(a); \ 379 (r0) = tmp * tm [all...] |
/barrelfish-master/lib/libc/regex/grot/ |
H A D | Makefile | 53 sh mkh $(MKHFLAGS) -i _REGEX_H_ $(REGEXHSRC) >regex.tmp 54 cmp -s regex.tmp regex.h 2>/dev/null || cp regex.tmp regex.h 55 rm -f regex.tmp 96 rm -f junk* core regex.tmp lint
|
/barrelfish-master/usr/bench/rcce/lu/ |
H A D | erhs.c | 21 double tmp; local 113 tmp = 1.0 / rsd(1,i,j,k); 115 u21i = tmp * rsd(2,i,j,k); 116 u31i = tmp * rsd(3,i,j,k); 117 u41i = tmp * rsd(4,i,j,k); 118 u51i = tmp * rsd(5,i,j,k); 120 tmp = 1.0 / rsd(1,i-1,j,k); 122 u21im1 = tmp * rsd(2,i-1,j,k); 123 u31im1 = tmp * rsd(3,i-1,j,k); 124 u41im1 = tmp * rs [all...] |
H A D | rhs.c | 19 double tmp; local 85 tmp = 1.0 / u(1,i,j,k); 87 u21i = tmp * u(2,i,j,k); 88 u31i = tmp * u(3,i,j,k); 89 u41i = tmp * u(4,i,j,k); 90 u51i = tmp * u(5,i,j,k); 92 tmp = 1.0 / u(1,i-1,j,k); 94 u21im1 = tmp * u(2,i-1,j,k); 95 u31im1 = tmp * u(3,i-1,j,k); 96 u41im1 = tmp * [all...] |
H A D | ssor.c | 14 double tmp; local 21 tmp = 1.0 / ( omega * ( 2.0 - omega ) ); 108 + tmp * rsd( m, i, j, k );
|
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | vj.c | 508 u32_t tmp; local 554 tmp = lwip_ntohl(th->ackno) + i; 555 th->ackno = lwip_htonl(tmp); 556 tmp = lwip_ntohl(th->seqno) + i; 557 th->seqno = lwip_htonl(tmp); 563 tmp = lwip_ntohl(th->seqno) + lwip_ntohs(IPH_LEN(&cs->cs_ip)) - cs->cs_hlen; 564 th->seqno = lwip_htonl(tmp); 609 tmp = n0->tot_len - vjlen + cs->cs_hlen; 610 IPH_LEN_SET(&cs->cs_ip, lwip_htons((u16_t)tmp)); 618 for (tmp [all...] |
H A D | magic.c | 164 u_char tmp[MD5_HASH_SIZE]; local 172 lwip_md5_finish(&md5_ctx, tmp); 176 MEMCPY(buf, tmp, n);
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | vj.c | 508 u32_t tmp; local 554 tmp = lwip_ntohl(th->ackno) + i; 555 th->ackno = lwip_htonl(tmp); 556 tmp = lwip_ntohl(th->seqno) + i; 557 th->seqno = lwip_htonl(tmp); 563 tmp = lwip_ntohl(th->seqno) + lwip_ntohs(IPH_LEN(&cs->cs_ip)) - cs->cs_hlen; 564 th->seqno = lwip_htonl(tmp); 609 tmp = n0->tot_len - vjlen + cs->cs_hlen; 610 IPH_LEN_SET(&cs->cs_ip, lwip_htons((u16_t)tmp)); 618 for (tmp [all...] |
H A D | magic.c | 164 u_char tmp[MD5_HASH_SIZE]; local 172 lwip_md5_finish(&md5_ctx, tmp); 176 MEMCPY(buf, tmp, n);
|
/barrelfish-master/lib/acpica/tests/ |
H A D | aslts.sh | 8 tmp_iasl=/tmp/iasl-$postfix 9 tmp_acpiexec=/tmp/acpiexec-$postfix 113 rm -rf $ASLTSDIR/tmp/aml/$version
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/perlasm/ |
H A D | x86nasm.pl | 15 my $tmp; 77 { my $tmp=<<___; 87 push(@out,$tmp);
|
/barrelfish-master/kernel/ |
H A D | paging_generic.c | 71 struct cte *tmp = mdb_predecessor(*next); local 74 while(is_copy(&tmp->cap, &(*next)->cap)) { 75 if (type_is_vnode(tmp->cap.type)) { 76 *next = tmp; 79 tmp = mdb_predecessor(tmp); 81 tmp = mdb_successor(*next); 82 while(is_copy(&tmp->cap, &(*next)->cap)) { 83 if (type_is_vnode(tmp->cap.type)) { 84 *next = tmp; [all...] |
/barrelfish-master/lib/usb/ |
H A D | usb_manager_client.c | 122 uint8_t tmp[2048]; local 126 &ret_status, tmp, &length); 152 usb_device_init(tmp);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ec/ |
H A D | ec_asn1.c | 302 BIGNUM *tmp = NULL; local 323 if ((tmp = BN_new()) == NULL) 329 if (!EC_GROUP_get_curve_GFp(group, tmp, NULL, NULL, NULL)) 335 field->p.prime = BN_to_ASN1_INTEGER(tmp,NULL); 425 err : if (tmp) 426 BN_free(tmp); 569 BIGNUM *tmp=NULL; local 574 if ((tmp = BN_new()) == NULL) 646 if (!EC_GROUP_get_order(group, tmp, NULL)) 651 ret->order = BN_to_ASN1_INTEGER(tmp, re 687 int ok = 1, tmp; local 742 int ok = 0, tmp; local 1007 int tmp=0; local 1084 ECPKPARAMETERS *tmp = ec_asn1_group2pkparameters(a, NULL); local [all...] |
/barrelfish-master/lib/tommath/mtest/ |
H A D | mpi.c | 346 mp_digit *tmp; local 360 if((tmp = s_mp_alloc(USED(from), sizeof(mp_digit))) == NULL) 363 s_mp_copy(DIGITS(from), tmp, USED(from)); 372 DIGITS(to) = tmp; 894 mp_int tmp; local 896 if((res = mp_init_copy(&tmp, a)) != MP_OKAY) 898 if((res = s_mp_sub(&tmp, b)) != MP_OKAY) { 899 mp_clear(&tmp); 903 s_mp_exch(&tmp, c); 904 mp_clear(&tmp); 924 mp_int tmp; local 984 mp_int tmp; local 1009 mp_int tmp; local 1865 mp_int tmp; local 2556 mp_int tmp; local 2590 char tmp = str[ix]; local 2657 mp_digit *tmp; local 2793 mp_int tmp; local 3426 mp_int tmp; local 3514 mp_int tmp; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_lib.c | 99 X509V3_EXT_METHOD tmp; local 100 const X509V3_EXT_METHOD *t = &tmp, * const *ret; 103 tmp.ext_nid = nid; 107 idx = sk_X509V3_EXT_METHOD_find(ext_list, &tmp);
|
/barrelfish-master/lib/devif/backends/net/mlx4/include/netinet/ |
H A D | ip6.h | 273 int tmp; \ 277 t = m_pulldown((m), (off), (len), &tmp); \ 279 if (t->m_len < tmp + (len)) \ 281 (val) = (typ)(mtod(t, caddr_t) + tmp); \
|