/barrelfish-2018-10-04/kernel/arch/armv7/ |
H A D | boot_protocol.c | 43 struct armv7_boot_record *br= local 47 spinlock_acquire(&br->lock); 50 br->core_data= new_core_data_ptr; 53 br->done= 0; 58 br->target_mpid= target; 63 clean_invalidate_to_poc(&br->core_data); 64 clean_invalidate_to_poc(&br->done); 65 clean_invalidate_to_poc(&br->target_mpid); 75 volatile uint32_t *mailbox= &br->done; 79 spinlock_release(&br [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ |
H A D | ia64cpuid.S | 8 { .mib; br.ret.sptk.many b0 };; 15 br.ret.sptk.many b0 };; 34 (p6) br.dpnt .Lspin };; 37 br.ret.sptk.many b0 };; 74 br.ctop.sptk .L_wipe_top };; 127 br.ret.sptk b0 };; 137 (p6) br.ret.spnt b0 };; 140 (p6) br.cond.dptk .Lot };; 146 (p6) br.cond.dptk .Little 147 (p7) br [all...] |
H A D | s390xcpuid.S | 12 br %r14 21 br %r14 34 br %r14 54 br %r14 71 br %r14 86 br %r14
|
H A D | alphacpuid.pl | 125 br .Little
|
/barrelfish-2018-10-04/tools/arm_molly/ |
H A D | molly_boot64.S | 55 br x30
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_prn.c | 186 OCSP_BASICRESP *br = NULL; local 210 if (!(br = OCSP_response_get1_basic(o))) goto err; 211 rd = br->tbsResponseData; 277 if(X509_signature_print(bp, br->signatureAlgorithm, br->signature) <= 0) 280 for (i=0; i<sk_X509_num(br->certs); i++) 282 X509_print(bp, sk_X509_value(br->certs,i)); 283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i)); 288 OCSP_BASICRESP_free(br);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ms/ |
H A D | uplink-ia64.pl | 30 br.call.sptk.many b0=OPENSSL_Uplink# };; 37 br.many b6 };;
|
H A D | uplink.pl | 152 br.call.sptk.many b0=OPENSSL_Uplink# };; 159 br.many b6 };;
|
/barrelfish-2018-10-04/usr/skb/testapps/ |
H A D | matrix.c | 54 //ar, ac && br, bc && cr, cc are the sizes of the respective arrays 58 int br, int bc, 59 int B[br][bc], 55 matrix_mul(int r, int c, int ar, int ac, int A[ar][ac], int br, int bc, int B[br][bc], int cr, int cc, int C[cr][cc]) argument
|
/barrelfish-2018-10-04/tools/fastmodels/ |
H A D | shim.S | 68 br x5
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/sha/asm/ |
H A D | sha512-ia64.pl | 231 (p9) br.cond.dpnt.many .L1byte };; 234 (p10) br.cond.dpnt.many .L2byte };; 237 (p11) br.cond.dpnt.many .L3byte };; 240 (p12) br.cond.dpnt.many .L4byte };; 243 (p13) br.cond.dpnt.many .L5byte };; 246 (p14) br.cond.dpnt.many .L6byte };; 249 (p15) br.cond.dpnt.many .L7byte };; 252 br.many .L_first16 };; 285 br.many .L_first16 };; 316 { .mfb; br [all...] |
H A D | sha1-s390x.pl | 162 br %r14 217 br %r14
|
H A D | sha512-s390x.pl | 233 br %r14 290 br %r14
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc4/asm/ |
H A D | rc4-ia64.pl | 95 # (pBypass) br.cond.spnt Bypass 137 # - There is no space for a "br.ctop" instruction. For this 297 &I(\$c, "br.cloop.sptk.few .rc4Loop"); 309 &I(\$bypass, "br.sptk.many .rc4Resume%u\n", $label); 403 we will always load from the stable the first time. The br.cexit 423 br.cexit.spnt.few .+16; /* never taken */ \\ 457 br.ctop.sptk.few label; \\ 498 (L_NOK) br.ret.sptk.few rp 511 (L_NOK) br.ret.sptk.few rp 582 (pSmall) br [all...] |
H A D | rc4-s390x.pl | 126 br $rp 184 br $rp 197 br %r14
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md5/asm/ |
H A D | md5-ia64.S | 306 (pOff) br.cond.spnt.many .md5_unaligned 331 br.call.sptk.many QUICK_RTN = md5_digest_block0 345 (pAgain) br.cond.dptk.many .md5_block_loop0 364 br.ret.sptk.few rp 397 br.call.sptk.many QUICK_RTN = md5_digest_block##offset; \ 407 (pAgain) br.cond.dptk.many .md5_block_loop##offset ; \ 412 br.cond.sptk.many .md5_exit ; \ 425 (pOff) br.cond.dpnt.many .md5_process1 430 (pOff) br.cond.dpnt.many .md5_process2 488 br [all...] |
/barrelfish-2018-10-04/lib/ahci/ |
H A D | ahci_dma_pool.c | 465 size_t br = region->backing_region + 1; local 466 while (br < pool.addr_count) { 467 if ((n = pool.first_free[br]) != NULL) { 469 AHCI_DEBUG("found next br w/ free: %zd\n", br); 476 br++; 481 if (br >= pool.addr_count) {
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/asm/ |
H A D | ia64.S | 178 (p6) br.ret.spnt.many b0 };; 207 br.ctop.sptk .L_bn_add_words_ctop };; 215 br.ret.sptk.many b0 };; 231 (p6) br.ret.spnt.many b0 };; 260 br.ctop.sptk .L_bn_sub_words_ctop };; 268 br.ret.sptk.many b0 };; 294 (p6) br.ret.spnt.many b0 };; 341 br.ctop.sptk .L_bn_mul_words_ctop };; 374 br.ctop.sptk .L_bn_mul_words_ctop };; 386 br [all...] |
H A D | s390x.S | 73 br %r14 140 br %r14 208 br %r14 218 br %r14 262 br %r14 326 br %r14 463 br %r14 516 br %r14 630 br %r14 677 br [all...] |
H A D | s390x-mont.pl | 219 br %r14
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/aes/asm/ |
H A D | aes-s390x.pl | 208 br %r14 230 br $ra 406 br $ra 534 br %r14 556 br $ra 728 br $ra 755 br %r14 795 br %r14 862 br $ra 910 br [all...] |
H A D | aes-ia64.S | 189 br.ctop.sptk .Le_top };; 274 br.ret.sptk b6 };; 303 (p6) br.dpnt.many .Le_i_unaligned };; 316 br.call.sptk.many b6=_ia64_AES_encrypt };; 320 (p6) br.spnt .Le_o_unaligned };; 330 br.ret.sptk.many b0 };; 374 { .mib; br.call.sptk.many b6=_ia64_AES_encrypt };; 414 br.ret.sptk.many b0 };; 568 br.ctop.sptk .Ld_top };; 653 br [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_eay.c | 351 BIGNUM *f, *ret, *br, *res; local 361 br = BN_CTX_get(ctx); 409 if (!rsa_blinding_convert(blinding, local_blinding, f, br, ctx)) 444 if (!rsa_blinding_invert(blinding, local_blinding, ret, br, ctx)) 483 BIGNUM *f, *ret, *br; local 494 br = BN_CTX_get(ctx); 532 if (!rsa_blinding_convert(blinding, local_blinding, f, br, ctx)) 567 if (!rsa_blinding_invert(blinding, local_blinding, ret, br, ctx))
|
/barrelfish-2018-10-04/usr/eclipseclp/CPViz/viztool/src/components/ |
H A D | InternalFrame.java | 384 BufferedReader br = new BufferedReader(fr);
388 while((s = br.readLine()) != null && i<4) {
511 BufferedReader br = new BufferedReader(fr);
514 while((s = br.readLine()) != null) {
|
/barrelfish-2018-10-04/lib/dmalloc/ |
H A D | dmalloc.c | 4144 char* br = CMFAIL; local 4160 (br = (char*)(CALL_MORECORE(ssize))) == base) { 4171 (br = (char*)(CALL_MORECORE(ssize))) == ss->base+ss->size) { 4172 tbase = br; 4178 if (br != CMFAIL) { /* Try to use/extend the space we did get */ 4188 br = CMFAIL; 4193 if (br != CMFAIL) { /* Use the space we did get */ 4194 tbase = br; 4215 char* br = CMFAIL; local 4218 br 4981 char* br = (char*)mem2chunk((size_t)(((size_t)((char*)mem + alignment - local [all...] |