Searched refs:num (Results 1 - 25 of 485) sorted by relevance

1234567891011>>

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/lhash/
H A Dnum.pl10 $num{$a[3]}++;
13 @a=sort {$a <=> $b } keys %num;
16 printf "%4d:%4d\n",$_,$num{$_};
/barrelfish-2018-10-04/lib/openssl-1.0.0d/util/
H A Dtab_num.pl3 $num=1;
14 print $_.("\t" x $i).$num."\n";
15 $num++;
/barrelfish-2018-10-04/lib/libc/stdlib/
H A Ddiv.c42 div(num, denom)
43 int num, denom;
47 r.quot = num / denom;
48 r.rem = num % denom;
60 * sign of num; if both are negative and r.quot has been
62 * have the opposite sign of num). These are considered
65 * If both are num and denom are positive, r will always
69 * if num >= 0, but r.rem < 0, we got the wrong answer.
73 if (num >= 0 && r.rem < 0) {
H A Dldiv.c42 ldiv(num, denom)
43 long num, denom;
49 r.quot = num / denom;
50 r.rem = num % denom;
52 if (num >= 0 && r.rem < 0) {
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/
H A Dofb_enc.c74 register int num=numbits; local
78 if (num > 64) return;
79 if (num > 32)
82 if (num >= 64)
85 mask1=(1L<<(num-32))-1;
89 if (num == 32)
92 mask0=(1L<<num)-1;
115 if (num == 32)
117 else if (num == 64)
119 else if (num > 3
[all...]
H A Denc_read.c104 long num=0,rnum;
167 /* num=0; */
168 n2l(p,num);
169 /* num should be rounded up to the next group of eight
172 if ((num > MAXWRITE) || (num < 0)) /* error */
174 rnum=(num < 8)?8:((num+7)/8*8);
192 if (len < num)
195 DES_pcbc_encrypt(net,unnet,num,sche
[all...]
/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/
H A Deg_cc_fail_loop.cc51 long num; local
64 if (EC_succeed == ((EC_word)X).is_long(&num))
66 std::cout << "p(" << num << ")\n"; local
69 if(num == 10)
H A Deg_c_fail_loop.c48 long num; local
71 if (PSUCCEED == ec_get_long(ec_ref_get(X),&num))
73 printf("p(%d)\n",num);
76 if(num == 3)
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md4/
H A Dmd4s.cpp38 void md4_block_x86(MD4_CTX *ctx, unsigned char *buffer,int num);
49 int i,num=0,numm; local
53 num=atoi(argv[1]);
55 if (num == 0) num=16;
56 if (num > 250) num=16;
57 numm=num+2;
58 num*=64;
70 md4_block_x86(&ctx,buffer,num);
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md5/
H A Dmd5s.cpp38 void md5_block_x86(MD5_CTX *ctx, unsigned char *buffer,int num);
49 int i,num=0,numm; local
53 num=atoi(argv[1]);
55 if (num == 0) num=16;
56 if (num > 250) num=16;
57 numm=num+2;
58 num*=64;
70 md5_block_x86(&ctx,buffer,num);
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ripemd/asm/
H A Drips.cpp40 void ripemd160_block_x86(RIPEMD160_CTX *ctx, unsigned char *buffer,int num);
51 int i,num=0,numm; local
55 num=atoi(argv[1]);
57 if (num == 0) num=16;
58 if (num > 250) num=16;
59 numm=num+2;
61 num*=64;
74 ripemd160_block_x86(&ctx,buffer,num);
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/times/x86/
H A Dmd4s.cpp38 void md4_block_x86(MD4_CTX *ctx, unsigned char *buffer,int num);
49 int i,num=0,numm; local
53 num=atoi(argv[1]);
55 if (num == 0) num=16;
56 if (num > 250) num=16;
57 numm=num+2;
58 num*=64;
70 md4_block_x86(&ctx,buffer,num);
[all...]
H A Dmd5s.cpp38 void md5_block_x86(MD5_CTX *ctx, unsigned char *buffer,int num);
49 int i,num=0,numm; local
53 num=atoi(argv[1]);
55 if (num == 0) num=16;
56 if (num > 250) num=16;
57 numm=num+2;
58 num*=64;
70 md5_block_x86(&ctx,buffer,num);
[all...]
H A Dsha1s.cpp38 void sha1_block_x86(SHA_CTX *ctx, unsigned char *buffer,int num);
49 int i,num=0,numm; local
53 num=atoi(argv[1]);
55 if (num == 0) num=16;
56 if (num > 250) num=16;
57 numm=num+2;
58 num*=64;
70 sha1_block_x86(&ctx,buffer,num);
[all...]
H A Drc4s.cpp45 int i,num=64,numm; local
49 num=atoi(argv[1]);
51 if (num == 0) num=256;
52 if (num > 1024-16) num=1024-16;
53 numm=num+8;
64 RC4(&ctx,num,buffer,buffer);
66 RC4(&ctx,num,buffer,buffer);
69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
[all...]
/barrelfish-2018-10-04/kernel/
H A Dmemset.c92 uintptr_t num, align, pattern, *p, x; local
100 num = n > align ? (sizeof(uintptr_t) - ((uintptr_t)s & align)) : n;
101 n -= num;
102 while (num--)
106 num = (uintptr_t)n / sizeof(uintptr_t);
118 while (num) {
120 if ((num & 3)==0) {
121 num -= 4;
127 num--;
133 num
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/asm/x86/
H A Dsqr.pl13 $num="ebx";
17 &mov($num,&wparam(2)); #
19 &and($num,0xfffffff8); # num / 8
36 &sub($num,8);
40 &mov($num,&wparam(2)); # get num
41 &and($num,7);
51 &dec($num) if ($i != 7-1);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/prime/
H A Dprime.c63 void callback(type,num)
64 int type,num;
80 int num=256; local
82 /* we should really call RAND_seed(char *bytes,int num);
86 num=atoi(argv[1]);
87 if (num == 0) num=256;
91 rand=BN_generate_prime(NULL,num,1,NULL,NULL,callback,NULL);
/barrelfish-2018-10-04/include/virtio/
H A Dvirtio_ring.h122 uint16_t num; ///< the number of buffers in the queue member in struct:vring
131 * \param num the queue size
134 static inline size_t vring_size(uint16_t num, uintptr_t align) argument
137 size_t size = num * sizeof(struct vring_desc);
140 // flags + idx + num * ring + used_event
141 size += sizeof(uint16_t) * (2 + num + 1);
147 // flags + idx + num * used_element + avail_event
148 size += sizeof(uint16_t) * 3 + sizeof(struct vring_used_elem) * num;
171 return &vr->avail->ring[vr->num];
182 return (uint16_t *) &vr->used->ring[vr->num];
219 vring_init(struct vring *vr, uint16_t num, uintptr_t align, void *addr) argument
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc4/
H A Drc4s.cpp45 int i,num=64,numm; local
49 num=atoi(argv[1]);
51 if (num == 0) num=256;
52 if (num > 1024-16) num=1024-16;
53 numm=num+8;
64 RC4(&ctx,num,buffer,buffer);
66 RC4(&ctx,num,buffer,buffer);
69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/aes/
H A Daes_cfb.c57 * 128bit block we have used is contained in *num;
62 unsigned char *ivec, int *num, const int enc) {
64 CRYPTO_cfb128_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt);
70 unsigned char *ivec, int *num, const int enc)
72 CRYPTO_cfb128_1_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt);
77 unsigned char *ivec, int *num, const int enc)
79 CRYPTO_cfb128_8_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt);
60 AES_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
68 AES_cfb1_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
75 AES_cfb8_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/camellia/
H A Dcmll_cfb.c114 * 128bit block we have used is contained in *num;
119 unsigned char *ivec, int *num, const int enc)
122 CRYPTO_cfb128_encrypt(in,out,length,key,ivec,num,enc,(block128_f)Camellia_encrypt);
128 unsigned char *ivec, int *num, const int enc)
130 CRYPTO_cfb128_1_encrypt(in,out,length,key,ivec,num,enc,(block128_f)Camellia_encrypt);
135 unsigned char *ivec, int *num, const int enc)
137 CRYPTO_cfb128_8_encrypt(in,out,length,key,ivec,num,enc,(block128_f)Camellia_encrypt);
117 Camellia_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
126 Camellia_cfb1_encrypt(const unsigned char *in, unsigned char *out, size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
133 Camellia_cfb8_encrypt(const unsigned char *in, unsigned char *out, size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rand/
H A Drand.h83 void (*seed)(const void *buf, int num);
84 int (*bytes)(unsigned char *buf, int num);
86 void (*add)(const void *buf, int num, double entropy);
87 int (*pseudorand)(unsigned char *buf, int num);
102 int RAND_bytes(unsigned char *buf,int num);
103 int RAND_pseudo_bytes(unsigned char *buf,int num);
104 void RAND_seed(const void *buf,int num);
105 void RAND_add(const void *buf,int num,double entropy);
108 const char *RAND_file_name(char *file,size_t num);
H A Drand_egd.c76 * num the number of bytes read from the EGD socket. This number is either
89 * num the number of bytes read from the EGD socket. This number is either
142 int len, num, numbytes; local
196 num = write(fd, egdbuf + numbytes, 2 - numbytes);
197 if (num >= 0)
198 numbytes += num;
220 num = read(fd, egdbuf, 1);
221 if (num == 0)
223 else if (num > 0)
224 numbytes += num;
288 int num, ret = 0; local
[all...]
/barrelfish-2018-10-04/include/openssl/
H A Drand.h83 void (*seed)(const void *buf, int num);
84 int (*bytes)(unsigned char *buf, int num);
86 void (*add)(const void *buf, int num, double entropy);
87 int (*pseudorand)(unsigned char *buf, int num);
102 int RAND_bytes(unsigned char *buf,int num);
103 int RAND_pseudo_bytes(unsigned char *buf,int num);
104 void RAND_seed(const void *buf,int num);
105 void RAND_add(const void *buf,int num,double entropy);
108 const char *RAND_file_name(char *file,size_t num);

Completed in 159 milliseconds

1234567891011>>