/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/lhash/ |
H A D | num.pl | 10 $num{$a[3]}++; 13 @a=sort {$a <=> $b } keys %num; 16 printf "%4d:%4d\n",$_,$num{$_};
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/util/ |
H A D | tab_num.pl | 3 $num=1; 14 print $_.("\t" x $i).$num."\n"; 15 $num++;
|
/barrelfish-2018-10-04/lib/libc/stdlib/ |
H A D | div.c | 42 div(num, denom) 43 int num, denom; 47 r.quot = num / denom; 48 r.rem = num % denom; 60 * sign of num; if both are negative and r.quot has been 62 * have the opposite sign of num). These are considered 65 * If both are num and denom are positive, r will always 69 * if num >= 0, but r.rem < 0, we got the wrong answer. 73 if (num >= 0 && r.rem < 0) {
|
H A D | ldiv.c | 42 ldiv(num, denom) 43 long num, denom; 49 r.quot = num / denom; 50 r.rem = num % denom; 52 if (num >= 0 && r.rem < 0) {
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | ofb_enc.c | 74 register int num=numbits; local 78 if (num > 64) return; 79 if (num > 32) 82 if (num >= 64) 85 mask1=(1L<<(num-32))-1; 89 if (num == 32) 92 mask0=(1L<<num)-1; 115 if (num == 32) 117 else if (num == 64) 119 else if (num > 3 [all...] |
H A D | enc_read.c | 104 long num=0,rnum; 167 /* num=0; */ 168 n2l(p,num); 169 /* num should be rounded up to the next group of eight 172 if ((num > MAXWRITE) || (num < 0)) /* error */ 174 rnum=(num < 8)?8:((num+7)/8*8); 192 if (len < num) 195 DES_pcbc_encrypt(net,unnet,num,sche [all...] |
/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/ |
H A D | eg_cc_fail_loop.cc | 51 long num; local 64 if (EC_succeed == ((EC_word)X).is_long(&num)) 66 std::cout << "p(" << num << ")\n"; local 69 if(num == 10)
|
H A D | eg_c_fail_loop.c | 48 long num; local 71 if (PSUCCEED == ec_get_long(ec_ref_get(X),&num)) 73 printf("p(%d)\n",num); 76 if(num == 3)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md4/ |
H A D | md4s.cpp | 38 void md4_block_x86(MD4_CTX *ctx, unsigned char *buffer,int num); 49 int i,num=0,numm; local 53 num=atoi(argv[1]); 55 if (num == 0) num=16; 56 if (num > 250) num=16; 57 numm=num+2; 58 num*=64; 70 md4_block_x86(&ctx,buffer,num); [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md5/ |
H A D | md5s.cpp | 38 void md5_block_x86(MD5_CTX *ctx, unsigned char *buffer,int num); 49 int i,num=0,numm; local 53 num=atoi(argv[1]); 55 if (num == 0) num=16; 56 if (num > 250) num=16; 57 numm=num+2; 58 num*=64; 70 md5_block_x86(&ctx,buffer,num); [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ripemd/asm/ |
H A D | rips.cpp | 40 void ripemd160_block_x86(RIPEMD160_CTX *ctx, unsigned char *buffer,int num); 51 int i,num=0,numm; local 55 num=atoi(argv[1]); 57 if (num == 0) num=16; 58 if (num > 250) num=16; 59 numm=num+2; 61 num*=64; 74 ripemd160_block_x86(&ctx,buffer,num); [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/times/x86/ |
H A D | md4s.cpp | 38 void md4_block_x86(MD4_CTX *ctx, unsigned char *buffer,int num); 49 int i,num=0,numm; local 53 num=atoi(argv[1]); 55 if (num == 0) num=16; 56 if (num > 250) num=16; 57 numm=num+2; 58 num*=64; 70 md4_block_x86(&ctx,buffer,num); [all...] |
H A D | md5s.cpp | 38 void md5_block_x86(MD5_CTX *ctx, unsigned char *buffer,int num); 49 int i,num=0,numm; local 53 num=atoi(argv[1]); 55 if (num == 0) num=16; 56 if (num > 250) num=16; 57 numm=num+2; 58 num*=64; 70 md5_block_x86(&ctx,buffer,num); [all...] |
H A D | sha1s.cpp | 38 void sha1_block_x86(SHA_CTX *ctx, unsigned char *buffer,int num); 49 int i,num=0,numm; local 53 num=atoi(argv[1]); 55 if (num == 0) num=16; 56 if (num > 250) num=16; 57 numm=num+2; 58 num*=64; 70 sha1_block_x86(&ctx,buffer,num); [all...] |
H A D | rc4s.cpp | 45 int i,num=64,numm; local 49 num=atoi(argv[1]); 51 if (num == 0) num=256; 52 if (num > 1024-16) num=1024-16; 53 numm=num+8; 64 RC4(&ctx,num,buffer,buffer); 66 RC4(&ctx,num,buffer,buffer); 69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num, [all...] |
/barrelfish-2018-10-04/kernel/ |
H A D | memset.c | 92 uintptr_t num, align, pattern, *p, x; local 100 num = n > align ? (sizeof(uintptr_t) - ((uintptr_t)s & align)) : n; 101 n -= num; 102 while (num--) 106 num = (uintptr_t)n / sizeof(uintptr_t); 118 while (num) { 120 if ((num & 3)==0) { 121 num -= 4; 127 num--; 133 num [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/asm/x86/ |
H A D | sqr.pl | 13 $num="ebx"; 17 &mov($num,&wparam(2)); # 19 &and($num,0xfffffff8); # num / 8 36 &sub($num,8); 40 &mov($num,&wparam(2)); # get num 41 &and($num,7); 51 &dec($num) if ($i != 7-1);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/prime/ |
H A D | prime.c | 63 void callback(type,num) 64 int type,num; 80 int num=256; local 82 /* we should really call RAND_seed(char *bytes,int num); 86 num=atoi(argv[1]); 87 if (num == 0) num=256; 91 rand=BN_generate_prime(NULL,num,1,NULL,NULL,callback,NULL);
|
/barrelfish-2018-10-04/include/virtio/ |
H A D | virtio_ring.h | 122 uint16_t num; ///< the number of buffers in the queue member in struct:vring 131 * \param num the queue size 134 static inline size_t vring_size(uint16_t num, uintptr_t align) argument 137 size_t size = num * sizeof(struct vring_desc); 140 // flags + idx + num * ring + used_event 141 size += sizeof(uint16_t) * (2 + num + 1); 147 // flags + idx + num * used_element + avail_event 148 size += sizeof(uint16_t) * 3 + sizeof(struct vring_used_elem) * num; 171 return &vr->avail->ring[vr->num]; 182 return (uint16_t *) &vr->used->ring[vr->num]; 219 vring_init(struct vring *vr, uint16_t num, uintptr_t align, void *addr) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rc4/ |
H A D | rc4s.cpp | 45 int i,num=64,numm; local 49 num=atoi(argv[1]); 51 if (num == 0) num=256; 52 if (num > 1024-16) num=1024-16; 53 numm=num+8; 64 RC4(&ctx,num,buffer,buffer); 66 RC4(&ctx,num,buffer,buffer); 69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num, [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_cfb.c | 57 * 128bit block we have used is contained in *num; 62 unsigned char *ivec, int *num, const int enc) { 64 CRYPTO_cfb128_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt); 70 unsigned char *ivec, int *num, const int enc) 72 CRYPTO_cfb128_1_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt); 77 unsigned char *ivec, int *num, const int enc) 79 CRYPTO_cfb128_8_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt); 60 AES_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument 68 AES_cfb1_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument 75 AES_cfb8_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num, const int enc) argument
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/camellia/ |
H A D | cmll_cfb.c | 114 * 128bit block we have used is contained in *num; 119 unsigned char *ivec, int *num, const int enc) 122 CRYPTO_cfb128_encrypt(in,out,length,key,ivec,num,enc,(block128_f)Camellia_encrypt); 128 unsigned char *ivec, int *num, const int enc) 130 CRYPTO_cfb128_1_encrypt(in,out,length,key,ivec,num,enc,(block128_f)Camellia_encrypt); 135 unsigned char *ivec, int *num, const int enc) 137 CRYPTO_cfb128_8_encrypt(in,out,length,key,ivec,num,enc,(block128_f)Camellia_encrypt); 117 Camellia_cfb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument 126 Camellia_cfb1_encrypt(const unsigned char *in, unsigned char *out, size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument 133 Camellia_cfb8_encrypt(const unsigned char *in, unsigned char *out, size_t length, const CAMELLIA_KEY *key, unsigned char *ivec, int *num, const int enc) argument
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rand/ |
H A D | rand.h | 83 void (*seed)(const void *buf, int num); 84 int (*bytes)(unsigned char *buf, int num); 86 void (*add)(const void *buf, int num, double entropy); 87 int (*pseudorand)(unsigned char *buf, int num); 102 int RAND_bytes(unsigned char *buf,int num); 103 int RAND_pseudo_bytes(unsigned char *buf,int num); 104 void RAND_seed(const void *buf,int num); 105 void RAND_add(const void *buf,int num,double entropy); 108 const char *RAND_file_name(char *file,size_t num);
|
H A D | rand_egd.c | 76 * num the number of bytes read from the EGD socket. This number is either 89 * num the number of bytes read from the EGD socket. This number is either 142 int len, num, numbytes; local 196 num = write(fd, egdbuf + numbytes, 2 - numbytes); 197 if (num >= 0) 198 numbytes += num; 220 num = read(fd, egdbuf, 1); 221 if (num == 0) 223 else if (num > 0) 224 numbytes += num; 288 int num, ret = 0; local [all...] |
/barrelfish-2018-10-04/include/openssl/ |
H A D | rand.h | 83 void (*seed)(const void *buf, int num); 84 int (*bytes)(unsigned char *buf, int num); 86 void (*add)(const void *buf, int num, double entropy); 87 int (*pseudorand)(unsigned char *buf, int num); 102 int RAND_bytes(unsigned char *buf,int num); 103 int RAND_pseudo_bytes(unsigned char *buf,int num); 104 void RAND_seed(const void *buf,int num); 105 void RAND_add(const void *buf,int num,double entropy); 108 const char *RAND_file_name(char *file,size_t num);
|