/macosx-10.9.5/CPANInternal-140/Crypt-OpenSSL-Bignum-0.04/ |
H A D | Bignum.pm | 63 $fac->mul( Crypt::OpenSSL::Bignum->new_from_word( $i ), $ctx, $fac ); 185 =item mul
|
H A D | Bignum.xs | 192 mul(a, b, ctx, ...) 200 croak( "usage: $bn->mul( $bn2, $ctx, [, $target] )" );
|
H A D | test.pl | 95 ok( 575 == $bn23->mul( $bn25, $ctx )->get_word() ); 96 ok( 575 == $bn23->mul( $bn25, $ctx, $bn )->get_word() );
|
/macosx-10.9.5/CPANInternal-140/Crypt-OpenSSL-Bignum/ |
H A D | Bignum.pm | 63 $fac->mul( Crypt::OpenSSL::Bignum->new_from_word( $i ), $ctx, $fac ); 185 =item mul
|
H A D | Bignum.xs | 192 mul(a, b, ctx, ...) 200 croak( "usage: $bn->mul( $bn2, $ctx, [, $target] )" );
|
H A D | test.pl | 95 ok( 575 == $bn23->mul( $bn25, $ctx )->get_word() ); 96 ok( 575 == $bn23->mul( $bn25, $ctx, $bn )->get_word() );
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/ |
H A D | _rijndael.c | 281 mul(UINT8 a, UINT8 b) function 295 c[j][i] = mul(0xe, (a[j] >> i*8) & 0xff) 296 ^ mul(0xb, (a[j] >> ((i+1)%4)*8) & 0xff) 297 ^ mul(0xd, (a[j] >> ((i+2)%4)*8) & 0xff) 298 ^ mul(0x9, (a[j] >> ((i+3)%4)*8) & 0xff);
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/ |
H A D | _rijndael.c | 281 mul(UINT8 a, UINT8 b) function 295 c[j][i] = mul(0xe, (a[j] >> i*8) & 0xff) 296 ^ mul(0xb, (a[j] >> ((i+1)%4)*8) & 0xff) 297 ^ mul(0xd, (a[j] >> ((i+2)%4)*8) & 0xff) 298 ^ mul(0x9, (a[j] >> ((i+3)%4)*8) & 0xff);
|
/macosx-10.9.5/JavaScriptCore-7537.78.1/assembler/ |
H A D | ARMAssembler.h | 425 void mul(int rd, int rn, int rm, Condition cc = AL) function in class:JSC::ARMAssembler
|
H A D | MIPSAssembler.h | 265 void mul(RegisterID rd, RegisterID rs, RegisterID rt) function in class:JSC::MIPSAssembler
|
H A D | MacroAssemblerMIPS.h | 339 m_assembler.mul(dest, dest, src); 344 m_assembler.mul(dest, op1, op2); 356 mul dest, src, dataTemp 359 m_assembler.mul(dest, src, dataTempRegister);
|
/macosx-10.9.5/JavaScriptCore-7537.78.1/dfg/ |
H A D | DFGGraph.h | 243 bool mulShouldSpeculateInteger(Node* mul) argument 245 ASSERT(mul->op() == ArithMul); 247 Node* left = mul->child1().node(); 248 Node* right = mul->child2().node(); 250 return Node::shouldSpeculateIntegerForArithmetic(left, right) && mul->canSpeculateInteger(); 753 bool mulImmediateShouldSpeculateInteger(Node* mul, Node* variable, Node* immediate) argument 772 return mul->canSpeculateInteger() && !nodeMayOverflow(mul->arithNodeFlags()); 774 return mul->canSpeculateInteger();
|
/macosx-10.9.5/Libc-997.90.3/gen/FreeBSD/ |
H A D | getbsize.c | 47 long n, max, mul, blocksize; local 67 mul = GB; 72 mul = KB; 77 mul = MB; 81 mul = 1; 87 mul = 1; 94 if ((blocksize = n * mul) < 512) {
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | ssh-keygen.c | 1668 int64_t mul, secs; local 1670 mul = *s == '-' ? -1 : 1; 1674 if (mul == -1 && secs > now) 1676 return now + (u_int64_t)(secs * mul);
|
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/ |
H A D | ossl-bn.c | 130 #define mul(r, a, w, c) \ macro 160 #define mul(r, a, w, c) \ macro 191 #define mul(r, a, w, c) \ macro 275 #define mul(r, a, bl, bh, c) \ macro 348 mul(rp[0], ap[0], w, c1); 349 mul(rp[1], ap[1], w, c1); 350 mul(rp[2], ap[2], w, c1); 351 mul(rp[3], ap[3], w, c1); 357 mul(rp[0], ap[0], w, c1); 361 mul(r [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_cryptkit/CurveParamDocs/ |
H A D | giants.c | 2425 register int j,k,mul = abs(i); local 2430 k = *digit * mul + carry;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | rijndael-alg-ref.c | 70 * Profiling measurements showed that the mul routine is where a large propertion of 71 * the time is spent. Since the first argument to mul is always one of six 83 * The mod 255 op in mul is really expensive... 99 word8 mul(word8 a, word8 b) { function 158 b[i][j] = mul(2,a[i][j]) 159 ^ mul(3,a[(i + 1) % 4][j]) 186 b[i][j] = mul(0xe,a[i][j]) 187 ^ mul(0xb,a[(i + 1) % 4][j]) 188 ^ mul(0xd,a[(i + 2) % 4][j]) 189 ^ mul( [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/open_ssl/bn/ |
H A D | bn_asm.c | 123 mul(rp[0],ap[0],w,c1); 124 mul(rp[1],ap[1],w,c1); 125 mul(rp[2],ap[2],w,c1); 126 mul(rp[3],ap[3],w,c1); 131 mul(rp[0],ap[0],w,c1); if (--num == 0) return c1; 132 mul(rp[1],ap[1],w,c1); if (--num == 0) return c1; 133 mul(rp[2],ap[2],w,c1); 200 mul(rp[0],ap[0],bl,bh,carry); 202 mul(rp[1],ap[1],bl,bh,carry); 204 mul(r [all...] |
H A D | bn_lcl.h | 275 #define mul(r,a,w,c) { \ macro 303 #define mul(r,a,w,c) { \ macro 383 #define mul(r,a,bl,bh,c) { \ macro
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | bn.h | 450 void BN_set_params(int mul,int high,int low,int mont); 451 int BN_get_params(int which); /* 0, mul, 1 high, 2 low, 3 mont */
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cryptkit/lib/CurveParamDocs/ |
H A D | giants.c | 2425 register int j,k,mul = abs(i); local 2430 k = *digit * mul + carry;
|
/macosx-10.9.5/bc-21/bc/Test/ |
H A D | timetest | 9 for file in exp.b ln.b sine.b atan.b jn.b mul.b div.b raise.b sqrt.b
|
/macosx-10.9.5/cctools-845/as/ |
H A D | arm.c | 6174 as_tsktsk (_("Rd and Rm should be different in mul")); 7365 X(mul, 4340, fb00f000), \ 14334 tCE(mul, 0000090, mul, 3, (RRnpc, RRnpc, oRR), mul, t_mul), 14335 tC3(muls, 0100090, muls, 3, (RRnpc, RRnpc, oRR), mul, t_mul),
|
/macosx-10.9.5/cxxfilt-11/cxxfilt/include/opcode/ |
H A D | avr.h | 163 AVR_INSN (mul, "r,r", "100111rdddddrrrr", 1, AVR_ISA_MUL, 0x9c00)
|
/macosx-10.9.5/dtrace-118.1/cmd/ |
H A D | dtrace_1.c | 1477 dtrace_optval_t j = 0, mul = 10; local 1491 for (; (INT64_C(1) << mul) <= nsize; j++, mul += 10) 1494 if (!(nsize & ((INT64_C(1) << (mul - 10)) - 1))) { 1496 (long long)nsize >> (mul - 10), " kmgtpe"[j]); 1587 dtrace_optval_t j = 0, mul = 10; local 1601 for (; (INT64_C(1) << mul) <= nsize; j++, mul += 10) 1604 if (!(nsize & ((INT64_C(1) << (mul - 10)) - 1))) { 1606 (long long)nsize >> (mul [all...] |