| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.go/ |
| types.go | 9 type T1 *T2 10 type T2 *T1
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.go/ |
| types.go | 9 type T1 *T2 10 type T2 *T1
|
| /src/external/lgpl3/gmp/dist/mpz/ |
| stronglucas.c | 1 /* mpz_stronglucas(n, t1, t2) -- An implementation of the strong Lucas 68 mpz_t T1, T2; 155 mpz_init (T1); 159 if (mpz_lucas_mod (V, Qk, Q, b0, n, T1, T2) == 0) 174 mpz_clear (T1);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/xray/tests/unit/ |
| buffer_queue_test.cc | 102 auto T1 = std::async(std::launch::async, F); 212 std::thread T0(Process), T1(Process); 229 T1.join();
|
| /src/external/gpl3/gcc/dist/libquadmath/math/ |
| tanq_kernel.c | 71 T1 = 1.320767960008972224312740075083259247618E6Q, 125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
|
| /src/external/gpl3/gcc.old/dist/libquadmath/math/ |
| tanq_kernel.c | 71 T1 = 1.320767960008972224312740075083259247618E6Q, 125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
|
| /src/crypto/external/bsd/openssl/dist/crypto/sha/ |
| sha256.c | 150 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; 168 T1 = X[i] = l; 169 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; 174 e = d + T1; 178 a = T1 + T2; 187 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; 188 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; 193 e = d + T1; 197 a = T1 + T2; 215 T1 += h + Sigma1(e) + Ch(e,f,g) + K256[i]; [all...] |
| sha512.c | 554 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; 571 T1 = X[i] = W[i]; 573 T1 = X[i] = PULL64(W[i]); 575 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; 580 e = d + T1; 584 a = T1 + T2; 593 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; 594 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; 599 e = d + T1; 603 a = T1 + T2 [all...] |
| /src/external/lgpl3/mpfr/dist/src/ |
| rec_sqrt.c | 77 /* the following T1 and T2 are bipartite tables giving initial 81 2048/sqrt(i/2048) the value x = T1[16*(a-8)+b] + T2[16*(a-8)+c]. 85 static short int T1[384] = { 200 t = T1[ab - 0x80] + T2[ac - 0x80]; /* fits on 16 bits */
|
| /src/common/lib/libc/hash/sha2/ |
| sha2.c | 290 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + \ 292 (d) += T1; \ 293 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \ 301 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + K256[j] + \ 303 (d) += T1; \ 304 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \ 311 uint32_t T1, *W256; 362 a = b = c = d = e = f = g = h = T1 = 0; 371 uint32_t T1, T2, *W256; 391 T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + W256[j] [all...] |
| /src/lib/libm/ld80/ |
| s_expl.c | 121 * Our T1 and T2 are chosen to be approximately the points where method 122 * A and method B have the same accuracy. Tang's T1 and T2 are the 131 T1 = -0.1659, /* ~-30.625/128 * log(2) */ 190 if (T1 < x && x < T2) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/sha/ |
| sha256.c | 219 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; 237 T1 = X[i] = l; 238 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; 243 e = d + T1; 247 a = T1 + T2; 256 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; 257 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; 262 e = d + T1; 266 a = T1 + T2; 284 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; [all...] |
| sha512.c | 649 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; 666 T1 = X[i] = W[i]; 668 T1 = X[i] = PULL64(W[i]); 670 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; 675 e = d + T1; 679 a = T1 + T2; 688 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; 689 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; 694 e = d + T1; 698 a = T1 + T2 [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| sha256.c | 119 uint32_t T1, T2; 121 T1 = HH + Sigma1(EE) + Ch(EE, FF, GG) + constant_256[i] + data[i]; 127 EE = DD + T1; 131 AA = T1 + T2;
|
| sha512.c | 143 uint64_t T1, T2; 145 T1 = HH + Sigma1(EE) + Ch(EE, FF, GG) + constant_512[i] + data[i]; 151 EE = DD + T1; 155 AA = T1 + T2;
|
| /src/crypto/external/bsd/netpgp/dist/src/libdigest/ |
| tiger.c | 561 #define T1 (table) 576 a -= T1[((c)>>(0*8))&0xFF] ^ T2[((c)>>(2*8))&0xFF] ^ \ 579 T2[((c)>>(5*8))&0xFF] ^ T1[((c)>>(7*8))&0xFF] ; \ 587 a -= T1[(uint8_t)(c)] ^ \ 594 T1[(const uint8_t)(((uint32_t)((c)>>(4*8)))>>(3*8))]; \
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/sha/ |
| sha256.c | 171 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; 189 T1 = X[i] = l; 190 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; 195 e = d + T1; 199 a = T1 + T2; 208 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; 209 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; 214 e = d + T1; 218 a = T1 + T2; 236 T1 += h + Sigma1(e) + Ch(e,f,g) + K256[i]; [all...] |
| sha512.c | 567 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; 584 T1 = X[i] = W[i]; 586 T1 = X[i] = PULL64(W[i]); 588 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; 593 e = d + T1; 597 a = T1 + T2; 606 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; 607 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; 612 e = d + T1; 616 a = T1 + T2 [all...] |
| /src/external/apache2/llvm/dist/llvm/lib/Target/Sparc/ |
| SparcISelDAGToDAG.cpp | 249 SDValue T1 = CurDAG->getCopyToReg(Sub1, dl, Reg1, Sub1, T0.getValue(1)); 253 Ops.push_back(T1.getValue(1)); 264 SDValue T1 = CurDAG->getCopyFromReg(Chain, dl, Reg1, MVT::i32, 274 T1, 283 Chain = CurDAG->getCopyToReg(T1, dl, GPVR, Pair, T1.getValue(1));
|
| /src/external/apache2/llvm/dist/llvm/utils/unittest/googletest/include/gtest/ |
| gtest-printers.h | 377 template <typename T1, typename T2> 379 const T1& value, const T2& /* other_operand */) { 380 return FormatForComparison<T1, T2>::Format(value); 648 template <typename T1, typename T2> 649 void PrintTo(const ::std::pair<T1, T2>& value, ::std::ostream* os) { 651 // We cannot use UniversalPrint(value.first, os) here, as T1 may be 653 UniversalPrinter<T1>::Print(value.first, os); 869 typedef T T1; 870 UniversalPrinter<T1>::Print(value, os);
|
| /src/external/bsd/elftosb/dist/common/ |
| rijndael.cpp | 65 static uint8_t T1[256][4]= 1464 *((uint32_t*)(b )) = *((uint32_t*)T1[temp[0][0]]) 1468 *((uint32_t*)(b + 4)) = *((uint32_t*)T1[temp[1][0]]) 1472 *((uint32_t*)(b + 8)) = *((uint32_t*)T1[temp[2][0]]) 1476 *((uint32_t*)(b +12)) = *((uint32_t*)T1[temp[3][0]]) 1487 *((uint32_t*)(b )) = *((uint32_t*)T1[temp[0][0]]) 1491 *((uint32_t*)(b + 4)) = *((uint32_t*)T1[temp[1][0]]) 1495 *((uint32_t*)(b + 8)) = *((uint32_t*)T1[temp[2][0]]) 1499 *((uint32_t*)(b +12)) = *((uint32_t*)T1[temp[3][0]]) 1508 b[ 0] = T1[temp[0][0]][1] [all...] |
| /src/external/bsd/unbound/dist/compat/ |
| sha512.c | 274 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer; 293 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; 296 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++); 302 e = d + T1; 306 a = T1 + T2; 319 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + 325 e = d + T1; 329 a = T1 + T2; 345 a = b = c = d = e = f = g = h = T1 = T2 = 0;
|
| /src/external/gpl3/gcc/dist/libgcc/config/libbid/ |
| bid64_add.c | 128 UINT64 saved_ca, saved_cb, C0_64, C64, remainder_h, T1, carry, tmp; 432 // T1 = 10^(16-diff_dec_expon) 433 T1 = power10_table_128[16 - diff_dec_expon].w[0]; 443 saved_ca = coefficient_a - T1; 474 saved_ca = saved_ca + T1; 480 coefficient_a = coefficient_a - T1; 485 (SINT64) (saved_ca - T1 - 486 (T1 << 3)) * (SINT64) power10_table_128[scale_k -
|
| /src/external/gpl3/gcc.old/dist/libgcc/config/libbid/ |
| bid64_add.c | 128 UINT64 saved_ca, saved_cb, C0_64, C64, remainder_h, T1, carry, tmp; 432 // T1 = 10^(16-diff_dec_expon) 433 T1 = power10_table_128[16 - diff_dec_expon].w[0]; 443 saved_ca = coefficient_a - T1; 474 saved_ca = saved_ca + T1; 480 coefficient_a = coefficient_a - T1; 485 (SINT64) (saved_ca - T1 - 486 (T1 << 3)) * (SINT64) power10_table_128[scale_k -
|
| /src/lib/libm/ld128/ |
| s_expl.c | 106 * Our T1 and T2 are chosen to be approximately the points where method 107 * A and method B have the same accuracy. Tang's T1 and T2 are the 115 * Split the interval [T1, T2] into two intervals [T1, T3] and [T3, T2]. 118 * into the [T1, T3] interval. 127 T1 = -0.1659, /* ~-30.625/128 * log(2) */ 233 if (T1 < x && x < T2) {
|