HomeSort by: relevance | last modified time | path
    Searched defs:T1 (Results 1 - 25 of 58) sorted by relevancy

1 2 3

  /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.go/
types.go 9 type T1 *T2
10 type T2 *T1
  /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.go/
types.go 9 type T1 *T2
10 type T2 *T1
  /src/external/lgpl3/gmp/dist/mpz/
stronglucas.c 1 /* mpz_stronglucas(n, t1, t2) -- An implementation of the strong Lucas
68 mpz_t T1, T2;
155 mpz_init (T1);
159 if (mpz_lucas_mod (V, Qk, Q, b0, n, T1, T2) == 0)
174 mpz_clear (T1);
  /src/sys/external/bsd/compiler_rt/dist/lib/xray/tests/unit/
buffer_queue_test.cc 102 auto T1 = std::async(std::launch::async, F);
212 std::thread T0(Process), T1(Process);
229 T1.join();
  /src/external/gpl3/gcc/dist/libquadmath/math/
tanq_kernel.c 71 T1 = 1.320767960008972224312740075083259247618E6Q,
125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
  /src/external/gpl3/gcc.old/dist/libquadmath/math/
tanq_kernel.c 71 T1 = 1.320767960008972224312740075083259247618E6Q,
125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
  /src/crypto/external/bsd/openssl/dist/crypto/sha/
sha256.c 150 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
168 T1 = X[i] = l;
169 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
174 e = d + T1;
178 a = T1 + T2;
187 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
188 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
193 e = d + T1;
197 a = T1 + T2;
215 T1 += h + Sigma1(e) + Ch(e,f,g) + K256[i];
    [all...]
sha512.c 554 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2;
571 T1 = X[i] = W[i];
573 T1 = X[i] = PULL64(W[i]);
575 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i];
580 e = d + T1;
584 a = T1 + T2;
593 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
594 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i];
599 e = d + T1;
603 a = T1 + T2
    [all...]
  /src/external/lgpl3/mpfr/dist/src/
rec_sqrt.c 77 /* the following T1 and T2 are bipartite tables giving initial
81 2048/sqrt(i/2048) the value x = T1[16*(a-8)+b] + T2[16*(a-8)+c].
85 static short int T1[384] = {
200 t = T1[ab - 0x80] + T2[ac - 0x80]; /* fits on 16 bits */
  /src/common/lib/libc/hash/sha2/
sha2.c 290 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + \
292 (d) += T1; \
293 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \
301 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + K256[j] + \
303 (d) += T1; \
304 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \
311 uint32_t T1, *W256;
362 a = b = c = d = e = f = g = h = T1 = 0;
371 uint32_t T1, T2, *W256;
391 T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + W256[j]
    [all...]
  /src/lib/libm/ld80/
s_expl.c 121 * Our T1 and T2 are chosen to be approximately the points where method
122 * A and method B have the same accuracy. Tang's T1 and T2 are the
131 T1 = -0.1659, /* ~-30.625/128 * log(2) */
190 if (T1 < x && x < T2) {
  /src/crypto/external/apache2/openssl/dist/crypto/sha/
sha256.c 219 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
237 T1 = X[i] = l;
238 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
243 e = d + T1;
247 a = T1 + T2;
256 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
257 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
262 e = d + T1;
266 a = T1 + T2;
284 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
    [all...]
sha512.c 649 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2;
666 T1 = X[i] = W[i];
668 T1 = X[i] = PULL64(W[i]);
670 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i];
675 e = d + T1;
679 a = T1 + T2;
688 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
689 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i];
694 e = d + T1;
698 a = T1 + T2
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
sha256.c 119 uint32_t T1, T2;
121 T1 = HH + Sigma1(EE) + Ch(EE, FF, GG) + constant_256[i] + data[i];
127 EE = DD + T1;
131 AA = T1 + T2;
sha512.c 143 uint64_t T1, T2;
145 T1 = HH + Sigma1(EE) + Ch(EE, FF, GG) + constant_512[i] + data[i];
151 EE = DD + T1;
155 AA = T1 + T2;
  /src/crypto/external/bsd/netpgp/dist/src/libdigest/
tiger.c 561 #define T1 (table)
576 a -= T1[((c)>>(0*8))&0xFF] ^ T2[((c)>>(2*8))&0xFF] ^ \
579 T2[((c)>>(5*8))&0xFF] ^ T1[((c)>>(7*8))&0xFF] ; \
587 a -= T1[(uint8_t)(c)] ^ \
594 T1[(const uint8_t)(((uint32_t)((c)>>(4*8)))>>(3*8))]; \
  /src/crypto/external/bsd/openssl.old/dist/crypto/sha/
sha256.c 171 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
189 T1 = X[i] = l;
190 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
195 e = d + T1;
199 a = T1 + T2;
208 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
209 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i];
214 e = d + T1;
218 a = T1 + T2;
236 T1 += h + Sigma1(e) + Ch(e,f,g) + K256[i];
    [all...]
sha512.c 567 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2;
584 T1 = X[i] = W[i];
586 T1 = X[i] = PULL64(W[i]);
588 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i];
593 e = d + T1;
597 a = T1 + T2;
606 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf];
607 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i];
612 e = d + T1;
616 a = T1 + T2
    [all...]
  /src/external/apache2/llvm/dist/llvm/lib/Target/Sparc/
SparcISelDAGToDAG.cpp 249 SDValue T1 = CurDAG->getCopyToReg(Sub1, dl, Reg1, Sub1, T0.getValue(1));
253 Ops.push_back(T1.getValue(1));
264 SDValue T1 = CurDAG->getCopyFromReg(Chain, dl, Reg1, MVT::i32,
274 T1,
283 Chain = CurDAG->getCopyToReg(T1, dl, GPVR, Pair, T1.getValue(1));
  /src/external/apache2/llvm/dist/llvm/utils/unittest/googletest/include/gtest/
gtest-printers.h 377 template <typename T1, typename T2>
379 const T1& value, const T2& /* other_operand */) {
380 return FormatForComparison<T1, T2>::Format(value);
648 template <typename T1, typename T2>
649 void PrintTo(const ::std::pair<T1, T2>& value, ::std::ostream* os) {
651 // We cannot use UniversalPrint(value.first, os) here, as T1 may be
653 UniversalPrinter<T1>::Print(value.first, os);
869 typedef T T1;
870 UniversalPrinter<T1>::Print(value, os);
  /src/external/bsd/elftosb/dist/common/
rijndael.cpp 65 static uint8_t T1[256][4]=
1464 *((uint32_t*)(b )) = *((uint32_t*)T1[temp[0][0]])
1468 *((uint32_t*)(b + 4)) = *((uint32_t*)T1[temp[1][0]])
1472 *((uint32_t*)(b + 8)) = *((uint32_t*)T1[temp[2][0]])
1476 *((uint32_t*)(b +12)) = *((uint32_t*)T1[temp[3][0]])
1487 *((uint32_t*)(b )) = *((uint32_t*)T1[temp[0][0]])
1491 *((uint32_t*)(b + 4)) = *((uint32_t*)T1[temp[1][0]])
1495 *((uint32_t*)(b + 8)) = *((uint32_t*)T1[temp[2][0]])
1499 *((uint32_t*)(b +12)) = *((uint32_t*)T1[temp[3][0]])
1508 b[ 0] = T1[temp[0][0]][1]
    [all...]
  /src/external/bsd/unbound/dist/compat/
sha512.c 274 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer;
293 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j];
296 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++);
302 e = d + T1;
306 a = T1 + T2;
319 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] +
325 e = d + T1;
329 a = T1 + T2;
345 a = b = c = d = e = f = g = h = T1 = T2 = 0;
  /src/external/gpl3/gcc/dist/libgcc/config/libbid/
bid64_add.c 128 UINT64 saved_ca, saved_cb, C0_64, C64, remainder_h, T1, carry, tmp;
432 // T1 = 10^(16-diff_dec_expon)
433 T1 = power10_table_128[16 - diff_dec_expon].w[0];
443 saved_ca = coefficient_a - T1;
474 saved_ca = saved_ca + T1;
480 coefficient_a = coefficient_a - T1;
485 (SINT64) (saved_ca - T1 -
486 (T1 << 3)) * (SINT64) power10_table_128[scale_k -
  /src/external/gpl3/gcc.old/dist/libgcc/config/libbid/
bid64_add.c 128 UINT64 saved_ca, saved_cb, C0_64, C64, remainder_h, T1, carry, tmp;
432 // T1 = 10^(16-diff_dec_expon)
433 T1 = power10_table_128[16 - diff_dec_expon].w[0];
443 saved_ca = coefficient_a - T1;
474 saved_ca = saved_ca + T1;
480 coefficient_a = coefficient_a - T1;
485 (SINT64) (saved_ca - T1 -
486 (T1 << 3)) * (SINT64) power10_table_128[scale_k -
  /src/lib/libm/ld128/
s_expl.c 106 * Our T1 and T2 are chosen to be approximately the points where method
107 * A and method B have the same accuracy. Tang's T1 and T2 are the
115 * Split the interval [T1, T2] into two intervals [T1, T3] and [T3, T2].
118 * into the [T1, T3] interval.
127 T1 = -0.1659, /* ~-30.625/128 * log(2) */
233 if (T1 < x && x < T2) {

Completed in 33 milliseconds

1 2 3