| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.go/ |
| types.go | 9 type T1 *T2 10 type T2 *T1
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.go/ |
| types.go | 9 type T1 *T2 10 type T2 *T1
|
| /src/external/lgpl3/gmp/dist/mpz/ |
| stronglucas.c | 1 /* mpz_stronglucas(n, t1, t2) -- An implementation of the strong Lucas 68 mpz_t T1, T2; 156 mpz_init (T2); 159 if (mpz_lucas_mod (V, Qk, Q, b0, n, T1, T2) == 0) 164 mpz_mul (T2, V, V); 165 mpz_submul_ui (T2, Qk, 2); 166 mpz_tdiv_r (V, T2, n); 170 mpz_mul (T2, Qk, Qk); 171 mpz_tdiv_r (Qk, T2, n); 175 mpz_clear (T2); [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/xray/tests/unit/ |
| buffer_queue_test.cc | 103 auto T2 = std::async(std::launch::async, [&] {
|
| /src/external/lgpl3/mpfr/dist/src/ |
| const_catalan.c | 59 mpz_t T2, P2, Q2; 61 mpz_init (T2); 64 S (T2, P2, Q2, m, n2); 66 mpz_mul (T2, T2, P); 67 mpz_add (T, T, T2); 70 mpz_clear (T2);
|
| const_euler.c | 163 mpz_t P2, Q2, T2; 168 mpz_init (T2); 170 mpfr_const_euler_bs_2 (P2, Q2, T2, m, n2, N, 1); 172 mpz_mul (T2, T2, P); 173 mpz_add (T, T, T2); 179 mpz_clear (T2);
|
| rec_sqrt.c | 77 /* the following T1 and T2 are bipartite tables giving initial 81 2048/sqrt(i/2048) the value x = T1[16*(a-8)+b] + T2[16*(a-8)+c]. 135 static unsigned char T2[384] = { 200 t = T1[ab - 0x80] + T2[ac - 0x80]; /* fits on 16 bits */
|
| /src/external/gpl3/gcc/dist/libquadmath/math/ |
| tanq_kernel.c | 72 T2 = -2.626775478255838182468651821863299023956E4Q, 125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
|
| /src/external/gpl3/gcc.old/dist/libquadmath/math/ |
| tanq_kernel.c | 72 T2 = -2.626775478255838182468651821863299023956E4Q, 125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
|
| /src/crypto/external/bsd/openssl/dist/crypto/sha/ |
| sha256.c | 150 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; 170 T2 = Sigma0(a) + Maj(a, b, c); 178 a = T1 + T2; 189 T2 = Sigma0(a) + Maj(a, b, c); 197 a = T1 + T2;
|
| sha512.c | 554 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; 576 T2 = Sigma0(a) + Maj(a, b, c); 584 a = T1 + T2; 595 T2 = Sigma0(a) + Maj(a, b, c); 603 a = T1 + T2;
|
| /src/common/lib/libc/hash/sha2/ |
| sha2.c | 371 uint32_t T1, T2, *W256; 392 T2 = Sigma0_256(a) + Maj(a, b, c); 400 a = T1 + T2; 415 T2 = Sigma0_256(a) + Maj(a, b, c); 423 a = T1 + T2; 439 a = b = c = d = e = f = g = h = T1 = T2 = 0; 714 uint64_t T1, T2, *W512 = (void *)context->buffer; 733 T2 = Sigma0_512(a) + Maj(a, b, c); 741 a = T1 + T2; 756 T2 = Sigma0_512(a) + Maj(a, b, c) [all...] |
| /src/lib/libm/ld80/ |
| s_expl.c | 121 * Our T1 and T2 are chosen to be approximately the points where method 122 * A and method B have the same accuracy. Tang's T1 and T2 are the 132 T2 = 0.1659; /* ~30.625/128 * log(2) */ 190 if (T1 < x && x < T2) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/sha/ |
| sha256.c | 219 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; 239 T2 = Sigma0(a) + Maj(a, b, c); 247 a = T1 + T2; 258 T2 = Sigma0(a) + Maj(a, b, c); 266 a = T1 + T2;
|
| sha512.c | 649 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; 671 T2 = Sigma0(a) + Maj(a, b, c); 679 a = T1 + T2; 690 T2 = Sigma0(a) + Maj(a, b, c); 698 a = T1 + T2;
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| sha256.c | 119 uint32_t T1, T2; 122 T2 = Sigma0(AA) + Maj(AA,BB,CC); 131 AA = T1 + T2;
|
| sha512.c | 143 uint64_t T1, T2; 146 T2 = Sigma0(AA) + Maj(AA,BB,CC); 155 AA = T1 + T2;
|
| /src/crypto/external/bsd/netpgp/dist/src/libdigest/ |
| tiger.c | 562 #define T2 (table+256) 576 a -= T1[((c)>>(0*8))&0xFF] ^ T2[((c)>>(2*8))&0xFF] ^ \ 579 T2[((c)>>(5*8))&0xFF] ^ T1[((c)>>(7*8))&0xFF] ; \ 588 T2[(const uint8_t)(((uint32_t)(c))>>(2*8))] ^ \ 593 T2[(const uint8_t)(((uint32_t)((c)>>(4*8)))>>(1*8))] ^ \
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/sha/ |
| sha256.c | 171 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; 191 T2 = Sigma0(a) + Maj(a, b, c); 199 a = T1 + T2; 210 T2 = Sigma0(a) + Maj(a, b, c); 218 a = T1 + T2;
|
| sha512.c | 567 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; 589 T2 = Sigma0(a) + Maj(a, b, c); 597 a = T1 + T2; 608 T2 = Sigma0(a) + Maj(a, b, c); 616 a = T1 + T2;
|
| /src/external/bsd/elftosb/dist/common/ |
| rijndael.cpp | 133 static uint8_t T2[256][4]= 1465 ^ *((uint32_t*)T2[temp[1][1]]) 1469 ^ *((uint32_t*)T2[temp[2][1]]) 1473 ^ *((uint32_t*)T2[temp[3][1]]) 1477 ^ *((uint32_t*)T2[temp[0][1]]) 1488 ^ *((uint32_t*)T2[temp[1][1]]) 1492 ^ *((uint32_t*)T2[temp[2][1]]) 1496 ^ *((uint32_t*)T2[temp[3][1]]) 1500 ^ *((uint32_t*)T2[temp[0][1]])
|
| /src/external/bsd/unbound/dist/compat/ |
| sha512.c | 274 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer; 298 T2 = Sigma0_512(a) + Maj(a, b, c); 306 a = T1 + T2; 321 T2 = Sigma0_512(a) + Maj(a, b, c); 329 a = T1 + T2; 345 a = b = c = d = e = f = g = h = T1 = T2 = 0;
|
| /src/lib/libm/ld128/ |
| s_expl.c | 106 * Our T1 and T2 are chosen to be approximately the points where method 107 * A and method B have the same accuracy. Tang's T1 and T2 are the 115 * Split the interval [T1, T2] into two intervals [T1, T3] and [T3, T2]. 128 T2 = 0.1659, /* ~30.625/128 * log(2) */ 233 if (T1 < x && x < T2) {
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| sha2.c | 387 uint32_t T1, T2, *W256; 408 T2 = Sigma0_256(a) + Maj(a, b, c); 416 a = T1 + T2; 431 T2 = Sigma0_256(a) + Maj(a, b, c); 439 a = T1 + T2; 455 a = b = c = d = e = f = g = h = T1 = T2 = 0; 730 uint64_t T1, T2, *W512 = (void *)context->buffer; 749 T2 = Sigma0_512(a) + Maj(a, b, c); 757 a = T1 + T2; 772 T2 = Sigma0_512(a) + Maj(a, b, c) [all...] |
| /src/external/bsd/openldap/dist/contrib/slapd-modules/passwd/sha2/ |
| sha2.c | 445 sha2_word32 T1, T2, *W256; 471 T2 = Sigma0_256(a) + Maj(a, b, c); 479 a = T1 + T2; 494 T2 = Sigma0_256(a) + Maj(a, b, c); 502 a = T1 + T2; 518 a = b = c = d = e = f = g = h = T1 = T2 = 0; 771 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer; 795 T2 = Sigma0_512(a) + Maj(a, b, c); 803 a = T1 + T2; 818 T2 = Sigma0_512(a) + Maj(a, b, c) [all...] |