HomeSort by: relevance | last modified time | path
    Searched defs:T2 (Results 1 - 25 of 53) sorted by relevancy

1 2 3

  /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.go/
types.go 9 type T1 *T2
10 type T2 *T1
  /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.go/
types.go 9 type T1 *T2
10 type T2 *T1
  /src/external/lgpl3/gmp/dist/mpz/
stronglucas.c 1 /* mpz_stronglucas(n, t1, t2) -- An implementation of the strong Lucas
68 mpz_t T1, T2;
156 mpz_init (T2);
159 if (mpz_lucas_mod (V, Qk, Q, b0, n, T1, T2) == 0)
164 mpz_mul (T2, V, V);
165 mpz_submul_ui (T2, Qk, 2);
166 mpz_tdiv_r (V, T2, n);
170 mpz_mul (T2, Qk, Qk);
171 mpz_tdiv_r (Qk, T2, n);
175 mpz_clear (T2);
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/xray/tests/unit/
buffer_queue_test.cc 103 auto T2 = std::async(std::launch::async, [&] {
  /src/external/lgpl3/mpfr/dist/src/
const_catalan.c 59 mpz_t T2, P2, Q2;
61 mpz_init (T2);
64 S (T2, P2, Q2, m, n2);
66 mpz_mul (T2, T2, P);
67 mpz_add (T, T, T2);
70 mpz_clear (T2);
const_euler.c 163 mpz_t P2, Q2, T2;
168 mpz_init (T2);
170 mpfr_const_euler_bs_2 (P2, Q2, T2, m, n2, N, 1);
172 mpz_mul (T2, T2, P);
173 mpz_add (T, T, T2);
179 mpz_clear (T2);
rec_sqrt.c 77 /* the following T1 and T2 are bipartite tables giving initial
81 2048/sqrt(i/2048) the value x = T1[16*(a-8)+b] + T2[16*(a-8)+c].
135 static unsigned char T2[384] = {
200 t = T1[ab - 0x80] + T2[ac - 0x80]; /* fits on 16 bits */
  /src/external/gpl3/gcc/dist/libquadmath/math/
tanq_kernel.c 72 T2 = -2.626775478255838182468651821863299023956E4Q,
125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
  /src/external/gpl3/gcc.old/dist/libquadmath/math/
tanq_kernel.c 72 T2 = -2.626775478255838182468651821863299023956E4Q,
125 r = T0 + z * (T1 + z * (T2 + z * (T3 + z * T4)));
  /src/crypto/external/bsd/openssl/dist/crypto/sha/
sha256.c 150 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
170 T2 = Sigma0(a) + Maj(a, b, c);
178 a = T1 + T2;
189 T2 = Sigma0(a) + Maj(a, b, c);
197 a = T1 + T2;
sha512.c 554 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2;
576 T2 = Sigma0(a) + Maj(a, b, c);
584 a = T1 + T2;
595 T2 = Sigma0(a) + Maj(a, b, c);
603 a = T1 + T2;
  /src/common/lib/libc/hash/sha2/
sha2.c 371 uint32_t T1, T2, *W256;
392 T2 = Sigma0_256(a) + Maj(a, b, c);
400 a = T1 + T2;
415 T2 = Sigma0_256(a) + Maj(a, b, c);
423 a = T1 + T2;
439 a = b = c = d = e = f = g = h = T1 = T2 = 0;
714 uint64_t T1, T2, *W512 = (void *)context->buffer;
733 T2 = Sigma0_512(a) + Maj(a, b, c);
741 a = T1 + T2;
756 T2 = Sigma0_512(a) + Maj(a, b, c)
    [all...]
  /src/lib/libm/ld80/
s_expl.c 121 * Our T1 and T2 are chosen to be approximately the points where method
122 * A and method B have the same accuracy. Tang's T1 and T2 are the
132 T2 = 0.1659; /* ~30.625/128 * log(2) */
190 if (T1 < x && x < T2) {
  /src/crypto/external/apache2/openssl/dist/crypto/sha/
sha256.c 219 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
239 T2 = Sigma0(a) + Maj(a, b, c);
247 a = T1 + T2;
258 T2 = Sigma0(a) + Maj(a, b, c);
266 a = T1 + T2;
sha512.c 649 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2;
671 T2 = Sigma0(a) + Maj(a, b, c);
679 a = T1 + T2;
690 T2 = Sigma0(a) + Maj(a, b, c);
698 a = T1 + T2;
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
sha256.c 119 uint32_t T1, T2;
122 T2 = Sigma0(AA) + Maj(AA,BB,CC);
131 AA = T1 + T2;
sha512.c 143 uint64_t T1, T2;
146 T2 = Sigma0(AA) + Maj(AA,BB,CC);
155 AA = T1 + T2;
  /src/crypto/external/bsd/netpgp/dist/src/libdigest/
tiger.c 562 #define T2 (table+256)
576 a -= T1[((c)>>(0*8))&0xFF] ^ T2[((c)>>(2*8))&0xFF] ^ \
579 T2[((c)>>(5*8))&0xFF] ^ T1[((c)>>(7*8))&0xFF] ; \
588 T2[(const uint8_t)(((uint32_t)(c))>>(2*8))] ^ \
593 T2[(const uint8_t)(((uint32_t)((c)>>(4*8)))>>(1*8))] ^ \
  /src/crypto/external/bsd/openssl.old/dist/crypto/sha/
sha256.c 171 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2;
191 T2 = Sigma0(a) + Maj(a, b, c);
199 a = T1 + T2;
210 T2 = Sigma0(a) + Maj(a, b, c);
218 a = T1 + T2;
sha512.c 567 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2;
589 T2 = Sigma0(a) + Maj(a, b, c);
597 a = T1 + T2;
608 T2 = Sigma0(a) + Maj(a, b, c);
616 a = T1 + T2;
  /src/external/bsd/elftosb/dist/common/
rijndael.cpp 133 static uint8_t T2[256][4]=
1465 ^ *((uint32_t*)T2[temp[1][1]])
1469 ^ *((uint32_t*)T2[temp[2][1]])
1473 ^ *((uint32_t*)T2[temp[3][1]])
1477 ^ *((uint32_t*)T2[temp[0][1]])
1488 ^ *((uint32_t*)T2[temp[1][1]])
1492 ^ *((uint32_t*)T2[temp[2][1]])
1496 ^ *((uint32_t*)T2[temp[3][1]])
1500 ^ *((uint32_t*)T2[temp[0][1]])
  /src/external/bsd/unbound/dist/compat/
sha512.c 274 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer;
298 T2 = Sigma0_512(a) + Maj(a, b, c);
306 a = T1 + T2;
321 T2 = Sigma0_512(a) + Maj(a, b, c);
329 a = T1 + T2;
345 a = b = c = d = e = f = g = h = T1 = T2 = 0;
  /src/lib/libm/ld128/
s_expl.c 106 * Our T1 and T2 are chosen to be approximately the points where method
107 * A and method B have the same accuracy. Tang's T1 and T2 are the
115 * Split the interval [T1, T2] into two intervals [T1, T3] and [T3, T2].
128 T2 = 0.1659, /* ~30.625/128 * log(2) */
233 if (T1 < x && x < T2) {
  /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/
sha2.c 387 uint32_t T1, T2, *W256;
408 T2 = Sigma0_256(a) + Maj(a, b, c);
416 a = T1 + T2;
431 T2 = Sigma0_256(a) + Maj(a, b, c);
439 a = T1 + T2;
455 a = b = c = d = e = f = g = h = T1 = T2 = 0;
730 uint64_t T1, T2, *W512 = (void *)context->buffer;
749 T2 = Sigma0_512(a) + Maj(a, b, c);
757 a = T1 + T2;
772 T2 = Sigma0_512(a) + Maj(a, b, c)
    [all...]
  /src/external/bsd/openldap/dist/contrib/slapd-modules/passwd/sha2/
sha2.c 445 sha2_word32 T1, T2, *W256;
471 T2 = Sigma0_256(a) + Maj(a, b, c);
479 a = T1 + T2;
494 T2 = Sigma0_256(a) + Maj(a, b, c);
502 a = T1 + T2;
518 a = b = c = d = e = f = g = h = T1 = T2 = 0;
771 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer;
795 T2 = Sigma0_512(a) + Maj(a, b, c);
803 a = T1 + T2;
818 T2 = Sigma0_512(a) + Maj(a, b, c)
    [all...]

Completed in 94 milliseconds

1 2 3