| /src/games/adventure/ |
| main.c | 67 struct text *kk; local 107 kk = &stext[loc]; 108 if ((abb[loc] % abbnum) == 0 || kk->seekadr == 0) 109 kk = <ext[loc]; 115 kk = &rtext[16]; 122 speak(kk);
|
| subr.c | 155 struct travlist *kk; local 197 for (kk = travel[dloc[i]]; kk != 0; kk = kk->next) { 198 newloc = kk->tloc; 203 || kk->conditions == 100)
|
| /src/external/bsd/bzip2/dist/ |
| spewG.c | 42 int ii, kk, p; local 45 for (kk = 0; kk < MEGABYTES * 515; kk+=3) {
|
| decompress.c | 368 Int32 ii, jj, kk; local 369 kk = MTFA_SIZE-1; 372 s->mtfa[kk] = (UChar)(ii * MTFL_SIZE + jj); 373 kk--; 375 s->mtfbase[ii] = kk + 1; 433 Int32 ii, jj, kk, pp, lno, off; local 472 kk = MTFA_SIZE-1; 475 s->mtfa[kk] = s->mtfa[s->mtfbase[ii] + jj]; 476 kk--; 478 s->mtfbase[ii] = kk + 1 [all...] |
| /src/sys/crypto/adiantum/ |
| adiantum.h | 42 uint8_t kk[32]; /* AES key */ member in struct:adiantum
|
| /src/external/bsd/libfido2/dist/fuzz/ |
| prng.c | 86 int kk; local 90 for (kk=0;kk<N-M;kk++) { 91 y = (mt[kk]&UPPER_MASK)|(mt[kk+1]&LOWER_MASK); 92 mt[kk] = mt[kk+M] ^ (y >> 1) ^ mag01[y & 0x1UL]; 94 for (;kk<N-1;kk++) [all...] |
| /src/external/lgpl3/gmp/dist/rand/ |
| randmt.c | 172 int kk; local 174 for (kk = 0; kk < N - M; kk++) 176 y = (mt[kk] & 0x80000000) | (mt[kk + 1] & 0x7FFFFFFF); 177 mt[kk] = mt[kk + M] ^ (y >> 1) ^ ((y & 0x01) != 0 ? MATRIX_A : 0); 179 for (; kk < N - 1; kk++ [all...] |
| /src/external/lgpl3/mpfr/dist/src/ |
| log_ui.c | 95 unsigned long N, lgN, i, kk; local 156 kk = k; 158 while ((p % 2) == 0) /* replace p/2^kk by (p/2)/2^(kk-1) */ 161 kk --; 171 /* we need at most w/log2(2^kk/|p|) terms for an accuracy of w bits */ 175 mpfr_ui_sub (tmp, kk, tmp, MPFR_RNDD); 193 S (P, &q0, B, T, 1, N, p, kk, 0); 218 case is when log(1 + p/2^kk) = log(2/3) ~ -0.405, and with n=3 which
|
| /src/external/bsd/unbound/dist/validator/ |
| val_kentry.c | 54 struct key_entry_key* kk = (struct key_entry_key*)key; local 56 size_t s = sizeof(*kk) + kk->namelen; 57 s += sizeof(*kd) + lock_get_mem(&kk->entry.lock); 83 struct key_entry_key* kk = (struct key_entry_key*)key; local 86 lock_rw_destroy(&kk->entry.lock); 87 free(kk->name); 88 free(kk); 102 key_entry_hash(struct key_entry_key* kk) 104 kk->entry.hash = 0x654 [all...] |
| /src/external/lgpl3/gmp/dist/mpn/generic/ |
| rootrem.c | 215 mp_bitcnt_t b, kk; local 255 kk = k * xnb; /* number of truncated bits in the input */ 281 kk -= xnb; 321 kk = number of truncated bits of the input 327 kk -= (k - 1) * b; /* remaining input bits */ 328 /* {rp, rn} = floor({up, un} / 2^kk) */ 329 rn = un - kk / GMP_NUMB_BITS; 330 MPN_RSHIFT (rp, up + kk / GMP_NUMB_BITS, rn, kk % GMP_NUMB_BITS); 346 /* if S^k > floor(U/2^kk), the root approximation was too large * [all...] |
| /src/games/larn/ |
| display.c | 287 int i, j, kk; local 305 else if ((kk = mitem[j][i]) != 0) 306 screen[j][i] = monstnamelist[kk]; 307 else if ((kk = item[j][i]) == OWALL) 331 for (kk = j; kk <= j + 3; kk++) 332 if (screen[kk][i] != ' ') 333 kk = 1000; 334 if (kk < 1000) 380 int i, j, kk, mm; local 501 int kk, mm, i, j; local [all...] |
| /src/external/gpl3/binutils/dist/gprofng/common/ |
| opteron_pcbe.c | 383 for (uint_t kk = 0; amd_events && amd_events[kk].name; kk++) 386 hwc_cb (jj, amd_events[kk].name); 389 for (uint_t kk = 0; amd_generic_events && amd_generic_events[kk].name; kk++) 392 hwc_cb (jj, amd_generic_events[kk].name); 410 uint_t kk; local 422 for (kk = 0; amd_events && amd_events[kk].name; kk++ [all...] |
| /src/external/gpl3/binutils.old/dist/gprofng/common/ |
| opteron_pcbe.c | 383 for (uint_t kk = 0; amd_events && amd_events[kk].name; kk++) 386 hwc_cb (jj, amd_events[kk].name); 389 for (uint_t kk = 0; amd_generic_events && amd_generic_events[kk].name; kk++) 392 hwc_cb (jj, amd_generic_events[kk].name); 410 uint_t kk; local 422 for (kk = 0; amd_events && amd_events[kk].name; kk++ [all...] |
| /src/sys/crypto/camellia/ |
| camellia.c | 925 unsigned char kk[32]; local 928 memcpy(kk, key, 24); 933 memcpy(kk+24, (unsigned char *)&krrl, 4); 934 memcpy(kk+28, (unsigned char *)&krrr, 4); 935 camellia_setup256(kk, subkey);
|
| /src/sys/external/isc/atheros_hal/dist/ar5212/ |
| ar2316.c | 308 uint16_t ii, kk; local 326 kk = VpdList[idxL]; 328 kk = (uint16_t) 332 retVpdList[pdGainIdx][ii] = kk; 373 uint32_t ii, jj, kk; local 421 for (kk = 0; kk < (uint16_t)(Pmax_t2[numPdGainsUsed] - Pmin_t2[numPdGainsUsed]); kk++) { 422 VpdTable_I[numPdGainsUsed][kk] = 425 (int16_t)VpdTable_L[numPdGainsUsed][kk], (int16_t)VpdTable_R[numPdGainsUsed][kk]) [all...] |
| ar2317.c | 285 uint16_t ii, kk; local 303 kk = VpdList[idxL]; 305 kk = (uint16_t) 309 retVpdList[pdGainIdx][ii] = kk; 351 uint32_t ii, jj, kk; local 399 for (kk = 0; kk < (uint16_t)(Pmax_t2[numPdGainsUsed] - Pmin_t2[numPdGainsUsed]); kk++) { 400 VpdTable_I[numPdGainsUsed][kk] = 403 (int16_t)VpdTable_L[numPdGainsUsed][kk], (int16_t)VpdTable_R[numPdGainsUsed][kk]) [all...] |
| ar2413.c | 302 uint16_t ii, kk; local 320 kk = VpdList[idxL]; 322 kk = (uint16_t) 326 retVpdList[pdGainIdx][ii] = kk; 367 uint32_t ii, jj, kk; local 415 for (kk = 0; kk < (uint16_t)(Pmax_t2[numPdGainsUsed] - Pmin_t2[numPdGainsUsed]); kk++) { 416 VpdTable_I[numPdGainsUsed][kk] = 419 (int16_t)VpdTable_L[numPdGainsUsed][kk], (int16_t)VpdTable_R[numPdGainsUsed][kk]) [all...] |
| ar2425.c | 304 uint16_t ii, kk; local 322 kk = VpdList[idxL]; 324 kk = (uint16_t) 328 retVpdList[pdGainIdx][ii] = kk; 366 uint32_t ii, jj, kk; local 422 for (kk = 0; kk < (uint16_t)(Pmax_t2[numPdGainsUsed] - Pmin_t2[numPdGainsUsed]); kk++) { 423 VpdTable_I[numPdGainsUsed][kk] = 426 (int16_t)VpdTable_L[numPdGainsUsed][kk], (int16_t)VpdTable_R[numPdGainsUsed][kk]) [all...] |
| ar5413.c | 338 uint16_t ii, kk; local 356 kk = VpdList[idxL]; 358 kk = (uint16_t) 362 retVpdList[pdGainIdx][ii] = kk; 403 uint32_t ii, jj, kk; local 451 for (kk = 0; kk < (uint16_t)(Pmax_t2[numPdGainsUsed] - Pmin_t2[numPdGainsUsed]); kk++) { 452 VpdTable_I[numPdGainsUsed][kk] = 455 (int16_t)VpdTable_L[numPdGainsUsed][kk], (int16_t)VpdTable_R[numPdGainsUsed][kk]) [all...] |
| ar5112.c | 353 uint32_t ii, jj, kk; local 405 kk = 0; 409 if (kk > 1) { 415 xgainList[kk++] = (uint16_t)jj; 422 kk = 0; 436 OS_MEMCPY(&powTableLXPD[kk][0], &tmpPowerTable[0], 450 OS_MEMCPY(&powTableLXPD[kk][0], &tmpPowerTable[0], 464 OS_MEMCPY(&powTableHXPD[kk][0], &tmpPowerTable[0], 467 kk++; 472 kk = chan_idx_R - chan_idx_L [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| camellia-ntt.c | 952 unsigned char kk[32]; local 955 memcpy(kk, key, 24); 960 memcpy(kk+24, (unsigned char *)&krrl, 4); 961 memcpy(kk+28, (unsigned char *)&krrr, 4); 962 camellia_setup256(kk, subkey);
|
| /src/sys/external/isc/atheros_hal/dist/ |
| ah_eeprom_v3.c | 183 int ii, jj, kk; local 194 kk = 0; 198 if (kk > 1) { 201 __func__, kk); 204 xgainList[kk++] = jj; 633 uint16_t i, j, kk, channelValue; local 654 kk = 0; 659 kk++; 660 if (kk == 1) { 679 uint16_t ii, jj, kk, ss local [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| bzlib.c | 1448 Int32 ii, jj, kk; local 1449 kk = MTFA_SIZE-1; 1452 s->mtfa[kk] = (UChar)(ii * MTFL_SIZE + jj); 1453 kk--; 1455 s->mtfbase[ii] = kk + 1; 1513 Int32 ii, jj, kk, pp, lno, off; local 1552 kk = MTFA_SIZE-1; 1555 s->mtfa[kk] = s->mtfa[s->mtfbase[ii] + jj]; 1556 kk--; 1558 s->mtfbase[ii] = kk + 1 [all...] |
| /src/external/bsd/unbound/dist/iterator/ |
| iter_utils.c | 925 struct key_entry_key* kk = key_cache_obtain(env->key_cache, local 927 if(kk) { 928 if(query_dname_compare(kk->name, dp->name) == 0) { 929 if(key_entry_isgood(kk) || key_entry_isbad(kk)) { 932 } else if(key_entry_isnull(kk)) {
|
| /src/sbin/ping6/ |
| ping6.c | 2409 int ii, jj, kk; local 2424 for (kk = 0; 2425 kk <= (int)(MAXDATALEN - (8 + sizeof(struct tv32) + ii)); 2426 kk += ii) 2428 bp[jj + kk] = pat[jj];
|