| /src/sys/crypto/skipjack/ |
| skipjack.c | 145 u_int8_t * k4 = key_tables [4]; local 213 u_int8_t * k4 = key_tables [4]; local
|
| /src/external/bsd/jemalloc/dist/include/jemalloc/internal/ |
| hash.h | 147 uint32_t k4 = hash_get_block_32(blocks, i*4 + 3); local 164 k4 *= c4; k4 = hash_rotl_32(k4, 18); k4 *= c1; h4 ^= k4; 177 uint32_t k4 = 0; local 180 case 15: k4 ^= tail[14] << 16; JEMALLOC_FALLTHROUGH; 181 case 14: k4 ^= tail[13] << 8; JEMALLOC_FALLTHROUGH; 182 case 13: k4 ^= tail[12] << 0 [all...] |
| /src/external/bsd/jemalloc/include/jemalloc/internal/ |
| hash.h | 147 uint32_t k4 = hash_get_block_32(blocks, i*4 + 3); local 164 k4 *= c4; k4 = hash_rotl_32(k4, 18); k4 *= c1; h4 ^= k4; 177 uint32_t k4 = 0; local 180 case 15: k4 ^= tail[14] << 16; JEMALLOC_FALLTHROUGH; 181 case 14: k4 ^= tail[13] << 8; JEMALLOC_FALLTHROUGH; 182 case 13: k4 ^= tail[12] << 0 [all...] |
| /src/external/bsd/jemalloc.old/dist/include/jemalloc/internal/ |
| hash.h | 147 uint32_t k4 = hash_get_block_32(blocks, i*4 + 3); local 164 k4 *= c4; k4 = hash_rotl_32(k4, 18); k4 *= c1; h4 ^= k4; 177 uint32_t k4 = 0; local 180 case 15: k4 ^= tail[14] << 16; /*FALLTHROUGH*/ 181 case 14: k4 ^= tail[13] << 8; /*FALLTHROUGH*/ 182 case 13: k4 ^= tail[12] << 0 [all...] |
| /src/external/bsd/jemalloc.old/include/jemalloc/internal/ |
| hash.h | 147 uint32_t k4 = hash_get_block_32(blocks, i*4 + 3); local 164 k4 *= c4; k4 = hash_rotl_32(k4, 18); k4 *= c1; h4 ^= k4; 177 uint32_t k4 = 0; local 180 case 15: k4 ^= tail[14] << 16; /*FALLTHROUGH*/ 181 case 14: k4 ^= tail[13] << 8; /*FALLTHROUGH*/ 182 case 13: k4 ^= tail[12] << 0 [all...] |
| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.python/ |
| py-nested-maps.c | 109 struct my_key_t k4 = {6, 7}; local 123 add_map_element (m2, k4, v4);
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.python/ |
| py-nested-maps.c | 109 struct my_key_t k4 = {6, 7}; local 123 add_map_element (m2, k4, v4);
|
| /src/external/bsd/unbound/dist/testcode/ |
| unitlruhash.c | 87 testkey_type* k4 = newkey(12 + 1024*2); local 123 unit_assert( k->entry.hash == k4->entry.hash ); 124 k4->entry.overflow_next = &k->entry; 125 k3->entry.overflow_next = &k4->entry; 140 unit_assert( bin_find_entry(table, &bin, k4->entry.hash, k4, NULL) 141 == &k4->entry ); 143 bin_overflow_remove(&bin, &k4->entry); 145 unit_assert( bin_find_entry(table, &bin, k4->entry.hash, k4, NULL) == NULL) [all...] |
| /src/external/gpl3/gcc/dist/libdecnumber/bid/ |
| bid2dpd_dpd2bid.c | 292 UINT64 k1, k2, k4, k5, k7, k8, k10, k11; local 340 k4 = ((UINT64) BHL32 * d103) >> (32 + 8); 341 k5 = BHL32 - (unsigned int) k4 *1000; 350 dcoeff.w[1] = (b2d[k5] >> 4) | (b2d[k4] << 6) | (b2d[k3] << 16) |
|
| /src/external/gpl3/gcc.old/dist/libdecnumber/bid/ |
| bid2dpd_dpd2bid.c | 292 UINT64 k1, k2, k4, k5, k7, k8, k10, k11; local 340 k4 = ((UINT64) BHL32 * d103) >> (32 + 8); 341 k5 = BHL32 - (unsigned int) k4 *1000; 350 dcoeff.w[1] = (b2d[k5] >> 4) | (b2d[k4] << 6) | (b2d[k3] << 16) |
|
| /src/external/gpl3/gdb/dist/libdecnumber/bid/ |
| bid2dpd_dpd2bid.c | 290 UINT64 k1, k2, k4, k5, k7, k8, k10, k11; local 324 k4 = ((UINT64) BHL32 * d103) >> (32 + 8); 325 k5 = BHL32 - (unsigned int) k4 *1000; 334 dcoeff.w[1] = (b2d[k5] >> 4) | (b2d[k4] << 6) | (b2d[k3] << 16) |
|
| /src/external/gpl3/gdb.old/dist/libdecnumber/bid/ |
| bid2dpd_dpd2bid.c | 290 UINT64 k1, k2, k4, k5, k7, k8, k10, k11; local 324 k4 = ((UINT64) BHL32 * d103) >> (32 + 8); 325 k5 = BHL32 - (unsigned int) k4 *1000; 334 dcoeff.w[1] = (b2d[k5] >> 4) | (b2d[k4] << 6) | (b2d[k3] << 16) |
|
| /src/external/bsd/tcpdump/dist/ |
| print-eigrp.c | 118 nd_uint8_t k4; member in struct:eigrp_tlv_general_parm_t 328 ND_PRINT("\n\t holdtime: %us, k1 %u, k2 %u, k3 %u, k4 %u, k5 %u", 333 GET_U_1(tlv_ptr.eigrp_tlv_general_parm->k4),
|
| /src/sys/crypto/adiantum/ |
| adiantum.c | 225 uint64_t k0, k1, k2, k3, k4; /* 64-bit extension of h */ 264 k4 = h4 + m4; 267 p0 = r0*k0 + 5*r4*k1 + 5*r3*k2 + 5*r2*k3 + 5*r1*k4; 268 p1 = r1*k0 + r0*k1 + 5*r4*k2 + 5*r3*k3 + 5*r2*k4; 269 p2 = r2*k0 + r1*k1 + r0*k2 + 5*r4*k3 + 5*r3*k4; 270 p3 = r3*k0 + r2*k1 + r1*k2 + r0*k3 + 5*r4*k4; 271 p4 = r4*k0 + r3*k1 + r2*k2 + r1*k3 + r0*k4; 223 uint64_t k0, k1, k2, k3, k4; \/* 64-bit extension of h *\/ local
|
| /src/crypto/external/bsd/openssh/dist/ |
| umac.c | 364 UINT32 k0,k1,k2,k3,k4,k5,k6,k7; local 373 k4 = *(k+4); k5 = *(k+5); k6 = *(k+6); k7 = *(k+7); 374 h += MUL64((k0 + d0), (k4 + d4)); 397 UINT32 k0,k1,k2,k3,k4,k5,k6,k7, local 408 k4 = *(k+4); k5 = *(k+5); k6 = *(k+6); k7 = *(k+7); 411 h1 += MUL64((k0 + d0), (k4 + d4)); 412 h2 += MUL64((k4 + d0), (k8 + d4)); 444 UINT32 k0,k1,k2,k3,k4,k5,k6,k7, local 451 k4 = *(k+4); k5 = *(k+5); k6 = *(k+6); k7 = *(k+7); 460 h1 += MUL64((k0 + d0), (k4 + d4)) 499 UINT32 k0,k1,k2,k3,k4,k5,k6,k7, local [all...] |