| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/in_1/ |
| kx_36.c | 165 dns_rdata_in_kx_t *kx = source; local 170 REQUIRE(kx != NULL); 171 REQUIRE(kx->common.rdtype == type); 172 REQUIRE(kx->common.rdclass == rdclass); 177 RETERR(uint16_tobuffer(kx->preference, target)); 178 dns_name_toregion(&kx->exchange, ®ion); 185 dns_rdata_in_kx_t *kx = target; local 190 REQUIRE(kx != NULL); 193 kx->common.rdclass = rdata->rdclass; 194 kx->common.rdtype = rdata->type 212 dns_rdata_in_kx_t *kx = source; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/rdata/in_1/ |
| kx_36.c | 166 dns_rdata_in_kx_t *kx = source; local 171 REQUIRE(kx != NULL); 172 REQUIRE(kx->common.rdtype == type); 173 REQUIRE(kx->common.rdclass == rdclass); 178 RETERR(uint16_tobuffer(kx->preference, target)); 179 dns_name_toregion(&kx->exchange, ®ion); 186 dns_rdata_in_kx_t *kx = target; local 191 REQUIRE(kx != NULL); 194 DNS_RDATACOMMON_INIT(kx, rdata->type, rdata->rdclass); 199 kx->preference = uint16_fromregion(®ion) 211 dns_rdata_in_kx_t *kx = source; local [all...] |
| /src/lib/libm/src/ |
| s_clogl.c | 61 int kx, ky; local 78 kx = hax - 16383; 83 if (kx == MAX_EXP || ky == MAX_EXP) 94 if (kx - ky > MANT_DIG || ay == 0) 98 if (kx >= MAX_EXP - 1) 101 if (kx >= (MAX_EXP - 1) / 2) 105 if (kx <= MIN_EXP - 2)
|
| /src/crypto/external/bsd/heimdal/dist/etc/ |
| services.append | 25 kx 2111/tcp # X over kerberos
|
| /src/external/lgpl3/mpfr/dist/tests/ |
| tcmp2.c | 300 /* Compare (m,kx) and (m,ky), where (m,k) means m fixed limbs followed by 306 int m, kx, ky, inex; local 312 for (kx = 0; kx <= 4; kx++) 316 mpfr_init2 (x, (m + kx) * GMP_NUMB_BITS 317 - (kx == 0 ? 0 : randlimb () % GMP_NUMB_BITS)); 331 printf ("Error in test_equal for m = %d, kx = %d, ky = %d\n", 332 m, kx, ky);
|
| tdiv_ui.c | 421 int i, kx, ky, px, pxmin, py, pymin, r; local 445 for (kx = 0; kx < 8; kx++) 448 if (kx != 0)
|
| /src/external/lgpl3/mpc/dist/src/ |
| asin.c | 93 unsigned long k, err, kx, ky; local 140 kx = (5 * k - 3) * k; 143 kx = 5 * k; 144 kx = (kx + 1) / 2; /* takes into account the 1/2 factor in both cases */ 145 /* now (5k-3)k/2 <= kx for e=1, and 5k/2 <= kx for e >= 2, thus 146 the maximal absolute error on Re(s),Im(s) is bounded by kx*2^(-e-p) */ 149 ky = kx; 151 /* for the real part, convert the maximal absolute error kx*2^(e-p) int [all...] |
| /src/external/lgpl3/mpfr/dist/src/ |
| compound.c | 248 Hence the first "if" below and the kx < ex test of the second "if" 265 mpfr_prec_t kx = mpfr_min_prec (x); local 268 MPFR_LOG_MSG (("Check if x^n fits... n=%ld kx=%Pd p=%Pd\n", 269 n, kx, p)); 270 if (kx < ex && n * (mpfr_exp_t) (kx - 1) <= p - 1)
|
| sub1sp.c | 1830 mp_size_t kx = n - 1 - (x / GMP_NUMB_BITS); local 1832 /* the round bit is in cp[kx], at position sx */ 1834 rb = cp[kx] & (MPFR_LIMB_ONE << sx); 1839 kx --; 1844 rbb = cp[kx] & (MPFR_LIMB_ONE << sx); 1847 sbb = cp[kx] & MPFR_LIMB_MASK(sx); 1848 while (sbb == 0 && kx > 0) 1849 sbb = cp[--kx];
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_ciph.c | 1661 const char *kx, *au, *enc, *mac; local 1663 static const char *const format = "%-30s %-7s Kx=%-8s Au=%-5s Enc=%-22s Mac=%-4s\n"; 1682 kx = "RSA"; 1685 kx = "DH"; 1688 kx = "ECDH"; 1691 kx = "PSK"; 1694 kx = "RSAPSK"; 1697 kx = "ECDHEPSK"; 1700 kx = "DHEPSK"; 1703 kx = "SRP" [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_ciph.c | 1694 const char *kx, *au, *enc, *mac; local 1696 static const char *format = "%-30s %-7s Kx=%-8s Au=%-5s Enc=%-22s Mac=%-4s\n"; 1717 kx = "RSA"; 1720 kx = "DH"; 1723 kx = "ECDH"; 1726 kx = "PSK"; 1729 kx = "RSAPSK"; 1732 kx = "ECDHEPSK"; 1735 kx = "DHEPSK"; 1738 kx = "SRP" [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_ciph.c | 1639 const char *kx, *au, *enc, *mac; local 1641 static const char *format = "%-23s %s Kx=%-8s Au=%-4s Enc=%-9s Mac=%-4s\n"; 1662 kx = "RSA"; 1665 kx = "DH"; 1668 kx = "ECDH"; 1671 kx = "PSK"; 1674 kx = "RSAPSK"; 1677 kx = "ECDHEPSK"; 1680 kx = "DHEPSK"; 1683 kx = "SRP" [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| srp-log.c | 90 CASE_TO_STR(kx);
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls_gnutls.c | 1678 gnutls_kx_algorithm_t kx; local 1688 kx = gnutls_kx_get(conn->session); 1689 kx_str = gnutls_kx_get_name(kx); 1698 if (kx == GNUTLS_KX_RSA)
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| pkinit.c | 1287 EncryptedData kx; local 1324 krb5_set_error_message(context, ret, "encoding of PKINIT-KX Key failed %d", ret); 1332 kckdata, kcklen, 0, &kx); 1340 &kx, &size, ret); 1341 free_EncryptedData(&kx); 1343 krb5_set_error_message(context, ret, "encoding of PKINIT-KX failed %d", ret); 1349 /* Add PA-PKINIT-KX */ 1353 "Failed adding PKINIT-KX %d", ret);
|
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| name-lookup.cc | 2413 for (unsigned kx = name_independent; kx > ix; --kx) 2415 current = (*member_vec)[kx - 1]; 2417 current = stat_hack ((*member_vec)[kx - 1], to_type); 2420 current = ovl_make ((*member_vec)[kx - 1], current);
|