/src/sys/arch/powerpc/fpu/ |
fpu_subr.c | 70 u_int m0, m1, m2, m3, s; local in function:fpu_shr 78 m2 = fp->fp_mant[2]; 83 KASSERT((m0 | m1 | m2 | m3) != 0); 89 if ((m0 | m1 | m2 | m3) == 0) 100 s |= m3 | m2 | m1; 101 m3 = m0, m2 = 0, m1 = 0, m0 = 0; 103 s |= m3 | m2; 104 m3 = m1, m2 = m0, m1 = 0, m0 = 0; 107 m3 = m2, m2 = m1, m1 = m0, m0 = 0 139 u_int m0, m1, m2, m3, top, sup, nrm; local in function:fpu_norm [all...] |
/src/sys/arch/sparc/fpu/ |
fpu_subr.c | 71 u_int m0, m1, m2, m3, s; local in function:fpu_shr 81 m2 = fp->fp_mant[2]; 87 if ((m0 | m1 | m2 | m3) == 0) 95 if ((m0 | m1 | m2 | m3) == 0) 106 s |= m3 | m2 | m1; 107 m3 = m0, m2 = 0, m1 = 0, m0 = 0; 109 s |= m3 | m2; 110 m3 = m1, m2 = m0, m1 = 0, m0 = 0; 113 m3 = m2, m2 = m1, m1 = m0, m0 = 0 145 u_int m0, m1, m2, m3, top, sup, nrm; local in function:fpu_norm [all...] |
/src/tests/usr.bin/xlint/lint1/ |
decl_struct_member.c | 15 __attribute__((deprecated)) int m2; member in struct:cover_begin_type_specifier_qualifier_list 26 number m2; member in struct:cover_begin_type_typespec 31 const volatile m2; member in struct:cover_begin_type_qualifier_list
|
/src/sys/arch/m68k/fpe/ |
fpu_subr.c | 86 uint32_t m0, m1, m2, s; local in function:fpu_shr 96 m2 = fp->fp_mant[2]; 101 if ((m0 | m1 | m2) == 0) 108 if ((m0 | m1 | m2) == 0) 119 s |= m2 | m1; 120 m2 = m0, m1 = 0, m0 = 0; 122 s |= m2; 123 m2 = m1, m1 = m0, m0 = 0; 129 s |= m2 << lsh; 130 m2 = (m2 >> rsh) | (m1 << lsh) 153 uint32_t m0, m1, m2, sup, nrm; local in function:fpu_norm [all...] |
/src/sys/external/isc/libsodium/dist/test/default/ |
secretbox7.c | 9 static unsigned char m2[10000]; variable in typeref:typename:unsigned char[10000] 23 if (crypto_secretbox_open(m2, c, mlen + crypto_secretbox_ZEROBYTES, n, 26 if (m2[i] != m[i]) {
|
secretbox_easy2.c | 9 unsigned char *m2; local in function:main 19 m2 = (unsigned char *) sodium_malloc(mlen); 29 m2, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce, 33 printf("%d\n", memcmp(m, m2, mlen)); 36 if (crypto_secretbox_open_easy(m2, c, (unsigned long long) i, nonce, 47 if (crypto_secretbox_open_detached(m2, c, mac, (unsigned long long) mlen, 51 printf("%d\n", memcmp(m, m2, mlen)); 65 sodium_free(m2);
|
box7.c | 16 unsigned char *m2; local in function:main 24 m2 = (unsigned char *) sodium_malloc(mlen_max); 33 if (crypto_box_open(m2, c, mlen + crypto_box_ZEROBYTES, n, alicepk, 36 if (m2[i] != m[i]) { 47 sodium_free(m2);
|
box8.c | 16 unsigned char *m2; local in function:main 25 m2 = (unsigned char *) sodium_malloc(mlen_max); 40 if (crypto_box_open(m2, c, mlen + crypto_box_ZEROBYTES, n, alicepk, 43 if (m2[i] != m[i]) { 55 sodium_free(m2);
|
box_seal.c | 12 unsigned char *m2; local in function:main 20 m2 = (unsigned char *) sodium_malloc(m_len); 27 if (crypto_box_seal_open(m2, c, c_len, pk, sk) != 0) { 31 printf("%d\n", memcmp(m, m2, m_len)); 39 sodium_free(m2);
|
secretbox8.c | 9 static unsigned char m2[10000]; variable in typeref:typename:unsigned char[10000] 27 if (crypto_secretbox_open(m2, c, mlen + crypto_secretbox_ZEROBYTES, 30 if (m2[i] != m[i]) {
|
box_easy2.c | 23 unsigned char *m2; local in function:main 35 m2 = (unsigned char *) sodium_malloc(m2_size); 52 if (crypto_box_open_easy(m2, c, 58 printf("%d\n", memcmp(m, m2, mlen)); 61 if (crypto_box_open_easy(m2, c, (unsigned long long) i, nonce, alicepk, 89 memset(m2, 0, m2_size); 98 m2, c, (unsigned long long) mlen + crypto_box_MACBYTES, nonce, 102 printf("%d\n", memcmp(m, m2, mlen)); 103 if (crypto_box_open_easy_afternm(m2, c, crypto_box_MACBYTES - 1U, nonce, 109 memset(m2, 0, m2_size) [all...] |
aead_chacha20poly1305.c | 27 unsigned char *m2 = (unsigned char *) sodium_malloc(MLEN); local in function:tv 57 if (crypto_aead_chacha20poly1305_decrypt(m2, &m2len, NULL, c, CLEN, 65 if (memcmp(m, m2, MLEN) != 0) { 66 printf("m != m2\n"); 68 memset(m2, 0, m2len); 73 if (crypto_aead_chacha20poly1305_decrypt_detached(m2, NULL, 79 if (memcmp(m, m2, MLEN) != 0) { 80 printf("detached m != m2\n"); 85 if (crypto_aead_chacha20poly1305_decrypt(m2, NULL, NULL, c, CLEN, 87 == 0 || memcmp(m, m2, MLEN) == 0) 208 unsigned char *m2 = (unsigned char *) sodium_malloc(MLEN); local in function:tv_ietf [all...] |
aead_xchacha20poly1305.c | 34 unsigned char *m2 = (unsigned char *) sodium_malloc(MLEN); local in function:tv 67 if (crypto_aead_xchacha20poly1305_ietf_decrypt(m2, &m2len, NULL, c, CLEN, ad, 74 if (memcmp(m, m2, MLEN) != 0) { 75 printf("m != m2\n"); 77 memset(m2, 0, m2len); 78 if (crypto_aead_xchacha20poly1305_ietf_decrypt_detached(m2, NULL, 84 if (memcmp(m, m2, MLEN) != 0) { 85 printf("detached m != m2\n"); 90 if (crypto_aead_xchacha20poly1305_ietf_decrypt(m2, NULL, NULL, c, CLEN, 92 == 0 || memcmp(m, m2, MLEN) == 0) [all...] |
secretstream.c | 14 unsigned char *m1, *m2, *m3; local in function:main 45 m2 = (unsigned char *) sodium_malloc(m2_len); 55 randombytes_buf(m2, m2_len); 56 memcpy(m2_, m2, m2_len); 75 (state, c2, NULL, m2, m2_len, ad, 0, 0); 97 (state, m2, NULL, &tag, 101 assert(memcmp(m2, m2_, m2_len) == 0); 126 (state, m2, NULL, &tag, 133 (state, m2, NULL, &tag, c2, 138 (state, m2, NULL, &tag, c2, 0, NULL, 0) [all...] |
/src/games/trek/ |
dcrept.c | 62 double m1, m2; local in function:dcrept 68 m2 = 1.0; 71 m2 = Param.dockfac; 93 x * m2 + 0.005);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/ |
blake2b-load-sse41.h | 22 b1 = _mm_unpacklo_epi64(m2, m3); \ 28 b1 = _mm_unpackhi_epi64(m2, m3); \ 45 b0 = _mm_unpacklo_epi64(m7, m2); \ 58 b1 = _mm_unpackhi_epi64(m5, m2); \ 70 b1 = _mm_unpackhi_epi64(m2, m7); \ 88 b1 = _mm_alignr_epi8(m2, m0, 8); \ 105 b0 = _mm_blend_epi16(m1, m2, 0xF0); \ 106 b1 = _mm_blend_epi16(m2, m7, 0xF0); \ 117 b0 = _mm_unpackhi_epi64(m4, m2); \ 124 b1 = _mm_blend_epi16(m2, m7, 0xF0); [all...] |
blake2b-load-avx2.h | 7 t1 = _mm256_unpacklo_epi64(m2, m3); \ 14 t1 = _mm256_unpackhi_epi64(m2, m3); \ 34 t0 = _mm256_unpacklo_epi64(m7, m2); \ 49 t1 = _mm256_unpackhi_epi64(m5, m2); \ 63 t1 = _mm256_unpackhi_epi64(m2, m7); \ 84 t1 = _mm256_alignr_epi8(m2, m0, 8); \ 104 t0 = _mm256_blend_epi32(m2, m1, 0x33); \ 105 t1 = _mm256_blend_epi32(m7, m2, 0x33); \ 118 t0 = _mm256_unpackhi_epi64(m4, m2); \ 126 t1 = _mm256_blend_epi32(m7, m2, 0x33); [all...] |
blake2b-load-sse2.h | 20 b0 = _mm_set_epi64x(m2, m0); \ 41 b0 = _mm_set_epi64x(m2, m12); \ 48 b1 = _mm_set_epi64x(m13, m2) 62 b0 = _mm_set_epi64x(m5, m2); \ 69 b1 = _mm_set_epi64x(m10, m2) 80 b0 = _mm_set_epi64x(m6, m2); \ 102 b1 = _mm_set_epi64x(m11, m2) 111 b1 = _mm_set_epi64x(m2, m8) 125 b0 = _mm_set_epi64x(m7, m2); \ 131 b0 = _mm_set_epi64x(m4, m2); \ [all...] |
/src/tests/dev/fss/ |
t_fss.sh | 55 mkdir ./m2 70 mount -o rdonly /dev/fss0 ./m2 78 read test_data < ./m2/text
|
/src/tests/usr.bin/indent/ |
opt_bc.c | 16 m2, variable in typeref:typename:int 27 m2, variable in typeref:typename:int 36 int m1, m2, m3; variable in typeref:typename:int
|
/src/sys/arch/x68k/include/ |
opmreg.h | 57 struct opm_operator m2; member in struct:opm_voice
|
/src/usr.bin/cdplay/ |
cdplay.c | 111 { CMD_PLAY, "play", 1, "tr1 m1:s1[.f1] [[tr2] [m2:s2[.f2]]]" }, 645 u_int n, tr1, tr2, m1, m2, s1, s2, f1, f2, tm, ts, tf; local in function:play 686 * Play MSF m1:s1 [ .f1 ] [ m2:s2 [ .f2 ] ] 691 * tr1 m1:s1[.f1] [[tr2] [m2:s2[.f2]]] 694 tr2 = m2 = s2 = f2 = f1 = 0; 696 &s1, &f1, &tr2, &m2, &s2, &f2)) 699 tr2 = m2 = s2 = f2 = f1 = 0; 701 &tr2, &m2, &s2, &f2)) 704 tr2 = m2 = s2 = f2 = f1 = 0; 706 &f1, &tr2, &m2, &s2) [all...] |
/src/usr.sbin/altq/libaltq/ |
qop_hfsc.h | 68 const char *parent_name, u_int m1, u_int d, u_int m2, 71 u_int m1, u_int d, u_int m2, int sctype);
|
qop_hfsc.c | 145 u_int m1, d, m2, rm1, rd, rm2, fm1, fd, fm2, um1, ud, um2; local in function:hfsc_class_parser 153 if (read_sc(&argc, &argv, &type, &m1, &d, &m2) != 0) { 160 rm1 = m1; rd = d; rm2 = m2; 163 fm1 = m1; fd = d; fm2 = m2; 166 um1 = m1; ud = d; um2 = m2; 253 m1 = rm1; d = rd; m2 = rm2; 255 m1 = fm1; d = fd; m2 = fm2; 258 m1, d, m2, qlimit, flags); 262 m1 = fm1; d = fd; m2 = fm2; type = HFSC_LINKSHARINGSC; 264 m1 = rm1; d = rd; m2 = rm2; type = HFSC_REALTIMESC [all...] |
/src/tests/usr.bin/error/ |
t_error.sh | 83 create_file code.m2 \ 86 'File code.m2, line 1: missing BEGIN' 93 atf_check -o 'file:expected' cat code.m2
|