/external/openssl/crypto/md5/asm/ |
md5-586.pl | 25 %Ltmp1=("R0",&Np($C), "R1",&Np($C), "R2",&Np($C), "R3",&Np($D)); 29 5, 8, 11, 14, 1, 4, 7, 10, 13, 0, 3, 6, 9, 12, 15, 2, # R2 94 sub R2 101 &comment("R2 $ki"); 119 &comment("R2 $ki"); 238 &comment("R2 section"); 239 &R2( 0,-1,$A,$B,$C,$D,$X,32, 4,0xfffa3942); 240 &R2( 1, 0,$D,$A,$B,$C,$X,33,11,0x8771f681); 241 &R2( 2, 0,$C,$D,$A,$B,$X,34,16,0x6d9d6122); 242 &R2( 3, 0,$B,$C,$D,$A,$X,35,23,0xfde5380c) [all...] |
/external/openssl/crypto/rc4/asm/ |
rc4-md5-x86_64.pl | 294 sub R2 { 378 for(;$i<48;$i++) { R2($i,@V); unshift(@V,pop(@V)); push(@TX,shift(@TX)); }
|
/external/openssl/crypto/md4/ |
md4_locl.h | 110 #define R2(a,b,c,d,k,s,t) { \
|
/external/llvm/unittests/ADT/ |
IntrusiveRefCntPtrTest.cpp | 24 IntrusiveRefCntPtr<VirtualRefCounted> R2 = V2; 34 IntrusiveRefCntPtr<SimpleRefCounted> R2 = S2;
|
/external/openssl/crypto/md5/ |
md5_locl.h | 122 #define R2(a,b,c,d,k,s,t) { \
|
/external/ppp/pppd/ |
sha1.c | 34 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 37 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 73 R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 74 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27) [all...] |
/bionic/libc/bionic/ |
sha1.c | 48 * (R0+R1), R2, R3, R4 are the different operations (rounds) used in SHA1 52 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 75 #define nR2(v,w,x,y,z,i) R2(*v,*w,*x,*y,*z,i) 163 R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 164 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27) [all...] |
/external/clang/lib/Analysis/ |
ReachableCode.cpp | 183 SourceRange &R2) { 184 R1 = R2 = SourceRange(); 202 R2 = CAO->getRHS()->getSourceRange(); 219 R2 = ASE->getRHS()->getSourceRange(); 248 SourceRange R1, R2; 249 SourceLocation Loc = GetUnreachableLoc(S, R1, R2); 250 CB.HandleUnreachable(Loc, R1, R2);
|
/external/openfst/src/test/ |
algo_test.h | 574 VectorFst<Arc> R2; 576 Reverse(R1, &R2); 577 CHECK(Equiv(T, R2)); 605 RmEpsilonFst<Arc> R2(T); 606 CHECK(Equiv(R1, R2)); [all...] |
/external/valgrind/main/none/tests/ |
sha1_test.c | 92 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 95 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 132 R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 133 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-internal.c | 138 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 145 #define R2(v,w,x,y,z,i) \ 198 R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 199 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27) [all...] |
/frameworks/av/media/libstagefright/codecs/amrwbenc/src/ |
p_med_ol.c | 42 Word32 i, j, max, R0, R1, R2; 99 R2 = 0; 104 R2 += vo_mult32(*p1, *p1); 107 R2 += vo_mult32(*p1, *p1); 110 R2 += vo_mult32(*p1, *p1); 113 R2 += vo_mult32(*p1, *p1); 119 R2 = (R2 <<1) + 1L; 120 /* gain = R0/ sqrt(R1*R2) */ 128 exp_R2 = norm_l(R2); [all...] |
/system/extras/ext4_utils/ |
sha1.c | 51 * (R0+R1), R2, R3, R4 are the different operations (rounds) used in SHA1 55 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 78 #define nR2(v,w,x,y,z,i) R2(*v,*w,*x,*y,*z,i) 166 R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 167 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27) [all...] |
/dalvik/libdex/ |
sha1.cpp | 125 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 128 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 164 R1(c,d,e,a,b,18); R1(b,c,d,e,a,19); R2(a,b,c,d,e,20); 165 R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 166 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); 167 R2(d,e,a,b,c,27); R2(c,d,e,a,b,28); R2(b,c,d,e,a,29) [all...] |
/frameworks/compile/libbcc/helper/ |
sha1.c | 124 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 127 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 163 R1(c,d,e,a,b,18); R1(b,c,d,e,a,19); R2(a,b,c,d,e,20); 164 R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 165 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); 166 R2(d,e,a,b,c,27); R2(c,d,e,a,b,28); R2(b,c,d,e,a,29) [all...] |
/external/clang/test/CodeGenCXX/ |
vtable-layout.cpp | 180 struct R2 { int r2; }; member in struct:Test4::R2 181 struct R3 : R1, R2 { int r3; }; 184 virtual R2 *f(); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.c | 567 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 574 #define R2(v,w,x,y,z,i) \ 627 R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); 628 R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27) [all...] |
/external/clang/lib/ARCMigrate/ |
TransformActions.cpp | 46 SourceRange R1, R2; 220 if (!canReplaceRange(act.R1, act.R2)) 259 commitReplace(act.R1, act.R2); 333 data.R2 = replacementRange;
|
/external/opencv/cv/src/ |
cvcalibration.cpp | 392 CvMat r1 = cvMat(3,1,CV_64F,_r1), r2 = cvMat(3,1,CV_64F,_r2); local 393 CvMat R1 = cvMat(3,3,CV_64F,_R1), R2 = cvMat(3,3,CV_64F,_R2); 404 cvConvert( _rvec2, &r2 ); 407 cvRodrigues2( &r2, &R2, &dR2dr2 ); 418 cvMatMul( &R2, &R1, &R3 ); 419 cvCalcMatMulDeriv( &R2, &R1, &dR3dR2, &dR3dR1 ); 460 cvMatMulAdd( &R2, &t1, &t2, &t3 ); 467 cvCalcMatMulDeriv( &R2, &t1, &dxdR2, &dxdt1 ); 967 double r2, r4, r6, a1, a2, a3, cdist [all...] |
/frameworks/av/media/libstagefright/codecs/avc/common/src/ |
deblock.cpp | [all...] |
/libcore/luni/src/test/java/libcore/java/lang/ |
ClassCastExceptionTest.java | 159 A2, B2, C2, D2, E2, F2, G2, H2, I2, J2, K2, L2, M2, N2, O2, P2, Q2, R2, S2, T2, U2, V2, W2, X2, Y2, Z2, 164 A2, B2, C2, D2, E2, F2, G2, H2, I2, J2, K2, L2, M2, N2, O2, P2, Q2, R2, S2, T2, U2, V2, W2, X2, Y2, Z2,
|
/system/core/libpixelflinger/codeflinger/ |
ARMAssemblerInterface.h | 50 R0, R1, R2, R3, R4, R5, R6, R7, R8, R9, R10, R11, R12, R13, R14, R15, 57 LIST(R0), LIST(R1), LIST(R2), LIST(R3), LIST(R4), LIST(R5), LIST(R6),
|
/external/clang/lib/Sema/ |
AnalysisBasedWarnings.cpp | 59 void HandleUnreachable(SourceLocation L, SourceRange R1, SourceRange R2) { 60 S.Diag(L, diag::warn_unreachable) << R1 << R2; [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSDigest.c | 905 #define R2(a,b,c,d,k,s,t) { \ 986 R2(A,B,C,D,X[ 5], 4,0xfffa3942L); 987 R2(D,A,B,C,X[ 8],11,0x8771f681L); 988 R2(C,D,A,B,X[11],16,0x6d9d6122L); 989 R2(B,C,D,A,X[14],23,0xfde5380cL); 990 R2(A,B,C,D,X[ 1], 4,0xa4beea44L); 991 R2(D,A,B,C,X[ 4],11,0x4bdecfa9L); 992 R2(C,D,A,B,X[ 7],16,0xf6bb4b60L); 993 R2(B,C,D,A,X[10],23,0xbebfbc70L); 994 R2(A,B,C,D,X[13], 4,0x289b7ec6L) [all...] |
/packages/inputmethods/LatinIME/native/jni/src/ |
correction.cpp | [all...] |