/external/chromium_org/v8/test/mjsunit/ |
never-optimize.js | 47 function u2() { 52 u2(); u2(); 55 %OptimizeFunctionOnNextCall(u2); 58 u2(); u2(); 62 assertOptimized(u2);
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_verify_hash.c | 35 void *w, *v, *u1, *u2; local 47 if ((err = mp_init_multi(&w, &v, &u1, &u2, NULL)) != CRYPT_OK) { 64 /* u2 = r*w mod q */ 65 if ((err = mp_mulmod(r, w, key->q, u2)) != CRYPT_OK) { goto error; } 67 /* v = g^u1 * y^u2 mod p mod q */ 69 if ((err = mp_exptmod(key->y, u2, key->p, u2)) != CRYPT_OK) { goto error; } 70 if ((err = mp_mulmod(u1, u2, key->p, v)) != CRYPT_OK) { goto error; } 80 mp_clear_multi(w, v, u1, u2, NULL);
|
/art/jdwpspy/ |
Common.h | 14 typedef uint16_t u2; typedef 36 INLINE u2 get2BE(unsigned char const* pSrc) { 37 u2 result;
|
/external/chromium_org/third_party/WebKit/Source/core/svg/ |
SVGHKernElement.cpp | 66 String u2 = fastGetAttribute(SVGNames::u2Attr); local 68 if ((u1.isEmpty() && g1.isEmpty()) || (u2.isEmpty() && g2.isEmpty())) 75 && parseKerningUnicodeString(u2, kerningPair.unicodeRange2, kerningPair.unicodeName2)) {
|
SVGVKernElement.cpp | 67 String u2 = fastGetAttribute(SVGNames::u2Attr); local 69 if ((u1.isEmpty() && g1.isEmpty()) || (u2.isEmpty() && g2.isEmpty())) 76 && parseKerningUnicodeString(u2, kerningPair.unicodeRange2, kerningPair.unicodeName2)) {
|
/external/clang/test/CXX/class/class.static/class.static.data/ |
p3.cpp | 40 U<NonLit> u2; // expected-note {{here}} variable
|
/external/clang/test/SemaTemplate/ |
fun-template-def.cpp | 33 U u2 = (T)i1; local
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_verify_hash.c | 30 * u2 = rw 31 * X = u1*G + u2*Q 51 void *r, *s, *v, *w, *u1, *u2, *e, *p, *m; local 70 if ((err = mp_init_multi(&r, &s, &v, &w, &u1, &u2, &p, &e, &m, NULL)) != CRYPT_OK) { 111 /* u2 = rw */ 112 if ((err = mp_mulmod(r, w, p, u2)) != CRYPT_OK) { goto error; } 123 /* compute u1*mG + u2*mQ = mG */ 126 if ((err = ltc_mp.ecc_ptmul(u2, mQ, mQ, m, 0)) != CRYPT_OK) { goto error; } 137 /* use Shamir's trick to compute u1*mG + u2*mQ using half of the doubles */ 138 if ((err = ltc_mp.ecc_mul2add(mG, u1, mQ, u2, mG, m)) != CRYPT_OK) { goto error; [all...] |
/external/dropbear/libtommath/ |
bn_mp_exteuclid.c | 19 a*u1 + b*u2 = u3 21 int mp_exteuclid(mp_int *a, mp_int *b, mp_int *U1, mp_int *U2, mp_int *U3) 23 mp_int u1,u2,u3,v1,v2,v3,t1,t2,t3,q,tmp; local 26 if ((err = mp_init_multi(&u1, &u2, &u3, &v1, &v2, &v3, &t1, &t2, &t3, &q, &tmp, NULL)) != MP_OKAY) { 30 /* initialize, (u1,u2,u3) = (1,0,a) */ 43 /* (t1,t2,t3) = (u1,u2,u3) - (v1,v2,v3)q */ 47 if ((err = mp_sub(&u2, &tmp, &t2)) != MP_OKAY) { goto _ERR; } 51 /* (u1,u2,u3) = (v1,v2,v3) */ 53 if ((err = mp_copy(&v2, &u2)) != MP_OKAY) { goto _ERR; } 65 mp_neg(&u2, &u2) [all...] |
/external/lzma/CPP/Common/ |
MyString.cpp | 143 wchar_t u2 = MyCharUpper(c2);
145 if (u1 < u2) return -1;
146 if (u1 > u2) return 1;
187 wchar_t u2 = MyCharUpper(c2);
local 188 if (u1 < u2) return -1;
189 if (u1 > u2) return 1;
|
/bionic/libm/upstream-freebsd/lib/msun/bsdsrc/ |
b_log.c | 367 double F, f, g, q, u, u2, v, zero = 0.0, one = 1.0; 410 u2 = (2.0*(f - F*u1) - u1*f) * g; 411 /* u1 + u2 = 2f/(2F+f) to extra precision. */ 418 u2 = (u2 + logF_tail[j]) + q; /* tiny */ 419 u2 += logF_tail[N]*m; 420 return (u1 + u2); 436 double F, f, g, q, u, v, u2; local 461 u2 = (2.0*(f - F*u1) - u1*f) * g; 465 u2 += logF_tail[j]; u2 += q [all...] |
/dalvik/dexgen/src/com/android/dexgen/rop/code/ |
SourcePosition.java | 89 sb.append(Hex.u2(address));
|
/dalvik/dexgen/src/com/android/dexgen/util/ |
Hex.java | 84 public static String u2(int v) { method in class:Hex 104 return u2(v); 277 case 4: astr = Hex.u2(outOffset); break;
|
/dalvik/dx/src/com/android/dx/rop/code/ |
SourcePosition.java | 89 sb.append(Hex.u2(address));
|
/dalvik/dx/src/com/android/dx/util/ |
Hex.java | 84 public static String u2(int v) { method in class:Hex 104 return u2(v); 277 case 4: astr = Hex.u2(outOffset); break;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
DSASigner.java | 113 BigInteger u2 = r.multiply(w).mod(params.getQ()); local 116 u2 = ((DSAPublicKeyParameters)key).getY().modPow(u2, params.getP()); 118 BigInteger v = u1.multiply(u2).mod(params.getP()).mod(params.getQ());
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_string.h | 112 unsigned char u1, u2; local 116 u2 = (unsigned char) *s2++; 117 if (u1 != u2) 118 return u1 - u2; 128 unsigned char u1, u2; local 132 u2 = (unsigned char) *s2++; 133 if (u1 != u2) 134 return u1 - u2;
|
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
dsa_ossl.c | 311 BIGNUM u1,u2,t1; local 334 BN_init(&u2); 353 * save W in u2 */ 354 if ((BN_mod_inverse(&u2,sig->s,dsa->q,ctx)) == NULL) goto err; 365 if (!BN_mod_mul(&u1,&u1,&u2,dsa->q,ctx)) goto err; 367 /* u2 = r * w mod q */ 368 if (!BN_mod_mul(&u2,sig->r,&u2,dsa->q,ctx)) goto err; 380 DSA_MOD_EXP(goto err, dsa, &t1, dsa->g, &u1, dsa->pub_key, &u2, dsa->p, ctx, mont); 395 BN_free(&u2); [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/ecdsa/ |
ecs_ossl.c | 358 BIGNUM *order, *u1, *u2, *m, *X; local 380 u2 = BN_CTX_get(ctx); 404 if (!BN_mod_inverse(u2, sig->s, order, ctx)) 428 if (!BN_mod_mul(u1, m, u2, order, ctx)) 433 /* u2 = r * w mod q */ 434 if (!BN_mod_mul(u2, sig->r, u2, order, ctx)) 445 if (!EC_POINT_mul(group, point, u1, pub_key, u2, ctx))
|
/external/dexmaker/src/dx/java/com/android/dx/rop/code/ |
SourcePosition.java | 89 sb.append(Hex.u2(address));
|
/external/dexmaker/src/dx/java/com/android/dx/util/ |
Hex.java | 84 public static String u2(int v) { method in class:Hex 104 return u2(v); 277 case 4: astr = Hex.u2(outOffset); break;
|
/external/elfutils/libcpu/ |
memory-access.h | 84 uint16_t u2; member in union:unaligned 97 return bswap_16 (up->u2); 98 return up->u2; 105 return (int16_t) bswap_16 (up->u2);
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_string.h | 112 unsigned char u1, u2; local 116 u2 = (unsigned char) *s2++; 117 if (u1 != u2) 118 return u1 - u2; 128 unsigned char u1, u2; local 132 u2 = (unsigned char) *s2++; 133 if (u1 != u2) 134 return u1 - u2;
|
/external/openssl/crypto/dsa/ |
dsa_ossl.c | 311 BIGNUM u1,u2,t1; local 334 BN_init(&u2); 353 * save W in u2 */ 354 if ((BN_mod_inverse(&u2,sig->s,dsa->q,ctx)) == NULL) goto err; 365 if (!BN_mod_mul(&u1,&u1,&u2,dsa->q,ctx)) goto err; 367 /* u2 = r * w mod q */ 368 if (!BN_mod_mul(&u2,sig->r,&u2,dsa->q,ctx)) goto err; 380 DSA_MOD_EXP(goto err, dsa, &t1, dsa->g, &u1, dsa->pub_key, &u2, dsa->p, ctx, mont); 395 BN_free(&u2); [all...] |
/external/openssl/crypto/ecdsa/ |
ecs_ossl.c | 358 BIGNUM *order, *u1, *u2, *m, *X; local 380 u2 = BN_CTX_get(ctx); 404 if (!BN_mod_inverse(u2, sig->s, order, ctx)) 428 if (!BN_mod_mul(u1, m, u2, order, ctx)) 433 /* u2 = r * w mod q */ 434 if (!BN_mod_mul(u2, sig->r, u2, order, ctx)) 445 if (!EC_POINT_mul(group, point, u1, pub_key, u2, ctx))
|