/dragonfly/contrib/binutils-2.27/libiberty/ |
H A D | sha1.c | 272 #define K2 0x6ed9eba1 macro 348 R( a, b, c, d, e, F2, K2, M(20) ); in sha1_process_block() 349 R( e, a, b, c, d, F2, K2, M(21) ); in sha1_process_block() 350 R( d, e, a, b, c, F2, K2, M(22) ); in sha1_process_block() 351 R( c, d, e, a, b, F2, K2, M(23) ); in sha1_process_block() 352 R( b, c, d, e, a, F2, K2, M(24) ); in sha1_process_block() 353 R( a, b, c, d, e, F2, K2, M(25) ); in sha1_process_block() 354 R( e, a, b, c, d, F2, K2, M(26) ); in sha1_process_block() 355 R( d, e, a, b, c, F2, K2, M(27) ); in sha1_process_block() 356 R( c, d, e, a, b, F2, K2, M(28) ); in sha1_process_block() [all …]
|
/dragonfly/contrib/binutils-2.34/libiberty/ |
H A D | sha1.c | 271 #define K2 0x6ed9eba1 macro 347 R( a, b, c, d, e, F2, K2, M(20) ); in sha1_process_block() 348 R( e, a, b, c, d, F2, K2, M(21) ); in sha1_process_block() 349 R( d, e, a, b, c, F2, K2, M(22) ); in sha1_process_block() 350 R( c, d, e, a, b, F2, K2, M(23) ); in sha1_process_block() 351 R( b, c, d, e, a, F2, K2, M(24) ); in sha1_process_block() 352 R( a, b, c, d, e, F2, K2, M(25) ); in sha1_process_block() 353 R( e, a, b, c, d, F2, K2, M(26) ); in sha1_process_block() 354 R( d, e, a, b, c, F2, K2, M(27) ); in sha1_process_block() 355 R( c, d, e, a, b, F2, K2, M(28) ); in sha1_process_block() [all …]
|
/dragonfly/contrib/gcc-4.7/libiberty/ |
H A D | sha1.c | 272 #define K2 0x6ed9eba1 macro 348 R( a, b, c, d, e, F2, K2, M(20) ); in sha1_process_block() 349 R( e, a, b, c, d, F2, K2, M(21) ); in sha1_process_block() 350 R( d, e, a, b, c, F2, K2, M(22) ); in sha1_process_block() 351 R( c, d, e, a, b, F2, K2, M(23) ); in sha1_process_block() 352 R( b, c, d, e, a, F2, K2, M(24) ); in sha1_process_block() 353 R( a, b, c, d, e, F2, K2, M(25) ); in sha1_process_block() 354 R( e, a, b, c, d, F2, K2, M(26) ); in sha1_process_block() 355 R( d, e, a, b, c, F2, K2, M(27) ); in sha1_process_block() 356 R( c, d, e, a, b, F2, K2, M(28) ); in sha1_process_block() [all …]
|
/dragonfly/contrib/gcc-8.0/libiberty/ |
H A D | sha1.c | 271 #define K2 0x6ed9eba1 macro 347 R( a, b, c, d, e, F2, K2, M(20) ); in sha1_process_block() 348 R( e, a, b, c, d, F2, K2, M(21) ); in sha1_process_block() 349 R( d, e, a, b, c, F2, K2, M(22) ); in sha1_process_block() 350 R( c, d, e, a, b, F2, K2, M(23) ); in sha1_process_block() 351 R( b, c, d, e, a, F2, K2, M(24) ); in sha1_process_block() 352 R( a, b, c, d, e, F2, K2, M(25) ); in sha1_process_block() 353 R( e, a, b, c, d, F2, K2, M(26) ); in sha1_process_block() 354 R( d, e, a, b, c, F2, K2, M(27) ); in sha1_process_block() 355 R( c, d, e, a, b, F2, K2, M(28) ); in sha1_process_block() [all …]
|
/dragonfly/contrib/gmp/mpn/generic/ |
H A D | mul_fft.c | 436 K2 = 1 << k; in mpn_fft_mul_modF_K() 438 maxLK = (K2 > GMP_NUMB_BITS) ? K2 : GMP_NUMB_BITS; in mpn_fft_mul_modF_K() 463 Ap = TMP_ALLOC_MP_PTRS (K2); in mpn_fft_mul_modF_K() 464 Bp = TMP_ALLOC_MP_PTRS (K2); in mpn_fft_mul_modF_K() 474 n, K2, nprime2, nprime2, 2.0*(double)n/nprime2/K2)); in mpn_fft_mul_modF_K() 551 int j, K2 = K >> 1; in mpn_fft_fftinv() local 554 mpn_fft_fftinv (Ap + K2, K2, 2 * omega, n, tp); in mpn_fft_fftinv() 557 for (j = 0; j < K2; j++, Ap++) in mpn_fft_fftinv() 845 unsigned long K2; in mpn_mul_fft() local 849 if ((nprime & (K2 - 1)) == 0) in mpn_mul_fft() [all …]
|
/dragonfly/sys/opencrypto/ |
H A D | rmd160.c | 62 #define K2 0x6ED9EBA1U macro 214 R(d, e, a, b, c, F2, K2, 11, 3); in RMD160Transform() 215 R(c, d, e, a, b, F2, K2, 13, 10); in RMD160Transform() 216 R(b, c, d, e, a, F2, K2, 6, 14); in RMD160Transform() 217 R(a, b, c, d, e, F2, K2, 7, 4); in RMD160Transform() 218 R(e, a, b, c, d, F2, K2, 14, 9); in RMD160Transform() 219 R(d, e, a, b, c, F2, K2, 9, 15); in RMD160Transform() 220 R(c, d, e, a, b, F2, K2, 13, 8); in RMD160Transform() 221 R(b, c, d, e, a, F2, K2, 15, 1); in RMD160Transform() 222 R(a, b, c, d, e, F2, K2, 14, 2); in RMD160Transform() [all …]
|
/dragonfly/initrd/etc/ |
H A D | termcap | 11 :k9=\E[U:k;=\E[V:F1=\E[W:F2=\E[X:K2=\E[E:nw=\E[E:ec=\E[%dX:\
|
/dragonfly/etc/ |
H A D | termcap.small | 42 :k9=\E[U:k;=\E[V:F1=\E[W:F2=\E[X:K2=\E[E:nw=\E[E:ec=\E[%dX:\ 187 :K2=\E[I:\
|
/dragonfly/contrib/gcc-8.0/gcc/config/i386/ |
H A D | sync.md | 778 "lock{%;} %K2<logic>{<imodesuffix>}\t{%1, %0|%0, %1}")
|
/dragonfly/share/termcap/ |
H A D | termcap.src | 2544 :K1=\EOq:K2=\EOr:K3=\EOs:K4=\EOp:K5=\EOn:pt:sr=2*\EM:xn:\ 2876 :@7=\EOF:@8=\EOM:F1=\E[23~:F2=\E[24~:K2=\EOE:Km=\E[M:\ 2907 :*6=\E[4~:@7=\E[4~:K2=\EOu:Km=\E[M:kH=\E[4~:kh=\E[1~:\ 2970 :K2=\217y:Km=\233M:LE=\233%dD:RI=\233%dC:UP=\233%dA:\ 3011 :F1=\E[192z:F2=\E[193z:K2=\E[218z:Km=\E[M:k1=\E[224z:\ 4334 :K2=\E[I:\ 4501 :is=K2 UCB IBMPC Kermit 1.2 8-30-84\n:tc=kermit: 4651 :AL=\E[%dL:DC=\E[%dP:DL=\E[%dM:K2=\E[G:\ 4676 :k9=\E[U:k;=\E[V:F1=\E[W:F2=\E[X:K2=\E[E:\ 4695 :K1=\EOw:K2=\EOu:K3=\EOy:K4=\EOq:K5=\EOs:LE=\E[%dD:\ [all …]
|
/dragonfly/sys/dev/netif/iwm/ |
H A D | if_iwmreg.h | 6568 uint8_t K2[16]; member
|
/dragonfly/contrib/ncurses/include/ |
H A D | Caps | 466 key_b2 kb2 str K2 KEY_B2 0536 YB-GE center of keypad
|
/dragonfly/share/misc/ |
H A D | pci_vendors | 7349 0040 K2 KeyLargo USB 7351 0042 K2 FireWire 7352 0043 K2 ATA/100 7353 0045 K2 HT-PCI Bridge 7354 0046 K2 HT-PCI Bridge 7355 0047 K2 HT-PCI Bridge 7356 0048 K2 HT-PCI Bridge 7357 0049 K2 HT-PCI Bridge 7360 004c K2 GMAC (Sun GEM) 12122 # GRID K2 USM [all …]
|
/dragonfly/contrib/ncurses/misc/ |
H A D | terminfo.src | 12586 is2=K2 UCB IBMPC Kermit 1.2 8-30-84\n, use=kermit,
|