Created
November 17, 2010 00:58
-
-
Save shigeyas/702824 to your computer and use it in GitHub Desktop.
# fgrep double `find . -name '*.c'` in openssl-1.0.0a
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
./apps/apps.c:double app_tminterval(int stop,int usertime) | |
./apps/apps.c: double ret=0; | |
./apps/apps.c:double app_tminterval(int stop,int usertime) | |
./apps/apps.c: double ret=0; | |
./apps/apps.c: else ret = (clock()-tmstart)/(double)CLOCKS_PER_SEC; | |
./apps/apps.c:double app_tminterval(int stop,int usertime) | |
./apps/apps.c: double ret=0; | |
./apps/apps.c: else ret = (now - tmstart)/(double)sysClkRateGet(); | |
./apps/apps.c:double app_tminterval(int stop,int usertime) | |
./apps/apps.c: double ret = 0; | |
./apps/apps.c: else ret = (now - tmstart)/(double)(CLK_TCK); | |
./apps/apps.c:double app_tminterval(int stop,int usertime) | |
./apps/apps.c: double ret = 0; | |
./apps/apps.c: ret = (now - tmstart)/(double)tck; | |
./apps/apps.c:double app_tminterval(int stop,int usertime) | |
./apps/apps.c: double ret = 0; | |
./apps/s_server.c: num = num + num; /* double the size */ | |
./apps/s_time.c:static double tm_Time_F(int s) | |
./apps/s_time.c: double totalTime = 0.0; | |
./apps/s_time.c: printf( "\n\n%d connections in %.2fs; %.2f connections/user sec, bytes read %ld\n", nConn, totalTime, ((double)nConn/totalTime),bytes_read); | |
./apps/s_time.c: printf( "\n\n%d connections in %.2fs; %.2f connections/user sec, bytes read %ld\n", nConn, totalTime, ((double)nConn/totalTime),bytes_read); | |
./apps/speed.c:static double Time_F(int s); | |
./apps/speed.c:static void print_result(int alg,int run_no,int count,double time_used); | |
./apps/speed.c:static double results[ALGOR_NUM][SIZE_NUM]; | |
./apps/speed.c:static double rsa_results[RSA_NUM][2]; | |
./apps/speed.c:static double dsa_results[DSA_NUM][2]; | |
./apps/speed.c:static double ecdsa_results[EC_NUM][2]; | |
./apps/speed.c:static double ecdh_results[EC_NUM][1]; | |
./apps/speed.c:static double Time_F(int s) | |
./apps/speed.c:static double Time_F(int s) | |
./apps/speed.c: double d=0.0; | |
./apps/speed.c: rsa_results[j][0]=d/(double)count; | |
./apps/speed.c: rsa_results[j][1]=d/(double)count; | |
./apps/speed.c: dsa_results[j][0]=d/(double)count; | |
./apps/speed.c: dsa_results[j][1]=d/(double)count; | |
./apps/speed.c: ecdsa_results[j][0]=d/(double)count; | |
./apps/speed.c: ecdsa_results[j][1]=d/(double)count; | |
./apps/speed.c: ecdh_results[j][0]=d/(double)count; | |
./apps/speed.c:static void print_result(int alg,int run_no,int count,double time_used) | |
./apps/speed.c: results[alg][run_no]=((double)count)/time_used*lengths[run_no]; | |
./apps/speed.c: double d; | |
./apps/speed.c: double d; | |
./apps/speed.c: double d; | |
./apps/speed.c: double d; | |
./apps/speed.c: double d; | |
./crypto/bf/bf_opts.c:# define HZ ((double)_BSD_CLK_TCK_) | |
./crypto/bf/bf_opts.c:# define HZ ((double)CLK_TCK) | |
./crypto/bf/bf_opts.c:double Time_F(int s); | |
./crypto/bf/bf_opts.c:double Time_F(int s) | |
./crypto/bf/bf_opts.c: double ret; | |
./crypto/bf/bf_opts.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/bf/bf_opts.c: ret=((double)(tend.time-tstart.time))+((double)i)/1000.0; | |
./crypto/bf/bf_opts.c: tm[index]=((double)COUNT(cb))/tm[index]; | |
./crypto/bf/bf_opts.c: double d,tm[16],max=0; | |
./crypto/bf/bfspeed.c:#define HZ ((double)CLK_TCK) | |
./crypto/bf/bfspeed.c:double Time_F(int s); | |
./crypto/bf/bfspeed.c:double Time_F(int s) | |
./crypto/bf/bfspeed.c: double ret; | |
./crypto/bf/bfspeed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/bf/bfspeed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/bf/bfspeed.c: double a,b,c,d; | |
./crypto/bf/bfspeed.c: a=((double)COUNT(ca))/d; | |
./crypto/bf/bfspeed.c: b=((double)COUNT(cb)*8)/d; | |
./crypto/bf/bfspeed.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/bio/b_print.c:#define LDOUBLE long double | |
./crypto/bio/b_print.c:#define LDOUBLE double | |
./crypto/bio/b_print.c: fvalue = va_arg(args, double); | |
./crypto/bio/b_print.c: fvalue = va_arg(args, double); | |
./crypto/bio/b_print.c: fvalue = va_arg(args, double); | |
./crypto/bn/bn_exp.c: /* Initialize the intermediate result. Do this early to save double conversion, | |
./crypto/bn/bn_mont.c: /* Ri-- (mod double word size) */ | |
./crypto/bn/bnspeed.c:# define HZ ((double)_BSD_CLK_TCK_) | |
./crypto/bn/bnspeed.c:# define HZ ((double)CLK_TCK) | |
./crypto/bn/bnspeed.c:static double Time_F(int s); | |
./crypto/bn/bnspeed.c:static double Time_F(int s) | |
./crypto/bn/bnspeed.c: double ret; | |
./crypto/bn/bnspeed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/bn/bnspeed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1000.0; | |
./crypto/bn/bnspeed.c: double tm; | |
./crypto/bn/exp.c: double d,md; | |
./crypto/bn/expspeed.c:# define HZ ((double)_BSD_CLK_TCK_) | |
./crypto/bn/expspeed.c:# define HZ ((double)CLK_TCK) | |
./crypto/bn/expspeed.c:static double Time_F(int s); | |
./crypto/bn/expspeed.c:static double Time_F(int s) | |
./crypto/bn/expspeed.c: double ret; | |
./crypto/bn/expspeed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/bn/expspeed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1000.0; | |
./crypto/bn/expspeed.c: double tm; | |
./crypto/cast/cast_spd.c:#define HZ ((double)CLK_TCK) | |
./crypto/cast/cast_spd.c:double Time_F(int s); | |
./crypto/cast/cast_spd.c:double Time_F(int s) | |
./crypto/cast/cast_spd.c: double ret; | |
./crypto/cast/cast_spd.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/cast/cast_spd.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/cast/cast_spd.c: double a,b,c,d; | |
./crypto/cast/cast_spd.c: a=((double)COUNT(ca))/d; | |
./crypto/cast/cast_spd.c: b=((double)COUNT(cb)*8)/d; | |
./crypto/cast/cast_spd.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/cast/castopts.c:# define HZ ((double)_BSD_CLK_TCK_) | |
./crypto/cast/castopts.c:# define HZ ((double)CLK_TCK) | |
./crypto/cast/castopts.c:double Time_F(int s); | |
./crypto/cast/castopts.c:double Time_F(int s) | |
./crypto/cast/castopts.c: double ret; | |
./crypto/cast/castopts.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/cast/castopts.c: ret=((double)(tend.time-tstart.time))+((double)i)/1000.0; | |
./crypto/cast/castopts.c: tm[index]=((double)COUNT(cb))/tm[index]; | |
./crypto/cast/castopts.c: double d,tm[16],max=0; | |
./crypto/cryptlib.c:static double SSLeay_MSVC5_hack=0.0; /* and for VC1.5 */ | |
./crypto/cryptlib.c: SSLeay_MSVC5_hack=(double)name[0]*(double)name[1]; | |
./crypto/des/des_opts.c:# define HZ ((double)_BSD_CLK_TCK_) | |
./crypto/des/des_opts.c:# define HZ ((double)CLK_TCK) | |
./crypto/des/des_opts.c:double Time_F(int s); | |
./crypto/des/des_opts.c:double Time_F(int s) | |
./crypto/des/des_opts.c: double ret; | |
./crypto/des/des_opts.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/des/des_opts.c: ret=((double)(tend.time-tstart.time))+((double)i)/1000.0; | |
./crypto/des/des_opts.c: tm[index]=((double)COUNT(cb))/tm[index]; | |
./crypto/des/des_opts.c: double d,tm[16],max=0; | |
./crypto/des/speed.c:# define HZ ((double)_BSD_CLK_TCK_) | |
./crypto/des/speed.c:# define HZ ((double)CLK_TCK) | |
./crypto/des/speed.c:double Time_F(int s); | |
./crypto/des/speed.c:double Time_F(int s) | |
./crypto/des/speed.c: double ret; | |
./crypto/des/speed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/des/speed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/des/speed.c: double a,b,c,d,e; | |
./crypto/des/speed.c: a=((double)COUNT(ca))/d; | |
./crypto/des/speed.c: b=((double)COUNT(cb)*8)/d; | |
./crypto/des/speed.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/des/speed.c: d=((double)COUNT(cd)*BUFSIZE)/d; | |
./crypto/des/speed.c: e=((double)COUNT(ce))/e; | |
./crypto/ec/ec2_mult.c: * Uses algorithm Mdouble in appendix of | |
./crypto/ec/ec2_mult.c:static int gf2m_Mdouble(const EC_GROUP *group, BIGNUM *x, BIGNUM *z, BN_CTX *ctx) | |
./crypto/ec/ec2_mult.c: /* Since Mdouble is static we can guarantee that ctx != NULL. */ | |
./crypto/ec/ec2_mult.c: if (!gf2m_Mdouble(group, x2, z2, ctx)) goto err; | |
./crypto/ec/ec2_mult.c: if (!gf2m_Mdouble(group, x1, z1, ctx)) goto err; | |
./crypto/ec/ectest.c: "base point multiplications", (double)clck/CLOCKS_PER_SEC); | |
./crypto/ec/ectest.c: "random point multiplications", (double)clck/CLOCKS_PER_SEC); | |
./crypto/ec/ectest.c: "s*P+t*Q operations", (double)clck/CLOCKS_PER_SEC); | |
./crypto/ec/ectest.c: fprintf(stdout, "average: %.4f " UNIT "\n", (double)clck/(CLOCKS_PER_SEC*i*j)); | |
./crypto/idea/idea_spd.c:#define HZ ((double)CLK_TCK) | |
./crypto/idea/idea_spd.c:double Time_F(int s); | |
./crypto/idea/idea_spd.c:double Time_F(int s) | |
./crypto/idea/idea_spd.c: double ret; | |
./crypto/idea/idea_spd.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/idea/idea_spd.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/idea/idea_spd.c: double a,aa,b,c,d; | |
./crypto/idea/idea_spd.c: a=((double)COUNT(ca))/d; | |
./crypto/idea/idea_spd.c: aa=((double)COUNT(cca))/d; | |
./crypto/idea/idea_spd.c: b=((double)COUNT(cb)*8)/d; | |
./crypto/idea/idea_spd.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/ocsp/ocsp_lib.c: /* Check for double slash */ | |
./crypto/ocsp/ocsp_srv.c: /* Right now, I think that not doing double hashing is the right | |
./crypto/pkcs12/p12_utl.c: /* Make result double null terminated */ | |
./crypto/rand/md_rand.c:static double entropy=0; | |
./crypto/rand/md_rand.c: * (to prevent double locking) */ | |
./crypto/rand/md_rand.c:static void ssleay_rand_add(const void *buf, int num, double add_entropy); | |
./crypto/rand/md_rand.c:static void ssleay_rand_add(const void *buf, int num, double add) | |
./crypto/rand/md_rand.c: ssleay_rand_add(buf, num, (double)num); | |
./crypto/rand/rand_lib.c:void RAND_add(const void *buf, int num, double entropy) | |
./crypto/rand/rand_unix.c: RAND_add(tmpbuf,sizeof tmpbuf,(double)n); | |
./crypto/rand/rand_win.c: double add_entropy=0; | |
./crypto/rand/randfile.c: RAND_add(buf,i,(double)i); | |
./crypto/rand/randfile.c: RAND_add(buf,n,(double)i); | |
./crypto/rand/randtest.c: /*double d; */ | |
./crypto/rc2/rc2speed.c:#define HZ ((double)CLK_TCK) | |
./crypto/rc2/rc2speed.c:double Time_F(int s); | |
./crypto/rc2/rc2speed.c:double Time_F(int s) | |
./crypto/rc2/rc2speed.c: double ret; | |
./crypto/rc2/rc2speed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/rc2/rc2speed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/rc2/rc2speed.c: double a,b,c,d; | |
./crypto/rc2/rc2speed.c: a=((double)COUNT(ca))/d; | |
./crypto/rc2/rc2speed.c: b=((double)COUNT(cb)*8)/d; | |
./crypto/rc2/rc2speed.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/rc4/rc4speed.c:#define HZ ((double)CLK_TCK) | |
./crypto/rc4/rc4speed.c:double Time_F(int s); | |
./crypto/rc4/rc4speed.c:double Time_F(int s) | |
./crypto/rc4/rc4speed.c: double ret; | |
./crypto/rc4/rc4speed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/rc4/rc4speed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/rc4/rc4speed.c: double a,b,c,d; | |
./crypto/rc4/rc4speed.c: a=((double)COUNT(ca))/d; | |
./crypto/rc4/rc4speed.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/rc5/rc5speed.c:#define HZ ((double)CLK_TCK) | |
./crypto/rc5/rc5speed.c:double Time_F(int s); | |
./crypto/rc5/rc5speed.c:double Time_F(int s) | |
./crypto/rc5/rc5speed.c: double ret; | |
./crypto/rc5/rc5speed.c: ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | |
./crypto/rc5/rc5speed.c: ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | |
./crypto/rc5/rc5speed.c: double a,b,c,d; | |
./crypto/rc5/rc5speed.c: a=((double)COUNT(ca))/d; | |
./crypto/rc5/rc5speed.c: b=((double)COUNT(cb)*8)/d; | |
./crypto/rc5/rc5speed.c: c=((double)COUNT(cc)*BUFSIZE)/d; | |
./crypto/threads/mttest.c: double ret; | |
./engines/e_sureware.c:static void surewarehk_rand_add(const void *buf, int num, double entropy); | |
./engines/e_sureware.c:static void surewarehk_rand_add(const void *buf, int num, double entropy) | |
./ssl/d1_lib.c:void dtls1_double_timeout(SSL *s) | |
./ssl/d1_lib.c: dtls1_double_timeout(s); | |
./ssl/ssl_sess.c: * be in trouble. So I'll increment it now, then double decrement | |
./ssl/ssltest.c: (double)s_time/CLOCKS_PER_SEC, | |
./ssl/ssltest.c: (double)c_time/CLOCKS_PER_SEC); | |
./ssl/ssltest.c: (double)s_time, | |
./ssl/ssltest.c: (double)c_time); | |
./test/ectest.c: "base point multiplications", (double)clck/CLOCKS_PER_SEC); | |
./test/ectest.c: "random point multiplications", (double)clck/CLOCKS_PER_SEC); | |
./test/ectest.c: "s*P+t*Q operations", (double)clck/CLOCKS_PER_SEC); | |
./test/ectest.c: fprintf(stdout, "average: %.4f " UNIT "\n", (double)clck/(CLOCKS_PER_SEC*i*j)); | |
./test/randtest.c: /*double d; */ | |
./test/ssltest.c: (double)s_time/CLOCKS_PER_SEC, | |
./test/ssltest.c: (double)c_time/CLOCKS_PER_SEC); | |
./test/ssltest.c: (double)s_time, | |
./test/ssltest.c: (double)c_time); |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment