/*! \brief Set up pointers for real working arrays. */ void zSetRWork(int m, int panel_size, doublecomplex *dworkptr, doublecomplex **dense, doublecomplex **tempv) { doublecomplex zero = {0.0, 0.0}; int maxsuper = SUPERLU_MAX( sp_ienv(3), sp_ienv(7) ), rowblk = sp_ienv(4); *dense = dworkptr; *tempv = *dense + panel_size*m; zfill (*dense, m * panel_size, zero); zfill (*tempv, NUM_TEMPV(m,panel_size,maxsuper,rowblk), zero); }
void os_reason_init() { int reasons_allocated = 0; /* * Initialize OS reason group and lock attributes */ os_reason_lock_grp_attr = lck_grp_attr_alloc_init(); os_reason_lock_grp = lck_grp_alloc_init("os_reason_lock", os_reason_lock_grp_attr); os_reason_lock_attr = lck_attr_alloc_init(); /* * Create OS reason zone. */ os_reason_zone = zinit(sizeof(struct os_reason), OS_REASON_MAX_COUNT * sizeof(struct os_reason), OS_REASON_MAX_COUNT, "os reasons"); if (os_reason_zone == NULL) { panic("failed to initialize os_reason_zone"); } /* * We pre-fill the OS reason zone to reduce the likelihood that * the jetsam thread and others block when they create an exit * reason. This pre-filled memory is not-collectable since it's * foreign memory crammed in as part of zfill(). */ reasons_allocated = zfill(os_reason_zone, OS_REASON_RESERVE_COUNT); assert(reasons_allocated > 0); }
} else{ std::stringstream s; s << static_cast <unsigned int> (pka); throw std::runtime_error("Error: PKA number " + s.str() + " not allowed or unknown."); } return {}; // should never reach here; mainly just to remove compiler warnings } std::vector <PGPMPI> pka_encrypt(const uint8_t pka, const std::string & data, const std::vector <PGPMPI> & pub){ return pka_encrypt(pka, rawtompi(data), pub); } Packet::Ptr encrypt_data(const std::string & session_key, const std::string & data, const std::string & filename, const uint8_t sym_alg, const uint8_t comp, const bool mdc, const PGPSecretKey::Ptr & signer, const std::string & sig_passphrase){ // generate prefix uint16_t BS = Symmetric_Algorithm_Block_Length.at(Symmetric_Algorithms.at(sym_alg)) >> 3; std::string prefix = unhexlify(zfill(bintohex(BBS().rand(BS << 3)), BS << 1, '0')); std::string to_encrypt; // put data in Literal Data Packet Tag11 tag11; tag11.set_format('t'); tag11.set_filename(filename); tag11.set_time(0); tag11.set_literal(data); to_encrypt = tag11.write(2); // // if message is to be signed // if (signer){ // // find preferred hash and compression algorithms of the signer