exp1
int p1 = exp1(vp, ignore);
p2 = exp1(vp, (ignore&IGNORE) || !p1);
int exp1(tchar ***, bool);
expected1(tok_kind exp1)
sizeof (expectbuf), "expected '%s'", toktostr(exp1));
expected2(tok_kind exp1, tok_kind exp2)
sizeof (expectbuf), "expected '%s' or '%s'", toktostr(exp1),
expected3(tok_kind exp1, tok_kind exp2, tok_kind exp3)
toktostr(exp1), toktostr(exp2), toktostr(exp3));
struct expr *exp1, struct expr *exp2, struct expr *exp3)
printf(" exp1 type: %s\n", type_name[GETTYPE(exp1->op)]);
if (exp1)
freeexpr(exp1);
newitem->nodes[0] = exp1;
struct expr *exp_op, *exp1, *exp2, *exp3;
exp1 = exp;
exp_op = stack_pop(stk, exp1, NULL);
*nexp = setop_reduce(UNARY, oop, stk, exp1, NULL, NULL);
exp1 = stack_pop(stk, exp_op, exp2);
if (!exp1)
tmp_flag = exp1->flag;
*nexp = setop_reduce(BINARY, oop, stk, exp1, exp2, NULL);
exp1 = stack_pop(stk, exp2, exp3);
if (!exp1)
tmp_flag = exp1->flag;
*nexp = setop_reduce(TRINARY, oop, stk, exp1, exp2, exp3);
rsa->exp1.val, rsa->exp1.len,
KMF_BIGINT exp1;
kmf_free_bigint(&key->exp1);
if (key->exp1.val != NULL &&
(dmp1 = BN_bin2bn(key->exp1.val, key->exp1.len, NULL)) == NULL)
if ((rv = sslBN2KMFBN((BIGNUM *)dmp1, &kmfkey->exp1)) != KMF_OK)
if ((ret = sslBN2KMFBN(Exp1, &rsa.exp1)) != KMF_OK)
rv = get_bigint_attr(sess, obj, CKA_EXPONENT_1, &rawrsa->exp1);
if (rawrsa->exp1.val)
free(rawrsa->exp1.val);
if (rawkey->rawdata.rsa.exp1.val != NULL) {
rawkey->rawdata.rsa.exp1.val,
rawkey->rawdata.rsa.exp1.len);
int exp0, exp1, exp2, exp3, exp4;
ty1 = LN2 * (double) exp1 + __TBL_logf[i1];
exp1 += (hx1 >> 20);
y0 += (double)(exp1 << 8);
int hx1 = 0, yisint1 = 0, exp1 = 0;
exp1 += (hx1 >> 20);
y1 += (double)(exp1 << 8);
int ind1, i1, exp1;
exp1 = ((ax1 & 0x7fffffff) >> 23) - 127;
yy1 = __TBL_log2f[ind1] + (double)(exp1 << 8);
char16_t exp0 = 0xd83d, exp1 = 0xdca9;
if (out1 != exp1) {
out1, exp1);
int exp1 = 0;
exp1 = exp1 * 10 + *(s++) - '0';
if (neg1) exp1 = -exp1;
e += exp1;
exp1(ls); /* initial value */
exp1(ls); /* limit */
exp1(ls); /* optional step */