/dports/lang/gcc6-aux/gcc-6-20180516/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 209 ka.privateKey, x, y, err = elliptic.GenerateKey(ka.curve, config.rand()) 225 if ka.version >= VersionTLS12 { 241 switch ka.sigType { 288 if !ka.curve.IsOnCurve(x, y) { 291 x, _ = ka.curve.ScalarMult(x, y, ka.privateKey) 317 ka.x, ka.y = elliptic.Unmarshal(ka.curve, skx.key[4:4+publicLen]) 318 if ka.x == nil { 321 if !ka.curve.IsOnCurve(ka.x, ka.y) { 353 switch ka.sigType { 385 if ka.curve == nil { [all …]
|
/dports/lang/gnat_util/gcc-6-20180516/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 209 ka.privateKey, x, y, err = elliptic.GenerateKey(ka.curve, config.rand()) 225 if ka.version >= VersionTLS12 { 241 switch ka.sigType { 288 if !ka.curve.IsOnCurve(x, y) { 291 x, _ = ka.curve.ScalarMult(x, y, ka.privateKey) 317 ka.x, ka.y = elliptic.Unmarshal(ka.curve, skx.key[4:4+publicLen]) 318 if ka.x == nil { 321 if !ka.curve.IsOnCurve(ka.x, ka.y) { 353 switch ka.sigType { 385 if ka.curve == nil { [all …]
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/scan/crypto/tls/ |
H A D | key_agreement.go | 209 ka.privateKey, x, y, err = elliptic.GenerateKey(ka.curve, config.rand()) 225 if ka.version >= VersionTLS12 { 241 switch ka.sigType { 288 if !ka.curve.IsOnCurve(x, y) { 291 x, _ = ka.curve.ScalarMult(x, y, ka.privateKey) 317 ka.x, ka.y = elliptic.Unmarshal(ka.curve, skx.key[4:4+publicLen]) 318 if ka.x == nil { 321 if !ka.curve.IsOnCurve(ka.x, ka.y) { 353 switch ka.sigType { 385 if ka.curve == nil { [all …]
|
/dports/devel/tinygo/tinygo-0.14.1/llvm-project/llgo/third_party/gofrontend/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 209 ka.privateKey, x, y, err = elliptic.GenerateKey(ka.curve, config.rand()) 225 if ka.version >= VersionTLS12 { 241 switch ka.sigType { 288 if !ka.curve.IsOnCurve(x, y) { 291 x, _ = ka.curve.ScalarMult(x, y, ka.privateKey) 317 ka.x, ka.y = elliptic.Unmarshal(ka.curve, skx.key[4:4+publicLen]) 318 if ka.x == nil { 321 if !ka.curve.IsOnCurve(ka.x, ka.y) { 353 switch ka.sigType { 385 if ka.curve == nil { [all …]
|
/dports/lang/gcc8/gcc-8.5.0/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 206 ka.curveid = c 212 if ka.curveid == 0 { 218 if ka.curveid == X25519 { 270 switch ka.sigType { 314 if ka.curveid == X25519 { 363 if ka.curveid == X25519 { 367 ka.publicKey = publicKey 374 if ka.x == nil { 401 switch ka.sigType { 433 if ka.curveid == 0 { [all …]
|
/dports/devel/riscv64-none-elf-gcc/gcc-8.4.0/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 206 ka.curveid = c 212 if ka.curveid == 0 { 218 if ka.curveid == X25519 { 270 switch ka.sigType { 314 if ka.curveid == X25519 { 363 if ka.curveid == X25519 { 367 ka.publicKey = publicKey 374 if ka.x == nil { 401 switch ka.sigType { 433 if ka.curveid == 0 { [all …]
|
/dports/devel/arm-none-eabi-gcc/gcc-8.4.0/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 206 ka.curveid = c 212 if ka.curveid == 0 { 218 if ka.curveid == X25519 { 270 switch ka.sigType { 314 if ka.curveid == X25519 { 363 if ka.curveid == X25519 { 367 ka.publicKey = publicKey 374 if ka.x == nil { 401 switch ka.sigType { 433 if ka.curveid == 0 { [all …]
|
/dports/devel/riscv32-unknown-elf-gcc/gcc-8.4.0/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 206 ka.curveid = c 212 if ka.curveid == 0 { 218 if ka.curveid == X25519 { 270 switch ka.sigType { 314 if ka.curveid == X25519 { 363 if ka.curveid == X25519 { 367 ka.publicKey = publicKey 374 if ka.x == nil { 401 switch ka.sigType { 433 if ka.curveid == 0 { [all …]
|
/dports/devel/aarch64-none-elf-gcc/gcc-8.4.0/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 206 ka.curveid = c 212 if ka.curveid == 0 { 218 if ka.curveid == X25519 { 270 switch ka.sigType { 314 if ka.curveid == X25519 { 363 if ka.curveid == X25519 { 367 ka.publicKey = publicKey 374 if ka.x == nil { 401 switch ka.sigType { 433 if ka.curveid == 0 { [all …]
|
/dports/devel/riscv64-gcc/gcc-8.3.0/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 206 ka.curveid = c 212 if ka.curveid == 0 { 218 if ka.curveid == X25519 { 270 switch ka.sigType { 314 if ka.curveid == X25519 { 363 if ka.curveid == X25519 { 367 ka.publicKey = publicKey 374 if ka.x == nil { 401 switch ka.sigType { 433 if ka.curveid == 0 { [all …]
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/tls-tris/ |
H A D | key_agreement.go | 165 ka.curveid = c 171 if ka.curveid == 0 { 177 if ka.curveid == X25519 { 184 ka.privateKey = scalar[:] 262 if ka.curveid == X25519 { 314 if ka.curveid == X25519 { 318 ka.publicKey = publicKey 325 if ka.x == nil { 361 if ka.curveid == 0 { 367 if ka.curveid == X25519 { [all …]
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/tls-tris/ |
H A D | key_agreement.go | 165 ka.curveid = c 171 if ka.curveid == 0 { 177 if ka.curveid == X25519 { 184 ka.privateKey = scalar[:] 262 if ka.curveid == X25519 { 314 if ka.curveid == X25519 { 318 ka.publicKey = publicKey 325 if ka.x == nil { 361 if ka.curveid == 0 { 367 if ka.curveid == X25519 { [all …]
|
/dports/devel/mingw32-gcc/gcc-4.8.1/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 119 ka.curve = elliptic.P256() 123 ka.curve = elliptic.P384() 139 ka.privateKey, x, y, err = elliptic.GenerateKey(ka.curve, config.rand()) 178 x, _ = ka.curve.ScalarMult(x, y, ka.privateKey) 199 ka.curve = elliptic.P256() 201 ka.curve = elliptic.P384() 203 ka.curve = elliptic.P521() 212 ka.x, ka.y = elliptic.Unmarshal(ka.curve, skx.key[4:4+publicLen]) 213 if ka.x == nil { 233 if ka.curve == nil { [all …]
|
/dports/lang/gcc48/gcc-4.8.5/libgo/go/crypto/tls/ |
H A D | key_agreement.go | 119 ka.curve = elliptic.P256() 123 ka.curve = elliptic.P384() 139 ka.privateKey, x, y, err = elliptic.GenerateKey(ka.curve, config.rand()) 178 x, _ = ka.curve.ScalarMult(x, y, ka.privateKey) 199 ka.curve = elliptic.P256() 201 ka.curve = elliptic.P384() 203 ka.curve = elliptic.P521() 212 ka.x, ka.y = elliptic.Unmarshal(ka.curve, skx.key[4:4+publicLen]) 213 if ka.x == nil { 233 if ka.curve == nil { [all …]
|
/dports/security/akmos/akmos-0.7.2/src/algo/ |
H A D | camellia.c | 83 ka[0] = d1; ka[1] = d2; \ 123 ka = ctx->ka; in camellia_setkey128() 133 ctx->kw[2] = Q2ROTL(ka[0], ka[1], 111); in camellia_setkey128() 134 ctx->kw[3] = Q2ROTL(ka[1], ka[0], 111); in camellia_setkey128() 136 ctx->ke[0] = Q1ROTL(ka[0], ka[1], 30); in camellia_setkey128() 137 ctx->ke[1] = Q1ROTL(ka[1], ka[0], 30); in camellia_setkey128() 147 ctx->k[ 4] = Q1ROTL(ka[0], ka[1], 15); in camellia_setkey128() 148 ctx->k[ 5] = Q1ROTL(ka[1], ka[0], 15); in camellia_setkey128() 151 ctx->k[ 8] = Q1ROTL(ka[0], ka[1], 45); in camellia_setkey128() 153 ctx->k[10] = Q1ROTL(ka[0], ka[1], 60); in camellia_setkey128() [all …]
|
/dports/math/scilab/scilab-6.1.1/scilab/modules/elementary_functions/tests/unit_tests/ |
H A D | intersect.tst | 12 [v, ka, kb] = intersect([],[]); 14 assert_checkequal(ka, []); 19 assert_checkequal(ka, []); 26 [v,ka,kb] = intersect(A,B); 28 assert_checkequal(A(ka), v); 36 [v,ka,kb] = intersect(A,B); 45 [v, ka, kb] = intersect(A,B); 47 assert_checkequal(A(ka), v); 57 assert_checkequal(A(ka), v); 101 [v, ka, kb]=intersect(A,B); [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/ |
H A D | key_amalgamation.rs | 52 let ka = ka.ref_raw(); in pgp_key_amalgamation_key() localVariable 54 ka.key().parts_as_unspecified().role_as_unspecified() in pgp_key_amalgamation_key() 73 let ka = ka.ref_raw(); in pgp_valid_key_amalgamation_key() localVariable 75 ka.key().parts_as_unspecified().role_as_unspecified() in pgp_valid_key_amalgamation_key() 84 ka.ref_raw() in pgp_valid_key_amalgamation_revocation_status() 94 ka.ref_raw() in pgp_valid_key_amalgamation_binding_signature() 106 ka: *const ValidKeyAmalgamation, in pgp_valid_key_amalgamation_set_expiration_time() 114 let ka = ka.ref_raw(); in pgp_valid_key_amalgamation_set_expiration_time() localVariable 120 match ka.set_expiration_time(signer.as_mut(), expiry) { in pgp_valid_key_amalgamation_set_expiration_time() 153 let ka = ka.move_from_raw(); in pgp_valid_key_amalgamation_with_policy() localVariable [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/ |
H A D | key_amalgamation.rs | 52 let ka = ka.ref_raw(); in pgp_key_amalgamation_key() localVariable 54 ka.key().parts_as_unspecified().role_as_unspecified() in pgp_key_amalgamation_key() 73 let ka = ka.ref_raw(); in pgp_valid_key_amalgamation_key() localVariable 75 ka.key().parts_as_unspecified().role_as_unspecified() in pgp_valid_key_amalgamation_key() 84 ka.ref_raw() in pgp_valid_key_amalgamation_revocation_status() 94 ka.ref_raw() in pgp_valid_key_amalgamation_binding_signature() 106 ka: *const ValidKeyAmalgamation, in pgp_valid_key_amalgamation_set_expiration_time() 114 let ka = ka.ref_raw(); in pgp_valid_key_amalgamation_set_expiration_time() localVariable 120 match ka.set_expiration_time(signer.as_mut(), expiry) { in pgp_valid_key_amalgamation_set_expiration_time() 153 let ka = ka.move_from_raw(); in pgp_valid_key_amalgamation_with_policy() localVariable [all …]
|
/dports/science/py-pyscf/pyscf-2.0.1/pyscf/pbc/cc/ |
H A D | kintermediates.py | 73 Fae[ka] += fvv[ka] 74 Fae[ka] += -0.5*einsum('me,ma->ae',fov[ka],t1[ka]) 76 Fae[ka] += einsum('mf,amef->ae',t1[km],eris_vovv[ka,km,ka]) 79 Fae[ka] += -0.5*einsum('mnaf,mnef->ae',tau_tilde[km,kn,ka], 149 km = ka 276 kn = ka 277 Wamef[ka, km, ke] = -eris.ovvv[km, ka, ke].transpose(1, 0, 2, 3) 334 tmp2[ka,kb,ke] += einsum('ma,mbei->abei',t1[ka],eris_ovvo[ka,kb,ke]) 336 tmp2[ka,kb,ke] -= einsum('ma,nibf,mnef->abei',t1[ka],t2[kn,ki,kb],eris.oovv[ka,kn,ke]) 391 t3[ki,kj,kk,ka,kb] = get_wijkabc(ki,kj,kk,ka,kb,kc) [all …]
|
/dports/devel/etcd32/etcd-3.2.32/clientv3/ |
H A D | lease.go | 240 ka = &keepAlive{ 250 ka.ctxs = append(ka.ctxs, ctx) 251 ka.chs = append(ka.chs, ch) 308 ka.ctxs = append(ka.ctxs[:i], ka.ctxs[i+1:]...) 309 ka.chs = append(ka.chs[:i], ka.chs[i+1:]...) 351 newChs[newIdx], newCtxs[newIdx] = ka.chs[i], ka.ctxs[newIdx] 354 ka.chs, ka.ctxs = newChs, newCtxs 391 ka.close() 471 ka.close() 502 ka.close() [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/concourse/dex/vendor/github.com/coreos/etcd/clientv3/ |
H A D | lease.go | 238 ka = &keepAlive{ 248 ka.ctxs = append(ka.ctxs, ctx) 249 ka.chs = append(ka.chs, ch) 306 ka.ctxs = append(ka.ctxs[:i], ka.ctxs[i+1:]...) 307 ka.chs = append(ka.chs[:i], ka.chs[i+1:]...) 349 newChs[newIdx], newCtxs[newIdx] = ka.chs[i], ka.ctxs[newIdx] 352 ka.chs, ka.ctxs = newChs, newCtxs 389 ka.Close() 470 ka.Close() 500 ka.Close() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/storage/mroonga/mysql-test/mroonga/storage/r/ |
H A D | fulltext_not_match_against.result | 14 2 10 ka ki ku ke ko 16 4 10 ka ki ku ke ko 18 6 20 ka ki ku ke ko 20 8 20 ka ki ku ke ko 29 2 10 ka ki ku ke ko 30 4 10 ka ki ku ke ko 31 6 20 ka ki ku ke ko 32 8 20 ka ki ku ke ko 38 2 10 ka ki ku ke ko 40 4 10 ka ki ku ke ko [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/storage/mroonga/mysql-test/mroonga/wrapper/r/ |
H A D | fulltext_not_match_against.result | 14 2 10 ka ki ku ke ko 16 4 10 ka ki ku ke ko 18 6 20 ka ki ku ke ko 20 8 20 ka ki ku ke ko 29 2 10 ka ki ku ke ko 30 4 10 ka ki ku ke ko 31 6 20 ka ki ku ke ko 32 8 20 ka ki ku ke ko 38 2 10 ka ki ku ke ko 40 4 10 ka ki ku ke ko [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/storage/mroonga/mysql-test/mroonga/storage/r/ |
H A D | fulltext_not_match_against.result | 14 2 10 ka ki ku ke ko 16 4 10 ka ki ku ke ko 18 6 20 ka ki ku ke ko 20 8 20 ka ki ku ke ko 29 2 10 ka ki ku ke ko 30 4 10 ka ki ku ke ko 31 6 20 ka ki ku ke ko 32 8 20 ka ki ku ke ko 38 2 10 ka ki ku ke ko 40 4 10 ka ki ku ke ko [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/storage/mroonga/mysql-test/mroonga/wrapper/r/ |
H A D | fulltext_not_match_against.result | 14 2 10 ka ki ku ke ko 16 4 10 ka ki ku ke ko 18 6 20 ka ki ku ke ko 20 8 20 ka ki ku ke ko 29 2 10 ka ki ku ke ko 30 4 10 ka ki ku ke ko 31 6 20 ka ki ku ke ko 32 8 20 ka ki ku ke ko 38 2 10 ka ki ku ke ko 40 4 10 ka ki ku ke ko [all …]
|