/dports/astro/wcslib/wcslib-7.7/doxygen/ |
H A D | tab.sed | 6 s|(K_1, K_2,... K_M)|@f$&@f$|g 7 s| K_1 \* K_2 \* ... \* K_M |@f$K_1 K_2 \\ldots K_M@f$|g
|
/dports/math/py-pymc3/pymc-3.11.4/docs/source/ |
H A D | Gaussian_Processes.rst | 199 0 & 0 & K_2 & K_2^* & K_2 & K_2^{*} \\ 200 0 & 0 & K_2^{*^T} & K_2^{**} & K_2^{*} & K_2^{**} \\ 201 K_1 & K_1^{*} & K_2 & K_2^{*} & K_1 + K_2 & K_1^{*} + K_2^{*} \\ 202 K_1^{*^T} & K_1^{**} & K_2^{*^T} & K_2^{**} & K_1^{*^T}+K_2^{*^T} & K_1^{**}+K_2^{**} 211 m_1^* + K_1^{*^T}(K_1 + K_2)^{-1}\left[f_1 + f_2 - m_1 - m_2\right] \,,\, 212 K_1^{**} - K_1^{*^T}(K_1 + K_2)^{-1}K_1^* \right) \,.
|
/dports/math/py-colormath/colormath-3.0.0/colormath/ |
H A D | color_diff.py | 49 def delta_e_cie1994(color1, color2, K_L=1, K_C=1, K_H=1, K_1=0.045, K_2=0.015): argument 66 color1_vector, color2_matrix, K_L=K_L, K_C=K_C, K_H=K_H, K_1=K_1, K_2=K_2)[0]
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 36 keys (K_1 and K_2), used by two separate instances of chacha20. 37 The first 256 bits consitute K_2 and the second 256 bits become 42 keyed by K_2, is used in conjunction with poly1305 to build an AEAD 56 using K_2, an IV consisting of the packet sequence number encoded as an 58 zero. The K_2 ChaCha20 block counter is then set to the little-endian 77 K_2, the packet sequence number as nonce and a starting block counter of 81 K_1. Encrypt the packet payload (using K_2) and append it to the
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | PROTOCOL.chacha20poly1305 | 36 keys (K_1 and K_2), used by two separate instances of chacha20. 37 The first 256 bits constitute K_2 and the second 256 bits become 42 keyed by K_2, is used in conjunction with poly1305 to build an AEAD 56 using K_2, an IV consisting of the packet sequence number encoded as an 58 zero. The K_2 ChaCha20 block counter is then set to the little-endian 77 K_2, the packet sequence number as nonce and a starting block counter of 81 K_1. Encrypt the packet payload (using K_2) and append it to the
|
/dports/science/ergo/ergo-3.8/source/test/ |
H A D | kmat_test.cc | 118 symmMatrix K_2; in main() local 119 K_2.resetSizesAndBlocks(matrix_size_block_info, in main() 172 if(compute_K_by_boxes_sparse(bis, integralInfo, CAM_params_not_used, J_K_params, K_2, D, in main() 181 K_diff += (ergo_real)(-1.0) * K_2; in main()
|
/dports/games/powermanga/powermanga-0.93.1/src/ |
H A D | special_keys.c | 65 if (keys_down[K_2] && !k2) in special_keys() 71 k2 = keys_down[K_2]; in special_keys() 184 if (keys_down[K_2] && !k2) in special_keys() 192 k2 = keys_down[K_2]; in special_keys()
|
/dports/devel/wasi-compiler-rt12/llvm-project-12.0.1.src/mlir/test/Dialect/Linalg/ |
H A D | fusion-pattern.mlir | 40 // CHECK: %[[K_2:.+]] = dim %[[ARG1]], %[[C0]] 43 // CHECK-SAME: %[[K_2]], %[[TILE_N]] 114 // CHECK: %[[K_2:.+]] = dim %[[ARG1]], %[[C0]] 116 // CHECK-SAME: [%[[K_2]], %[[TILE_N]]] 118 // CHECK-SAME: [%[[K_2]], %[[TILE_N]]] 123 // CHECK-DAG: %[[K_2:.+]] = dim %[[ARG0]], %[[C1]] 196 // CHECK: %[[K_2:.+]] = dim %[[ARG0]], %[[C1]] 198 // CHECK-SAME: [%[[TILE_M]], %[[K_2]]] 200 // CHECK-SAME: [%[[TILE_M]], %[[K_2]]] 212 // CHECK: %[[K_2:.+]] = dim %[[ARG2]], %[[C0]] [all …]
|
/dports/devel/llvm12/llvm-project-12.0.1.src/mlir/test/Dialect/Linalg/ |
H A D | fusion-pattern.mlir | 40 // CHECK: %[[K_2:.+]] = dim %[[ARG1]], %[[C0]] 43 // CHECK-SAME: %[[K_2]], %[[TILE_N]] 114 // CHECK: %[[K_2:.+]] = dim %[[ARG1]], %[[C0]] 116 // CHECK-SAME: [%[[K_2]], %[[TILE_N]]] 118 // CHECK-SAME: [%[[K_2]], %[[TILE_N]]] 123 // CHECK-DAG: %[[K_2:.+]] = dim %[[ARG0]], %[[C1]] 196 // CHECK: %[[K_2:.+]] = dim %[[ARG0]], %[[C1]] 198 // CHECK-SAME: [%[[TILE_M]], %[[K_2]]] 200 // CHECK-SAME: [%[[TILE_M]], %[[K_2]]] 212 // CHECK: %[[K_2:.+]] = dim %[[ARG2]], %[[C0]] [all …]
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | PROTOCOL.chacha20poly1305 | 36 keys (K_1 and K_2), used by two separate instances of chacha20. 40 keyed by K_2, is used in conjunction with poly1305 to build an AEAD 54 using K_2, an IV consisting of the packet sequence number encoded as an 56 zero. The K_2 ChaCha20 block counter is then set to the little-endian 75 K_2, the packet sequence number as nonce and a starting block counter of 79 K_1. Encrypt the packet payload (using K_2) and append it to the
|
/dports/cad/tochnog/Sources/Tochnog-Latest-jan-2014/ |
H A D | hyperela.cc | 141 double I1=0., I2=0., I3=0., J=0., J1=0., J2=0., K=0., K_1=0., K_2=0., in hyper_law() local 160 K_2 = hyper_data[1]; in hyper_law() 162 W += K_1*scalar_power((J1-3.),alpha) + K_2*(J2-3.); in hyper_law() 182 K_2 = hyper_data[1]; in hyper_law() 183 W += K_1*(J1-3.) + K_2*(J2-3.); in hyper_law()
|
/dports/games/libretro-freeintv/FreeIntv-5fc8d85/src/ |
H A D | controller.c | 24 #define K_2 0x41 macro 62 int keypadDirections[8]={ K_2, K_3, K_6, K_9, K_8, K_7, K_4, K_1 }; 65 int keypadStates[12]={ K_1, K_2, K_3, K_4, K_5, K_6, K_7, K_8, K_9, K_C, K_0, K_E };
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/llvm/mlir/test/Dialect/Linalg/ |
H A D | fusion-pattern.mlir | 40 // CHECK: %[[K_2:.+]] = dim %[[ARG1]], %[[C0]] 43 // CHECK-SAME: %[[K_2]], %[[TILE_N]] 56 // CHECK: %[[TILE_K_2:.+]] = affine.min #[[MAP3]](%[[IV2]])[%[[K_2]]] 118 // CHECK-DAG: %[[K_2:.+]] = dim %[[ARG0]], %[[C1]] 121 // CHECK-NEXT: scf.for %[[IV2:.+]] = %[[C0]] to %[[K_2]] step %[[C16]] { 123 // CHECK: %[[TILE_K:.+]] = affine.min #[[MAP3]](%[[IV2]])[%[[K_2]]] 202 // CHECK: %[[K_2:.+]] = dim %[[ARG2]], %[[C0]] 203 // CHECK: %[[TILE_K_2:.+]] = affine.min #[[MAP2]](%[[IV2]])[%[[K_2]]] 280 // CHECK: %[[K_2:.+]] = dim %[[ARG3]], %[[C0]] 281 // CHECK: %[[TILE_K_2:.+]] = affine.min #[[MAP2]](%[[IV2]])[%[[K_2]]]
|
/dports/net/libwebsockets/libwebsockets-v4.2.2/plugins/ssh-base/crypto/ |
H A D | chacha.c | 235 #define K_2(_keys) &((struct lws_cipher_chacha *)_keys->cipher)->ccctx[1] macro 252 chacha_keysetup(K_2(keys), keys->key[SSH_KEYIDX_ENC], 256); in lws_chacha_activate() 316 chacha_ivsetup(K_2(keys), seqbuf, NULL); in chachapoly_crypt() 317 chacha_encrypt_bytes(K_2(keys), in chachapoly_crypt() 338 chacha_ivsetup(K_2(keys), seqbuf, one); in chachapoly_crypt() 339 chacha_encrypt_bytes(K_2(keys), src + aadlen, dest + aadlen, len); in chachapoly_crypt()
|
/dports/science/lammps/lammps-stable_29Sep2021/doc/src/ |
H A D | angle_class2.rst | 39 E_a & = K_2 (\theta - \theta_0)^2 + K_3 (\theta - \theta_0)^3 + K_4(\theta - \theta_0)^4 \\ 59 * :math:`K_2` (energy) 105 …E_{a} = K_2\left(\theta - \theta_0\right)^2 + K_3\left(\theta - \theta_0\right)^3 + K_4\left(\thet… 110 * :math:`K_2` (energy)
|
H A D | bond_class2.rst | 32 E = K_2 (r - r_0)^2 + K_3 (r - r_0)^3 + K_4 (r - r_0)^4 44 * :math:`K_2` (energy/distance\^2)
|
H A D | angle_quartic.rst | 31 E = K_2 (\theta - \theta_0)^2 + K_3 (\theta - \theta_0)^3 + K_4 (\theta - \theta_0)^4 42 * :math:`K_2` (energy)
|
/dports/net-p2p/bitcoin-utils/bitcoin-22.0/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/net-p2p/bitcoin-daemon/bitcoin-22.0/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/net-p2p/bitcoin/bitcoin-22.0/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/net-p2p/namecoin-utils/namecoin-core-nc0.21.0.1/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/net-p2p/namecoin-daemon/namecoin-core-nc0.21.0.1/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/net-p2p/namecoin/namecoin-core-nc0.21.0.1/src/crypto/ |
H A D | chacha_poly_aead.cpp | 30 …a20Poly1305AEAD(const unsigned char* K_1, size_t K_1_len, const unsigned char* K_2, size_t K_2_len) in ChaCha20Poly1305AEAD() argument 35 m_chacha_header.SetKey(K_2, CHACHA20_POLY1305_AEAD_KEY_LEN); in ChaCha20Poly1305AEAD()
|
/dports/devel/wasi-compiler-rt13/llvm-project-13.0.1.src/mlir/test/Dialect/Linalg/ |
H A D | fusion-pattern.mlir | 42 // CHECK: %[[K_2:.+]] = memref.dim %[[ARG1]], %[[C0]] 45 // CHECK-SAME: %[[K_2]], %[[TILE_N]] 62 // CHECK: %[[TILE_K_2:.+]] = affine.min #[[MAP3]](%[[IV2]])[%[[K_2]]] 119 // CHECK: %[[K_2:.+]] = memref.dim %[[ARG1]], %[[C0]] 123 // CHECK-SAME: [%[[K_2]], %[[TILE_N_3]]] 131 // CHECK-DAG: %[[K_2:.+]] = memref.dim %[[ARG0]], %[[C1]] 134 // CHECK-NEXT: scf.for %[[IV2:.+]] = %[[C0]] to %[[K_2]] step %[[C16]] { 136 // CHECK: %[[TILE_K:.+]] = affine.min #[[MAP3]](%[[IV2]])[%[[K_2]]] 225 // CHECK: %[[K_2:.+]] = memref.dim %[[ARG2]], %[[C0]] 226 // CHECK: %[[TILE_K_2:.+]] = affine.min #[[MAP2]](%[[IV2]])[%[[K_2]]] [all …]
|