/dports/science/tinker/tinker/source/ |
H A D | echgdpl2.f | 649 & - sk1*dtaperx*dedxk1 + sk1*sk1*d2taperxx 651 & - sk1*dtapery*dedxk1 + sk1*sk1*d2taperxy 653 & - sk1*dtaperz*dedxk1 + sk1*sk1*d2taperxz 667 & - sk1*dtaperx*dedyk1 + sk1*sk1*d2taperxy 669 & - sk1*dtapery*dedyk1 + sk1*sk1*d2taperyy 671 & - sk1*dtaperz*dedyk1 + sk1*sk1*d2taperyz 685 & - sk1*dtaperx*dedzk1 + sk1*sk1*d2taperxz 687 & - sk1*dtapery*dedzk1 + sk1*sk1*d2taperyz 689 & - sk1*dtaperz*dedzk1 + sk1*sk1*d2taperzz 1355 & - sk1*dtaperx*dedxk1 + sk1*sk1*d2taperxx [all …]
|
H A D | edipole2.f | 37 real*8 si1,si2,sk1,sk2 local 133 sk1 = 1.0d0 - sdpl(kdipole) 245 dedxk1 = -sk1*termx - termxk 246 dedyk1 = -sk1*termy - termyk 247 dedzk1 = -sk1*termz - termzk 589 hessx(1,k1) = hessx(1,k1) - sk1*dtaperx*dedxi1 591 hessx(2,k1) = hessx(2,k1) - sk1*dtapery*dedxi1 764 sk1 = 1.0d0 - sdpl(kdipole) 883 dedxk1 = -sk1*termx - termxk 884 dedyk1 = -sk1*termy - termyk [all …]
|
/dports/security/hashcat/hashcat-6.2.5/OpenCL/ |
H A D | inc_luks_twofish.h | 9 DECLSPEC void twofish128_decrypt_cbc (const u32 *sk1, const u32 *lk1, const u32 *in, u32 *out, u32 … 10 DECLSPEC void twofish256_decrypt_cbc (const u32 *sk1, const u32 *lk1, const u32 *in, u32 *out, u32 … 29 …sector_twofish_cbc_plain128 (GLOBAL_AS const u32 *in, u32 *out, const u32 *sk1, const u32 *lk1, co… 30 …twofish_cbc_plain128_mk_sha1 (GLOBAL_AS const u32 *in, u32 *mk, const u32 *sk1, const u32 *lk1, co… 32 …ofish_cbc_plain128_mk_sha256 (GLOBAL_AS const u32 *in, u32 *mk, const u32 *sk1, const u32 *lk1, co… 34 …ofish_cbc_plain128_mk_sha512 (GLOBAL_AS const u32 *in, u32 *mk, const u32 *sk1, const u32 *lk1, co… 38 …sector_twofish_cbc_plain256 (GLOBAL_AS const u32 *in, u32 *out, const u32 *sk1, const u32 *lk1, co… 39 …twofish_cbc_plain256_mk_sha1 (GLOBAL_AS const u32 *in, u32 *mk, const u32 *sk1, const u32 *lk1, co… 41 …ofish_cbc_plain256_mk_sha256 (GLOBAL_AS const u32 *in, u32 *mk, const u32 *sk1, const u32 *lk1, co… 48 DECLSPEC void twofish128_decrypt_xts (const u32 *sk1, const u32 *lk1, const u32 *in, u32 *out, u32 … [all …]
|
H A D | inc_luks_twofish.cl | 2585 u32 sk1[4]; u32 lk1[40]; 2618 u32 sk1[4]; u32 lk1[40]; 2646 u32 sk1[4]; u32 lk1[40]; 2673 u32 sk1[4]; u32 lk1[40]; 2706 u32 sk1[4]; u32 lk1[40]; 2746 u32 sk1[4]; u32 lk1[40]; 2781 u32 sk1[4]; u32 lk1[40]; 2806 u32 sk1[4]; u32 lk1[40]; 2826 u32 sk1[4]; u32 lk1[40]; 2845 u32 sk1[4]; u32 lk1[40]; [all …]
|
H A D | m14523_a1-pure.cl | 114 u32 sk1[4] = { 0 }; 119 twofish128_set_key (sk1, lk1, ukey); 121 twofish128_encrypt (sk1, lk1, iv, CT); 125 twofish192_set_key (sk1, lk1, ukey); 127 twofish192_encrypt (sk1, lk1, iv, CT); 131 twofish256_set_key (sk1, lk1, ukey); 133 twofish256_encrypt (sk1, lk1, iv, CT); 246 u32 sk1[4] = { 0 }; 251 twofish128_set_key (sk1, lk1, ukey); 257 twofish192_set_key (sk1, lk1, ukey); [all …]
|
H A D | m14533_a0-pure.cl | 118 u32 sk1[4] = { 0 }; 123 twofish128_set_key (sk1, lk1, ukey); 125 twofish128_encrypt (sk1, lk1, iv, CT); 129 twofish192_set_key (sk1, lk1, ukey); 131 twofish192_encrypt (sk1, lk1, iv, CT); 135 twofish256_set_key (sk1, lk1, ukey); 137 twofish256_encrypt (sk1, lk1, iv, CT); 256 u32 sk1[4] = { 0 }; 261 twofish128_set_key (sk1, lk1, ukey); 267 twofish192_set_key (sk1, lk1, ukey); [all …]
|
H A D | m14533_a1-pure.cl | 114 u32 sk1[4] = { 0 }; 119 twofish128_set_key (sk1, lk1, ukey); 121 twofish128_encrypt (sk1, lk1, iv, CT); 125 twofish192_set_key (sk1, lk1, ukey); 127 twofish192_encrypt (sk1, lk1, iv, CT); 131 twofish256_set_key (sk1, lk1, ukey); 133 twofish256_encrypt (sk1, lk1, iv, CT); 246 u32 sk1[4] = { 0 }; 251 twofish128_set_key (sk1, lk1, ukey); 257 twofish192_set_key (sk1, lk1, ukey); [all …]
|
H A D | m14523_a0-pure.cl | 118 u32 sk1[4] = { 0 }; 123 twofish128_set_key (sk1, lk1, ukey); 125 twofish128_encrypt (sk1, lk1, iv, CT); 129 twofish192_set_key (sk1, lk1, ukey); 131 twofish192_encrypt (sk1, lk1, iv, CT); 135 twofish256_set_key (sk1, lk1, ukey); 137 twofish256_encrypt (sk1, lk1, iv, CT); 256 u32 sk1[4] = { 0 }; 261 twofish128_set_key (sk1, lk1, ukey); 267 twofish192_set_key (sk1, lk1, ukey); [all …]
|
H A D | m14523_a3-pure.cl | 127 u32 sk1[4] = { 0 }; 132 twofish128_set_key (sk1, lk1, ukey); 134 twofish128_encrypt (sk1, lk1, iv, CT); 138 twofish192_set_key (sk1, lk1, ukey); 140 twofish192_encrypt (sk1, lk1, iv, CT); 144 twofish256_set_key (sk1, lk1, ukey); 146 twofish256_encrypt (sk1, lk1, iv, CT); 272 u32 sk1[4] = { 0 }; 277 twofish128_set_key (sk1, lk1, ukey); 283 twofish192_set_key (sk1, lk1, ukey); [all …]
|
H A D | m14543_a0-pure.cl | 137 u32 sk1[4] = { 0 }; 142 twofish128_set_key (sk1, lk1, ukey); 144 twofish128_encrypt (sk1, lk1, iv, CT); 148 twofish192_set_key (sk1, lk1, ukey); 150 twofish192_encrypt (sk1, lk1, iv, CT); 154 twofish256_set_key (sk1, lk1, ukey); 156 twofish256_encrypt (sk1, lk1, iv, CT); 294 u32 sk1[4] = { 0 }; 299 twofish128_set_key (sk1, lk1, ukey); 305 twofish192_set_key (sk1, lk1, ukey); [all …]
|
H A D | m14543_a3-pure.cl | 140 u32 sk1[4] = { 0 }; 145 twofish128_set_key (sk1, lk1, ukey); 147 twofish128_encrypt (sk1, lk1, iv, CT); 151 twofish192_set_key (sk1, lk1, ukey); 153 twofish192_encrypt (sk1, lk1, iv, CT); 157 twofish256_set_key (sk1, lk1, ukey); 159 twofish256_encrypt (sk1, lk1, iv, CT); 298 u32 sk1[4] = { 0 }; 303 twofish128_set_key (sk1, lk1, ukey); 309 twofish192_set_key (sk1, lk1, ukey); [all …]
|
/dports/security/R-cran-openssl/openssl/tests/testthat/ |
H A D | test_keys_rsa.R | 4 sk1 <- read_key("../keys/id_rsa") globalVar 11 expect_equal(sk1, sk2) 12 expect_equal(sk1, sk3) 13 expect_equal(sk1, sk4) 22 pk6 <- as.list(sk1)$pubkey 31 expect_equal(sk1, read_key(write_pkcs1(sk1))) 67 expect_equal(sk1, read_key(write_pem(sk1, password = NULL))) 69 expect_equal(sk1, read_key(write_pem(sk1, tempfile(), password = NULL))) 74 expect_equal(sk1, read_key(write_der(sk1), der = TRUE)) 76 expect_equal(sk1, read_key(write_der(sk1, tempfile()), der = TRUE)) [all …]
|
H A D | test_keys_ecdsa521.R | 13 expect_equal(sk1, sk2) 14 expect_equal(sk1, sk3) 15 expect_equal(sk1, sk4) 23 pk5 <- as.list(sk1)$pubkey 31 expect_equal(sk1, read_key(write_pkcs1(sk1))) 32 expect_equal(sk1, read_key(write_pkcs1(sk1, password = 'test'), password = 'test')) 67 expect_equal(sk1, read_key(write_pem(sk1, password = NULL))) 69 expect_equal(sk1, read_key(write_pem(sk1, tempfile(), password = NULL))) 74 expect_equal(sk1, read_key(write_der(sk1), der = TRUE)) 76 expect_equal(sk1, read_key(write_der(sk1, tempfile()), der = TRUE)) [all …]
|
H A D | test_keys_ecdsa384.R | 13 expect_equal(sk1, sk2) 14 expect_equal(sk1, sk3) 15 expect_equal(sk1, sk4) 23 pk5 <- as.list(sk1)$pubkey 31 expect_equal(sk1, read_key(write_pkcs1(sk1))) 32 expect_equal(sk1, read_key(write_pkcs1(sk1, password = 'test'), password = 'test')) 67 expect_equal(sk1, read_key(write_pem(sk1, password = NULL))) 69 expect_equal(sk1, read_key(write_pem(sk1, tempfile(), password = NULL))) 74 expect_equal(sk1, read_key(write_der(sk1), der = TRUE)) 76 expect_equal(sk1, read_key(write_der(sk1, tempfile()), der = TRUE)) [all …]
|
H A D | test_keys_dsa.R | 4 sk1 <- read_key("../keys/id_dsa") globalVar 12 expect_equal(sk1, sk2) 13 expect_equal(sk1, sk3) 14 expect_equal(sk1, sk4) 22 pk5 <- as.list(sk1)$pubkey 30 expect_equal(sk1, read_key(write_pkcs1(sk1))) 70 expect_equal(sk1, read_key(write_pem(sk1, password = NULL))) 72 expect_equal(sk1, read_key(write_pem(sk1, tempfile(), password = NULL))) 77 expect_equal(sk1, read_key(write_der(sk1), der = TRUE)) 79 expect_equal(sk1, read_key(write_der(sk1, tempfile()), der = TRUE)) [all …]
|
H A D | test_keys_ecdsa.R | 14 expect_equal(sk1, sk2) 15 expect_equal(sk1, sk3) 16 expect_equal(sk1, sk4) 24 pk5 <- as.list(sk1)$pubkey 32 expect_equal(sk1, read_key(write_pkcs1(sk1))) 33 expect_equal(sk1, read_key(write_pkcs1(sk1, password = 'test'), password = 'test')) 72 expect_equal(sk1, read_key(write_pem(sk1, password = NULL))) 74 expect_equal(sk1, read_key(write_pem(sk1, tempfile(), password = NULL))) 79 expect_equal(sk1, read_key(write_der(sk1), der = TRUE)) 81 expect_equal(sk1, read_key(write_der(sk1, tempfile()), der = TRUE)) [all …]
|
H A D | test_keys_ed25519.R | 6 sk1 <- read_key("../keys/id_ed25519") globalVar 13 expect_equal(sk1, sk2) 14 expect_equal(sk1, sk3) 15 expect_equal(sk1, sk4) 23 pk5 <- as.list(sk1)$pubkey 42 sig <- signature_create(msg, sha1, sk1) 56 expect_equal(sk1, read_key(write_pem(sk1, password = NULL))) 58 expect_equal(sk1, read_key(write_pem(sk1, tempfile(), password = NULL))) 63 expect_equal(sk1, read_key(write_der(sk1), der = TRUE)) 65 expect_equal(sk1, read_key(write_der(sk1, tempfile()), der = TRUE)) [all …]
|
/dports/security/palisade/palisade-release-d76213499af44558170cca6c72c5314755fec23c/src/binfhe/unittest/ |
H A D | UnitTestFHEWSerial.cpp | 48 auto sk1 = cc1.KeyGen(); 52 auto ct1 = cc1.Encrypt(sk1, 1, FRESH); 66 Serial::Serialize(sk1, s, SerType::JSON); 87 auto sk1 = cc1.KeyGen(); 91 auto ct1 = cc1.Encrypt(sk1, 1, FRESH); 105 Serial::Serialize(sk1, s, SerType::JSON); 126 auto sk1 = cc1.KeyGen(); 130 auto ct111 = cc1.Encrypt(sk1, 1, FRESH); 171 Serial::Serialize(sk1, s, SerType::BINARY); 192 auto sk1 = cc1.KeyGen(); [all …]
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/sodiumoxide-0.2.7/src/crypto/box_/ |
H A D | curve25519xsalsa20poly1305.rs | 340 let (pk1, sk1) = gen_keypair(); in test_seal_open() 354 let (pk1, sk1) = gen_keypair(); in test_seal_open_precomputed() 373 let (pk1, sk1) = gen_keypair(); in test_seal_open_tamper() 390 let (pk1, sk1) = gen_keypair(); in test_seal_open_precomputed_tamper() 446 let (pk1, sk1) = gen_keypair(); in test_seal_open_detached() 461 let (pk1, sk1) = gen_keypair(); in test_seal_combined_then_open_detached() 477 let (pk1, sk1) = gen_keypair(); in test_seal_detached_then_open_combined() 494 let (pk1, sk1) = gen_keypair(); in test_seal_open_detached_tamper() 515 let (pk1, sk1) = gen_keypair(); in test_open_detached_failure_does_not_modify() 614 let (pk1, sk1) = gen_keypair(); in test_open_detached_precomputed_failure_does_not_modify() [all …]
|
/dports/games/retroarch/RetroArch-1.9.7/deps/bearssl-0.6/src/symcipher/ |
H A D | des_ct.c | 83 uint32_t kl, kr, sk0, sk1; in keysched_unit() local 89 sk1 = 0; in keysched_unit() 92 sk1 <<= 1; in keysched_unit() 96 sk1 |= (kr >> QR1[j]) & (uint32_t)1; in keysched_unit() 100 skey[(i << 1) + 1] = sk1; in keysched_unit() 136 sk1 = kl & (uint32_t)0x02000000; in keysched_unit() 137 sk1 |= (kl & (uint32_t)0x00001000) << 5; in keysched_unit() 143 sk1 |= (kl & (uint32_t)0x00200000) >> 5; in keysched_unit() 145 sk1 |= (kr & (uint32_t)0x00000010) << 8; in keysched_unit() 148 sk1 |= (kr & (uint32_t)0x00000400) >> 9; in keysched_unit() [all …]
|
/dports/security/bearssl/bearssl-0.6/src/symcipher/ |
H A D | des_ct.c | 83 uint32_t kl, kr, sk0, sk1; in keysched_unit() local 89 sk1 = 0; in keysched_unit() 92 sk1 <<= 1; in keysched_unit() 96 sk1 |= (kr >> QR1[j]) & (uint32_t)1; in keysched_unit() 100 skey[(i << 1) + 1] = sk1; in keysched_unit() 136 sk1 = kl & (uint32_t)0x02000000; in keysched_unit() 137 sk1 |= (kl & (uint32_t)0x00001000) << 5; in keysched_unit() 143 sk1 |= (kl & (uint32_t)0x00200000) >> 5; in keysched_unit() 145 sk1 |= (kr & (uint32_t)0x00000010) << 8; in keysched_unit() 148 sk1 |= (kr & (uint32_t)0x00000400) >> 9; in keysched_unit() [all …]
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/langtools/test/tools/javac/defaultMethods/static/hiding/ |
H A D | InterfaceMethodHidingTest.java | 92 … static boolean overrides(MethodKind mk1, SignatureKind sk1, MethodKind mk2, SignatureKind sk2) { in overrides() argument 93 return sk1 == sk2 && in overrides() 129 for (SignatureKind sk1 : SignatureKind.values()) { in main() 137 … new InterfaceMethodHidingTest(mk1, mk2, mk3, sk1, sk2, sk3, be1, be2, be3).run(comp, fm); in main() 151 SignatureKind sk1, sk2, sk3; field in InterfaceMethodHidingTest 157 …SignatureKind sk1, SignatureKind sk2, SignatureKind sk3, BodyExpr be1, BodyExpr be2, BodyExpr be3)… in InterfaceMethodHidingTest() argument 161 this.sk1 = sk1; in InterfaceMethodHidingTest() 190 source = template.replaceAll("#M1", mk1.getBody(be1, sk1)) in JavaSource() 218 sk2.overrideEquivalentWith(sk1) && !MethodKind.overrides(mk2, sk2, mk1, sk1) || in check() 219 sk3.overrideEquivalentWith(sk1) && !MethodKind.overrides(mk3, sk3, mk1, sk1); in check()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/langtools/test/tools/javac/defaultMethods/static/hiding/ |
H A D | InterfaceMethodHidingTest.java | 92 … static boolean overrides(MethodKind mk1, SignatureKind sk1, MethodKind mk2, SignatureKind sk2) { in overrides() argument 93 return sk1 == sk2 && in overrides() 129 for (SignatureKind sk1 : SignatureKind.values()) { in main() 137 … new InterfaceMethodHidingTest(mk1, mk2, mk3, sk1, sk2, sk3, be1, be2, be3).run(comp, fm); in main() 151 SignatureKind sk1, sk2, sk3; field in InterfaceMethodHidingTest 157 …SignatureKind sk1, SignatureKind sk2, SignatureKind sk3, BodyExpr be1, BodyExpr be2, BodyExpr be3)… in InterfaceMethodHidingTest() argument 161 this.sk1 = sk1; in InterfaceMethodHidingTest() 190 source = template.replaceAll("#M1", mk1.getBody(be1, sk1)) in JavaSource() 218 sk2.overrideEquivalentWith(sk1) && !MethodKind.overrides(mk2, sk2, mk1, sk1) || in check() 219 sk3.overrideEquivalentWith(sk1) && !MethodKind.overrides(mk3, sk3, mk1, sk1); in check()
|
/dports/science/openmx/openmx3.8/source/ |
H A D | Poisson_ESM.c | 44 double sk1,sk2,sk3; in Poisson_ESM() local 152 if (k1<Ngrid1/2) sk1 = (double)k1; in Poisson_ESM() 155 Gz = sk1*rtv[1][1]; in Poisson_ESM() 290 if (k1<Ngrid1/2) sk1 = (double)k1; in Poisson_ESM() 338 if (k1<Ngrid1/2) sk1 = (double)k1; in Poisson_ESM() 341 zz = sk1*tv[1][1]/(double)Ngrid1; in Poisson_ESM() 402 Gz = sk1*rtv[1][1]; in Poisson_ESM() 501 Gz = sk1*rtv[1][1]; in Poisson_ESM() 614 Gz = sk1*rtv[1][1]; in Poisson_ESM() 702 Gz = sk1*rtv[1][1]; in Poisson_ESM() [all …]
|
/dports/net-p2p/libtorrent-rasterbar/libtorrent-rasterbar-1.2.14/test/ |
H A D | test_ed25519.cpp | 226 secret_key sk1; in TORRENT_TEST() local 227 std::tie(pk1, sk1) = ed25519_create_keypair(s1); in TORRENT_TEST() 244 sk1 = ed25519_add_scalar(sk1, n); in TORRENT_TEST() 248 signature sig = ed25519_sign(msg, pk1, sk1); in TORRENT_TEST() 259 secret_key sk1; in TORRENT_TEST() local 260 std::tie(pk1, sk1) = ed25519_create_keypair(s1); in TORRENT_TEST() 277 std::array<char, 32> secretA = ed25519_key_exchange(pk2, sk1); in TORRENT_TEST()
|