/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/pidl/lib/Parse/Pidl/ |
H A D | Typelist.pm | 28 my %scalars = ( 90 # of known scalars or has no mapping 91 return $scalars{$name} if defined($scalars{$name}); 192 foreach (keys %scalars) {
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/pidl/lib/Parse/Pidl/ |
H A D | Typelist.pm | 28 my %scalars = ( 90 # of known scalars or has no mapping 91 return $scalars{$name} if defined($scalars{$name}); 192 foreach (keys %scalars) {
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/pidl/lib/Parse/Pidl/ |
H A D | Typelist.pm | 28 my %scalars = ( 90 # of known scalars or has no mapping 91 return $scalars{$name} if defined($scalars{$name}); 192 foreach (keys %scalars) {
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/test/ |
H A D | ectest.c | 133 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 208 /* test multiplication with group order, long and negative scalars */ 239 const BIGNUM *scalars[6]; local 293 scalars[0] = n1; 295 scalars[1] = n2; 297 scalars[2] = n1; 299 scalars[3] = n2; 301 scalars[4] = n1; 303 scalars[5] = n2; 305 if (!EC_POINTs_mul(group, P, NULL, 6, points, scalars, ct 881 const BIGNUM *scalars[4]; local 1395 const BIGNUM *scalars[3]; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/ec/ |
H A D | ectest.c | 133 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 208 /* test multiplication with group order, long and negative scalars */ 239 const BIGNUM *scalars[6]; local 293 scalars[0] = n1; 295 scalars[1] = n2; 297 scalars[2] = n1; 299 scalars[3] = n2; 301 scalars[4] = n1; 303 scalars[5] = n2; 305 if (!EC_POINTs_mul(group, P, NULL, 6, points, scalars, ct 881 const BIGNUM *scalars[4]; local 1395 const BIGNUM *scalars[3]; local [all...] |
H A D | ec_lcl.h | 176 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], 318 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], 457 const EC_POINT *points[], const BIGNUM *scalars[], 474 const EC_POINT *points[], const BIGNUM *scalars[], 479 const BIGNUM *scalars[], BN_CTX *ctx); 494 const EC_POINT *points[], const BIGNUM *scalars[], 499 const BIGNUM *scalars[], BN_CTX *ctx); 514 const EC_POINT *points[], const BIGNUM *scalars[], 519 const BIGNUM *scalars[], BN_CTX *ctx);
|
H A D | ec2_mult.c | 371 * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] 376 const EC_POINT *points[], const BIGNUM *scalars[], 399 ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); 424 (group, p, scalars[i], points[i], ctx)) 426 if (BN_is_negative(scalars[i])) 374 ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/test/ |
H A D | ectest.c | 133 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 208 /* test multiplication with group order, long and negative scalars */ 239 const BIGNUM *scalars[6]; local 293 scalars[0] = n1; 295 scalars[1] = n2; 297 scalars[2] = n1; 299 scalars[3] = n2; 301 scalars[4] = n1; 303 scalars[5] = n2; 305 if (!EC_POINTs_mul(group, P, NULL, 6, points, scalars, ct 881 const BIGNUM *scalars[4]; local 1395 const BIGNUM *scalars[3]; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/ec/ |
H A D | ectest.c | 133 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 208 /* test multiplication with group order, long and negative scalars */ 239 const BIGNUM *scalars[6]; local 293 scalars[0] = n1; 295 scalars[1] = n2; 297 scalars[2] = n1; 299 scalars[3] = n2; 301 scalars[4] = n1; 303 scalars[5] = n2; 305 if (!EC_POINTs_mul(group, P, NULL, 6, points, scalars, ct 881 const BIGNUM *scalars[4]; local 1395 const BIGNUM *scalars[3]; local [all...] |
H A D | ec_lcl.h | 176 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], 318 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], 457 const EC_POINT *points[], const BIGNUM *scalars[], 474 const EC_POINT *points[], const BIGNUM *scalars[], 479 const BIGNUM *scalars[], BN_CTX *ctx); 494 const EC_POINT *points[], const BIGNUM *scalars[], 499 const BIGNUM *scalars[], BN_CTX *ctx); 514 const EC_POINT *points[], const BIGNUM *scalars[], 519 const BIGNUM *scalars[], BN_CTX *ctx);
|
H A D | ec2_mult.c | 371 * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] 376 const EC_POINT *points[], const BIGNUM *scalars[], 399 ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); 424 (group, p, scalars[i], points[i], ctx)) 426 if (BN_is_negative(scalars[i])) 374 ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/test/ |
H A D | ectest.c | 133 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 208 /* test multiplication with group order, long and negative scalars */ 239 const BIGNUM *scalars[6]; local 293 scalars[0] = n1; 295 scalars[1] = n2; 297 scalars[2] = n1; 299 scalars[3] = n2; 301 scalars[4] = n1; 303 scalars[5] = n2; 305 if (!EC_POINTs_mul(group, P, NULL, 6, points, scalars, ct 881 const BIGNUM *scalars[4]; local 1395 const BIGNUM *scalars[3]; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/ec/ |
H A D | ectest.c | 133 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 208 /* test multiplication with group order, long and negative scalars */ 239 const BIGNUM *scalars[6]; local 293 scalars[0] = n1; 295 scalars[1] = n2; 297 scalars[2] = n1; 299 scalars[3] = n2; 301 scalars[4] = n1; 303 scalars[5] = n2; 305 if (!EC_POINTs_mul(group, P, NULL, 6, points, scalars, ct 881 const BIGNUM *scalars[4]; local 1395 const BIGNUM *scalars[3]; local [all...] |
H A D | ec_lcl.h | 176 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], 318 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], 457 const EC_POINT *points[], const BIGNUM *scalars[], 474 const EC_POINT *points[], const BIGNUM *scalars[], 479 const BIGNUM *scalars[], BN_CTX *ctx); 494 const EC_POINT *points[], const BIGNUM *scalars[], 499 const BIGNUM *scalars[], BN_CTX *ctx); 514 const EC_POINT *points[], const BIGNUM *scalars[], 519 const BIGNUM *scalars[], BN_CTX *ctx);
|
H A D | ec2_mult.c | 371 * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] 376 const EC_POINT *points[], const BIGNUM *scalars[], 399 ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); 424 (group, p, scalars[i], points[i], ctx)) 426 if (BN_is_negative(scalars[i])) 374 ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/test/ |
H A D | ectest.c | 132 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 653 const BIGNUM *scalars[4]; local 665 scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */ 666 scalars[1] = y; 672 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 673 if (!EC_POINTs_mul(group, R, z, 2, points, scalars, ctx)) ABORT; 683 scalars[0] = y; 684 scalars[1] = z; /* z = -(order + y) */ 686 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 695 scalars[ 1136 const BIGNUM *scalars[3]; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/ec/ |
H A D | ectest.c | 132 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 653 const BIGNUM *scalars[4]; local 665 scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */ 666 scalars[1] = y; 672 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 673 if (!EC_POINTs_mul(group, R, z, 2, points, scalars, ctx)) ABORT; 683 scalars[0] = y; 684 scalars[1] = z; /* z = -(order + y) */ 686 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 695 scalars[ 1136 const BIGNUM *scalars[3]; local [all...] |
H A D | ec2_mult.c | 317 * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] 321 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) 342 ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); 361 if (!ec_GF2m_montgomery_point_multiply(group, p, scalars[i], points[i], ctx)) goto err; 362 if (BN_is_negative(scalars[i])) 320 ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/test/ |
H A D | ectest.c | 132 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 653 const BIGNUM *scalars[4]; local 665 scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */ 666 scalars[1] = y; 672 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 673 if (!EC_POINTs_mul(group, R, z, 2, points, scalars, ctx)) ABORT; 683 scalars[0] = y; 684 scalars[1] = z; /* z = -(order + y) */ 686 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 695 scalars[ 1136 const BIGNUM *scalars[3]; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/ec/ |
H A D | ectest.c | 132 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 653 const BIGNUM *scalars[4]; local 665 scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */ 666 scalars[1] = y; 672 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 673 if (!EC_POINTs_mul(group, R, z, 2, points, scalars, ctx)) ABORT; 683 scalars[0] = y; 684 scalars[1] = z; /* z = -(order + y) */ 686 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 695 scalars[ 1136 const BIGNUM *scalars[3]; local [all...] |
H A D | ec2_mult.c | 317 * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] 321 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) 342 ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); 361 if (!ec_GF2m_montgomery_point_multiply(group, p, scalars[i], points[i], ctx)) goto err; 362 if (BN_is_negative(scalars[i])) 320 ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/test/ |
H A D | ectest.c | 132 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 653 const BIGNUM *scalars[4]; local 665 scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */ 666 scalars[1] = y; 672 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 673 if (!EC_POINTs_mul(group, R, z, 2, points, scalars, ctx)) ABORT; 683 scalars[0] = y; 684 scalars[1] = z; /* z = -(order + y) */ 686 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 695 scalars[ 1136 const BIGNUM *scalars[3]; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/ec/ |
H A D | ectest.c | 132 fprintf(stdout, "%d-bit scalars ", (int)BN_num_bits(s)); 653 const BIGNUM *scalars[4]; local 665 scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */ 666 scalars[1] = y; 672 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 673 if (!EC_POINTs_mul(group, R, z, 2, points, scalars, ctx)) ABORT; 683 scalars[0] = y; 684 scalars[1] = z; /* z = -(order + y) */ 686 if (!EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx)) ABORT; 695 scalars[ 1136 const BIGNUM *scalars[3]; local [all...] |
H A D | ec2_mult.c | 317 * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] 321 size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) 342 ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); 361 if (!ec_GF2m_montgomery_point_multiply(group, p, scalars[i], points[i], ctx)) goto err; 362 if (BN_is_negative(scalars[i])) 320 ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/libvorbis/doc/ |
H A D | 06-floor0.tex | 89 \item The number of scalars read into the vector \varname{[coefficients]} 95 scalars in \varname{[coefficients]} is to to read a total of twelve 96 scalars as four vectors of three scalars each. This is not an error 114 length \varname{[n]} vector with all-zero scalars. Otherwise, begin by
|