/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/libvorbis-1.2.3/lib/ |
H A D | lsp.h | 24 extern void vorbis_lsp_to_curve(float *curve,int *map,int n,int ln,
|
H A D | lsp.c | 44 /* three possible LSP to f curve functions; the exact computation 65 void vorbis_lsp_to_curve(float *curve,int *map,int n,int ln,float *lsp,int m, argument 109 curve[i++]*=q; 140 void vorbis_lsp_to_curve(float *curve,int *map,int n,int ln,float *lsp,int m, argument 236 curve[i]*=amp; 237 while(map[++i]==k)curve[i]*=amp; 248 void vorbis_lsp_to_curve(float *curve,int *map,int n,int ln,float *lsp,int m, argument 278 curve[i]*=q; 279 while(map[++i]==k)curve[i]*=q;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/contrib/src/plot/ |
H A D | plot.cpp | 233 wxPlotCurve *curve = (wxPlotCurve*)node->GetData(); local 236 double range = curve->GetEndY() - curve->GetStartY(); 237 double end = curve->GetEndY(); 238 wxCoord offset_y = curve->GetOffsetY(); 240 double dy = (end - curve->GetY( (wxInt32)(x/m_owner->GetZoom()) )) / range; 248 event1.SetCurve( curve ); 252 if (curve != m_owner->GetCurrentCurve()) 257 event2.SetCurve( curve ); 260 m_owner->SetCurrentCurve( curve ); 270 DeleteCurve( wxPlotCurve *curve, int from, int to ) argument 278 DrawCurve( wxDC *dc, wxPlotCurve *curve, int from, int to ) argument 323 DrawOnOffCurve( wxDC *dc, wxPlotOnOffCurve *curve, int from, int to ) argument 413 wxPlotCurve *curve = (wxPlotCurve*) node->GetData(); local 430 wxPlotOnOffCurve *curve = (wxPlotOnOffCurve*) node->GetData(); local 603 wxPlotCurve *curve = m_owner->GetCurrentCurve(); local 878 Move( wxPlotCurve* curve, int pixels_up ) argument 903 Enlarge( wxPlotCurve *curve, double factor ) argument 955 wxPlotCurve *curve = (wxPlotCurve*) node->GetData(); local 975 wxPlotCurve *curve = (wxPlotCurve*) node->GetData(); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/ssltest-ecc/ |
H A D | ssltest.sh | 72 for curve in $ELLIPTIC_CURVE_LIST 74 echo "Testing AECDH-NULL-SHA (with $curve)" 76 -named_curve $curve -cipher AECDH-NULL-SHA 79 for curve in $ELLIPTIC_CURVE_LIST 81 echo "Testing AECDH-RC4-SHA (with $curve)" 83 -named_curve $curve -cipher AECDH-RC4-SHA 127 for curve in $ELLIPTIC_CURVE_LIST 129 echo "Testing ECDHE-ECDSA-AES128-SHA (2-way auth with $curve)" 133 -cipher ECDHE-ECDSA-AES128-SHA -named_curve $curve
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/ssltest-ecc/ |
H A D | ssltest.sh | 72 for curve in $ELLIPTIC_CURVE_LIST 74 echo "Testing AECDH-NULL-SHA (with $curve)" 76 -named_curve $curve -cipher AECDH-NULL-SHA 79 for curve in $ELLIPTIC_CURVE_LIST 81 echo "Testing AECDH-RC4-SHA (with $curve)" 83 -named_curve $curve -cipher AECDH-RC4-SHA 127 for curve in $ELLIPTIC_CURVE_LIST 129 echo "Testing ECDHE-ECDSA-AES128-SHA (2-way auth with $curve)" 133 -cipher ECDHE-ECDSA-AES128-SHA -named_curve $curve
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/ssltest-ecc/ |
H A D | ssltest.sh | 72 for curve in $ELLIPTIC_CURVE_LIST 74 echo "Testing AECDH-NULL-SHA (with $curve)" 76 -named_curve $curve -cipher AECDH-NULL-SHA 79 for curve in $ELLIPTIC_CURVE_LIST 81 echo "Testing AECDH-RC4-SHA (with $curve)" 83 -named_curve $curve -cipher AECDH-RC4-SHA 127 for curve in $ELLIPTIC_CURVE_LIST 129 echo "Testing ECDHE-ECDSA-AES128-SHA (2-way auth with $curve)" 133 -cipher ECDHE-ECDSA-AES128-SHA -named_curve $curve
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavfilter/ |
H A D | af_afade.c | 34 int curve; member in struct:__anon3316 42 int64_t start, int range, int curve); 63 { "curve", "set fade curve type", OFFSET(curve), AV_OPT_TYPE_INT, {.i64 = TRI }, TRI, CBR, FLAGS, "curve" }, 64 { "c", "set fade curve type", OFFSET(curve), AV_OPT_TYPE_INT, {.i64 = TRI }, TRI, CBR, FLAGS, "curve" }, 65 { "tri", "linear slope", 0, AV_OPT_TYPE_CONST, {.i64 = TRI }, 0, 0, FLAGS, "curve" }, 120 fade_gain(int curve, int64_t index, int range) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ec/ |
H A D | ec_asn1.c | 175 X9_62_CURVE *curve; member in struct:ec_parameters_st 246 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 430 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument 439 if (!group || !curve || !curve->a || !curve->b) 516 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || 517 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) 526 if (!curve->seed) 527 if ((curve [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ec/ |
H A D | ec_asn1.c | 179 X9_62_CURVE *curve; member in struct:ec_parameters_st 250 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 431 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument 440 if (!group || !curve || !curve->a || !curve->b) 502 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || 503 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) { 510 if (!curve->seed) 511 if ((curve [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ec/ |
H A D | ec_asn1.c | 179 X9_62_CURVE *curve; member in struct:ec_parameters_st 250 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 431 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument 440 if (!group || !curve || !curve->a || !curve->b) 502 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || 503 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) { 510 if (!curve->seed) 511 if ((curve [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/contrib/include/wx/plot/ |
H A D | plot.h | 94 void SetCurve( wxPlotCurve *curve ) 95 { m_curve = curve; } 226 void DrawCurve( wxDC *dc, wxPlotCurve *curve, int from = -1, int to = -1 ); 227 void DrawOnOffCurve( wxDC *dc, wxPlotOnOffCurve *curve, int from = -1, int to = -1 ); 228 void DeleteCurve( wxPlotCurve *curve, int from = -1, int to = -1 ); 295 // curve accessors 298 void Add( wxPlotCurve *curve ); 299 void Delete( wxPlotCurve* curve ); 310 void Add( wxPlotOnOffCurve *curve ); 311 void Delete( wxPlotOnOffCurve* curve ); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/libvorbis-1.2.3/doc/ |
H A D | 07-floor1.tex | 9 encode a spectral envelope curve. The representation plots this curve 20 Floor type one represents a spectral curve as a series of 21 line segments. Synthesis constructs a floor curve using iterative 177 indicating this floor curve (and thus this channel) is unused this 226 An end-of-packet condition during curve decode should be considered a 237 \paragraph{curve computation} \label{vorbis:spec:floor1-synth} 241 values taken from the bitstream. The second step plots the curve 336 \item[step 2: curve synthesis] 340 calling to floor decode). Floor 1 curve synthesi [all...] |
H A D | 06-floor0.tex | 10 smooth spectral envelope curve as the frequency response of the LSP 50 Extracting a floor0 curve from an audio packet consists of first 51 decoding the curve amplitude and \varname{[floor0_order]} LSP 53 curve, which is defined as the frequency response of the decoded LSP 91 required for curve computation. For example, if the VQ codebook used 104 \subsubsection{curve computation} \label{vorbis:spec:floor0-synth} 145 The above is used to synthesize the LSP curve on a Bark-scale frequency 147 Similarly, the below calculation synthesizes the output LSP curve \varname{[output]} on a log
|
H A D | 01-introduction.tex | 210 Floor 1 represents the curve as a piecewise linear interpolated 232 once the floor curve has been subtracted out. In simplest terms, it 300 \item generate floor curve from decoded floor data 432 \paragraph{generate floor curve} 434 The decoder may choose to generate the floor curve at any appropriate 435 time. It is reasonable to generate the output curve when the floor 450 multiplies the floor curve and residue vectors element by element,
|
H A D | 09-helper.tex | 129 curve for contiguous piecewise line segments. Note that it has not
|
H A D | 04-codec.tex | 374 \subsubsection{floor curve decode} 429 remembered at floor curve synthesis time. 530 For each channel, synthesize the floor curve from the decoded floor 534 For each channel, multiply each element of the floor curve by each
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | ecc.c | 63 /* Definition of a curve. */ 71 const char *name; /* Name of curve or NULL. */ 89 /* This tables defines aliases for curve names. */ 125 const char *desc; /* Description of the curve. */ 127 unsigned int fips:1; /* True if this is a FIPS140-2 approved curve. */ 343 * Release a curve object. 357 * Return a copy of a curve object. 394 * Solve the right side of the equation that defines a curve. 443 a curve or the desired number of bits and stores at R_CURVE the argument 444 parameters of the named curve o 1616 char *curve; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | ecc.c | 63 /* Definition of a curve. */ 71 const char *name; /* Name of curve or NULL. */ 89 /* This tables defines aliases for curve names. */ 125 const char *desc; /* Description of the curve. */ 127 unsigned int fips:1; /* True if this is a FIPS140-2 approved curve. */ 343 * Release a curve object. 357 * Return a copy of a curve object. 394 * Solve the right side of the equation that defines a curve. 443 a curve or the desired number of bits and stores at R_CURVE the argument 444 parameters of the named curve o 1616 char *curve; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/ |
H A D | graphicspath.tex | 62 Adds a cubic Bezier curve from the current point, using two control points and an end point. 90 Adds a quadratic Bezier curve from the current point, using a control point and an end point.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | t1_trce.c | 917 int curve; local 920 curve = (msg[1] << 8) | msg[2]; 922 ssl_trace_str(curve, ssl_curve_tbl), curve);
|
H A D | t1_lib.c | 521 /* Check a curve is one of our preferences */ 529 /* Check curve matches Suite B preferences */ 553 * Return |nmatch|th shared curve or NID_undef if there is no match. 555 * For nmatch == -2, return the NID of the curve to use for 569 * For Suite B ciphersuite determines curve: we already know 580 /* If not Suite B just return first preference shared curve */ 635 * Bitmap of curves included to detect duplicates: only works while curve 640 EC_GROUP *curve; local 651 /* NB: 25 is last curve ID supported by FIPS module */ 658 curve [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | t1_trce.c | 917 int curve; local 920 curve = (msg[1] << 8) | msg[2]; 922 ssl_trace_str(curve, ssl_curve_tbl), curve);
|
H A D | t1_lib.c | 521 /* Check a curve is one of our preferences */ 529 /* Check curve matches Suite B preferences */ 553 * Return |nmatch|th shared curve or NID_undef if there is no match. 555 * For nmatch == -2, return the NID of the curve to use for 569 * For Suite B ciphersuite determines curve: we already know 580 /* If not Suite B just return first preference shared curve */ 635 * Bitmap of curves included to detect duplicates: only works while curve 640 EC_GROUP *curve; local 651 /* NB: 25 is last curve ID supported by FIPS module */ 658 curve [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 473 # define test_ecdh_kat(bio, curve, bits) \ 474 ecdh_kat(bio, curve, NID_brainpoolP##bits##r1, \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdh/ |
H A D | ecdhtest.c | 473 # define test_ecdh_kat(bio, curve, bits) \ 474 ecdh_kat(bio, curve, NID_brainpoolP##bits##r1, \
|