Lines Matching +full:10 +full:k
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
148 and \*(L"extracts\*(R" from it a fixed-length pseudorandom key K. The second stage
149 \&\*(L"expands\*(R" the key K into several additional pseudorandom keys (the output
191 intermediate fixed-length pseudorandom key K is not returned.
200 key K. The \fIkeylen\fR parameter must match the size of K, which can be looked
210 pseudorandom key K returned from a previous extract operation.
234 This example derives 10 bytes using \s-1SHA\-256\s0 with the secret key \*(L"secret\*(R",
240 \& unsigned char out[10];