OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:algorithms
(Results
151 - 175
of
2344
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
RC2.java
15
// Android-removed: Unsupported
algorithms
19
// Android-removed: Unsupported
algorithms
25
// Android-removed: Unsupported
algorithms
29
// Android-removed: Unsupported
algorithms
43
// BEGIN Android-removed: Unsupported
algorithms
99
// END Android-removed: Unsupported
algorithms
185
// BEGIN Android-removed: Unsupported
algorithms
199
// END Android-removed: Unsupported
algorithms
213
// BEGIN Android-removed: Unsupported
algorithms
457
// END Android-removed: Unsupported
algorithms
[
all
...]
/external/eigen/Eigen/
SVD
22
* Two decomposition
algorithms
are provided:
/external/eigen/unsupported/Eigen/
BVH
23
* \brief This module provides generic bounding volume hierarchy
algorithms
32
* of the two basic
algorithms
over a BVH: intersection of a query object against all objects in the hierarchy and minimization
53
* This implementation decouples the basic
algorithms
both from the type of hierarchy (and the types of the bounding volumes) and
57
* To be used in the
algorithms
, a hierarchy must implement the following traversal mechanism (see KdBVH for a sample implementation): \code
IterativeSolvers
17
* This module aims to provide various iterative linear and non linear solver
algorithms
.
NonLinearOptimization
27
* This module provides implementation of two important
algorithms
in non linear
59
* They guaranty we get the same results as the original
algorithms
(value for 'x',
78
* Both
algorithms
can use either the jacobian (provided by the user) or compute
89
* All
algorithms
are provided using Two APIs :
/external/iproute2/man/man8/
ip-sr.8
39
The currently supported
algorithms
for \fIALGO\fR are \fBsha1\fR and \fBsha256\fR.
/external/lzma/C/
LzFindMt.h
1
/* LzFindMt.h -- multithreaded Match finder for LZ
algorithms
/external/ply/ply/
ANNOUNCE
30
either SLR or LALR(1)
algorithms
.
/external/tensorflow/tensorflow/core/api_def/base_api/
api_def_CompareAndBitpack.pbtxt
33
algorithms
that use hashing approximations of cosine and `L2` distances;
/external/tpm2/
PCR_Event.c
51
// Iterate supported PCR bank
algorithms
to extend
_TPM_Hash_Data.c
34
// For each of the implemented hash
algorithms
, update the digest with the
/external/v8/src/
locked-queue.h
16
//
Algorithms
" by M. Scott and M. Michael.
/external/vboot_reference/firmware/2lib/include/
2guid.h
31
/* Key GUIDs to use for VB2_SIG_NONE and hash
algorithms
*/
/external/vboot_reference/tests/
gen_test_cases.sh
16
# of message digest
algorithms
and RSA key sizes.
/external/wycheproof/java/com/google/security/wycheproof/testcases/
BasicTest.java
27
/** List all
algorithms
known to the security manager. */
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/
ClearKeyDrmProperties.h
30
static const android::String8 kAlgorithmsKey("
algorithms
");
/frameworks/av/media/libeffects/lvm/lib/Common/lib/
LVM_Common.h
20
/* Header file for the common definitions used within the bundle and its
algorithms
. */
/prebuilts/go/darwin-x86/src/hash/crc32/
crc32_arm64.go
5
// ARM64-specific hardware-assisted CRC32
algorithms
. See crc32.go for a
/prebuilts/go/linux-x86/src/hash/crc32/
crc32_arm64.go
5
// ARM64-specific hardware-assisted CRC32
algorithms
. See crc32.go for a
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.50/
bcprov-jdk15on-1.50.pom
9
<description>The Bouncy Castle Crypto package is a Java implementation of cryptographic
algorithms
. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.7.</description>
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.56/
bcprov-jdk15on-1.56.pom
9
<description>The Bouncy Castle Crypto package is a Java implementation of cryptographic
algorithms
. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.</description>
/system/bt/stack/smp/
p_256_ecc_pp.h
21
* This file contains simple pairing
algorithms
using Elliptic Curve
/toolchain/binutils/binutils-2.27/gas/
bignum.h
25
* complicates
algorithms
. *
/toolchain/binutils/binutils-2.27/include/
sort.h
1
/* Sorting
algorithms
.
/system/tpm/trunks/
tpm_state_test.cc
98
if (data.
algorithms
.count == kMaxProperties ||
99
data.
algorithms
.count == property_count) {
104
data.
algorithms
.alg_properties[data.
algorithms
.count].alg = i;
105
data.
algorithms
.alg_properties[data.
algorithms
.count].alg_properties =
107
data.
algorithms
.count++;
Completed in 1546 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>