HomeSort by relevance Sort by last modified time
    Searched full:algorithms (Results 351 - 375 of 2344) sorted by null

<<11121314151617181920>>

  /external/pcre/dist2/doc/html/
pcre2matching.html 16 <li><a name="TOC1" href="#SEC1">PCRE2 MATCHING ALGORITHMS</a>
25 <br><a name="SEC1" href="#TOC1">PCRE2 MATCHING ALGORITHMS</a><br>
27 This document describes the two different algorithms that are available in
44 pattern, the two algorithms give the same answer. A difference arises, however,
63 correspond to the two matching algorithms provided by PCRE2.
  /external/python/cpython2/Lib/test/
test_hashlib.py 55 algorithms = set()
57 algorithms.add(algorithm.lower())
59 for algorithm in algorithms:
74 # These two algorithms should always be present when this module
108 self.assertEqual(hashlib.algorithms,
  /external/conscrypt/libcore-stub/src/main/java/libcore/java/security/
StandardNames.java 95 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...)
110 HashSet<String> algorithms = PROVIDER_ALGORITHMS.get(type); local
111 if (algorithms == null) {
112 algorithms = new HashSet<String>();
113 PROVIDER_ALGORITHMS.put(type, algorithms);
116 algorithms.add(algorithm.toUpperCase(Locale.ROOT)));
119 HashSet<String> algorithms = PROVIDER_ALGORITHMS.get(type); local
120 assertNotNull(algorithms);
121 assertTrue(algorithm, algorithms.remove(algorithm.toUpperCase(Locale.ROOT)));
122 if (algorithms.isEmpty())
    [all...]
  /libcore/support/src/test/java/libcore/java/security/
StandardNames.java 96 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...)
111 Set<String> algorithms = PROVIDER_ALGORITHMS.get(type); local
112 if (algorithms == null) {
113 algorithms = new HashSet<String>();
114 PROVIDER_ALGORITHMS.put(type, algorithms);
117 algorithms.add(algorithm.toUpperCase(Locale.ROOT)));
120 Set<String> algorithms = PROVIDER_ALGORITHMS.get(type); local
121 assertNotNull(algorithms);
122 assertTrue(algorithm, algorithms.remove(algorithm.toUpperCase(Locale.ROOT)));
123 if (algorithms.isEmpty())
    [all...]
  /external/eigen/blas/testing/
dblat3.f 62 *> Jeremy Du Croz, Numerical Algorithms Group Ltd.
63 *> Sven Hammarling, Numerical Algorithms Group Ltd.
406 * Jeremy Du Croz, Numerical Algorithms Group Ltd.
407 * Sven Hammarling, Numerical Algorithms Group Ltd.
687 * Jeremy Du Croz, Numerical Algorithms Group Ltd.
688 * Sven Hammarling, Numerical Algorithms Group Ltd.
    [all...]
sblat3.f 62 *> Jeremy Du Croz, Numerical Algorithms Group Ltd.
63 *> Sven Hammarling, Numerical Algorithms Group Ltd.
406 * Jeremy Du Croz, Numerical Algorithms Group Ltd.
407 * Sven Hammarling, Numerical Algorithms Group Ltd.
687 * Jeremy Du Croz, Numerical Algorithms Group Ltd.
688 * Sven Hammarling, Numerical Algorithms Group Ltd.
    [all...]
  /external/libjpeg-turbo/
README-turbo.txt 284 point DCT/IDCT algorithms are mainly a legacy feature, and they do not
285 produce significantly more accuracy than the slow integer algorithms (to put
286 numbers on this, the typical difference in PNSR between the two algorithms
289 -- If the floating point algorithms in libjpeg-turbo are not implemented using
294 still using the same algorithms as libjpeg v6b, so there are several specific
299 implements those scaling algorithms differently than libjpeg v6b does, and
303 with its DCT/IDCT scaling algorithms rather than with a separate
README.md 288 point DCT/IDCT algorithms are mainly a legacy feature, and they do not
289 produce significantly more accuracy than the slow integer algorithms (to put
290 numbers on this, the typical difference in PNSR between the two algorithms
294 - If the floating point algorithms in libjpeg-turbo are not implemented using
299 still using the same algorithms as libjpeg v6b, so there are several specific
304 implements those scaling algorithms differently than libjpeg v6b does, and
308 with its DCT/IDCT scaling algorithms rather than with a separate
  /external/boringssl/src/include/openssl/
evp.h 79 // EVP abstracts over public/private key algorithms.
237 // For single-shot signing algorithms which do not use a pre-hash, such as
250 // signature algorithms which do not support this. Use |EVP_DigestSign| for a
263 // signature algorithms which do not support this. Use |EVP_DigestSign| for a
290 // For single-shot signing algorithms which do not use a pre-hash, such as
303 // signature algorithms which do not support this. Use |EVP_PKEY_verify_message|
313 // signature algorithms which do not support this. Use |EVP_PKEY_verify_message|
485 // algorithms which do not support this. Use |EVP_DigestSignInit| to sign an
507 // algorithms which do not support this. Use |EVP_DigestVerifyInit| to verify a
    [all...]
  /external/tpm2/generator/
tpm_table.py 75 _alg_id_table: actual table of various TPM2 algorithms, a copy of Table 9
77 used in other tables into a list of matching algorithms.
119 # all algorithms a type should apply to. The macros are described in details
184 """Split the passed in word by the regex used to pick TPM algorithms.
187 similar code needs to be generated for different algorithms of a certain
452 of all algorithms matching the algorithm description.
459 suffix, either one could be empty) and a list of matching algorithms
585 """Find all algorithms encoded in the variable name.
601 # Find all algorithms of this type in the alg id table
  /libcore/luni/src/test/java/libcore/java/security/
ProviderTest.java 66 // Allow access to deprecated BC algorithms in this test, so we can ensure they
90 // build set of expected algorithms
188 assertEquals("Algorithms are provided but not present in StandardNames",
208 assertEquals("Algorithms are present in StandardNames but not provided",
220 * implementation that exists or are aliases to known algorithms.
333 * Ensures that, for all algorithms provided by Conscrypt, there is no alias from
346 // 1. Find all the algorithms provided by Conscrypt.
355 // Ignore aliases, we only want the concrete algorithms
361 // 2. Determine which classes in BC implement those algorithms
    [all...]
  /libcore/ojluni/src/main/java/sun/security/x509/
AlgorithmId.java 37 * This class identifies algorithms, such as cryptographic transforms, each
45 * to have parsed. Two examples of such algorithms are Diffie-Hellman key
49 * used algorithms, for which conventional string names have been defined.
469 // Digesting algorithms
497 // Various public key algorithms
515 // Secret key algorithms
664 * HASHING ALGORITHMS
729 * COMMON SIGNATURE ALGORITHMS
784 * Algorithm ID for the PBE encryption algorithms from PKCS#5 and
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
_hashopenssl.c 1 /* Module that wraps all OpenSSL hash algorithms */
462 The MD5 and SHA1 algorithms are always supported.\n");
495 * hash algorithms. These constructors are much faster than calling
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
BaseAgreementSpi.java 14 // Android-removed: Unsupported algorithms
24 // Android-removed: Unsupported algorithms
168 // END Android-removed: Unsupported algorithms
  /external/bzip2/
README 108 Unless you are 100% familiar with *all* the algorithms
124 of the algorithms, and, in particular, the presence of various
139 patented algorithms. However, I do not have the resources
  /external/eigen/doc/
TutorialGeometry.dox 77 might still be interesting to write generic and efficient algorithms taking as input any
98 generic algorithms working on any kind of transformation representations:
134 <tr><td colspan="2">(See subject 5.27 of this <a href="http://www.faqs.org/faqs/graphics/algorithms-faq">faq</a> for the explanations)</td></tr>
  /external/kernel-headers/original/uapi/linux/
virtio_crypto.h 270 /* algo should be service-specific algorithms */
272 /* session_id should be service-specific algorithms */
430 /* Detailed algorithms mask */
  /external/sonic/doc/
index.md 22 other algorithms that came before, Sonic is optimized for speed ups of over 2X.
41 sonic algorithms do not violate any patents, as most of it is very old, based
58 However, there are decent free software algorithms for speeding up speech. They
  /external/swiftshader/third_party/LLVM/include/llvm/Analysis/
PathNumbering.h 52 // algorithms.
71 // Get/set the NodeColor used in graph algorithms.
117 // 'Color' used by graph algorithms to mark the node.
  /external/vboot_reference/tests/
vb20_common3_tests.c 367 /* Permutations of signing and data key algorithms in active use */
377 /* Test only the algorithms we use */
388 /* Test all the algorithms */
vboot_common3_tests.c 342 * Permutations of signing and data key algorithms in active use:
352 /* Test only the algorithms we use */
363 /* Test all the algorithms */
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
EciesTest.java 68 * BouncyCastle v.1.52 uses the following algorithms: KDF2 with SHA1 for the key derivation
92 * additional tests covering the new algorithms.
239 // to not assigning default algorithms.
  /frameworks/base/core/java/android/net/
IpSecAlgorithm.java 135 * <p>For algorithms that produce an integrity check value, the truncation length is a required
149 * <p>This constructor only supports algorithms that use a truncation length. i.e.
150 * Authentication and Authenticated Encryption algorithms.
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyFactoryTest.java 137 String[] algorithms = { local
158 for (int i = 0; i < algorithms.length; i++) {
159 String algorithm = algorithms[i];
  /libcore/ojluni/src/main/java/java/security/
AlgorithmParameterGenerator.java 46 * for different algorithms. For example, in the case of parameters for
69 * <p> Android provides the following <code>AlgorithmParameterGenerator</code> algorithms:
101 * These algorithms are described in the <a href=

Completed in 2803 milliseconds

<<11121314151617181920>>