/external/pcre/dist2/doc/html/ |
pcre2matching.html | 16 <li><a name="TOC1" href="#SEC1">PCRE2 MATCHING ALGORITHMS</a> 25 <br><a name="SEC1" href="#TOC1">PCRE2 MATCHING ALGORITHMS</a><br> 27 This document describes the two different algorithms that are available in 44 pattern, the two algorithms give the same answer. A difference arises, however, 63 correspond to the two matching algorithms provided by PCRE2.
|
/external/python/cpython2/Lib/test/ |
test_hashlib.py | 55 algorithms = set() 57 algorithms.add(algorithm.lower()) 59 for algorithm in algorithms: 74 # These two algorithms should always be present when this module 108 self.assertEqual(hashlib.algorithms,
|
/external/conscrypt/libcore-stub/src/main/java/libcore/java/security/ |
StandardNames.java | 95 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...) 110 HashSet<String> algorithms = PROVIDER_ALGORITHMS.get(type); local 111 if (algorithms == null) { 112 algorithms = new HashSet<String>(); 113 PROVIDER_ALGORITHMS.put(type, algorithms); 116 algorithms.add(algorithm.toUpperCase(Locale.ROOT))); 119 HashSet<String> algorithms = PROVIDER_ALGORITHMS.get(type); local 120 assertNotNull(algorithms); 121 assertTrue(algorithm, algorithms.remove(algorithm.toUpperCase(Locale.ROOT))); 122 if (algorithms.isEmpty()) [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
StandardNames.java | 96 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...) 111 Set<String> algorithms = PROVIDER_ALGORITHMS.get(type); local 112 if (algorithms == null) { 113 algorithms = new HashSet<String>(); 114 PROVIDER_ALGORITHMS.put(type, algorithms); 117 algorithms.add(algorithm.toUpperCase(Locale.ROOT))); 120 Set<String> algorithms = PROVIDER_ALGORITHMS.get(type); local 121 assertNotNull(algorithms); 122 assertTrue(algorithm, algorithms.remove(algorithm.toUpperCase(Locale.ROOT))); 123 if (algorithms.isEmpty()) [all...] |
/external/eigen/blas/testing/ |
dblat3.f | 62 *> Jeremy Du Croz, Numerical Algorithms Group Ltd. 63 *> Sven Hammarling, Numerical Algorithms Group Ltd. 406 * Jeremy Du Croz, Numerical Algorithms Group Ltd. 407 * Sven Hammarling, Numerical Algorithms Group Ltd. 687 * Jeremy Du Croz, Numerical Algorithms Group Ltd. 688 * Sven Hammarling, Numerical Algorithms Group Ltd. [all...] |
sblat3.f | 62 *> Jeremy Du Croz, Numerical Algorithms Group Ltd. 63 *> Sven Hammarling, Numerical Algorithms Group Ltd. 406 * Jeremy Du Croz, Numerical Algorithms Group Ltd. 407 * Sven Hammarling, Numerical Algorithms Group Ltd. 687 * Jeremy Du Croz, Numerical Algorithms Group Ltd. 688 * Sven Hammarling, Numerical Algorithms Group Ltd. [all...] |
/external/libjpeg-turbo/ |
README-turbo.txt | 284 point DCT/IDCT algorithms are mainly a legacy feature, and they do not 285 produce significantly more accuracy than the slow integer algorithms (to put 286 numbers on this, the typical difference in PNSR between the two algorithms 289 -- If the floating point algorithms in libjpeg-turbo are not implemented using 294 still using the same algorithms as libjpeg v6b, so there are several specific 299 implements those scaling algorithms differently than libjpeg v6b does, and 303 with its DCT/IDCT scaling algorithms rather than with a separate
|
README.md | 288 point DCT/IDCT algorithms are mainly a legacy feature, and they do not 289 produce significantly more accuracy than the slow integer algorithms (to put 290 numbers on this, the typical difference in PNSR between the two algorithms 294 - If the floating point algorithms in libjpeg-turbo are not implemented using 299 still using the same algorithms as libjpeg v6b, so there are several specific 304 implements those scaling algorithms differently than libjpeg v6b does, and 308 with its DCT/IDCT scaling algorithms rather than with a separate
|
/external/boringssl/src/include/openssl/ |
evp.h | 79 // EVP abstracts over public/private key algorithms. 237 // For single-shot signing algorithms which do not use a pre-hash, such as 250 // signature algorithms which do not support this. Use |EVP_DigestSign| for a 263 // signature algorithms which do not support this. Use |EVP_DigestSign| for a 290 // For single-shot signing algorithms which do not use a pre-hash, such as 303 // signature algorithms which do not support this. Use |EVP_PKEY_verify_message| 313 // signature algorithms which do not support this. Use |EVP_PKEY_verify_message| 485 // algorithms which do not support this. Use |EVP_DigestSignInit| to sign an 507 // algorithms which do not support this. Use |EVP_DigestVerifyInit| to verify a [all...] |
/external/tpm2/generator/ |
tpm_table.py | 75 _alg_id_table: actual table of various TPM2 algorithms, a copy of Table 9 77 used in other tables into a list of matching algorithms. 119 # all algorithms a type should apply to. The macros are described in details 184 """Split the passed in word by the regex used to pick TPM algorithms. 187 similar code needs to be generated for different algorithms of a certain 452 of all algorithms matching the algorithm description. 459 suffix, either one could be empty) and a list of matching algorithms 585 """Find all algorithms encoded in the variable name. 601 # Find all algorithms of this type in the alg id table
|
/libcore/luni/src/test/java/libcore/java/security/ |
ProviderTest.java | 66 // Allow access to deprecated BC algorithms in this test, so we can ensure they 90 // build set of expected algorithms 188 assertEquals("Algorithms are provided but not present in StandardNames", 208 assertEquals("Algorithms are present in StandardNames but not provided", 220 * implementation that exists or are aliases to known algorithms. 333 * Ensures that, for all algorithms provided by Conscrypt, there is no alias from 346 // 1. Find all the algorithms provided by Conscrypt. 355 // Ignore aliases, we only want the concrete algorithms 361 // 2. Determine which classes in BC implement those algorithms [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
AlgorithmId.java | 37 * This class identifies algorithms, such as cryptographic transforms, each 45 * to have parsed. Two examples of such algorithms are Diffie-Hellman key 49 * used algorithms, for which conventional string names have been defined. 469 // Digesting algorithms 497 // Various public key algorithms 515 // Secret key algorithms 664 * HASHING ALGORITHMS 729 * COMMON SIGNATURE ALGORITHMS 784 * Algorithm ID for the PBE encryption algorithms from PKCS#5 and [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
_hashopenssl.c | 1 /* Module that wraps all OpenSSL hash algorithms */
462 The MD5 and SHA1 algorithms are always supported.\n");
495 * hash algorithms. These constructors are much faster than calling
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
BaseAgreementSpi.java | 14 // Android-removed: Unsupported algorithms 24 // Android-removed: Unsupported algorithms 168 // END Android-removed: Unsupported algorithms
|
/external/bzip2/ |
README | 108 Unless you are 100% familiar with *all* the algorithms 124 of the algorithms, and, in particular, the presence of various 139 patented algorithms. However, I do not have the resources
|
/external/eigen/doc/ |
TutorialGeometry.dox | 77 might still be interesting to write generic and efficient algorithms taking as input any 98 generic algorithms working on any kind of transformation representations: 134 <tr><td colspan="2">(See subject 5.27 of this <a href="http://www.faqs.org/faqs/graphics/algorithms-faq">faq</a> for the explanations)</td></tr>
|
/external/kernel-headers/original/uapi/linux/ |
virtio_crypto.h | 270 /* algo should be service-specific algorithms */ 272 /* session_id should be service-specific algorithms */ 430 /* Detailed algorithms mask */
|
/external/sonic/doc/ |
index.md | 22 other algorithms that came before, Sonic is optimized for speed ups of over 2X. 41 sonic algorithms do not violate any patents, as most of it is very old, based 58 However, there are decent free software algorithms for speeding up speech. They
|
/external/swiftshader/third_party/LLVM/include/llvm/Analysis/ |
PathNumbering.h | 52 // algorithms. 71 // Get/set the NodeColor used in graph algorithms. 117 // 'Color' used by graph algorithms to mark the node.
|
/external/vboot_reference/tests/ |
vb20_common3_tests.c | 367 /* Permutations of signing and data key algorithms in active use */ 377 /* Test only the algorithms we use */ 388 /* Test all the algorithms */
|
vboot_common3_tests.c | 342 * Permutations of signing and data key algorithms in active use: 352 /* Test only the algorithms we use */ 363 /* Test all the algorithms */
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
EciesTest.java | 68 * BouncyCastle v.1.52 uses the following algorithms: KDF2 with SHA1 for the key derivation 92 * additional tests covering the new algorithms. 239 // to not assigning default algorithms.
|
/frameworks/base/core/java/android/net/ |
IpSecAlgorithm.java | 135 * <p>For algorithms that produce an integrity check value, the truncation length is a required 149 * <p>This constructor only supports algorithms that use a truncation length. i.e. 150 * Authentication and Authenticated Encryption algorithms.
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyFactoryTest.java | 137 String[] algorithms = { local 158 for (int i = 0; i < algorithms.length; i++) { 159 String algorithm = algorithms[i];
|
/libcore/ojluni/src/main/java/java/security/ |
AlgorithmParameterGenerator.java | 46 * for different algorithms. For example, in the case of parameters for 69 * <p> Android provides the following <code>AlgorithmParameterGenerator</code> algorithms: 101 * These algorithms are described in the <a href=
|