/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 121 fail("IllegalArgumentException must be thrown when key algorithms do not match");
|
/libcore/ojluni/src/main/java/sun/security/util/ |
AlgorithmDecomposer.java | 33 * The class decomposes standard algorithms into sub-elements.
|
/packages/inputmethods/LatinIME/common/src/com/android/inputmethod/latin/common/ |
CodePointUtils.java | 103 // exercise the algorithms in dicttool much more.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/bits/ |
sched.h | 29 /* Scheduling algorithms. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/bits/ |
sched.h | 29 /* Scheduling algorithms. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/x86_64-linux/include/c++/4.8/tr1/ |
array | 209 // Specialized algorithms [6.2.2.2].
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/lib/gcc/x86_64-w64-mingw32/4.8.3/plugin/include/ |
splay-tree.h | 26 Algorithms. Harper-Collins, Inc. 1991.
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/share/info/ |
gmp.info-1 | 64 * Algorithms:: What happens behind the scenes. 124 designed to give good performance for both, by choosing algorithms 129 arithmetic type, by using sophisticated algorithms, by including [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/c++/4.8.3/tr1/ |
array | 209 // Specialized algorithms [6.2.2.2].
|
/prebuilts/go/darwin-x86/src/math/big/ |
calibrate_test.go | 6 // different algorithms. Ideally, this would be converted
|
/prebuilts/go/darwin-x86/src/sync/atomic/ |
doc.go | 6 // useful for implementing synchronization algorithms.
|
/prebuilts/go/linux-x86/src/math/big/ |
calibrate_test.go | 6 // different algorithms. Ideally, this would be converted
|
/prebuilts/go/linux-x86/src/sync/atomic/ |
doc.go | 6 // useful for implementing synchronization algorithms.
|
/prebuilts/ndk/r16/sources/third_party/shaderc/third_party/glslang/SPIRV/ |
InReadableOrder.cpp | 38 // Because such algorithms visit a block only after traversing some path to it
|
/prebuilts/tools/common/m2/repository/com/google/errorprone/error_prone_check_api/2.1.2/ |
error_prone_check_api-2.1.2.pom | 139 <artifactId>software-and-algorithms</artifactId>
|
/prebuilts/tools/common/m2/repository/com/google/errorprone/error_prone_check_api/2.2.0/ |
error_prone_check_api-2.2.0.pom | 139 <artifactId>software-and-algorithms</artifactId>
|
/system/keymaster/include/keymaster/ |
soft_keymaster_device.h | 110 keymaster_algorithm_t** algorithms,
|
/toolchain/binutils/binutils-2.27/include/ |
splay-tree.h | 25 Algorithms. Harper-Collins, Inc. 1991.
|
/toolchain/binutils/binutils-2.27/libiberty/ |
sort.c | 1 /* Sorting algorithms.
|
/toolchain/binutils/binutils-2.27/zlib/ |
zlib.3 | 17 but other algorithms may be added later
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CRLImpl.java | 336 * algorithms. 358 * algorithms. 413 * algorithms. 470 * algorithms. 490 * algorithms. 793 * <a href="http://www.ietf.org/rfc/rfc3279.txt">RFC 3279: Algorithms and [all...] |
/system/keymaster/contexts/ |
soft_keymaster_device.cpp | 410 keymaster_algorithm_t** algorithms, 415 if (!algorithms || !algorithms_length) 420 return km1_dev->get_supported_algorithms(km1_dev, algorithms, algorithms_length); 432 *algorithms = 433 reinterpret_cast<keymaster_algorithm_t*>(malloc(*algorithms_length * sizeof(**algorithms))); 434 if (!*algorithms) 436 std::copy(response.results, response.results + response.results_length, *algorithms); [all...] |
/external/boringssl/src/ssl/test/runner/ |
common.go | 190 // algorithms' throughout. We match the latter. 194 // RSASSA-PKCS1-v1_5 algorithms 201 // ECDSA algorithms 207 // RSASSA-PSS algorithms 212 // EdDSA algorithms 218 // algorithms. 487 // supported signature algorithms to sign with. 491 // supported signature algorithms that are accepted. [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Include/Library/ |
Tpm2CommandLib.h | 538 This command is used to set the desired PCR allocation of PCR and algorithms.
766 This function will query the TPM to determine which hashing algorithms
769 @param[out] TpmHashAlgorithmBitmap A bitmask containing the algorithms supported by the TPM.
814 This command allows the platform to change the set of algorithms that are used by the TPM.
[all...] |
/external/python/cpython3/Lib/ |
heapq.py | 18 Our API differs from textbook heap algorithms as follows: 115 [1] The disk balancing algorithms which are current, nowadays, are 452 # Alternative Algorithms 454 # Other algorithms were not used because they: 459 # http://code.activestate.com/recipes/577573-compare-algorithms-for-heapqsmallest
|