| /OK3568_Linux_fs/external/rkupdate/ |
| H A D | MD5ChecksumDefines.h | 27 //Transformation Constants - Round 1 28 #define MD5_T01 0xd76aa478 //Transformation Constant 1 29 #define MD5_T02 0xe8c7b756 //Transformation Constant 2 30 #define MD5_T03 0x242070db //Transformation Constant 3 31 #define MD5_T04 0xc1bdceee //Transformation Constant 4 32 #define MD5_T05 0xf57c0faf //Transformation Constant 5 33 #define MD5_T06 0x4787c62a //Transformation Constant 6 34 #define MD5_T07 0xa8304613 //Transformation Constant 7 35 #define MD5_T08 0xfd469501 //Transformation Constant 8 36 #define MD5_T09 0x698098d8 //Transformation Constant 9 [all …]
|
| H A D | MD5Checksum.cpp | 236 DESCRIPTION: Implementation of basic MD5 transformation algorithm 240 DWORD S : MD5_SXX Transformation constant 241 DWORD T : MD5_TXX Transformation constant 256 DESCRIPTION: Implementation of basic MD5 transformation algorithm 260 DWORD S : MD5_SXX Transformation constant 261 DWORD T : MD5_TXX Transformation constant 276 DESCRIPTION: Implementation of basic MD5 transformation algorithm 280 DWORD S : MD5_SXX Transformation constant 281 DWORD T : MD5_TXX Transformation constant 296 DESCRIPTION: Implementation of basic MD5 transformation algorithm [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | intro.rst | 8 as other data transformation mechanisms and methods to invoke these. 27 - data transformation implementations (typically ciphers) that can be 32 however, does not discuss all API calls available to data transformation 37 Note: The terms "transformation" and cipher algorithm are used 43 The transformation implementation is an actual code or interface to 44 hardware which implements a certain transformation with precisely 47 The transformation object (TFM) is an instance of a transformation 48 implementation. There can be multiple transformation objects associated 49 with a single transformation implementation. Each of those 50 transformation objects is held by a crypto API consumer or another [all …]
|
| H A D | devel-algos.rst | 4 Registering And Unregistering Transformation 8 API. One is used to register a generic cryptographic transformation, 19 former function registers a single transformation, while the latter 20 works on an array of transformation descriptions. The latter is useful 52 This section describes the simplest of all transformation 62 filled in with proper callbacks to implement this transformation. 103 This section describes the multi-block cipher transformation 105 which operate on scatterlists of data supplied to the transformation 141 Registering And Unregistering The Transformation 144 There are multiple ways to register a HASH transformation, depending on [all …]
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | crypto.h | 197 * @cia_min_keysize: Minimum key size supported by the transformation. This is 198 * the smallest key length supported by this transformation 203 * @cia_max_keysize: Maximum key size supported by the transformation. This is 204 * the largest key length supported by this transformation 209 * @cia_setkey: Set key for the transformation. This function is used to either 211 * transformation context for programming it later. Note that this 212 * function does modify the transformation context. This function 214 * transformation object, so one must make sure the key is properly 233 * transformation context, the key might need to be re-programmed 235 * modify the transformation context, as this function may be [all …]
|
| /OK3568_Linux_fs/kernel/net/xfrm/ |
| H A D | Kconfig | 23 tristate "Transformation user configuration interface" 26 Support for Transformation(XFRM) user configuration interface 37 Transformation(XFRM) user configuration interface like IPsec 43 tristate "Transformation virtual interface" 51 bool "Transformation sub policy support" 61 bool "Transformation migrate database" 72 bool "Transformation statistics" 76 statistics about transformation error (or almost error) factor
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | hash.h | 27 * @digestsize: Size of the result of the transformation. A buffer of this size 32 * @statesize: Size of the block for partial state of the transformation. A 34 * will save the partial state of the transformation into it. On the 64 * @init: **[mandatory]** Initialize the transformation context. Intended only to initialize the 65 * state of the HASH transformation at the beginning. This shall fill in 67 * transformation. No data processing happens at this point. Driver code 69 * @update: **[mandatory]** Push a chunk of data into the driver for transformation. This 72 * function must not finalize the HASH transformation by calculating the 74 * transformation. This function shall not modify the transformation 76 * transformation object. Data processing can happen synchronously [all …]
|
| H A D | skcipher.h | 49 * @min_keysize: Minimum key size supported by the transformation. This is the 50 * smallest key length supported by this transformation algorithm. 54 * @max_keysize: Maximum key size supported by the transformation. This is the 55 * largest key length supported by this transformation algorithm. 59 * @setkey: Set key for the transformation. This function is used to either 61 * transformation context for programming it later. Note that this 62 * function does modify the transformation context. This function can 63 * be called multiple times during the existence of the transformation 76 * key was stored in transformation context, the key might need to be 78 * shall not modify the transformation context, as this function may [all …]
|
| H A D | aead.h | 104 * transformation. A transformation may support smaller tag sizes. 109 * @setauthsize: Set authentication size for the AEAD transformation. This 111 * authentication tag to be either generated by the transformation 121 * @init: Initialize the cryptographic transformation object. This function 122 * is used to initialize the cryptographic transformation object. 124 * after the transformation context was allocated. In case the 127 * requirement of the transformation and put any software fallbacks 129 * @exit: Deinitialize the cryptographic transformation object. This is a
|
| H A D | acompress.h | 61 * @init: Initialize the cryptographic transformation object. 63 * transformation object. This function is called only once at 64 * the instantiation time, right after the transformation context 68 * transformation and put any software fallbacks in place. 69 * @exit: Deinitialize the cryptographic transformation object. This is a
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | xfrm_proc.rst | 10 Transformation Statistics 14 dropped by the transformation code and why. These counters are defined 36 Transformation protocol specific error 40 Transformation mode specific error 91 Transformation protocol specific error 94 Transformation mode specific error
|
| /OK3568_Linux_fs/external/rknpu2/examples/3rdparty/opencv/opencv-linux-aarch64/include/opencv2/shape/ |
| H A D | shape_transformer.hpp | 56 /** @brief Abstract base class for shape transformation algorithms. 61 …/** @brief Estimate the transformation parameters of the current transformer algorithm, based on p… 70 /** @brief Apply a transformation, given a pre-estimated transformation parameters. 72 @param input Contour (set of points) to apply the transformation. 77 /** @brief Apply a transformation, given a pre-estimated transformation parameters, to an Image. 93 /** @brief Definition of the transformation 117 /** @brief Wrapper class for the OpenCV Affine Transformation algorithm. :
|
| /OK3568_Linux_fs/kernel/include/sound/sof/ |
| H A D | channel_map.h | 16 * \brief Channel map, specifies transformation of one-to-many or many-to-one. 26 * Ext ID is the identifier of external part of the transformation. Depending 49 * More than one transformation per a single channel is allowed (in case 51 * A channel may be skipped in the transformation list, then it is filled 52 * with 0's by the transformation function.
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0080-gl-renderer-Check-GLES3.0-for-glTexImage3D.patch | 10 .../renderer-gl/gl-shader-config-color-transformation.c | 5 ++++- 14 …n/renderer-gl/gl-shader-config-color-transformation.c b/libweston/renderer-gl/gl-shader-config-col… 16 --- a/libweston/renderer-gl/gl-shader-config-color-transformation.c 17 +++ b/libweston/renderer-gl/gl-shader-config-color-transformation.c
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0079-gl-renderer-Check-GLES3.0-for-glTexImage3D.patch | 10 .../renderer-gl/gl-shader-config-color-transformation.c | 5 ++++- 14 …n/renderer-gl/gl-shader-config-color-transformation.c b/libweston/renderer-gl/gl-shader-config-col… 16 --- a/libweston/renderer-gl/gl-shader-config-color-transformation.c 17 +++ b/libweston/renderer-gl/gl-shader-config-color-transformation.c
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/lib/gcc/arm-none-linux-gnueabihf/10.3.1/plugin/include/ |
| H A D | dbgcnt.def | 27 This is primarily used to speed up the search for the bad transformation 29 you can quickly narrow down to one transformation 46 any particular transformation can happen. 66 exact transformation that causes the bug. A second shell script 88 where the problem transformation is being logged.
|
| H A D | tree-switch-conversion.h | 265 is profitable transformation. */ 288 This transformation is only applied if the number of case targets is small, 292 The following example shows the code the transformation generates: 322 TODO: There are still some improvements to this transformation that could 334 This transformation was contributed by Roger Sayle, see this e-mail: 387 transformation. */ 391 is profitable transformation. */ 405 this transformation, but the immediate dominators are updated if 547 /* Before switch transformation, record all SSA_NAMEs defined in switch BB 578 The transformation is performed by splitting the ordered [all …]
|
| H A D | ipa-param-manipulation.h | 29 a description how the new parameters should look like after the transformation 160 /* Structure that describes one parameter of a function after transformation. 237 indicates that the function should return void after transformation. */ in class() 344 /* Register a replacement decl for the transformation done in APM. */ 400 transformation. */ 405 these types after transformation, otherwise an empty one. */ 416 being removed as a part of the transformation. Before a new VAR_DECL is
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/lib/gcc/aarch64-none-linux-gnu/10.3.1/plugin/include/ |
| H A D | dbgcnt.def | 27 This is primarily used to speed up the search for the bad transformation 29 you can quickly narrow down to one transformation 46 any particular transformation can happen. 66 exact transformation that causes the bug. A second shell script 88 where the problem transformation is being logged.
|
| H A D | tree-switch-conversion.h | 265 is profitable transformation. */ 288 This transformation is only applied if the number of case targets is small, 292 The following example shows the code the transformation generates: 322 TODO: There are still some improvements to this transformation that could 334 This transformation was contributed by Roger Sayle, see this e-mail: 387 transformation. */ 391 is profitable transformation. */ 405 this transformation, but the immediate dominators are updated if 547 /* Before switch transformation, record all SSA_NAMEs defined in switch BB 578 The transformation is performed by splitting the ordered [all …]
|
| H A D | ipa-param-manipulation.h | 29 a description how the new parameters should look like after the transformation 160 /* Structure that describes one parameter of a function after transformation. 237 indicates that the function should return void after transformation. */ in class() 344 /* Register a replacement decl for the transformation done in APM. */ 400 transformation. */ 405 these types after transformation, otherwise an empty one. */ 416 being removed as a part of the transformation. Before a new VAR_DECL is
|
| /OK3568_Linux_fs/external/rknpu2/examples/3rdparty/opencv/opencv-linux-aarch64/include/opencv2/stitching/detail/ |
| H A D | matchers.hpp | 201 It's assumed that there is a transformation between those images. Transformation may be 202 homography or affine transformation based on selected matcher. 216 Mat H; //!< Estimated transformation 320 transformation (affine trasformation estimate will be placed in matches_info). 330 … @param full_affine whether to use full affine transformation with 6 degress of freedom or reduced 331 transformation with 4 degrees of freedom using only rotation, translation and uniform scaling
|
| H A D | motion_estimators.hpp | 112 /** @brief Affine transformation based estimator. 115 final transformation for each camera. 276 /** @brief Bundle adjuster that expects affine transformation 281 It estimates all transformation parameters. Refinement mask is ignored. 300 /** @brief Bundle adjuster that expects affine transformation with 4 DOF 305 It estimates all transformation parameters. Refinement mask is ignored.
|
| /OK3568_Linux_fs/kernel/net/ipv6/ |
| H A D | Kconfig | 51 tristate "IPv6: AH transformation" 66 tristate "IPv6: ESP transformation" 81 tristate "IPv6: ESP transformation offload" 86 Support for ESP transformation offload. This makes sense 106 tristate "IPv6: IPComp transformation"
|
| /OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/deps/boost/1.65.1/include/boost/geometry/strategies/ |
| H A D | strategy_transform.hpp | 87 \brief Transformation strategy to copy one point to another using assignment operator 102 \brief Transformation strategy to do copy a point, copying per coordinate. 122 \brief Transformation strategy to go from degree to radian and back 301 \brief Transformation strategy for 2D spherical (phi,theta) to 3D cartesian (x,y,z) 331 \brief Transformation strategy for 3D spherical (phi,theta,r) to 3D cartesian (x,y,z) 362 \brief Transformation strategy for 3D cartesian (x,y,z) to 2D spherical (phi,theta) 367 \note If x,y,z point is not lying on unit sphere, transformation will return false 391 \brief Transformation strategy for 3D cartesian (x,y,z) to 3D spherical (phi,theta,r)
|