HomeSort by relevance Sort by last modified time
    Searched refs:Such (Results 1 - 7 of 7) sorted by null

  /device/samsung/crespo/
device.mk 24 # drivers aren't available. Such cases are handled by having this file
device_base.mk 24 # drivers aren't available. Such cases are handled by having this file
125 # Note that the only such settings should be the ones that are too low-level to
  /external/dnsmasq/contrib/dnslist/
dnslist.pl 301 For example, if you distribute copies of such a program, whether
333 refers to any such program or work, and a "work based on the Program"
360 distribute such modifications or work under the terms of Section 1
372 when run, you must cause it, when started running for such
379 does not normally print such an announcement, your work based on
420 received the program in object code or executable form with such
445 this License will not have their licenses terminated so long as such
485 such claims; this section has the sole purpose of protecting the
502 countries not thus excluded. In such case, this License incorporates
506 of the General Public License from time to time. Such new versions wil
    [all...]
  /external/iproute2/doc/
api-ip6-flowlabels.tex 64 Essentially, it means that such options cannot present in packets
124 Following RFC2553 such applications can be considered as broken,
128 memory bandwidth is not a good idea. Such patches are acceptable
ip-tunnels.tex 72 Well, if you like such tricks, nobody may prohibit you to use them.
389 address. Such tunnel becomes {\bf broadcast} tunnel (though word
398 sent to multicast group 224.66.66.66. By default such tunnel starts
420 Actually, such setup is the most natural for tunneling,
445 In general case of dynamic routing you should create such classes
ip-cref.tex 146 In the command descriptions below such parameters
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex 123 The library was designed such that new ciphers/hashes/PRNGs can be added at run-time and the existing API
132 provide all of the tools required to build such functionality. LibTomCrypt was designed to be a flexible library that
161 with \textit{cycles per byte} timings that are comparable (and often favourable) to other libraries such as OpenSSL and
319 Certain functions such as (for example) \textit{rsa\_export()} give an output that is variable length. To prevent buffer overflows you
360 Certain functions such as \textit{rsa\_make\_key()} require a Pseudo Random Number Generator (PRNG). These functions do not setup
364 may be passed as \textbf{NULL} in such situations.
395 must pass in (a pointer to) an array of 32 \textit{unsigned char} variables. Certain routines (such as SAFER+) take
555 ciphers are configured such that the default number of rounds provide adequate security for the given block and key
647 The \textit{encrypt only} descriptors are useful for applications that only use the encryption function of the cipher. Algorithms such
729 Which accepts a pointer to a descriptor and returns the index into the global descriptor table. If an error occurs such
    [all...]

Completed in 1268 milliseconds