OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:Such
(Results
1 - 7
of
7
) sorted by null
/device/samsung/crespo/
device.mk
24
# drivers aren't available.
Such
cases are handled by having this file
device_base.mk
24
# drivers aren't available.
Such
cases are handled by having this file
125
# Note that the only
such
settings should be the ones that are too low-level to
/external/dnsmasq/contrib/dnslist/
dnslist.pl
301
For example, if you distribute copies of
such
a program, whether
333
refers to any
such
program or work, and a "work based on the Program"
360
distribute
such
modifications or work under the terms of Section 1
372
when run, you must cause it, when started running for
such
379
does not normally print
such
an announcement, your work based on
420
received the program in object code or executable form with
such
445
this License will not have their licenses terminated so long as
such
485
such
claims; this section has the sole purpose of protecting the
502
countries not thus excluded. In
such
case, this License incorporates
506
of the General Public License from time to time.
Such
new versions wil
[
all
...]
/external/iproute2/doc/
api-ip6-flowlabels.tex
64
Essentially, it means that
such
options cannot present in packets
124
Following RFC2553
such
applications can be considered as broken,
128
memory bandwidth is not a good idea.
Such
patches are acceptable
ip-tunnels.tex
72
Well, if you like
such
tricks, nobody may prohibit you to use them.
389
address.
Such
tunnel becomes {\bf broadcast} tunnel (though word
398
sent to multicast group 224.66.66.66. By default
such
tunnel starts
420
Actually,
such
setup is the most natural for tunneling,
445
In general case of dynamic routing you should create
such
classes
ip-cref.tex
146
In the command descriptions below
such
parameters
[
all
...]
/external/dropbear/libtomcrypt/
crypt.tex
123
The library was designed
such
that new ciphers/hashes/PRNGs can be added at run-time and the existing API
132
provide all of the tools required to build
such
functionality. LibTomCrypt was designed to be a flexible library that
161
with \textit{cycles per byte} timings that are comparable (and often favourable) to other libraries
such
as OpenSSL and
319
Certain functions
such
as (for example) \textit{rsa\_export()} give an output that is variable length. To prevent buffer overflows you
360
Certain functions
such
as \textit{rsa\_make\_key()} require a Pseudo Random Number Generator (PRNG). These functions do not setup
364
may be passed as \textbf{NULL} in
such
situations.
395
must pass in (a pointer to) an array of 32 \textit{unsigned char} variables. Certain routines (
such
as SAFER+) take
555
ciphers are configured
such
that the default number of rounds provide adequate security for the given block and key
647
The \textit{encrypt only} descriptors are useful for applications that only use the encryption function of the cipher. Algorithms
such
729
Which accepts a pointer to a descriptor and returns the index into the global descriptor table. If an error occurs
such
[
all
...]
Completed in 1268 milliseconds