HomeSort by relevance Sort by last modified time
    Searched defs:Example (Results 1 - 5 of 5) sorted by null

  /cts/tests/tests/example/src/android/example/
Example.java 17 package android.example;
20 * Example class being tested. In a real test, the classes to test would
24 public class Example {
  /frameworks/base/test-runner/tests/src/android/test/suitebuilder/annotation/
HasAnnotationTest.java 48 return new HasAnnotation(Example.class).apply(testMethod);
53 public @interface Example {
56 @Example
59 @Example
69 @Example
  /external/iproute2/doc/
ip-cref.tex 403 to all hosts sharing the same link. A typical example is an Ethernet link.
807 \paragraph{Example:} Delete all the addresses from the private network
819 Another instructive example is disabling IP on all the Ethernets:
823 And the last example shows how to flush all the IPv6 addresses
920 \paragraph{Example:}
    [all...]
api-ip6-flowlabels.tex 176 \paragraph{Example.}
177 \addcontentsline{toc}{subsection}{Example}
341 \paragraph{Example.}
342 \addcontentsline{toc}{subsection}{Example}
378 A bit more complicated example using routing header can be found
380 contains an example of using operation \verb|IPV6_FL_A_RENEW|.
  /external/dropbear/libtomcrypt/
crypt.tex 171 For example, consider a hardware platform with a specialized RNG device. Obviously one would like to tap
236 An example of handling an error is:
319 Certain functions such as (for example) \textit{rsa\_export()} give an output that is variable length. To prevent buffer overflows you
320 must pass it the length of the buffer where the output will be stored. For example:
351 In the above example if the size of the RSA public key was more than 1024 bytes this function would return an error code
363 Certain PRNG algorithms do not require a \textit{prng\_state} argument (sprng for example). The \textit{prng\_state} argument
394 lower eight bits contain data. For example, if you want to pass a 256 bit key to a symmetric ciphers setup routine, you
425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not
465 will return {\bf CRYPT\_OK} if the key size specified is acceptable. For example:
496 An example snippet that encodes a block with Blowfish in ECB mode
    [all...]

Completed in 3333 milliseconds