HomeSort by relevance Sort by last modified time
    Searched defs:also (Results 1 - 3 of 3) sorted by null

  /external/iproute2/doc/
ip-cref.tex 27 but translating them into other terms, which may also be unknown to the reader.
166 about the reason for the failure. Sometimes it also prints a help page.
367 (\verb|eth0|, \verb|sit0| etc.). The interface name is also
482 \paragraph{Statistics:} With the \verb|-statistics| option, \verb|ip| also
768 In this case the output also contains information on times, when
804 twice, \verb|ip addr flush| also dumps all the deleted addresses
848 \paragraph{See also:} Appendix~\ref{PROXY-NEIGH}, p.\pageref{PROXY-NEIGH}
876 --- the link layer address of the neighbour. \verb|LLADDRESS| can also be
    [all...]
  /external/iptables/include/
xtables.h 120 * @also: bitmask of flags that must be used with this option
130 unsigned int id, excl, also, flags; member in struct:xt_option_entry
  /external/dropbear/libtomcrypt/
crypt.tex 126 also performs extensive parameter error checking to prevent any number of run-time exploits or errors.
148 on an x86 with zero problems. The consistent API also means that if you learn how to use Blowfish with the library you
153 Not only did I strive to make a consistent and simple API to work with but I also attempted to make the library
158 On top of making the build simple and the API approachable I've also attempted for a reasonably high level of
165 The LibTomCrypt package has also been written to be very modular. The block ciphers, one--way hashes,
267 The header file \textit{tomcrypt.h} also includes \textit{stdio.h}, \textit{string.h}, \textit{stdlib.h}, \textit{time.h} and \textit{ctype.h}.
410 have the same prototype and store their keys as naturally as possible. This also removes the need for dynamic memory
493 setup function must also call the respective cipher done function when finished.
639 For AES, (also known as Rijndael) there are four descriptors which complicate issues a little. The descriptors
692 the location in the array where the cipher was found. For example, to indirectly setup Blowfish you can also use
    [all...]

Completed in 1307 milliseconds