Searched
full:recommended (Results
1201 -
1225 of
2212) sorted by null
<<41424344454647484950>>
/external/mesa3d/src/egl/main/ |
eglconfig.c | 53 * It is also recommended that when there are N configs, their
|
/external/mesa3d/src/gallium/auxiliary/gallivm/ |
lp_bld_flow.c | 463 * The mem2reg optimization pass is the recommended way to dealing with mutable
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 185 * parameter value. Realm strings MUST be globally unique. It is RECOMMENDED
|
/external/owasp/sanitizer/tools/findbugs/doc/ |
AddingDetectors.txt | 96 BAD_PRACTICE - violations of recommended and essential coding practice
|
demo.html | 185 Violations of recommended and essential
|
/external/pdfium/core/src/fxcodec/libjpeg/ |
fpdfapi_jcmarker.c | 329 * We emit 0 for unused field(s); this is recommended by the P&M text
|
fpdfapi_jidctred.c | 92 * For 8-bit samples with the recommended scaling, all the variable
|
/external/ppp/pppd/plugins/radius/ |
avpair.c | 256 * the "SHOULD" format recommended by RCF 2138.
|
/external/qemu/distrib/jpeg-6b/ |
jcmarker.c | 328 * We emit 0 for unused field(s); this is recommended by the P&M text
|
jidctred.c | 91 * For 8-bit samples with the recommended scaling, all the variable
|
wizard.doc | 108 be achieved by specifying "-sample 2x1". This is not recommended unless
|
/external/srtp/doc/ |
draft-irtf-cfrg-icm-00.txt | 68
Crypto Forum Research Group David A. McGrew
Internet Draft Cisco Systems, Inc.
Expires April, 2003 October, 2002
Integer Counter Mode
<draft-irtf-cfrg-icm-00.txt>
Status of this Memo
This document is an Internet Draft and is in full conformance with
all provisions of Section 10 of RFC-2026. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and working groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
1. Abstract
This document specifies Integer Counter Mode (ICM), a mode of
operation of a block cipher which defines an indexed keystream
generator (which generates a keystream segment given an index).
This mode is efficient, parallelizable, and has been proven secure
given realistic assumptions about the block cipher. Test vectors
are provided for AES.
Counter Mode admits many variations. The variant specified in
this document is secure and flexible, yet it enables a single
implementation of a keystream generator to suffice in different
application domains.
McGrew [Page 1]
Internet Draft Integer Counter Mode October, 2002
2. Notational Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC-2119 [B97].
(…)
|
/external/stlport/stlport/stl/config/ |
user_config.h | 120 * Otherwise this option is not recommended as it increases the size of your object files
|
/external/strace/ |
INSTALL | 66 recommended that the package be configured and built as a regular
|
/external/wpa_supplicant_8/hostapd/ |
defconfig | 226 # However, it is very strongly recommended that the system pool is initialized
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 21 * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits),
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 21 * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits),
|
eap_server_wsc.c | 481 /* Recommended retransmit times: retransmit timeout 5 seconds,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-Windows.txt | 228 users) -- this is *not* recommended, since named pipes can be attached
|
/frameworks/av/include/ndk/ |
NdkMediaDrm.h | 159 * returned in KeyRequest.data. The recommended URL to deliver the key request to
|
/frameworks/base/core/java/android/nfc/cardemulation/ |
HostApduService.java | 45 * AIDs, it is recommended to choose an AID of at least 6 bytes,
|
/frameworks/base/core/java/android/nfc/tech/ |
Ndef.java | 65 * recommended to use NFC Forum Types 1-4 in new deployments of NFC tags
|
/frameworks/base/docs/html/about/versions/ |
android-2.0.jd | 338 <p>In general, intercepting the BACK key in an application is not recommended,
|
/frameworks/base/docs/html/design/wear/ |
patterns.jd | 147 href="{@docRoot}training/wearables/apps/layouts.html#UiLibrary"><code>WearableListView</code></a> component) creates a simple list optimized for ease of use on a small screen where the focused item snaps to the center of the screen and a single tap selects. This widget is recommended as a common pattern for selecting items. It is used throughout the system UI, including in the list that can be accessed by swiping up on the cue card.</p>
|
/frameworks/base/docs/html/google/play/billing/ |
api.jd | 127 <p>Subsequently, when the user starts up or logs in to your application, you should check if the user owns any outstanding consumable in-app products; if so, make sure to consume and provision those items. Here's the recommended application startup flow if you implement consumable in-app products in your application:</p>
|
Completed in 1014 milliseconds
<<41424344454647484950>>