HomeSort by relevance Sort by last modified time
    Searched full:recommended (Results 1201 - 1225 of 2212) sorted by null

<<41424344454647484950>>

  /external/mesa3d/src/egl/main/
eglconfig.c 53 * It is also recommended that when there are N configs, their
  /external/mesa3d/src/gallium/auxiliary/gallivm/
lp_bld_flow.c 463 * The mem2reg optimization pass is the recommended way to dealing with mutable
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationHeader.java 185 * parameter value. Realm strings MUST be globally unique. It is RECOMMENDED
  /external/owasp/sanitizer/tools/findbugs/doc/
AddingDetectors.txt 96 BAD_PRACTICE - violations of recommended and essential coding practice
demo.html 185 Violations of recommended and essential
  /external/pdfium/core/src/fxcodec/libjpeg/
fpdfapi_jcmarker.c 329 * We emit 0 for unused field(s); this is recommended by the P&M text
fpdfapi_jidctred.c 92 * For 8-bit samples with the recommended scaling, all the variable
  /external/ppp/pppd/plugins/radius/
avpair.c 256 * the "SHOULD" format recommended by RCF 2138.
  /external/qemu/distrib/jpeg-6b/
jcmarker.c 328 * We emit 0 for unused field(s); this is recommended by the P&M text
jidctred.c 91 * For 8-bit samples with the recommended scaling, all the variable
wizard.doc 108 be achieved by specifying "-sample 2x1". This is not recommended unless
  /external/srtp/doc/
draft-irtf-cfrg-icm-00.txt 68 Crypto Forum Research Group David A. McGrew Internet Draft Cisco Systems, Inc. Expires April, 2003 October, 2002 Integer Counter Mode <draft-irtf-cfrg-icm-00.txt> Status of this Memo This document is an Internet Draft and is in full conformance with all provisions of Section 10 of RFC-2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Abstract This document specifies Integer Counter Mode (ICM), a mode of operation of a block cipher which defines an indexed keystream generator (which generates a keystream segment given an index). This mode is efficient, parallelizable, and has been proven secure given realistic assumptions about the block cipher. Test vectors are provided for AES. Counter Mode admits many variations. The variant specified in this document is secure and flexible, yet it enables a single implementation of a keystream generator to suffice in different application domains. McGrew [Page 1] Internet Draft Integer Counter Mode October, 2002 2. Notational Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [B97]. (…)
  /external/stlport/stlport/stl/config/
user_config.h 120 * Otherwise this option is not recommended as it increases the size of your object files
  /external/strace/
INSTALL 66 recommended that the package be configured and built as a regular
  /external/wpa_supplicant_8/hostapd/
defconfig 226 # However, it is very strongly recommended that the system pool is initialized
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 21 * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits),
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 21 * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits),
eap_server_wsc.c 481 /* Recommended retransmit times: retransmit timeout 5 seconds,
  /external/wpa_supplicant_8/wpa_supplicant/
README-Windows.txt 228 users) -- this is *not* recommended, since named pipes can be attached
  /frameworks/av/include/ndk/
NdkMediaDrm.h 159 * returned in KeyRequest.data. The recommended URL to deliver the key request to
  /frameworks/base/core/java/android/nfc/cardemulation/
HostApduService.java 45 * AIDs, it is recommended to choose an AID of at least 6 bytes,
  /frameworks/base/core/java/android/nfc/tech/
Ndef.java 65 * recommended to use NFC Forum Types 1-4 in new deployments of NFC tags
  /frameworks/base/docs/html/about/versions/
android-2.0.jd 338 <p>In general, intercepting the BACK key in an application is not recommended,
  /frameworks/base/docs/html/design/wear/
patterns.jd 147 href="{@docRoot}training/wearables/apps/layouts.html#UiLibrary"><code>WearableListView</code></a> component) creates a simple list optimized for ease of use on a small screen where the focused item snaps to the center of the screen and a single tap selects. This widget is recommended as a common pattern for selecting items. It is used throughout the system UI, including in the list that can be accessed by swiping up on the cue card.</p>
  /frameworks/base/docs/html/google/play/billing/
api.jd 127 <p>Subsequently, when the user starts up or logs in to your application, you should check if the user owns any outstanding consumable in-app products; if so, make sure to consume and provision those items. Here's the recommended application startup flow if you implement consumable in-app products in your application:</p>

Completed in 1014 milliseconds

<<41424344454647484950>>