Searched defs:also (Results 1 - 3 of 3) sorted by relevance
/external/iproute2/doc/ |
H A D | ip-cref.tex | 27 but translating them into other terms, which may also be unknown to the reader. 166 about the reason for the failure. Sometimes it also prints a help page. 367 (\verb|eth0|, \verb|sit0| etc.). The interface name is also 482 \paragraph{Statistics:} With the \verb|-statistics| option, \verb|ip| also 768 In this case the output also contains information on times, when 804 twice, \verb|ip addr flush| also dumps all the deleted addresses 848 \paragraph{See also:} Appendix~\ref{PROXY-NEIGH}, p.\pageref{PROXY-NEIGH} 876 --- the link layer address of the neighbour. \verb|LLADDRESS| can also be 1057 twice, \verb|ip neigh flush| also dumps all the deleted neighbours 1226 \verb|ip| assumes a full-length host route. There is also [all...] |
/external/iptables/include/ |
H A D | xtables.h | 120 * @also: bitmask of flags that must be used with this option 130 unsigned int id, excl, also, flags; member in struct:xt_option_entry
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 126 also performs extensive parameter error checking to prevent any number of run-time exploits or errors. 148 on an x86 with zero problems. The consistent API also means that if you learn how to use Blowfish with the library you 153 Not only did I strive to make a consistent and simple API to work with but I also attempted to make the library 158 On top of making the build simple and the API approachable I've also attempted for a reasonably high level of 165 The LibTomCrypt package has also been written to be very modular. The block ciphers, one--way hashes, 267 The header file \textit{tomcrypt.h} also includes \textit{stdio.h}, \textit{string.h}, \textit{stdlib.h}, \textit{time.h} and \textit{ctype.h}. 410 have the same prototype and store their keys as naturally as possible. This also removes the need for dynamic memory 493 setup function must also call the respective cipher done function when finished. 639 For AES, (also known as Rijndael) there are four descriptors which complicate issues a little. The descriptors 692 the location in the array where the cipher was found. For example, to indirectly setup Blowfish you can also us [all...] |
Completed in 210 milliseconds