Home
last modified time | relevance | path

Searched refs:two (Results 1 – 25 of 207) sorted by relevance

123456789

/openssl/doc/man3/
H A DX509_cmp.pod27 The X509_cmp() function compares two B<X509> objects indicated by parameters
29 values of two B<X509> objects and the canonical (DER) encoding values.
31 The X509_NAME_cmp() function compares two B<X509_NAME> objects indicated by
34 canonical (DER) encoding values of the two objects using L<i2d_X509_NAME(3)>.
49 The X509_CRL_match() function compares two B<X509_CRL> objects. Unlike the
H A DRAND_get0_primary.pod30 directly, but is used internally to reseed the other two instances.
34 The two set functions allow the public and private DRBG instances to be
55 they are thread-local. Note however, that changes to these two instances
71 The two set functions, operate on the current thread. If you want to
H A DBN_mod_exp_mont.pod40 BN_mod_exp_mont_consttime_x2() computes two independent exponentiations I<a1> to
44 to speedup two exponentiations. In all other cases the function reduces to two
H A DSSL_get_handshake_rtt.pod22 This metric is created by taking two timestamps during the handshake and
23 providing the difference between these two times.
H A DASN1_TYPE_get.pod64 ASN1_TYPE_cmp() may not return zero if two types are equivalent but have
70 return value is nonzero. Technically if both parameters are NULL the two
74 applications should handle the case of two absent values separately.
H A DCRYPTO_memcmp.pod27 Unlike memcmp(2), this function cannot be used to order the two memory regions
H A DEVP_PKEY_CTX_new.pod67 in two threads.
77 Key types are given in two different manners:
H A DBN_rand.pod51 If it is B<BN_RAND_TOP_TWO>, the two most significant bits of
52 the number will be set to 1, so that the product of two such random
H A DASN1_STRING_length.pod43 ASN1_STRING_cmp() compares I<a> and I<b> returning 0 if the two
74 for an IA5String the data will be ASCII, for a BMPString two bytes per
H A DSSL_CONF_cmd_argv.pod15 The function SSL_CONF_cmd_argv() processes at most two command line
H A DSSL_CIPHER_get_name.pod98 in B<ptr>. The B<ptr> parameter is a two element array of B<char>, which stores the
99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
H A DBIO_s_socket.pod35 Windows is one such platform. Any code mixing the two will not work on
/openssl/doc/internal/man3/
H A DOSSL_TIME.pod118 B<ossl_time_add> performs a saturating addition of the two times,
122 B<ossl_time_subtract> performs a saturating subtraction of the two items,
135 B<ossl_time_abs_difference> returns the magnitude of the difference between two
138 B<ossl_time_min> returns the lesser of two time values.
140 B<ossl_time_max> returns the greater of two time values.
170 B<ossl_time_add> returns the summation of the two times or
173 B<ossl_time_subtract> returns the difference of the two times or the
183 time and the two integral values.
H A DOSSL_SAFE_MATH_SIGNED.pod43 safe_add_TYPE() adds the two arguments I<a> and I<b> together.
47 safe_mul_TYPE() multiplies the two arguments I<a> and I<b> together.
/openssl/doc/internal/man7/
H A DEVP_PKEY.pod37 The functions available through those two method structures get full
57 These two forms can never co-exist in the same B<EVP_PKEY>, the main
59 with synchronising between the two forms, and potentially make it
60 confusing which one of the two is the origin.
117 B<EVP_PKEY>. Each cache entry has two items, a pointer to the
122 there are two forms of the latter, we have the "legacy origin" and the
H A Dbuild.info.pod292 F<build.info> files that are digested. There are two exceptions,
377 With those two lines, the program C<foo> will not have the attribute
399 With those two lines, the library C<libfoo> will not have the
412 With those two lines, the module C<foo> will not have the attribute
427 With those two lines, the script C<foo> will not have the attribute
595 that the dependency between two libraries is weak and is only there to
598 Without this attribute, a dependency between two libraries, expressed
604 With this attribute, a dependency between two libraries, expressed
612 This is useful in complex dependency trees where two libraries can be
H A Ddeprecation.pod44 two numbers (such as C<3_0>) from 3.0 and on.
46 The implementation of a deprecated symbol is kept for one of two reasons:
/openssl/crypto/property/
H A DREADME.md68 separate hash tables. The two Boolean values, the strings "yes" and "no",
69 are populated as the first two members of the value table. All property
79 against a definition and merging two queries into a single larger query.
/openssl/doc/man1/
H A Dopenssl-kdf.pod.in84 the secret key is specified in hexadecimal form (two hex digits per byte).
95 the password is specified in hexadecimal form (two hex digits per byte).
108 the salt is specified in hexadecimal form (two hex digits per byte).
122 the info is specified in hexadecimal form (two hex digits per byte).
/openssl/doc/man7/
H A Dproperty.pod21 Property names fall into two categories: those reserved by the OpenSSL
31 two or more C-style identifiers, separated by periods.
65 The first two represent mandatory clauses, such clauses B<must> match
H A DEVP_RAND.pod71 It is possible to create chains of more than two DRBG in a row.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
217 The DRBG distinguishes two different types of random input: I<entropy>,
239 The following two sections describe the reseeding process of the primary
H A Dossl-guide-quic-multi-stream.pod34 data between the two peers. Each stream is also represented by an B<SSL>
52 connection. But you cannot use the same B<SSL> object on two different threads
197 For the purposes of this example we will create two different streams to send
198 two different HTTP requests to the server. For the purposes of demonstration the
203 * We create two new client initiated streams. The first will be
238 the requests on the two streams. For the sake of simplicity this example does
243 order. For example we could start two threads (one for each stream) and write
/openssl/demos/http3/
H A DREADME.md7 The demo is structured into two parts:
/openssl/doc/HOWTO/
H A Dkeys.txt40 Generating a key for the DSA algorithm is a two-step process. First,
65 two-step processes. First, you have to get the EC parameters from which
/openssl/crypto/aes/asm/
H A Daesp8-ppc.pl1479 vadduwm $two,$one,$one
1484 vadduwm $out2,$ivec,$two
1487 vadduwm $out3,$out1,$two
1490 vadduwm $out4,$out2,$two
1493 vadduwm $out5,$out3,$two
1496 vadduwm $out6,$out4,$two
1498 vadduwm $out7,$out5,$two
1638 vadduwm $out2,$ivec,$two
1641 vadduwm $out3,$out1,$two
1644 vadduwm $out4,$out2,$two
[all …]

Completed in 28 milliseconds

123456789