/openssl/doc/man3/ |
H A D | X509_cmp.pod | 27 The X509_cmp() function compares two B<X509> objects indicated by parameters 29 values of two B<X509> objects and the canonical (DER) encoding values. 31 The X509_NAME_cmp() function compares two B<X509_NAME> objects indicated by 34 canonical (DER) encoding values of the two objects using L<i2d_X509_NAME(3)>. 49 The X509_CRL_match() function compares two B<X509_CRL> objects. Unlike the
|
H A D | RAND_get0_primary.pod | 30 directly, but is used internally to reseed the other two instances. 34 The two set functions allow the public and private DRBG instances to be 55 they are thread-local. Note however, that changes to these two instances 71 The two set functions, operate on the current thread. If you want to
|
H A D | BN_mod_exp_mont.pod | 40 BN_mod_exp_mont_consttime_x2() computes two independent exponentiations I<a1> to 44 to speedup two exponentiations. In all other cases the function reduces to two
|
H A D | SSL_get_handshake_rtt.pod | 22 This metric is created by taking two timestamps during the handshake and 23 providing the difference between these two times.
|
H A D | ASN1_TYPE_get.pod | 64 ASN1_TYPE_cmp() may not return zero if two types are equivalent but have 70 return value is nonzero. Technically if both parameters are NULL the two 74 applications should handle the case of two absent values separately.
|
H A D | CRYPTO_memcmp.pod | 27 Unlike memcmp(2), this function cannot be used to order the two memory regions
|
H A D | EVP_PKEY_CTX_new.pod | 67 in two threads. 77 Key types are given in two different manners:
|
H A D | BN_rand.pod | 51 If it is B<BN_RAND_TOP_TWO>, the two most significant bits of 52 the number will be set to 1, so that the product of two such random
|
H A D | ASN1_STRING_length.pod | 43 ASN1_STRING_cmp() compares I<a> and I<b> returning 0 if the two 74 for an IA5String the data will be ASCII, for a BMPString two bytes per
|
H A D | SSL_CONF_cmd_argv.pod | 15 The function SSL_CONF_cmd_argv() processes at most two command line
|
H A D | SSL_CIPHER_get_name.pod | 98 in B<ptr>. The B<ptr> parameter is a two element array of B<char>, which stores the 99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
|
H A D | BIO_s_socket.pod | 35 Windows is one such platform. Any code mixing the two will not work on
|
/openssl/doc/internal/man3/ |
H A D | OSSL_TIME.pod | 118 B<ossl_time_add> performs a saturating addition of the two times, 122 B<ossl_time_subtract> performs a saturating subtraction of the two items, 135 B<ossl_time_abs_difference> returns the magnitude of the difference between two 138 B<ossl_time_min> returns the lesser of two time values. 140 B<ossl_time_max> returns the greater of two time values. 170 B<ossl_time_add> returns the summation of the two times or 173 B<ossl_time_subtract> returns the difference of the two times or the 183 time and the two integral values.
|
H A D | OSSL_SAFE_MATH_SIGNED.pod | 43 safe_add_TYPE() adds the two arguments I<a> and I<b> together. 47 safe_mul_TYPE() multiplies the two arguments I<a> and I<b> together.
|
/openssl/doc/internal/man7/ |
H A D | EVP_PKEY.pod | 37 The functions available through those two method structures get full 57 These two forms can never co-exist in the same B<EVP_PKEY>, the main 59 with synchronising between the two forms, and potentially make it 60 confusing which one of the two is the origin. 117 B<EVP_PKEY>. Each cache entry has two items, a pointer to the 122 there are two forms of the latter, we have the "legacy origin" and the
|
H A D | build.info.pod | 292 F<build.info> files that are digested. There are two exceptions, 377 With those two lines, the program C<foo> will not have the attribute 399 With those two lines, the library C<libfoo> will not have the 412 With those two lines, the module C<foo> will not have the attribute 427 With those two lines, the script C<foo> will not have the attribute 595 that the dependency between two libraries is weak and is only there to 598 Without this attribute, a dependency between two libraries, expressed 604 With this attribute, a dependency between two libraries, expressed 612 This is useful in complex dependency trees where two libraries can be
|
H A D | deprecation.pod | 44 two numbers (such as C<3_0>) from 3.0 and on. 46 The implementation of a deprecated symbol is kept for one of two reasons:
|
/openssl/crypto/property/ |
H A D | README.md | 68 separate hash tables. The two Boolean values, the strings "yes" and "no", 69 are populated as the first two members of the value table. All property 79 against a definition and merging two queries into a single larger query.
|
/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 84 the secret key is specified in hexadecimal form (two hex digits per byte). 95 the password is specified in hexadecimal form (two hex digits per byte). 108 the salt is specified in hexadecimal form (two hex digits per byte). 122 the info is specified in hexadecimal form (two hex digits per byte).
|
/openssl/doc/man7/ |
H A D | property.pod | 21 Property names fall into two categories: those reserved by the OpenSSL 31 two or more C-style identifiers, separated by periods. 65 The first two represent mandatory clauses, such clauses B<must> match
|
H A D | EVP_RAND.pod | 71 It is possible to create chains of more than two DRBG in a row. 88 the two other two DRBG instances. It reseeds itself by obtaining randomness 217 The DRBG distinguishes two different types of random input: I<entropy>, 239 The following two sections describe the reseeding process of the primary
|
H A D | ossl-guide-quic-multi-stream.pod | 34 data between the two peers. Each stream is also represented by an B<SSL> 52 connection. But you cannot use the same B<SSL> object on two different threads 197 For the purposes of this example we will create two different streams to send 198 two different HTTP requests to the server. For the purposes of demonstration the 203 * We create two new client initiated streams. The first will be 238 the requests on the two streams. For the sake of simplicity this example does 243 order. For example we could start two threads (one for each stream) and write
|
/openssl/demos/http3/ |
H A D | README.md | 7 The demo is structured into two parts:
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 40 Generating a key for the DSA algorithm is a two-step process. First, 65 two-step processes. First, you have to get the EC parameters from which
|
/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 1479 vadduwm $two,$one,$one 1484 vadduwm $out2,$ivec,$two 1487 vadduwm $out3,$out1,$two 1490 vadduwm $out4,$out2,$two 1493 vadduwm $out5,$out3,$two 1496 vadduwm $out6,$out4,$two 1498 vadduwm $out7,$out5,$two 1638 vadduwm $out2,$ivec,$two 1641 vadduwm $out3,$out1,$two 1644 vadduwm $out4,$out2,$two [all …]
|