Home
last modified time | relevance | path

Searched refs:two (Results 1 – 25 of 162) sorted by relevance

1234567

/openssl/doc/internal/man3/
H A DOSSL_TIME.pod79 B<ossl_time_add> performs a saturating addition of the two times,
83 B<ossl_time_subtract> performs a saturating subtraction of the two items,
93 B<ossl_time_abs_difference> returns the magnitude of the difference between two
96 B<ossl_time_min> returns the lesser of two time values.
98 B<ossl_time_max> returns the greater of two time values.
118 B<ossl_time_add> returns the summation of the two times or
121 B<ossl_time_subtract> returns the difference of the two times or the
H A DOSSL_SAFE_MATH_SIGNED.pod43 safe_add_TYPE() adds the two arguments I<a> and I<b> together.
47 safe_mul_TYPE() multiplies the two arguments I<a> and I<b> together.
/openssl/doc/man3/
H A DX509_cmp.pod27 The X509_cmp() function compares two B<X509> objects indicated by parameters
29 values of two B<X509> objects and the canonical (DER) encoding values.
31 The X509_NAME_cmp() function compares two B<X509_NAME> objects indicated by
34 canonical (DER) encoding values of the two objects using L<i2d_X509_NAME(3)>.
49 The X509_CRL_match() function compares two B<X509_CRL> objects. Unlike the
H A DBN_mod_exp_mont.pod40 BN_mod_exp_mont_consttime_x2() computes two independent exponentiations I<a1> to
44 to speedup two exponentiations. In all other cases the function reduces to two
H A DASN1_TYPE_get.pod64 ASN1_TYPE_cmp() may not return zero if two types are equivalent but have
70 return value is nonzero. Technically if both parameters are NULL the two
74 applications should handle the case of two absent values separately.
H A DRAND_get0_primary.pod26 directly, but is used internally to reseed the other two instances.
48 they are thread-local. Note however, that changes to these two instances
H A DCRYPTO_memcmp.pod27 Unlike memcmp(2), this function cannot be used to order the two memory regions
H A DASN1_STRING_length.pod43 ASN1_STRING_cmp() compares I<a> and I<b> returning 0 if the two
74 for an IA5String the data will be ASCII, for a BMPString two bytes per
H A DSSL_CONF_cmd_argv.pod15 The function SSL_CONF_cmd_argv() processes at most two command line
H A DEVP_sha224.pod42 The two algorithms: SHA-512/224 and SHA512/256 are truncated forms of the
H A DEVP_PKEY_CTX_new.pod67 in two threads.
77 Key types are given in two different manners:
H A DBN_rand.pod51 If it is B<BN_RAND_TOP_TWO>, the two most significant bits of
52 the number will be set to 1, so that the product of two such random
H A DBIO_s_socket.pod35 Windows is one such platform. Any code mixing the two will not work on
H A DSSL_CIPHER_get_name.pod98 in B<ptr>. The B<ptr> parameter is a two element array of B<char>, which stores the
99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
H A DBN_security_bits.pod17 defined in NIST SP800-57. Currently, BN_security_bits() support two types
H A DOPENSSL_strcasecmp.pod5 OPENSSL_strcasecmp, OPENSSL_strncasecmp - compare two strings ignoring case
/openssl/doc/internal/man7/
H A DEVP_PKEY.pod37 The functions available through those two method structures get full
57 These two forms can never co-exist in the same B<EVP_PKEY>, the main
59 with synchronising between the two forms, and potentially make it
60 confusing which one of the two is the origin.
117 B<EVP_PKEY>. Each cache entry has two items, a pointer to the
122 there are two forms of the latter, we have the "legacy origin" and the
H A Dbuild.info.pod292 F<build.info> files that are digested. There are two exceptions,
377 With those two lines, the program C<foo> will not have the attribute
399 With those two lines, the library C<libfoo> will not have the
412 With those two lines, the module C<foo> will not have the attribute
427 With those two lines, the script C<foo> will not have the attribute
562 that the dependency between two libraries is weak and is only there to
565 Without this attribute, a dependency between two libraries, expressed
571 With this attribute, a dependency between two libraries, expressed
579 This is useful in complex dependency trees where two libraries can be
/openssl/crypto/property/
H A DREADME.md68 separate hash tables. The two Boolean values, the strings "yes" and "no",
69 are populated as the first two members of the value table. All property
79 against a definition and merging two queries into a single larger query.
/openssl/
H A DREADME-FIPS.md36 The Installation of the FIPS provider consists of two steps. In the first step,
43 the installation by doing the following two things:
/openssl/doc/man7/
H A Dproperty.pod21 Property names fall into two categories: those reserved by the OpenSSL
31 two or more C-style identifiers, separated by periods.
65 The first two represent mandatory clauses, such clauses B<must> match
H A DEVP_RAND.pod71 It is possible to create chains of more than two DRBG in a row.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
217 The DRBG distinguishes two different types of random input: I<entropy>,
233 The following two sections describe the reseeding process of the primary
H A Dfips_module.pod257 default property query is defined then the two queries are merged together and
261 There are two important built-in properties that you should be aware of:
304 create two library contexts. In one we assume the existence of a config file
314 * Create two nondefault library contexts. One for fips usage and
415 In this first example we create two SSL_CTX objects using two different library
430 In this second example we create two SSL_CTX objects using different properties
/openssl/doc/HOWTO/
H A Dkeys.txt40 Generating a key for the DSA algorithm is a two-step process. First,
65 two-step processes. First, you have to get the EC parameters from which
/openssl/test/
H A DREADME-dev.md9 where `{nn}` is a two digit number and
21 A test recipe is named `test/recipes/{nn}-test_{name}.t`, where `{nn}` is a two

Completed in 50 milliseconds

1234567