Home
last modified time | relevance | path

Searched refs:duplicate (Results 1 – 25 of 51) sorted by relevance

123

/openssl/test/
H A Ddrbgtest.c407 int duplicate[2] = {0, 0}; in test_rand_reseed_on_fork() local
467 ++duplicate[result[i].private]; in test_rand_reseed_on_fork()
471 if (duplicate[0] >= DRBG_FORK_COUNT - 1) { in test_rand_reseed_on_fork()
473 TEST_note("ERROR: %d duplicate prefixes in public random output", duplicate[0]); in test_rand_reseed_on_fork()
477 if (duplicate[1] >= DRBG_FORK_COUNT - 1) { in test_rand_reseed_on_fork()
479 TEST_note("ERROR: %d duplicate prefixes in private random output", duplicate[1]); in test_rand_reseed_on_fork()
483 duplicate[0] = 0; in test_rand_reseed_on_fork()
491 ++duplicate[0]; in test_rand_reseed_on_fork()
494 if (duplicate[0] >= DRBG_FORK_COUNT - 1) { in test_rand_reseed_on_fork()
496 TEST_note("ERROR: %d duplicate chunks in random output", duplicate[0]); in test_rand_reseed_on_fork()
/openssl/demos/certs/
H A DREADME.txt3 CA certificates, obsolete V1 certificates or duplicate serial numbers.
/openssl/crypto/ui/
H A Dui_lib.c386 void *duplicate = NULL; in UI_dup_user_data() local
394 duplicate = ui->meth->ui_duplicate_data(ui, user_data); in UI_dup_user_data()
395 if (duplicate == NULL) { in UI_dup_user_data()
400 (void)UI_add_user_data(ui, duplicate); in UI_dup_user_data()
/openssl/dev/release-aux/
H A Dopenssl-announce-pre-release.tmpl44 Please check the release notes and mailing lists to avoid duplicate
/openssl/doc/man3/
H A DOSSL_STORE_INFO.pod72 As an alternative, STORE_INFO_get1_<TYPE>() extracts a duplicate (or the
99 all take a B<OSSL_STORE_INFO> and return a duplicate the object it
200 a pointer to a duplicate of the OpenSSL object on success, NULL otherwise.
H A DDSA_get0_pqg.pod90 needed, duplicate the received value using BN_dup() and pass the
91 duplicate. The same applies to DSA_get0_pqg() and DSA_set0_pqg().
H A DX509_ALGOR_dup.pod45 a duplicate of each (and free any thing pointed to from within *dest).
H A DDH_get0_pqg.pod113 needed, duplicate the received value using BN_dup() and pass the
114 duplicate. The same applies to DH_get0_pqg() and DH_set0_pqg().
H A DX509_new.pod55 use: this avoids the need to duplicate the entire certificate structure.
H A DRSA_get0_key.pod130 needed, duplicate the received value using BN_dup() and pass the
131 duplicate. The same applies to RSA_get0_factors() and RSA_set0_factors()
H A DEVP_VerifyInit.pod74 provider does not allow to duplicate contexts EVP_VerifyFinal() will
H A DEVP_SignInit.pod78 provider does not allow to duplicate contexts EVP_SignFinal() will
H A DX509_PUBKEY_new.pod65 X509_PUBKEY_dup() creates a duplicate copy of the B<X509_PUBKEY> object
/openssl/
H A DNOTES-DJGPP.md8 with illegal or duplicate names.
/openssl/doc/designs/quic-design/
H A Djson-encoder.md57 - it is the caller's responsibility to avoid generating duplicate keys;
H A Dquic-ackm.md20 duplicate and should not be processed
416 - duplicate, meaning that we have already been passed such a PN in a call
420 state for it (meaning we cannot tell whether it is a duplicate and cannot
H A Dstream-receive-buffers.md120 data limits by sending duplicate frames with only slight changes in the
/openssl/doc/man7/
H A Dprovider-mac.pod106 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the
107 I<mctx> parameter and return the duplicate copy.
H A Dprovider-cipher.pod123 OSSL_FUNC_cipher_dupctx() should duplicate the provider side cipher context in the
124 I<cctx> parameter and return the duplicate copy.
H A Dprovider-kem.pod125 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem
126 context in the I<ctx> parameter and return the duplicate copy.
H A Dprovider-keyexch.pod104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in
105 the I<ctx> parameter and return the duplicate copy.
H A Dprovider-digest.pod113 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the
114 I<dctx> parameter and return the duplicate copy.
H A Dprovider-kdf.pod104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the
105 I<kctx> parameter and return the duplicate copy.
H A Dprovider-asym_cipher.pod119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher
120 context in the I<ctx> parameter and return the duplicate copy.
/openssl/doc/man1/
H A Dopenssl-rehash.pod.in69 full SHA-1 fingerprint. A warning will be displayed if a duplicate

Completed in 62 milliseconds

123