Searched refs:duplicate (Results 1 – 25 of 51) sorted by relevance
123
/openssl/test/ |
H A D | drbgtest.c | 407 int duplicate[2] = {0, 0}; in test_rand_reseed_on_fork() local 467 ++duplicate[result[i].private]; in test_rand_reseed_on_fork() 471 if (duplicate[0] >= DRBG_FORK_COUNT - 1) { in test_rand_reseed_on_fork() 473 TEST_note("ERROR: %d duplicate prefixes in public random output", duplicate[0]); in test_rand_reseed_on_fork() 477 if (duplicate[1] >= DRBG_FORK_COUNT - 1) { in test_rand_reseed_on_fork() 479 TEST_note("ERROR: %d duplicate prefixes in private random output", duplicate[1]); in test_rand_reseed_on_fork() 483 duplicate[0] = 0; in test_rand_reseed_on_fork() 491 ++duplicate[0]; in test_rand_reseed_on_fork() 494 if (duplicate[0] >= DRBG_FORK_COUNT - 1) { in test_rand_reseed_on_fork() 496 TEST_note("ERROR: %d duplicate chunks in random output", duplicate[0]); in test_rand_reseed_on_fork()
|
/openssl/demos/certs/ |
H A D | README.txt | 3 CA certificates, obsolete V1 certificates or duplicate serial numbers.
|
/openssl/crypto/ui/ |
H A D | ui_lib.c | 386 void *duplicate = NULL; in UI_dup_user_data() local 394 duplicate = ui->meth->ui_duplicate_data(ui, user_data); in UI_dup_user_data() 395 if (duplicate == NULL) { in UI_dup_user_data() 400 (void)UI_add_user_data(ui, duplicate); in UI_dup_user_data()
|
/openssl/dev/release-aux/ |
H A D | openssl-announce-pre-release.tmpl | 44 Please check the release notes and mailing lists to avoid duplicate
|
/openssl/doc/man3/ |
H A D | OSSL_STORE_INFO.pod | 72 As an alternative, STORE_INFO_get1_<TYPE>() extracts a duplicate (or the 99 all take a B<OSSL_STORE_INFO> and return a duplicate the object it 200 a pointer to a duplicate of the OpenSSL object on success, NULL otherwise.
|
H A D | DSA_get0_pqg.pod | 90 needed, duplicate the received value using BN_dup() and pass the 91 duplicate. The same applies to DSA_get0_pqg() and DSA_set0_pqg().
|
H A D | X509_ALGOR_dup.pod | 45 a duplicate of each (and free any thing pointed to from within *dest).
|
H A D | DH_get0_pqg.pod | 113 needed, duplicate the received value using BN_dup() and pass the 114 duplicate. The same applies to DH_get0_pqg() and DH_set0_pqg().
|
H A D | X509_new.pod | 55 use: this avoids the need to duplicate the entire certificate structure.
|
H A D | RSA_get0_key.pod | 130 needed, duplicate the received value using BN_dup() and pass the 131 duplicate. The same applies to RSA_get0_factors() and RSA_set0_factors()
|
H A D | EVP_VerifyInit.pod | 74 provider does not allow to duplicate contexts EVP_VerifyFinal() will
|
H A D | EVP_SignInit.pod | 78 provider does not allow to duplicate contexts EVP_SignFinal() will
|
H A D | X509_PUBKEY_new.pod | 65 X509_PUBKEY_dup() creates a duplicate copy of the B<X509_PUBKEY> object
|
/openssl/ |
H A D | NOTES-DJGPP.md | 8 with illegal or duplicate names.
|
/openssl/doc/designs/quic-design/ |
H A D | json-encoder.md | 57 - it is the caller's responsibility to avoid generating duplicate keys;
|
H A D | quic-ackm.md | 20 duplicate and should not be processed 416 - duplicate, meaning that we have already been passed such a PN in a call 420 state for it (meaning we cannot tell whether it is a duplicate and cannot
|
H A D | stream-receive-buffers.md | 120 data limits by sending duplicate frames with only slight changes in the
|
/openssl/doc/man7/ |
H A D | provider-mac.pod | 106 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the 107 I<mctx> parameter and return the duplicate copy.
|
H A D | provider-cipher.pod | 123 OSSL_FUNC_cipher_dupctx() should duplicate the provider side cipher context in the 124 I<cctx> parameter and return the duplicate copy.
|
H A D | provider-kem.pod | 125 OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem 126 context in the I<ctx> parameter and return the duplicate copy.
|
H A D | provider-keyexch.pod | 104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in 105 the I<ctx> parameter and return the duplicate copy.
|
H A D | provider-digest.pod | 113 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the 114 I<dctx> parameter and return the duplicate copy.
|
H A D | provider-kdf.pod | 104 OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the 105 I<kctx> parameter and return the duplicate copy.
|
H A D | provider-asym_cipher.pod | 119 OSSL_FUNC_asym_cipher_dupctx() should duplicate the provider side asymmetric cipher 120 context in the I<ctx> parameter and return the duplicate copy.
|
/openssl/doc/man1/ |
H A D | openssl-rehash.pod.in | 69 full SHA-1 fingerprint. A warning will be displayed if a duplicate
|
Completed in 52 milliseconds
123