Searched full:transparently (Results 1 – 25 of 142) sorted by relevance
123456
99 /// Transparently provide more efficient getOperand methods.167 /// Transparently provide more efficient getOperand methods.403 /// Transparently provide more efficient getOperand methods.547 /// Transparently provide more efficient getOperand methods.584 /// Transparently provide more efficient getOperand methods.608 /// Transparently provide more efficient getOperand methods.
68 a new handshake is started then this will be handled transparently by calling72 this will be handled transparently through calling any OpenSSL IO function. For
42 1. This is handled transparently by these functions.
56 transparently with any underlying ENGINE implementation because it uses the
51 * formats transparently. in IMPLEMENT_PEM_rw()182 /* Transparently read in PKCS#3 or X9.42 DH parameters */ in IMPLEMENT_PEM_write()
11 # Route all UDP packets through transparently.
83 /// Transparently provide more efficient getOperand methods.110 /// Transparently provide more efficient getOperand methods.138 /// Transparently provide more efficient getOperand methods.174 /// Transparently provide more efficient getOperand methods.211 /// Transparently provide more efficient getOperand methods.
203 a new handshake is started then this will be handled transparently by calling207 this will be handled transparently through calling any OpenSSL \s-1IO\s0 function. For
4 mechanism that allows for clients to transparently make remote method
14 mechanism that allows for clients to transparently make remote method
56 argument transparently to
51 * rwlock_padalign rwlocks can use the rwlock(9) API transparently without
54 * mtx_padalign mutexes can use the mtx(9) API transparently without
63 * Since POWER ISA 2.07B this is solved transparently
67 then transparently invokes
122 wide string, the object will transparently convert formats
155 File flags are transparently converted between a bitmap
96 transparently converted to the character encoding suitable for your
17 I/O it can transparently handle SSL connections, unencrypted network
33 copied and transparently passed to the remote side as part of the
44 copied and transparently passed to the remote side as part of the
85 // Subclasses must provide a command object that will be transparently used
36 to identify data items. These are mapped transparently to CRYPTO_EX_DATA dynamic
55 HVM configurations may either rely on transparently emulated hardware
71 // comparison operators to work transparently, etc.