
ntohl(3)  convert values between different byte orderings

These routines convert 16, 32 and 64bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... 
ntohs(3)  convert values between different byte orderings

These routines convert 16, 32 and 64bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... 
OBJ_nid2sn(3)  EVP cipher routines

The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... 
OBJ_obj2nid(3)  EVP cipher routines

The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... 
ocurses(3)  screen functions with ``optimal'' cursor motion

These routines give the user a method of updating screens with reasonable optimization. They keep an image of the current screen, and the user sets up an image of a new one. Then refresh() tells the r... 
ohash_create_entry(3)  helper functions for open hashing

These functions are commonly used to simplify open hashing usage, and use similar conventions. They operate indifferently on nullterminated strings (by setting *pend = NULL) or memory ranges (delimite... 
ohash_delete(3)  lightweight open hashing

Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... 
ohash_entries(3)  lightweight open hashing

Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... 
ohash_find(3)  lightweight open hashing

Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... 
ohash_first(3)  lightweight open hashing

Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... 
ohash_init(3)  lightweight open hashing

Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... 
ohash_insert(3)  lightweight open hashing

Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... 
ohash_interval(3)  helper functions for open hashing

These functions are commonly used to simplify open hashing usage, and use similar conventions. They operate indifferently on nullterminated strings (by setting *pend = NULL) or memory ranges (delimite... 