Searched refs:allocated (Results 1 – 25 of 133) sorted by relevance
123456
/openssl-master/doc/man3/ |
A D | SSL_alloc_buffers.pod | 21 control when buffers are freed and allocated. 27 to control where and how buffers are allocated. 46 The SSL_alloc_buffers() function returns 1 if the buffers have been allocated. 47 This value is also returned if the buffers had been allocated before calling
|
A D | OSSL_PARAM_BLD.pod | 58 I<bld> into an allocated OSSL_PARAM array. 78 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation 79 will also be securely allocated. 87 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation 88 will also be securely allocated. 118 OSSL_PARAM_BLD_new() returns the allocated OSSL_PARAM_BLD structure, or NULL 121 OSSL_PARAM_BLD_to_param() returns the allocated OSSL_PARAM array, or NULL
|
A D | OPENSSL_secure_malloc.pod | 89 the memory if it was not allocated from the secure heap. 93 OPENSSL_secure_actual_size() tells the actual size allocated to the 97 OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap. 99 CRYPTO_secure_used() returns the number of bytes allocated in the 114 allocated.
|
A D | ASN1_STRING_new.pod | 18 ASN1_STRING_new() returns an allocated B<ASN1_STRING> structure. Its type 21 ASN1_STRING_type_new() returns an allocated B<ASN1_STRING> structure of
|
A D | OPENSSL_hexchar2int.pod | 41 The memory is allocated by calling OPENSSL_malloc() and should be 57 The memory is allocated by calling OPENSSL_malloc() and should be 66 return a pointer to allocated memory, or NULL on error.
|
A D | SSL_SESSION_free.pod | 31 the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated 37 SSL_SESSION objects are allocated, when a TLS/SSL handshake operation 62 SSL_SESSION_new returns a pointer to the newly allocated SSL_SESSION structure
|
A D | SSL_CTX_free.pod | 5 SSL_CTX_free - free an allocated SSL_CTX object 16 SSL_CTX object pointed to by B<ctx> and frees up the allocated memory if the reference count has re…
|
A D | SRP_create_verifier.pod | 50 On successful exit I<*verifier> will point to a newly allocated BIGNUM containing 52 newly allocated BIGNUM containing a random salt. If I<*salt> is not NULL then 54 The caller is responsible for freeing the allocated I<*salt> and I<*verifier> 64 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
|
A D | SSL_free.pod | 5 SSL_free - free an allocated SSL structure 16 structure pointed to by B<ssl> and frees up the allocated memory if the
|
A D | BUF_MEM_new.pod | 33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>. 43 or additionally-allocated memory to zero.
|
A D | BN_mod_mul_reciprocal.pod | 30 previously allocated B<BN_CTX> used for temporary variables. 50 BN_RECP_CTX_new() returns the newly allocated B<BN_RECP_CTX>, and NULL
|
A D | PEM_read_bio_ex.pod | 28 input are allocated from the secure heap. 45 The caller must release the storage allocated for *name, *header, and *data.
|
A D | BN_mod_mul_montgomery.pod | 54 For all functions, I<ctx> is a previously allocated B<BN_CTX> used for 59 BN_MONT_CTX_new() returns the newly allocated B<BN_MONT_CTX>, and NULL
|
A D | ERR_new.pod | 38 additional data string, which is allocated and store in the error 58 For dynamically allocated library numbers, reason strings are recorded
|
A D | BIO_ADDR.pod | 79 returned string has been allocated on the heap and must be freed 86 returned string has been allocated on the heap and must be freed 91 protocol family AF_UNIX. The returned string has been allocated
|
A D | ASN1_INTEGER_new.pod | 18 ASN1_INTEGER_new() returns an allocated B<ASN1_INTEGER> structure.
|
A D | OSSL_ENCODER_to_bio.pod | 33 allocated using L<OPENSSL_zalloc(3)>, and I<*pdata> will be set to point at 108 * pkey was successfully encoded into a newly allocated
|
A D | PEM_bytes_read_bio.pod | 50 storage allocated within the PEM processing stack. The BIO stack from 52 allocated from the secure heap. In cases where it is desirable to ensure
|
A D | PKCS12_get_friendlyname.pod | 24 The returned string is allocated by OpenSSL and should be freed by the user.
|
A D | SSL_get_all_async_fds.pod | 40 responsibility to ensure sufficient memory is allocated at I<*fds> so typically 49 sufficient memory allocated, although they may be NULL. The number of added fds
|
/openssl-master/crypto/ |
A D | README-sparse_array.md | 30 less than the maximum possible height. Only sufficient height is allocated to 108 The nodes themselves are allocated in a sparse manner. Only nodes which exist 109 along a path from the root of the tree to an added leaf will be allocated. 110 The complexity is hidden and nodes are allocated on an as needed basis.
|
/openssl-master/crypto/asn1/ |
A D | a_object.c | 23 unsigned char *p, *allocated = NULL; in i2d_ASN1_OBJECT() local 34 if ((p = allocated = OPENSSL_malloc(objsize)) == NULL) { in i2d_ASN1_OBJECT() 49 *pp = allocated != NULL ? allocated : p + a->length; in i2d_ASN1_OBJECT()
|
/openssl-master/crypto/dso/ |
A D | dso_lib.c | 112 int allocated = 0; in DSO_load() local 120 allocated = 1; in DSO_load() 158 if (allocated) in DSO_load()
|
/openssl-master/doc/internal/man3/ |
A D | ossl_rand_get_entropy.pod | 32 ossl_rand_cleanup_entropy() cleanses and frees any storage allocated by 44 ossl_rand_cleanup_nonce() cleanses and frees any storage allocated by
|
A D | evp_pkey_export_to_provider.pod | 52 allocated. It also either sets I<*keymgmt> to the B<EVP_KEYMGMT> associated 61 function. Since B<EVP_PKEY> is always dynamically allocated, this is OK.
|
Completed in 21 milliseconds
123456