Home
last modified time | relevance | path

Searched refs:allocated (Results 1 – 25 of 133) sorted by relevance

123456

/openssl-master/doc/man3/
A DSSL_alloc_buffers.pod21 control when buffers are freed and allocated.
27 to control where and how buffers are allocated.
46 The SSL_alloc_buffers() function returns 1 if the buffers have been allocated.
47 This value is also returned if the buffers had been allocated before calling
A DOSSL_PARAM_BLD.pod58 I<bld> into an allocated OSSL_PARAM array.
78 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation
79 will also be securely allocated.
87 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation
88 will also be securely allocated.
118 OSSL_PARAM_BLD_new() returns the allocated OSSL_PARAM_BLD structure, or NULL
121 OSSL_PARAM_BLD_to_param() returns the allocated OSSL_PARAM array, or NULL
A DOPENSSL_secure_malloc.pod89 the memory if it was not allocated from the secure heap.
93 OPENSSL_secure_actual_size() tells the actual size allocated to the
97 OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap.
99 CRYPTO_secure_used() returns the number of bytes allocated in the
114 allocated.
A DASN1_STRING_new.pod18 ASN1_STRING_new() returns an allocated B<ASN1_STRING> structure. Its type
21 ASN1_STRING_type_new() returns an allocated B<ASN1_STRING> structure of
A DOPENSSL_hexchar2int.pod41 The memory is allocated by calling OPENSSL_malloc() and should be
57 The memory is allocated by calling OPENSSL_malloc() and should be
66 return a pointer to allocated memory, or NULL on error.
A DSSL_SESSION_free.pod31 the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated
37 SSL_SESSION objects are allocated, when a TLS/SSL handshake operation
62 SSL_SESSION_new returns a pointer to the newly allocated SSL_SESSION structure
A DSSL_CTX_free.pod5 SSL_CTX_free - free an allocated SSL_CTX object
16 SSL_CTX object pointed to by B<ctx> and frees up the allocated memory if the reference count has re…
A DSRP_create_verifier.pod50 On successful exit I<*verifier> will point to a newly allocated BIGNUM containing
52 newly allocated BIGNUM containing a random salt. If I<*salt> is not NULL then
54 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
64 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
A DSSL_free.pod5 SSL_free - free an allocated SSL structure
16 structure pointed to by B<ssl> and frees up the allocated memory if the
A DBUF_MEM_new.pod33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
43 or additionally-allocated memory to zero.
A DBN_mod_mul_reciprocal.pod30 previously allocated B<BN_CTX> used for temporary variables.
50 BN_RECP_CTX_new() returns the newly allocated B<BN_RECP_CTX>, and NULL
A DPEM_read_bio_ex.pod28 input are allocated from the secure heap.
45 The caller must release the storage allocated for *name, *header, and *data.
A DBN_mod_mul_montgomery.pod54 For all functions, I<ctx> is a previously allocated B<BN_CTX> used for
59 BN_MONT_CTX_new() returns the newly allocated B<BN_MONT_CTX>, and NULL
A DERR_new.pod38 additional data string, which is allocated and store in the error
58 For dynamically allocated library numbers, reason strings are recorded
A DBIO_ADDR.pod79 returned string has been allocated on the heap and must be freed
86 returned string has been allocated on the heap and must be freed
91 protocol family AF_UNIX. The returned string has been allocated
A DASN1_INTEGER_new.pod18 ASN1_INTEGER_new() returns an allocated B<ASN1_INTEGER> structure.
A DOSSL_ENCODER_to_bio.pod33 allocated using L<OPENSSL_zalloc(3)>, and I<*pdata> will be set to point at
108 * pkey was successfully encoded into a newly allocated
A DPEM_bytes_read_bio.pod50 storage allocated within the PEM processing stack. The BIO stack from
52 allocated from the secure heap. In cases where it is desirable to ensure
A DPKCS12_get_friendlyname.pod24 The returned string is allocated by OpenSSL and should be freed by the user.
A DSSL_get_all_async_fds.pod40 responsibility to ensure sufficient memory is allocated at I<*fds> so typically
49 sufficient memory allocated, although they may be NULL. The number of added fds
/openssl-master/crypto/
A DREADME-sparse_array.md30 less than the maximum possible height. Only sufficient height is allocated to
108 The nodes themselves are allocated in a sparse manner. Only nodes which exist
109 along a path from the root of the tree to an added leaf will be allocated.
110 The complexity is hidden and nodes are allocated on an as needed basis.
/openssl-master/crypto/asn1/
A Da_object.c23 unsigned char *p, *allocated = NULL; in i2d_ASN1_OBJECT() local
34 if ((p = allocated = OPENSSL_malloc(objsize)) == NULL) { in i2d_ASN1_OBJECT()
49 *pp = allocated != NULL ? allocated : p + a->length; in i2d_ASN1_OBJECT()
/openssl-master/crypto/dso/
A Ddso_lib.c112 int allocated = 0; in DSO_load() local
120 allocated = 1; in DSO_load()
158 if (allocated) in DSO_load()
/openssl-master/doc/internal/man3/
A Dossl_rand_get_entropy.pod32 ossl_rand_cleanup_entropy() cleanses and frees any storage allocated by
44 ossl_rand_cleanup_nonce() cleanses and frees any storage allocated by
A Devp_pkey_export_to_provider.pod52 allocated. It also either sets I<*keymgmt> to the B<EVP_KEYMGMT> associated
61 function. Since B<EVP_PKEY> is always dynamically allocated, this is OK.

Completed in 21 milliseconds

123456