/openssl-master/crypto/perlasm/ |
A D | x86asm.pl | 30 if ($opcode =~ /^push/) { $stack+=4; } 31 elsif ($opcode =~ /^pop/) { $stack-=4; } 51 sub ::stack_push{ my $num=$_[0]*4; $stack+=$num; &sub("esp",$num); } 52 sub ::stack_pop { my $num=$_[0]*4; $stack-=$num; &add("esp",$num); } 53 sub ::blindpop { &pop($_[0]); $stack+=4; } 54 sub ::wparam { &DWP($stack+4*$_[0],"esp"); } 219 $stack=4; 233 $stack=0; 243 $stack+=16; # readjust esp as if we didn't pop anything
|
A D | x86nasm.pl | 117 $::stack=4; 121 { $::stack=0;
|
A D | x86masm.pl | 115 $::stack=4; 121 $::stack=0;
|
/openssl-master/crypto/bn/ |
A D | bn_ctx.c | 67 BN_STACK stack; member 86 BN_STACK *stack = &ctx->stack; in ctxdbg() local 99 while (fpidx < stack->depth) { in ctxdbg() 100 while (bnidx++ < stack->indexes[fpidx]) in ctxdbg() 128 BN_STACK_init(&ret->stack); in BN_CTX_new_ex() 165 ctx->stack.size, ctx->pool.size); in BN_CTX_free() 176 BN_STACK_finish(&ctx->stack); in BN_CTX_free() 188 else if (!BN_STACK_push(&ctx->stack, ctx->used)) { in BN_CTX_start() 203 unsigned int fp = BN_STACK_pop(&ctx->stack); in BN_CTX_end()
|
/openssl-master/doc/man3/ |
A D | DEFINE_STACK_OF.pod | 21 - stack container 78 This can be used in every header file that references the stack. 122 B<sk_I<TYPE>_new_reserve>() allocates a new stack. The new stack will have 128 to the newly created stack. If I<compare> is NULL then no comparison 191 element in the sorted stack is returned. 203 or an empty stack if the passed stack is NULL. 207 copied or an empty stack if the passed stack is NULL. 246 passed stack is NULL. 252 return an empty stack or NULL if an error occurs. 268 the total number of elements in the stack and 0 if an error occurred. [all …]
|
A D | ERR_set_mark.pod | 21 ERR_pop_to_mark() will pop the top of the error stack until a mark is found. 22 The mark is then removed. If there is no mark, the whole stack is removed. 28 ERR_set_mark() returns 0 if the error stack is empty, otherwise 1. 31 error stack, which implies that the stack became empty, otherwise 1.
|
A D | SSL_load_client_CA_file.pod | 20 int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, 22 int SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, 24 int SSL_add_store_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, 37 and adds their subject name to the already existing I<stack>. 41 already existing I<stack>. 45 I<stack>. 63 The operation failed, check out the error stack for the reason.
|
A D | PEM_X509_INFO_read_bio_ex.pod | 36 If the input stack I<sk> is NULL a new stack is allocated, 37 else the given stack is extended. 49 a stack of B<X509_INFO> objects or NULL on failure.
|
A D | PKCS12_SAFEBAG_get0_attrs.pod | 19 PKCS12_SAFEBAG_get0_attrs() retrieves the stack of B<X509_ATTRIBUTE>s from a 22 PKCS12_get_attr_gen() retrieves an attribute by NID from a stack of 27 PKCS12_SAFEBAG_get0_attrs() returns the stack of B<X509_ATTRIBUTE>s from a
|
A D | SSL_get_ciphers.pod | 30 SSL_get_ciphers() returns the stack of available SSL_CIPHERs for B<ssl>, 34 SSL_CTX_get_ciphers() returns the stack of available SSL_CIPHERs for B<ctx>. 36 SSL_get1_supported_ciphers() returns the stack of enabled SSL_CIPHERs for 49 SSL_get_client_ciphers() returns the stack of available SSL_CIPHERs matching the 89 return a pointer to an internal cipher stack, which will be freed later on when 93 The stack returned by SSL_get1_supported_ciphers() should be freed using
|
A D | X509_new.pod | 41 chain B<x> and returns a copy of the stack, or an empty stack if B<a> is NULL. 50 each certificate. It also returns a copy of the stack, using sk_X509_dup(), 62 X509_chain_up_ref() returns a copy of the stack or NULL if an error occurred.
|
A D | X509v3_get_ext_by_NID.pod | 14 X509_REVOKED_add_ext - extension stack utility functions 68 with B<nid> or B<obj> from extension stack B<x>. The search starts from the 81 X509v3_add_ext() adds extension B<ex> to stack B<*x> at position B<loc>. If 83 a new stack will be allocated. The passed extension B<ex> is duplicated 130 X509v3_add_ext() returns a stack of extensions or B<NULL> on error.
|
A D | SSL_CTX_add_extra_chain_cert.pod | 29 The returned stack should not be freed by the caller. 33 The returned stack should not be freed by the caller. 65 1 on success and 0 for failure. Check out the error stack to find out the
|
A D | X509_STORE_get0_param.pod | 41 X509_STORE_get0_objects() returns a pointer to a stack of B<X509_OBJECT>. 43 X509_STORE_get1_all_certs() returns a pointer to a stack of the retrieved
|
A D | TS_VERIFY_CTX_set_certs.pod | 32 B<certs> is a stack of B<X509> certificates. 39 TS_VERIFY_CTX_set_certs() returns the stack of B<X509> certificates the user
|
A D | ADMISSIONS.pod | 109 The B<PROFESSION_INFOS> type is a stack of B<PROFESSION_INFO>; see 122 The B<ADMISSION_SYNTAX> type has an authority name and a stack of 133 stack of B<PROFESSION_INFO> items.
|
A D | BIO_connect.pod | 86 (-1) on error. When an error has occurred, the OpenSSL error stack 90 When an error has occurred, the OpenSSL error stack will hold the error 95 OpenSSL error stack will hold the error data and errno has the system
|
/openssl-master/crypto/ |
A D | ex_data.c | 217 EX_CALLBACK *stack[10]; in ossl_crypto_new_ex_data_ex() local 232 if (mx < (int)OSSL_NELEM(stack)) in ossl_crypto_new_ex_data_ex() 233 storage = stack; in ossl_crypto_new_ex_data_ex() 253 if (storage != stack) in ossl_crypto_new_ex_data_ex() 272 EX_CALLBACK *stack[10]; in CRYPTO_dup_ex_data() local 296 if (mx < (int)OSSL_NELEM(stack)) in CRYPTO_dup_ex_data() 297 storage = stack; in CRYPTO_dup_ex_data() 332 if (storage != stack) in CRYPTO_dup_ex_data() 369 struct ex_callback_entry stack[10]; in CRYPTO_free_ex_data() local 383 storage = stack; in CRYPTO_free_ex_data() [all …]
|
/openssl-master/apps/ |
A D | list.c | 98 STACK_OF(EVP_CIPHER) *cipher_stack = stack; in collect_ciphers() 182 STACK_OF(EVP_MD) *digest_stack = stack; in collect_digests() 248 static void collect_macs(EVP_MAC *mac, void *stack) in collect_macs() argument 250 STACK_OF(EVP_MAC) *mac_stack = stack; in collect_macs() 314 STACK_OF(EVP_KDF) *kdf_stack = stack; in collect_kdfs() 384 STACK_OF(EVP_RAND) *rand_stack = stack; in collect_rands() 510 STACK_OF(OSSL_ENCODER) *encoder_stack = stack; in collect_encoders() 637 STACK_OF(EVP_KEYMGMT) *km_stack = stack; in collect_keymanagers() 700 STACK_OF(EVP_SIGNATURE) *sig_stack = stack; in collect_signatures() 760 STACK_OF(EVP_KEM) *kem_stack = stack; in collect_kem() [all …]
|
A D | crl2pkcs7.c | 22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 195 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument 220 sk_X509_push(stack, xi->x509); in add_certs_from_file()
|
/openssl-master/crypto/stack/ |
A D | build.info | 2 SOURCE[../../libcrypto]=stack.c 3 SOURCE[../../providers/libfips.a]=stack.c
|
/openssl-master/Configurations/ |
A D | INTERNALS.Configure | 22 condition stack that tell if a build.info should be processed or if it 23 should just be skipped over. The possible states of the stack top are 26 # The top item of this stack has the following values 34 stack top is > 0. Condition lines (IF, ELSIF, ELSE and ENDIF 36 stack states, so they are a little more intricate. 39 the skip stack should look like after each line is processed:
|
/openssl-master/ssl/ |
A D | ssl_cert.c | 690 oldcmp = sk_X509_NAME_set_cmp_func(stack, xname_sk_cmp); in SSL_add_file_cert_subjects_to_stack() 710 if (sk_X509_NAME_find(stack, xn) >= 0) { in SSL_add_file_cert_subjects_to_stack() 713 } else if (!sk_X509_NAME_push(stack, xn)) { in SSL_add_file_cert_subjects_to_stack() 727 (void)sk_X509_NAME_set_cmp_func(stack, oldcmp); in SSL_add_file_cert_subjects_to_stack() 755 if (!SSL_add_file_cert_subjects_to_stack(stack, buf)) in SSL_add_dir_cert_subjects_to_stack() 775 static int add_uris_recursive(STACK_OF(X509_NAME) *stack, in add_uris_recursive() argument 806 if (sk_X509_NAME_find(stack, xn) >= 0) { in add_uris_recursive() 809 } else if (!sk_X509_NAME_push(stack, xn)) { in add_uris_recursive() 833 = sk_X509_NAME_set_cmp_func(stack, xname_sk_cmp); in SSL_add_store_cert_subjects_to_stack() 834 int ret = add_uris_recursive(stack, store, 1); in SSL_add_store_cert_subjects_to_stack() [all …]
|
/openssl-master/doc/internal/man3/ |
A D | ossl_rsa_get0_all_params.pod | 39 the I<primes> stack contains I<p>, I<q>, and then the rest of the primes 44 the I<exps> stack contains I<dP>, I<dQ>, and then the rest of the exponents 49 the I<coeffs> stack contains I<qInv>, and then the rest of the coefficients
|
/openssl-master/crypto/asn1/ |
A D | tasn_prn.c | 292 STACK_OF(const_ASN1_VALUE) *stack; in asn1_template_print_ctx() 307 stack = (STACK_OF(const_ASN1_VALUE) *)*fld; in asn1_template_print_ctx() 308 for (i = 0; i < sk_const_ASN1_VALUE_num(stack); i++) { in asn1_template_print_ctx() 312 skitem = sk_const_ASN1_VALUE_value(stack, i); in asn1_template_print_ctx() 319 stack == NULL ? "ABSENT" : "EMPTY") <= 0) in asn1_template_print_ctx()
|