Home
last modified time | relevance | path

Searched refs:allocated (Results 1 – 25 of 160) sorted by relevance

1234567

/openssl/doc/man3/
H A DSSL_alloc_buffers.pod21 control when buffers are freed and allocated.
27 to control where and how buffers are allocated.
49 The SSL_alloc_buffers() function returns 1 if the buffers have been allocated.
50 This value is also returned if the buffers had been allocated before calling
H A DOSSL_PARAM_BLD.pod59 I<bld> into an allocated OSSL_PARAM array.
87 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation
88 will also be securely allocated.
99 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation
100 will also be securely allocated.
130 OSSL_PARAM_BLD_new() returns the allocated OSSL_PARAM_BLD structure, or NULL
133 OSSL_PARAM_BLD_to_param() returns the allocated OSSL_PARAM array, or NULL
H A DASN1_STRING_new.pod18 ASN1_STRING_new() returns an allocated B<ASN1_STRING> structure. Its type
21 ASN1_STRING_type_new() returns an allocated B<ASN1_STRING> structure of
H A DSSL_get1_builtin_sigalgs.pod26 NULL may be returned if no memory could be allocated. Otherwise, a
27 newly allocated string is always returned but it may have strlen == 0.
H A DOPENSSL_secure_malloc.pod90 the memory if it was not allocated from the secure heap.
95 OPENSSL_secure_actual_size() tells the actual size allocated to the
99 OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap.
101 CRYPTO_secure_used() returns the number of bytes allocated in the
116 allocated.
H A DOPENSSL_hexchar2int.pod42 The memory is allocated by calling OPENSSL_malloc() and should be
58 The memory is allocated by calling OPENSSL_malloc() and should be
67 return a pointer to allocated memory, or NULL on error.
H A DSSL_SESSION_free.pod31 the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated
37 SSL_SESSION objects are allocated, when a TLS/SSL handshake operation
62 SSL_SESSION_new returns a pointer to the newly allocated SSL_SESSION structure
H A DSSL_CTX_free.pod5 SSL_CTX_free - free an allocated SSL_CTX object
16 SSL_CTX object pointed to by B<ctx> and frees up the allocated memory if the reference count has re…
H A DSRP_create_verifier.pod50 On successful exit I<*verifier> will point to a newly allocated BIGNUM containing
52 newly allocated BIGNUM containing a random salt. If I<*salt> is not NULL then
54 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
64 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
H A DOSSL_ERR_STATE_save.pod45 for all the added entries. Any allocated data in the saved error
53 OSSL_ERR_STATE_new() returns a pointer to the allocated ERR_STATE
62 over any allocated data from the thread error state.
H A DBUF_MEM_new.pod33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
44 or additionally-allocated memory to zero.
H A DPEM_read_bio_ex.pod28 input are allocated from the secure heap.
45 The caller must release the storage allocated for *name, *header, and *data.
H A DBN_mod_mul_reciprocal.pod30 previously allocated B<BN_CTX> used for temporary variables.
50 BN_RECP_CTX_new() returns the newly allocated B<BN_RECP_CTX>, and NULL
H A DBN_mod_mul_montgomery.pod54 For all functions, I<ctx> is a previously allocated B<BN_CTX> used for
59 BN_MONT_CTX_new() returns the newly allocated B<BN_MONT_CTX>, and NULL
H A DERR_new.pod38 additional data string, which is allocated and store in the error
58 For dynamically allocated library numbers, reason strings are recorded
H A DEVP_PKEY_CTX_get_algor.pod43 If I<*alg> is NULL, space will be allocated automatically, and assigned to
51 If I<< alg->parameters >> is NULL, space will be allocated automatically, and
H A DSSL_accept_stream.pod21 given QUIC connection SSL object and returns the newly allocated QUIC stream SSL
53 SSL_accept_stream() returns a newly allocated QUIC stream SSL object, or NULL if
H A DBIO_ADDR.pod89 returned string has been allocated on the heap and must be freed
96 returned string has been allocated on the heap and must be freed
101 protocol family AF_UNIX. The returned string has been allocated
H A DPEM_bytes_read_bio.pod50 storage allocated within the PEM processing stack. The BIO stack from
52 allocated from the secure heap. In cases where it is desirable to ensure
H A DOSSL_ENCODER_to_bio.pod33 allocated using L<OPENSSL_zalloc(3)>, and I<*pdata> will be set to point at
108 * pkey was successfully encoded into a newly allocated
/openssl/crypto/
H A DREADME-sparse_array.md30 less than the maximum possible height. Only sufficient height is allocated to
108 The nodes themselves are allocated in a sparse manner. Only nodes which exist
109 along a path from the root of the tree to an added leaf will be allocated.
110 The complexity is hidden and nodes are allocated on an as needed basis.
/openssl/crypto/asn1/
H A Da_object.c23 unsigned char *p, *allocated = NULL; in i2d_ASN1_OBJECT() local
34 if ((p = allocated = OPENSSL_malloc(objsize)) == NULL) in i2d_ASN1_OBJECT()
47 *pp = allocated != NULL ? allocated : p + a->length; in i2d_ASN1_OBJECT()
/openssl/crypto/dso/
H A Ddso_lib.c107 int allocated = 0; in DSO_load() local
115 allocated = 1; in DSO_load()
153 if (allocated) in DSO_load()
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod49 ossl_rand_cleanup_entropy() cleanses and frees any storage allocated by
53 ossl_rand_cleanup_user_entropy() cleanses and frees any storage allocated by
70 ossl_rand_cleanup_nonce() cleanses and frees any storage allocated by
H A Devp_pkey_export_to_provider.pod52 allocated. It also either sets I<*keymgmt> to the B<EVP_KEYMGMT> associated
61 function. Since B<EVP_PKEY> is always dynamically allocated, this is OK.

Completed in 51 milliseconds

1234567