Home
last modified time | relevance | path

Searched refs:reference (Results 1 – 25 of 134) sorted by relevance

123456

/openssl/doc/man3/
H A DSSL_SESSION_free.pod27 SSL_SESSION_up_ref() increments the reference count on the given SSL_SESSION
30 SSL_SESSION_free() decrements the reference count of B<session> and removes
32 memory, if the reference count has reached 0.
43 object at the same time. It is therefore crucial to keep the reference
47 when an SSL_SESSION object was completely freed as the reference count
53 which the reference count was explicitly incremented (e.g.
58 incorrect reference counts and therefore program failures.
H A DENGINE_add.pod198 inherently a B<structural> reference - a structural reference is required
207 B<functional> reference. This kind of reference can be considered a
208 specialised form of structural reference, because each functional reference
211 kinds of reference independently. If you have a functional reference to an
214 until after you have released your reference.
234 structural reference will internally obtain another reference - typically
261 To obtain a functional reference from an existing structural reference,
268 implicit structural reference as well).
380 /* Release the functional reference from ENGINE_init() */
382 /* Release the structural reference from ENGINE_by_id() */
[all …]
H A DX509_new.pod28 library context of I<libctx>, property query of I<propq> and a reference
38 X509_free() decrements the reference count of B<X509> structure B<a> and
39 frees it up if the reference count is zero. If the argument is NULL,
42 X509_up_ref() increments the reference count of B<a>.
44 X509_chain_up_ref() increases the reference count of all certificates in
57 The function X509_chain_up_ref() doesn't just up the reference count of
H A DSSL_CTX_sess_set_get_cb.pod61 Since sessions are reference-counted objects, the reference count on the
64 internal cache and the reference count released. If the callback returns B<1>,
65 the application retains the reference (for an entry in the
67 calling SSL_SESSION_free() when the session reference is no longer in use.
95 SSL engine to increment the reference count of the SSL_SESSION object;
96 setting B<copy> to B<0> causes the reference count to remain unchanged.
97 If the get_session_cb() does not write to B<copy>, the reference count
H A DSSL_set_bio.pod32 ownership of one reference. Therefore, it may be necessary to increment the
58 previously set values then one reference is consumed for the rbio and one
59 reference is consumed for the wbio.
64 the same as the previously set value then one reference is consumed.
75 previously set value then one reference is consumed for the B<wbio> and no
82 were the same as each other then one reference is consumed for the B<rbio>
90 to each other, then one reference is consumed for the B<rbio> and one
91 reference is consumed for the B<wbio>.
H A DX509_cmp_time.pod28 X509_cmp_timeframe() compares the given time period with the reference time
30 B<X509_V_FLAG_USE_CHECK_TIME>; else the current time is used as reference time.
67 1 if the end time is not NULL and the reference time (which has determined as
69 reference time is before, else 0 to indicate that the reference time is in range
H A DSSL_free.pod15 SSL_free() decrements the reference count of B<ssl>, and removes the SSL
17 reference count has reached 0.
29 The ssl session has reference counts from two users: the SSL object, for
30 which the reference count is removed by SSL_free() and the internal
65 A QUIC stream SSL object maintains a reference to a QUIC connection SSL object
H A DSSL_get_session.pod18 B<ssl>. The reference count of the B<SSL_SESSION> is not incremented, so
23 SSL_get1_session() is the same as SSL_get_session(), but the reference
63 reference counter is not incremented, the pointer is only valid while
70 If the data is to be kept, SSL_get1_session() will increment the reference
74 to decrement the reference count again.
78 One SSL_SESSION object, regardless of its reference count, must therefore
H A DSSL_set1_host.pod29 the primary reference identifier of the peer, and should not call
32 SSL_add1_host() adds B<name> as an additional reference identifier
47 from the peer certificate that matched one of the reference
50 of the reference identifiers configured via SSL_set1_host() or
53 of the reference identifier. The returned string is allocated by
H A DSSL_new.pod21 reference counted. Creating an B<SSL> structure for the first time increments
22 the reference count. Freeing it (using SSL_free) decrements it. When the
23 reference count drops to zero, any memory or resources allocated to the B<SSL>
26 SSL_up_ref() increments the reference count for an
36 reference count and returns the I<same> handle. It may be possible to
H A DSSL_set_session.pod17 When the session is set, the reference count of B<session> is incremented
18 by 1. If the session is not reused, the reference count is decremented
35 One SSL_SESSION object, regardless of its reference count, must therefore
H A DX509_get_pubkey.pod28 reference count incremented: this means the returned key must be freed up
30 the reference count of the returned B<EVP_PKEY> so it must not be freed up
47 return the cached structure with its reference count incremented to
H A DOSSL_PARAM_BLD.pod89 The I<bn> argument is stored by reference and the underlying BIGNUM object
101 The I<bn> argument is stored by reference and the underlying BIGNUM object
108 The string that I<buf> points to is stored by reference and must remain in
113 The memory that I<buf> points to is stored by reference and must remain in
120 The string I<buf> points to is stored by reference and must remain in
125 The memory I<buf> points to is stored by reference and must remain in
H A DSSL_CTX_free.pod15 SSL_CTX_free() decrements the reference count of B<ctx>, and removes the
16 SSL_CTX object pointed to by B<ctx> and frees up the allocated memory if the reference count has re…
H A DSSL_CTX_set_cert_store.pod24 of B<ctx> to/with B<store>. The B<store>'s reference count is incremented.
52 SSL_CTX_set_cert_store() does not increment the B<store>'s reference
59 increment the reference count of the X509_STORE.
H A DUI_create_method.pod62 This function takes a reference to a UI and starts a session, for
67 This function takes a reference to a UI and a UI String, and writes
75 This function takes a reference to a UI, and flushes everything that
82 This function takes a reference to a UI and a UI string and reads off
90 This function takes a reference to a UI, and closes the session, maybe
H A DEVP_ASYM_CIPHER_free.pod45 EVP_ASYM_CIPHER_free() decrements the reference count for the B<EVP_ASYM_CIPHER>
47 to EVP_ASYM_CIPHER_fetch(). If the reference count drops to 0 then the
50 EVP_ASYM_CIPHER_up_ref() increments the reference count for an
H A DEVP_KEM_free.pod41 EVP_KEM_free() decrements the reference count for the B<EVP_KEM> structure.
43 EVP_KEM_fetch(). If the reference count drops to 0 then the structure is freed.
46 EVP_KEM_up_ref() increments the reference count for an B<EVP_KEM> structure.
/openssl/doc/internal/man3/
H A Dossl_method_construct.pod64 reference counting and acts accordingly (i.e. it will call the
65 subsystem destruct() method to decrement the reference count when
101 This function is expected to increment the resulting method's reference count.
118 This function is expected to increment the I<method>'s reference count.
126 it possible for the subsystem constructor to keep a reference, which
128 If such a reference is kept, the I<provider object> reference counter
131 This function is expected to set the method's reference count to 1.
135 Decrement the I<method>'s reference count, and destruct it when
136 the reference count reaches zero.
H A Dossl_provider_new.pod113 Provider objects are reference counted.
129 The provider object it finds has its reference count incremented.
135 reference count incremented.
140 The reference count of a newly created provider object will always
142 reference.
153 reference count.
156 reference count; when it drops to zero, the provider object is assumed
186 ossl_provider_free_parent() decreases the reference count on the parent
233 reference to the provider that should be used is passed back in the
252 ossl_provider_dso() returns a reference to the module, for providers
[all …]
H A Dossl_cmp_ctx_set1_caPubs.pod35 The reference counts of those certificates handled successfully are increased.
51 The reference counts of those certificates handled successfully are increased.
/openssl/doc/man7/
H A Dprovider-object.pod38 (see L</Parameter reference> below), where it's assumed to a plain UTF8 string.
45 I<By reference>
48 reference> is passed instead. It's an octet string that only the correct
56 Objects I<by reference> need a higher level of cooperation from the
67 reference>. This can only be used if the target implementation is from the
90 =head2 Parameter reference
101 =item "reference" (B<OSSL_OBJECT_PARAM_REFERENCE>) <octet string>
103 The object data I<passed by reference>.
123 object data may be I<passed by value> or I<passed by reference>.
169 item, or object data I<passed by reference>, i.e. the "reference" item).
H A Dopenssl-threads.pod23 One major use of the OpenSSL thread API is to implement reference counting.
24 Many objects within OpenSSL are reference-counted, so resources are not
25 released, until the last reference is removed.
29 the reference count.
37 remains with the object and a reference to it is returned.
39 updates the attribute's reference count so that the object is shared
42 Functions that involve attributes that have reference counts themselves,
61 One example of this is the reference counting API's described above.
/openssl/providers/implementations/keymgmt/
H A Drsa_kmgmt.c653 static void *common_load(const void *reference, size_t reference_sz, in common_load() argument
660 rsa = *(RSA **)reference; in common_load()
666 *(RSA **)reference = NULL; in common_load()
672 static void *rsa_load(const void *reference, size_t reference_sz) in rsa_load() argument
674 return common_load(reference, reference_sz, RSA_FLAG_TYPE_RSA); in rsa_load()
677 static void *rsapss_load(const void *reference, size_t reference_sz) in rsapss_load() argument
679 return common_load(reference, reference_sz, RSA_FLAG_TYPE_RSASSAPSS); in rsapss_load()
/openssl/crypto/engine/
H A DREADME.md41 rewrites of many applications, to assume that EVP_CIPHERs can be reference
55 especially necessary considering the fact ENGINE uses reference counts to allow
94 reference) for any ENGINE that is registered to perform the algo/mode that the
103 combination represented by the provided EVP_CIPHER, then a functional reference
105 That functional reference will be stored in the context (and released on
106 cleanup) - and having that reference provides a *safe* way to use an EVP_CIPHER
112 there is no associated problem with it not having reference counts. And of
147 functional reference to the first that successfully initialised. In the latter
148 case it will also cache an extra functional reference to the ENGINE as a
155 (ie. it's simply an increment of the functional reference count, and no real
[all …]

Completed in 33 milliseconds

123456