Home
last modified time | relevance | path

Searched refs:storage (Results 1 – 25 of 48) sorted by relevance

12

/openssl/crypto/
H A Dex_data.c243 storage = OPENSSL_malloc(sizeof(*storage) * mx); in ossl_crypto_new_ex_data_ex()
253 if (storage[i] != NULL && storage[i]->new_func != NULL) { in ossl_crypto_new_ex_data_ex()
256 storage[i]->argl, storage[i]->argp); in ossl_crypto_new_ex_data_ex()
259 if (storage != stack) in ossl_crypto_new_ex_data_ex()
305 storage = OPENSSL_malloc(sizeof(*storage) * mx); in CRYPTO_dup_ex_data()
314 if (storage == NULL) in CRYPTO_dup_ex_data()
328 if (storage[i] != NULL && storage[i]->dup_func != NULL) in CRYPTO_dup_ex_data()
330 storage[i]->argl, storage[i]->argp)) in CRYPTO_dup_ex_data()
336 if (storage != stack) in CRYPTO_dup_ex_data()
389 storage = OPENSSL_malloc(sizeof(*storage) * mx); in CRYPTO_free_ex_data()
[all …]
/openssl/crypto/bn/
H A Drsaz_exp_x2.c164 BN_ULONG *storage = NULL;
189 if (storage == NULL)
191 storage_aligned = (BN_ULONG *)ALIGN_OF(storage, 64);
259 if (storage != NULL) {
260 OPENSSL_cleanse(storage, storage_len_bytes);
261 OPENSSL_free(storage);
316 BN_ULONG *storage = NULL;
371 if (storage == NULL)
511 if (storage != NULL) {
513 OPENSSL_cleanse(storage, storage_len_bytes);
[all …]
H A Drsaz_exp.c55 unsigned char storage[320 * 3 + 32 * 9 * 16 + 64]; /* 5.5KB */
56 unsigned char *p_str = storage + (64 - ((size_t)storage % 64));
236 OPENSSL_cleanse(storage, sizeof(storage));
259 unsigned char storage[16 * 8 * 8 + 64 * 2 + 64]; /* 1.2KB */
260 unsigned char *table = storage + (64 - ((size_t)storage % 64));
312 OPENSSL_cleanse(storage, sizeof(storage));
H A Dbn_mod.c58 BN_ULONG storage[1024 / BN_BITS2]; in bn_mod_add_fixed_top() local
59 BN_ULONG carry, temp, mask, *rp, *tp = storage; in bn_mod_add_fixed_top()
65 if (mtop > OSSL_NELEM(storage)) { in bn_mod_add_fixed_top()
97 if (tp != storage) in bn_mod_add_fixed_top()
/openssl/doc/man3/
H A DPEM_bytes_read_bio.pod36 non-NULL. The caller must free the storage pointed to by I<*pnm>.
39 I<*pdata> with length I<*plen>. The caller must free the storage pointed
43 memory from the secure heap for its temporary buffers and the storage
45 OPENSSL_secure_free() to free that storage.
50 storage allocated within the PEM processing stack. The BIO stack from
H A DSSL_CTX_set_cert_store.pod5 … SSL_CTX_set1_cert_store, SSL_CTX_get_cert_store - manipulate X509 certificate verification storage
17 SSL_CTX_set_cert_store() sets/replaces the certificate verification storage
23 SSL_CTX_set1_cert_store() sets/replaces the certificate verification storage
28 verification storage. B<ctx> B<MUST NOT> be NULL.
H A DSSL_CTX_set_session_cache_mode.pod33 A server will look up the session in its internal session storage. If the
34 session is not found in internal storage or lookups for the internal storage
36 the external storage if available.
H A DOSSL_PARAM_allocate_from_text.pod60 bytes become the number stored in the I<< to->data >> storage.
78 I<< to->data >> storage.
86 resulting bytes are stored in the I<< to->data >> storage.
92 copied to the I<< to->data >> storage.
H A DSSL_CTX_set_client_hello_cb.pod66 both required, and on success the caller must release the storage allocated for
76 (e.g., to allocate storage for a subsequent call). Otherwise, B<*exts> is populated
79 as input to supply the size of storage allocated by the caller, and as output to
82 A subsequent call with B<exts> set to NULL can retrieve the size of storage needed.
H A DOSSL_PARAM_int.pod172 The storage for this parameter is at I<address> and is of I<size> bytes.
186 The parameter will use storage pointed to by I<buf> and return size of I<ret>.
190 A parameter with name I<key>, storage I<buf>, size I<bsize> and return
195 A parameter with name I<key>, storage I<buf> and size I<bsize> is created.
201 A parameter with name I<key>, storage I<buf> and size I<bsize> is created.
205 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize>
210 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize>
H A DOPENSSL_secure_malloc.pod11 CRYPTO_secure_used - secure heap storage
51 This protects long-term storage of private keys, but will not necessarily
H A DPEM_read_bio_ex.pod45 The caller must release the storage allocated for *name, *header, and *data.
H A DSSL_CTX_add_extra_chain_cert.pod46 available CA certificates in the trusted CA storage, see
H A DX509_get_default_cert_file.pod63 These functions return pointers to constant strings with static storage
H A DSSL_CTX_set_default_passwd_cb.pod63 password could be stored into the userdata storage and the
H A DSSL_CTX_use_certificate.pod159 storage is used or when the CA issuing the certificate shall not be added to
160 the trusted CA storage.
H A DEVP_aes_128_gcm.pod149 intended for encrypting data on a storage device.
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod49 ossl_rand_cleanup_entropy() cleanses and frees any storage allocated by
53 ossl_rand_cleanup_user_entropy() cleanses and frees any storage allocated by
70 ossl_rand_cleanup_nonce() cleanses and frees any storage allocated by
/openssl/crypto/engine/
H A DREADME.md20 or can be loaded "en masse" into EVP storage so that they can be catalogued and
49 into ENGINE is storage - the OBJ_NAME-based storage used by EVP to register
87 turn out to be degenerate forms of the same thing. The EVP storage of ciphers,
89 descriptions remain untouched. However, the storage takes more meaning in terms
111 EVP storage, nor is it returned to applications from traditional API functions,
189 callbacks calling each in turn, and will then internally delete its own storage
192 start again), the internal STACK storage will be freshly allocated. This is much
/openssl/providers/implementations/ciphers/
H A Dcipher_chacha20_poly1305_hw.c125 unsigned char *buf, *tohash, *ctr, storage[sizeof(zero) + 32]; in chacha20_poly1305_tls_cipher() local
129 buf = storage + ((0 - (size_t)storage) & 15); /* align */ in chacha20_poly1305_tls_cipher()
H A Dcipher_aes_cbc_hmac_sha1_hw.c130 unsigned char storage[sizeof(SHA1_MB_CTX) + 32]; in tls1_multi_block_encrypt() local
149 mctx = (SHA1_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ in tls1_multi_block_encrypt()
H A Dcipher_aes_cbc_hmac_sha256_hw.c134 unsigned char storage[sizeof(SHA256_MB_CTX) + 32]; in tls1_multi_block_encrypt() local
153 mctx = (SHA256_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ in tls1_multi_block_encrypt()
/openssl/crypto/evp/
H A De_chacha20_poly1305.c219 unsigned char *buf, *tohash, *ctr, storage[sizeof(zero) + 32]; in chacha20_poly1305_tls_cipher() local
224 buf = storage + ((0 - (size_t)storage) & 15); /* align */ in chacha20_poly1305_tls_cipher()
H A De_aes_cbc_hmac_sha1.c168 unsigned char storage[sizeof(SHA1_MB_CTX) + 32]; in tls1_1_multi_block_encrypt() local
187 ctx = (SHA1_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ in tls1_1_multi_block_encrypt()
H A De_aes_cbc_hmac_sha256.c162 unsigned char storage[sizeof(SHA256_MB_CTX) + 32]; in tls1_1_multi_block_encrypt() local
182 ctx = (SHA256_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); in tls1_1_multi_block_encrypt()

Completed in 63 milliseconds

12