/openssl/crypto/ |
H A D | ex_data.c | 243 storage = OPENSSL_malloc(sizeof(*storage) * mx); in ossl_crypto_new_ex_data_ex() 253 if (storage[i] != NULL && storage[i]->new_func != NULL) { in ossl_crypto_new_ex_data_ex() 256 storage[i]->argl, storage[i]->argp); in ossl_crypto_new_ex_data_ex() 259 if (storage != stack) in ossl_crypto_new_ex_data_ex() 305 storage = OPENSSL_malloc(sizeof(*storage) * mx); in CRYPTO_dup_ex_data() 314 if (storage == NULL) in CRYPTO_dup_ex_data() 328 if (storage[i] != NULL && storage[i]->dup_func != NULL) in CRYPTO_dup_ex_data() 330 storage[i]->argl, storage[i]->argp)) in CRYPTO_dup_ex_data() 336 if (storage != stack) in CRYPTO_dup_ex_data() 389 storage = OPENSSL_malloc(sizeof(*storage) * mx); in CRYPTO_free_ex_data() [all …]
|
/openssl/crypto/bn/ |
H A D | rsaz_exp_x2.c | 164 BN_ULONG *storage = NULL; 189 if (storage == NULL) 191 storage_aligned = (BN_ULONG *)ALIGN_OF(storage, 64); 259 if (storage != NULL) { 260 OPENSSL_cleanse(storage, storage_len_bytes); 261 OPENSSL_free(storage); 316 BN_ULONG *storage = NULL; 371 if (storage == NULL) 511 if (storage != NULL) { 513 OPENSSL_cleanse(storage, storage_len_bytes); [all …]
|
H A D | rsaz_exp.c | 55 unsigned char storage[320 * 3 + 32 * 9 * 16 + 64]; /* 5.5KB */ 56 unsigned char *p_str = storage + (64 - ((size_t)storage % 64)); 236 OPENSSL_cleanse(storage, sizeof(storage)); 259 unsigned char storage[16 * 8 * 8 + 64 * 2 + 64]; /* 1.2KB */ 260 unsigned char *table = storage + (64 - ((size_t)storage % 64)); 312 OPENSSL_cleanse(storage, sizeof(storage));
|
H A D | bn_mod.c | 58 BN_ULONG storage[1024 / BN_BITS2]; in bn_mod_add_fixed_top() local 59 BN_ULONG carry, temp, mask, *rp, *tp = storage; in bn_mod_add_fixed_top() 65 if (mtop > OSSL_NELEM(storage)) { in bn_mod_add_fixed_top() 97 if (tp != storage) in bn_mod_add_fixed_top()
|
/openssl/doc/man3/ |
H A D | PEM_bytes_read_bio.pod | 36 non-NULL. The caller must free the storage pointed to by I<*pnm>. 39 I<*pdata> with length I<*plen>. The caller must free the storage pointed 43 memory from the secure heap for its temporary buffers and the storage 45 OPENSSL_secure_free() to free that storage. 50 storage allocated within the PEM processing stack. The BIO stack from
|
H A D | SSL_CTX_set_cert_store.pod | 5 … SSL_CTX_set1_cert_store, SSL_CTX_get_cert_store - manipulate X509 certificate verification storage 17 SSL_CTX_set_cert_store() sets/replaces the certificate verification storage 23 SSL_CTX_set1_cert_store() sets/replaces the certificate verification storage 28 verification storage. B<ctx> B<MUST NOT> be NULL.
|
H A D | SSL_CTX_set_session_cache_mode.pod | 33 A server will look up the session in its internal session storage. If the 34 session is not found in internal storage or lookups for the internal storage 36 the external storage if available.
|
H A D | OSSL_PARAM_allocate_from_text.pod | 60 bytes become the number stored in the I<< to->data >> storage. 78 I<< to->data >> storage. 86 resulting bytes are stored in the I<< to->data >> storage. 92 copied to the I<< to->data >> storage.
|
H A D | SSL_CTX_set_client_hello_cb.pod | 66 both required, and on success the caller must release the storage allocated for 76 (e.g., to allocate storage for a subsequent call). Otherwise, B<*exts> is populated 79 as input to supply the size of storage allocated by the caller, and as output to 82 A subsequent call with B<exts> set to NULL can retrieve the size of storage needed.
|
H A D | OSSL_PARAM_int.pod | 172 The storage for this parameter is at I<address> and is of I<size> bytes. 186 The parameter will use storage pointed to by I<buf> and return size of I<ret>. 190 A parameter with name I<key>, storage I<buf>, size I<bsize> and return 195 A parameter with name I<key>, storage I<buf> and size I<bsize> is created. 201 A parameter with name I<key>, storage I<buf> and size I<bsize> is created. 205 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize> 210 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize>
|
H A D | OPENSSL_secure_malloc.pod | 11 CRYPTO_secure_used - secure heap storage 51 This protects long-term storage of private keys, but will not necessarily
|
H A D | PEM_read_bio_ex.pod | 45 The caller must release the storage allocated for *name, *header, and *data.
|
H A D | SSL_CTX_add_extra_chain_cert.pod | 46 available CA certificates in the trusted CA storage, see
|
H A D | X509_get_default_cert_file.pod | 63 These functions return pointers to constant strings with static storage
|
H A D | SSL_CTX_set_default_passwd_cb.pod | 63 password could be stored into the userdata storage and the
|
H A D | SSL_CTX_use_certificate.pod | 159 storage is used or when the CA issuing the certificate shall not be added to 160 the trusted CA storage.
|
H A D | EVP_aes_128_gcm.pod | 149 intended for encrypting data on a storage device.
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 49 ossl_rand_cleanup_entropy() cleanses and frees any storage allocated by 53 ossl_rand_cleanup_user_entropy() cleanses and frees any storage allocated by 70 ossl_rand_cleanup_nonce() cleanses and frees any storage allocated by
|
/openssl/crypto/engine/ |
H A D | README.md | 20 or can be loaded "en masse" into EVP storage so that they can be catalogued and 49 into ENGINE is storage - the OBJ_NAME-based storage used by EVP to register 87 turn out to be degenerate forms of the same thing. The EVP storage of ciphers, 89 descriptions remain untouched. However, the storage takes more meaning in terms 111 EVP storage, nor is it returned to applications from traditional API functions, 189 callbacks calling each in turn, and will then internally delete its own storage 192 start again), the internal STACK storage will be freshly allocated. This is much
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_chacha20_poly1305_hw.c | 125 unsigned char *buf, *tohash, *ctr, storage[sizeof(zero) + 32]; in chacha20_poly1305_tls_cipher() local 129 buf = storage + ((0 - (size_t)storage) & 15); /* align */ in chacha20_poly1305_tls_cipher()
|
H A D | cipher_aes_cbc_hmac_sha1_hw.c | 130 unsigned char storage[sizeof(SHA1_MB_CTX) + 32]; in tls1_multi_block_encrypt() local 149 mctx = (SHA1_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ in tls1_multi_block_encrypt()
|
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 134 unsigned char storage[sizeof(SHA256_MB_CTX) + 32]; in tls1_multi_block_encrypt() local 153 mctx = (SHA256_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ in tls1_multi_block_encrypt()
|
/openssl/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 219 unsigned char *buf, *tohash, *ctr, storage[sizeof(zero) + 32]; in chacha20_poly1305_tls_cipher() local 224 buf = storage + ((0 - (size_t)storage) & 15); /* align */ in chacha20_poly1305_tls_cipher()
|
H A D | e_aes_cbc_hmac_sha1.c | 168 unsigned char storage[sizeof(SHA1_MB_CTX) + 32]; in tls1_1_multi_block_encrypt() local 187 ctx = (SHA1_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); /* align */ in tls1_1_multi_block_encrypt()
|
H A D | e_aes_cbc_hmac_sha256.c | 162 unsigned char storage[sizeof(SHA256_MB_CTX) + 32]; in tls1_1_multi_block_encrypt() local 182 ctx = (SHA256_MB_CTX *) (storage + 32 - ((size_t)storage % 32)); in tls1_1_multi_block_encrypt()
|