Searched refs:heap (Results 1 – 16 of 16) sorted by relevance
50 struct pq_heap_st *heap; member123 struct pq_heap_st *h = pq->heap; in pqueue_move_elem()208 pq->heap[n].data = data; in ossl_pqueue_push()209 pq->heap[n].index = m; in ossl_pqueue_push()225 return pq->heap->data; in ossl_pqueue_peek()239 res = pq->heap->data; in ossl_pqueue_pop()240 elem = pq->heap->index; in ossl_pqueue_pop()307 h = OPENSSL_realloc(pq->heap, new_max * sizeof(*pq->heap)); in ossl_pqueue_reserve()312 pq->heap = h; in ossl_pqueue_reserve()342 pq->heap = OPENSSL_malloc(sizeof(*pq->heap) * min_nodes); in ossl_pqueue_new()[all …]
11 CRYPTO_secure_used - secure heap storage54 CRYPTO_secure_malloc_init() creates the secure heap, with the specified56 allocate from the heap or zero to use a reasonable default value.62 heap as been initialized and is available.68 OPENSSL_secure_malloc() allocates C<num> bytes from the heap.78 OPENSSL_secure_free() releases the memory at C<ptr> back to the heap.89 the memory if it was not allocated from the secure heap.95 requested, in order to "round up" and reduce secure heap fragmentation.100 secure heap.105 and 2 if successful but the heap could not be protected by memory[all …]
43 memory from the secure heap for its temporary buffers and the storage49 PEM_bytes_read_bio_secmem() only enforces that the secure heap is used for52 allocated from the secure heap. In cases where it is desirable to ensure53 that the contents of the PEM file only appears in memory from the secure heap,
85 returned string has been allocated on the heap and must be freed92 returned string has been allocated on the heap and must be freed98 on the heap and must be freed with OPENSSL_free().
24 BN_secure_new() does the same except that the secure heap
33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
28 input are allocated from the secure heap.
31 NCONF_new_ex() creates a new CONF object in heap memory and assigns to
33 but uses the secure heap (see L<CRYPTO_secure_malloc(3)>) to hold the
79 HMAC_CTX_new() creates a new HMAC_CTX in heap memory.
32 BIO_s_secmem() is like BIO_s_mem() except that the secure heap is used
114 B<ossl_event_queue_add_new> allocates a new timer event on the heap
244 * Keep all global DRBG instances on the secure heap if it is enabled.325 * ChaCha20/Poly1305 heap-buffer-overflow ([CVE-2016-7054])486 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption587 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
1924 dependent but is typically heap allocated.2727 - Keep all global DRBG instances on the secure heap if it is enabled.3395 * ChaCha20/Poly1305 heap-buffer-overflow4414 * Add secure heap for storage of private keys (when possible).5187 can overflow resulting in a heap corruption.5349 amounts of input data then a length check can overflow resulting in a heap5369 resulting in a heap corruption. Following an analysis of all OpenSSL5490 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption6388 can overflow resulting in a heap corruption.6571 resulting in a heap corruption. Following an analysis of all OpenSSL[all …]
152 * The returned string shall always be allocated on the heap with
539 stack allocate some structures. Instead they must be heap allocated through some
Completed in 98 milliseconds