/openssl/doc/man3/ |
H A D | SSL_alloc_buffers.pod | 21 control when buffers are freed and allocated. 27 to control where and how buffers are allocated. 49 The SSL_alloc_buffers() function returns 1 if the buffers have been allocated. 50 This value is also returned if the buffers had been allocated before calling
|
H A D | OSSL_PARAM_BLD.pod | 59 I<bld> into an allocated OSSL_PARAM array. 87 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation 88 will also be securely allocated. 99 If I<bn> is marked as being securely allocated, its OSSL_PARAM representation 100 will also be securely allocated. 130 OSSL_PARAM_BLD_new() returns the allocated OSSL_PARAM_BLD structure, or NULL 133 OSSL_PARAM_BLD_to_param() returns the allocated OSSL_PARAM array, or NULL
|
H A D | ASN1_STRING_new.pod | 18 ASN1_STRING_new() returns an allocated B<ASN1_STRING> structure. Its type 21 ASN1_STRING_type_new() returns an allocated B<ASN1_STRING> structure of
|
H A D | SSL_get1_builtin_sigalgs.pod | 26 NULL may be returned if no memory could be allocated. Otherwise, a 27 newly allocated string is always returned but it may have strlen == 0.
|
H A D | OPENSSL_secure_malloc.pod | 90 the memory if it was not allocated from the secure heap. 95 OPENSSL_secure_actual_size() tells the actual size allocated to the 99 OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap. 101 CRYPTO_secure_used() returns the number of bytes allocated in the 116 allocated.
|
H A D | OPENSSL_hexchar2int.pod | 42 The memory is allocated by calling OPENSSL_malloc() and should be 58 The memory is allocated by calling OPENSSL_malloc() and should be 67 return a pointer to allocated memory, or NULL on error.
|
H A D | SSL_SESSION_free.pod | 31 the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated 37 SSL_SESSION objects are allocated, when a TLS/SSL handshake operation 62 SSL_SESSION_new returns a pointer to the newly allocated SSL_SESSION structure
|
H A D | SSL_CTX_free.pod | 5 SSL_CTX_free - free an allocated SSL_CTX object 16 SSL_CTX object pointed to by B<ctx> and frees up the allocated memory if the reference count has re…
|
H A D | SRP_create_verifier.pod | 50 On successful exit I<*verifier> will point to a newly allocated BIGNUM containing 52 newly allocated BIGNUM containing a random salt. If I<*salt> is not NULL then 54 The caller is responsible for freeing the allocated I<*salt> and I<*verifier> 64 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
|
H A D | OSSL_ERR_STATE_save.pod | 45 for all the added entries. Any allocated data in the saved error 53 OSSL_ERR_STATE_new() returns a pointer to the allocated ERR_STATE 62 over any allocated data from the thread error state.
|
H A D | BUF_MEM_new.pod | 33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>. 44 or additionally-allocated memory to zero.
|
H A D | PEM_read_bio_ex.pod | 28 input are allocated from the secure heap. 45 The caller must release the storage allocated for *name, *header, and *data.
|
H A D | BN_mod_mul_reciprocal.pod | 30 previously allocated B<BN_CTX> used for temporary variables. 50 BN_RECP_CTX_new() returns the newly allocated B<BN_RECP_CTX>, and NULL
|
H A D | BN_mod_mul_montgomery.pod | 54 For all functions, I<ctx> is a previously allocated B<BN_CTX> used for 59 BN_MONT_CTX_new() returns the newly allocated B<BN_MONT_CTX>, and NULL
|
H A D | ERR_new.pod | 38 additional data string, which is allocated and store in the error 58 For dynamically allocated library numbers, reason strings are recorded
|
H A D | EVP_PKEY_CTX_get_algor.pod | 43 If I<*alg> is NULL, space will be allocated automatically, and assigned to 51 If I<< alg->parameters >> is NULL, space will be allocated automatically, and
|
H A D | SSL_accept_stream.pod | 21 given QUIC connection SSL object and returns the newly allocated QUIC stream SSL 53 SSL_accept_stream() returns a newly allocated QUIC stream SSL object, or NULL if
|
H A D | BIO_ADDR.pod | 89 returned string has been allocated on the heap and must be freed 96 returned string has been allocated on the heap and must be freed 101 protocol family AF_UNIX. The returned string has been allocated
|
H A D | PEM_bytes_read_bio.pod | 50 storage allocated within the PEM processing stack. The BIO stack from 52 allocated from the secure heap. In cases where it is desirable to ensure
|
H A D | OSSL_ENCODER_to_bio.pod | 33 allocated using L<OPENSSL_zalloc(3)>, and I<*pdata> will be set to point at 108 * pkey was successfully encoded into a newly allocated
|
/openssl/crypto/ |
H A D | README-sparse_array.md | 30 less than the maximum possible height. Only sufficient height is allocated to 108 The nodes themselves are allocated in a sparse manner. Only nodes which exist 109 along a path from the root of the tree to an added leaf will be allocated. 110 The complexity is hidden and nodes are allocated on an as needed basis.
|
/openssl/crypto/asn1/ |
H A D | a_object.c | 23 unsigned char *p, *allocated = NULL; in i2d_ASN1_OBJECT() local 34 if ((p = allocated = OPENSSL_malloc(objsize)) == NULL) in i2d_ASN1_OBJECT() 47 *pp = allocated != NULL ? allocated : p + a->length; in i2d_ASN1_OBJECT()
|
/openssl/crypto/dso/ |
H A D | dso_lib.c | 107 int allocated = 0; in DSO_load() local 115 allocated = 1; in DSO_load() 153 if (allocated) in DSO_load()
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 49 ossl_rand_cleanup_entropy() cleanses and frees any storage allocated by 53 ossl_rand_cleanup_user_entropy() cleanses and frees any storage allocated by 70 ossl_rand_cleanup_nonce() cleanses and frees any storage allocated by
|
H A D | evp_pkey_export_to_provider.pod | 52 allocated. It also either sets I<*keymgmt> to the B<EVP_KEYMGMT> associated 61 function. Since B<EVP_PKEY> is always dynamically allocated, this is OK.
|