Home
last modified time | relevance | path

Searched refs:new (Results 1 – 25 of 379) sorted by relevance

12345678910>>...16

/openssl/crypto/
H A Dthreads_win.c132 struct rcu_qp *new = in allocate_new_qp_group() local
136 return new; in allocate_new_qp_group()
153 new = OPENSSL_zalloc(sizeof(*new)); in ossl_rcu_lock_new()
155 if (new == NULL) in ossl_rcu_lock_new()
158 new->ctx = ctx; in ossl_rcu_lock_new()
165 new->qp_group = allocate_new_qp_group(new, num_writers); in ossl_rcu_lock_new()
183 new = NULL; in ossl_rcu_lock_new()
186 return new; in ossl_rcu_lock_new()
412 if (new == NULL) in ossl_rcu_call()
414 new->data = data; in ossl_rcu_call()
[all …]
H A Dthreads_pthread.c430 struct rcu_qp *new = in allocate_new_qp_group() local
434 return new; in allocate_new_qp_group()
502 if (new == NULL) in ossl_rcu_call()
505 new->data = data; in ossl_rcu_call()
506 new->fn = cb; in ossl_rcu_call()
538 new = OPENSSL_zalloc(sizeof(*new)); in ossl_rcu_lock_new()
539 if (new == NULL) in ossl_rcu_lock_new()
542 new->ctx = ctx; in ossl_rcu_lock_new()
551 new->qp_group = allocate_new_qp_group(new, num_writers); in ossl_rcu_lock_new()
554 new = NULL; in ossl_rcu_lock_new()
[all …]
H A Dthreads_none.c77 struct rcu_cb_item *new = OPENSSL_zalloc(sizeof(*new)); in ossl_rcu_call() local
79 if (new == NULL) in ossl_rcu_call()
82 new->fn = cb; in ossl_rcu_call()
83 new->data = data; in ossl_rcu_call()
84 new->next = lock->cb_items; in ossl_rcu_call()
85 lock->cb_items = new; in ossl_rcu_call()
/openssl/crypto/hashtable/
H A Dhashtable.c177 HT *new = OPENSSL_zalloc(sizeof(*new)); in ossl_ht_new() local
179 if (new == NULL) in ossl_ht_new()
189 new->wpd.neighborhood_len = new->config.init_neighborhoods; in ossl_ht_new()
192 new->wpd.neighborhood_len |= new->wpd.neighborhood_len >> 1; in ossl_ht_new()
193 new->wpd.neighborhood_len |= new->wpd.neighborhood_len >> 2; in ossl_ht_new()
194 new->wpd.neighborhood_len |= new->wpd.neighborhood_len >> 4; in ossl_ht_new()
195 new->wpd.neighborhood_len |= new->wpd.neighborhood_len >> 8; in ossl_ht_new()
196 new->wpd.neighborhood_len |= new->wpd.neighborhood_len >> 16; in ossl_ht_new()
205 new->md = OPENSSL_zalloc(sizeof(*new->md)); in ossl_ht_new()
214 new->md->neighborhood_mask = new->wpd.neighborhood_len - 1; in ossl_ht_new()
[all …]
/openssl/fuzz/
H A Dslh-dsa.c65 EVP_PKEY *new = NULL; in slh_dsa_gen_key() local
71 new = EVP_PKEY_new(); in slh_dsa_gen_key()
76 EVP_PKEY_free(new); in slh_dsa_gen_key()
77 new = NULL; in slh_dsa_gen_key()
89 return new; in slh_dsa_gen_key()
423 EVP_PKEY *new = NULL; in slh_dsa_export_import() local
434 new = EVP_PKEY_new(); in slh_dsa_export_import()
446 EVP_PKEY_free(new); in slh_dsa_export_import()
451 new = NULL; in slh_dsa_export_import()
460 new = EVP_PKEY_new(); in slh_dsa_export_import()
[all …]
/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_enrollment.csv6 0,missing chain, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLA…
28 1,issuer, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,, -issuer,_CA_DN,BLANK,,BLANK,,B…
31 1,days 1, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,1,BLANK,,BLANK,,B…
32 1,days 0, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,0,BLANK,,BLANK,,B…
60 0,popo NONE, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,…
72 0,no certout, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,…
73 0,certout missing arg, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLAN…
75 0,certout too many parameters, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLA…
77 1,no out_trusted, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BL…
110 1,cr, -section,, -cmd,cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,…
[all …]
/openssl/crypto/cmp/
H A Dcmp_util.c245 ASN1_OCTET_STRING *new; in ossl_cmp_asn1_octet_string_set1() local
255 if ((new = ASN1_OCTET_STRING_dup(src)) == NULL) in ossl_cmp_asn1_octet_string_set1()
258 new = NULL; in ossl_cmp_asn1_octet_string_set1()
262 *tgt = new; in ossl_cmp_asn1_octet_string_set1()
269 ASN1_OCTET_STRING *new = NULL; in ossl_cmp_asn1_octet_string_set1_bytes() local
276 if ((new = ASN1_OCTET_STRING_new()) == NULL in ossl_cmp_asn1_octet_string_set1_bytes()
277 || !(ASN1_OCTET_STRING_set(new, bytes, len))) { in ossl_cmp_asn1_octet_string_set1_bytes()
278 ASN1_OCTET_STRING_free(new); in ossl_cmp_asn1_octet_string_set1_bytes()
284 *tgt = new; in ossl_cmp_asn1_octet_string_set1_bytes()
/openssl/demos/certs/apps/
H A Dmkacerts.sh13 -keyout root.pem -out root.pem -key rootkey.pem -new -days 3650
16 -key intkey.pem -out intreq.pem -new
22 -key ckey.pem -out creq.pem -new
29 -key skey.pem -out sreq.pem -new
36 -key skey2.pem -out sreq2.pem -new
H A Dmkxcerts.sh14 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1
17 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256
20 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512
/openssl/doc/designs/quic-design/
H A Dquic-connID-retire.md22 * creation of new CIDs (coded but not used)
23 * responding to new CIDs by returning new CIDs to peer match
48 When a remote creates a new connection ID:
50 * May respond with a new connection ID frame (it's a good idea)
68 be retransmitted, they'll be done so using a new CID on a new route.
/openssl/doc/man3/
H A DPKCS12_SAFEBAG_create_cert.pod38 PKCS12_SAFEBAG_create_cert() creates a new B<PKCS12_SAFEBAG> of type B<NID_certBag>
41 PKCS12_SAFEBAG_create_crl() creates a new B<PKCS12_SAFEBAG> of type B<NID_crlBag>
44 PKCS12_SAFEBAG_create_secret() creates a new B<PKCS12_SAFEBAG> of type
49 PKCS12_SAFEBAG_create0_p8inf() creates a new B<PKCS12_SAFEBAG> of type B<NID_keyBag>
52 PKCS12_SAFEBAG_create0_pkcs8() creates a new B<PKCS12_SAFEBAG> of type
55 PKCS12_SAFEBAG_create_pkcs8_encrypt() creates a new B<PKCS12_SAFEBAG> of type
H A DX509_NAME_add_entry_by_txt.pod36 standard ASN1 type (such as B<V_ASN1_IA5STRING>). The new entry is
40 to B<name>. The new entry is added to a position determined by B<loc>
61 The B<loc> and B<set> parameters determine where a new entry should
63 to 0. This adds a new entry to the end of B<name> as a single valued
66 B<loc> actually determines the index where the new entry is inserted:
69 B<set> determines how the new type is added.
70 If it is zero a new RDN is created.
72 If B<set> is -1 or 1 it is added as a new set member
H A DSSL_new_stream.pod6 SSL_STREAM_FLAG_ADVANCE - create a new locally-initiated QUIC stream
20 a new locally-initiated bidirectional or unidirectional QUIC stream and returns
44 The creation of new streams is subject to flow control by the QUIC protocol. If
45 it is currently not possible to create a new locally initiated stream of the
47 is configured in blocking mode) until a new stream can be created, or otherwise
56 object even if a new QUIC stream cannot yet be opened due to flow control. The
57 caller may begin to use the new stream and fill the write buffer of the stream
67 SSL_new_stream() returns a new stream object, or NULL on error.
H A DSSL_CTX_set_ssl_version.pod6 - choose a new TLS/SSL method
20 SSL_CTX_set_ssl_version() sets a new default TLS/SSL B<method> for SSL objects
30 SSL_set_ssl_method() sets a new TLS/SSL B<method> for a particular B<ssl>
46 it would usually be preferable to create a new SSL_CTX object than to
63 The new choice failed, check the error stack to find out the reason.
H A DCMAC_CTX.pod34 Applications should use the new L<EVP_MAC(3)> interface.
39 =item L<EVP_MAC_CTX_new(3)> to create a new MAC context.
57 CMAC_CTX_new() creates a new B<CMAC_CTX> structure and returns a pointer to it.
70 CMAC_Init() initializes the B<CMAC_CTX> structure for a new CMAC calculation
86 additional data to be processed and a new MAC to be generated.
90 CMAC_CTX_new() returns a pointer to a new B<CMAC_CTX> structure or NULL if
H A DSSL_key_update.pod50 When called from the client side, SSL_renegotiate() schedules a completely new
55 attempt to resume any session associated with the connection in the new
60 session associated with the current connection in the new handshake.
64 for a new handshake to be sent to the client. The next time an IO operation is
66 appropriate, the request is sent. The client may or may not respond with a new
68 a new handshake is started then this will be handled transparently by calling
74 new handshake. For historical reasons, DTLS clients will not attempt to resume
75 the session in the new handshake.
H A DDH_meth_new.pod72 DH_meth_new() creates a new B<DH_METHOD> structure. It should be given a
76 during the construction of a new B<DH> object based on this B<DH_METHOD>. Any
77 new B<DH> object will have those flags set by default.
80 parameter. This might be useful for creating a new B<DH_METHOD> based on an
101 function used for generating a new DH key pair respectively. This function will
106 function used for computing a new DH shared secret respectively. This function
121 for creating a new DH instance respectively. This function will be
124 functions will allocate the memory for the new DH object, and a pointer to this
/openssl/doc/HOWTO/
H A Ddocumenting-functions-and-macros.md11 If you add a new public function or macro to a header file without documenting
23 So, create a new `.pod` file named `doc/man3/FUNCTION.pod`.
37 Next, you need to add your new file to the `doc/build.info` file.
48 now agree with you that you have documented all your new defines,
60 but new additions should be placed at the end of the file.
65 For demonstration purposes, two new public symbols have been added
123 which triggers a scan of the public headers for new API functions.
125 All new functions will be added to either `util/libcrypto.num`
174 can be utilized to check for this. A completely new documentation file
/openssl/crypto/err/
H A DREADME.md1 Adding new libraries
4 When adding a new sub-library to OpenSSL, assign it a library number
37 generation script as the point to place new error codes, any text
46 Adding new error codes
/openssl/ssl/
H A Dssl_cert_comp.c400 SSL *new = SSL_new(ctx); in SSL_CTX_compress_certs() local
402 if (new == NULL) in SSL_CTX_compress_certs()
405 ret = ssl_compress_certs(new, ctx->cert->pkeys, alg); in SSL_CTX_compress_certs()
406 SSL_free(new); in SSL_CTX_compress_certs()
435 SSL *new = SSL_new(ctx); in SSL_CTX_get1_compressed_cert() local
437 ret = ssl_get_compressed_cert(new, ctx->cert->key, alg, data, orig_len); in SSL_CTX_get1_compressed_cert()
438 SSL_free(new); in SSL_CTX_get1_compressed_cert()
/openssl/Configurations/
H A Dunix-Makefile.tmpl635 $(RM) providers/fips*.new
763 mv -f "$(DESTDIR)$(libdir)/$$fn.new" \
792 cp -f $$a $$a.new; \
797 $(AR) r $$a.new $$so; \
800 $(AR) r $$a.new $$s1; \
801 mv -f $$a.new $$a; \
941 mv -f "$(DESTDIR)$(bindir)/$$fn.new" \
947 mv -f "$(DESTDIR)$(libdir)/$$fn.new" \
1213 > crypto/objects/obj_mac.new && \
1421 providers/fips.checksum.new: providers/fips.module.sources.new
[all …]
/openssl/doc/internal/man3/
H A Dossl_init_thread_deregister.pod29 Thread aware code registers a "stop handler" for each new thread that it uses.
30 Typically, when a new thread is being used, code will add a new value to some
35 A new stop handler is registered using the function ossl_init_thread_start().
/openssl/util/
H A Dfind-unused-errs49 grep -v -w $F <$FILE >$FILE.new
50 mv $FILE.new $FILE
/openssl/test/recipes/25-test_eai_data/
H A Dkdc.sh10 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-root-key.pem \
36 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-key.pem \
/openssl/doc/man7/
H A Devp.pod29 asymmetric algorithms. To create a new EVP_PKEY see
33 new keys can be generated using L<EVP_PKEY_keygen(3)>.
62 implementation. However, new applications should not typically use this (preferring, for example,
78 versions of new algorithms cannot be accessed using the low-level functions.
79 Also makes code harder to adapt to new algorithms and some options are not

Completed in 93 milliseconds

12345678910>>...16