Home
last modified time | relevance | path

Searched refs:heap (Results 1 – 16 of 16) sorted by relevance

/openssl/ssl/
H A Dpriority_queue.c50 struct pq_heap_st *heap; member
123 struct pq_heap_st *h = pq->heap; in pqueue_move_elem()
208 pq->heap[n].data = data; in ossl_pqueue_push()
209 pq->heap[n].index = m; in ossl_pqueue_push()
225 return pq->heap->data; in ossl_pqueue_peek()
239 res = pq->heap->data; in ossl_pqueue_pop()
240 elem = pq->heap->index; in ossl_pqueue_pop()
313 h = OPENSSL_realloc(pq->heap, new_max * sizeof(*pq->heap)); in ossl_pqueue_reserve()
316 pq->heap = h; in ossl_pqueue_reserve()
342 pq->heap = OPENSSL_malloc(sizeof(*pq->heap) * min_nodes); in ossl_pqueue_new()
[all …]
/openssl/doc/man3/
H A DOPENSSL_secure_malloc.pod11 CRYPTO_secure_used - secure heap storage
54 CRYPTO_secure_malloc_init() creates the secure heap, with the specified
56 allocate from the heap or zero to use a reasonable default value.
62 heap as been initialized and is available.
68 OPENSSL_secure_malloc() allocates C<num> bytes from the heap.
78 OPENSSL_secure_free() releases the memory at C<ptr> back to the heap.
90 the memory if it was not allocated from the secure heap.
97 requested, in order to "round up" and reduce secure heap fragmentation.
102 secure heap.
107 and 2 if successful but the heap could not be protected by memory
[all …]
H A DPEM_bytes_read_bio.pod43 memory from the secure heap for its temporary buffers and the storage
49 PEM_bytes_read_bio_secmem() only enforces that the secure heap is used for
52 allocated from the secure heap. In cases where it is desirable to ensure
53 that the contents of the PEM file only appears in memory from the secure heap,
H A DBIO_ADDR.pod89 returned string has been allocated on the heap and must be freed
96 returned string has been allocated on the heap and must be freed
102 on the heap and must be freed with OPENSSL_free().
H A DBN_new.pod24 BN_secure_new() does the same except that the secure heap
H A DBUF_MEM_new.pod33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
H A DPEM_read_bio_ex.pod28 input are allocated from the secure heap.
H A DNCONF_new_ex.pod31 NCONF_new_ex() creates a new CONF object in heap memory and assigns to
H A DBN_CTX_new.pod33 but uses the secure heap (see L<CRYPTO_secure_malloc(3)>) to hold the
H A DHMAC.pod82 HMAC_CTX_new() creates a new HMAC_CTX in heap memory.
H A DBIO_s_mem.pod32 BIO_s_secmem() is like BIO_s_mem() except that the secure heap is used
/openssl/doc/designs/quic-design/
H A Djson-encoder.md61 headers and can be incorporated into other objects without a heap allocation.
/openssl/
H A DNEWS.md464 * Fixed heap memory corruption with RSA private key operation
680 * Keep all global DRBG instances on the secure heap if it is enabled.
761 * ChaCha20/Poly1305 heap-buffer-overflow ([CVE-2016-7054])
922 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
1023 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
H A DCHANGES.md1636 SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that
3466 dependent but is typically heap allocated.
4269 - Keep all global DRBG instances on the secure heap if it is enabled.
4937 * ChaCha20/Poly1305 heap-buffer-overflow
5956 * Add secure heap for storage of private keys (when possible).
6729 can overflow resulting in a heap corruption.
6911 resulting in a heap corruption. Following an analysis of all OpenSSL
7032 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
7930 can overflow resulting in a heap corruption.
8113 resulting in a heap corruption. Following an analysis of all OpenSSL
[all …]
/openssl/include/openssl/
H A Dui.h.in152 * The returned string shall always be allocated on the heap with
/openssl/doc/man7/
H A Dossl-guide-migration.pod594 stack allocate some structures. Instead they must be heap allocated through some

Completed in 88 milliseconds