Searched refs:heap (Results 1 – 16 of 16) sorted by relevance
50 struct pq_heap_st *heap; member123 struct pq_heap_st *h = pq->heap; in pqueue_move_elem()208 pq->heap[n].data = data; in ossl_pqueue_push()209 pq->heap[n].index = m; in ossl_pqueue_push()225 return pq->heap->data; in ossl_pqueue_peek()239 res = pq->heap->data; in ossl_pqueue_pop()240 elem = pq->heap->index; in ossl_pqueue_pop()313 h = OPENSSL_realloc(pq->heap, new_max * sizeof(*pq->heap)); in ossl_pqueue_reserve()316 pq->heap = h; in ossl_pqueue_reserve()342 pq->heap = OPENSSL_malloc(sizeof(*pq->heap) * min_nodes); in ossl_pqueue_new()[all …]
11 CRYPTO_secure_used - secure heap storage54 CRYPTO_secure_malloc_init() creates the secure heap, with the specified56 allocate from the heap or zero to use a reasonable default value.62 heap as been initialized and is available.68 OPENSSL_secure_malloc() allocates C<num> bytes from the heap.78 OPENSSL_secure_free() releases the memory at C<ptr> back to the heap.90 the memory if it was not allocated from the secure heap.97 requested, in order to "round up" and reduce secure heap fragmentation.102 secure heap.107 and 2 if successful but the heap could not be protected by memory[all …]
43 memory from the secure heap for its temporary buffers and the storage49 PEM_bytes_read_bio_secmem() only enforces that the secure heap is used for52 allocated from the secure heap. In cases where it is desirable to ensure53 that the contents of the PEM file only appears in memory from the secure heap,
89 returned string has been allocated on the heap and must be freed96 returned string has been allocated on the heap and must be freed102 on the heap and must be freed with OPENSSL_free().
24 BN_secure_new() does the same except that the secure heap
33 should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
28 input are allocated from the secure heap.
31 NCONF_new_ex() creates a new CONF object in heap memory and assigns to
33 but uses the secure heap (see L<CRYPTO_secure_malloc(3)>) to hold the
82 HMAC_CTX_new() creates a new HMAC_CTX in heap memory.
32 BIO_s_secmem() is like BIO_s_mem() except that the secure heap is used
61 headers and can be incorporated into other objects without a heap allocation.
464 * Fixed heap memory corruption with RSA private key operation680 * Keep all global DRBG instances on the secure heap if it is enabled.761 * ChaCha20/Poly1305 heap-buffer-overflow ([CVE-2016-7054])922 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption1023 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
1636 SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that3466 dependent but is typically heap allocated.4269 - Keep all global DRBG instances on the secure heap if it is enabled.4937 * ChaCha20/Poly1305 heap-buffer-overflow5956 * Add secure heap for storage of private keys (when possible).6729 can overflow resulting in a heap corruption.6911 resulting in a heap corruption. Following an analysis of all OpenSSL7032 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption7930 can overflow resulting in a heap corruption.8113 resulting in a heap corruption. Following an analysis of all OpenSSL[all …]
152 * The returned string shall always be allocated on the heap with
594 stack allocate some structures. Instead they must be heap allocated through some
Completed in 88 milliseconds