Home
last modified time | relevance | path

Searched refs:trigger (Results 1 – 25 of 26) sorted by relevance

12

/openssl/crypto/
H A Driscvcap.c123 static int trigger = 0; in OPENSSL_cpuid_setup() local
125 if (trigger != 0) in OPENSSL_cpuid_setup()
127 trigger = 1; in OPENSSL_cpuid_setup()
H A Dcpuid.c97 static int trigger = 0; in OPENSSL_cpuid_setup() local
103 if (trigger) in OPENSSL_cpuid_setup()
106 trigger = 1; in OPENSSL_cpuid_setup()
H A Dsparcv9cap.c90 static int trigger = 0; in OPENSSL_cpuid_setup() local
92 if (trigger) in OPENSSL_cpuid_setup()
94 trigger = 1; in OPENSSL_cpuid_setup()
H A Dppccap.c146 static int trigger = 0; in OPENSSL_cpuid_setup() local
148 if (trigger) in OPENSSL_cpuid_setup()
150 trigger = 1; in OPENSSL_cpuid_setup()
H A Darmcap.c258 static int trigger = 0; in OPENSSL_cpuid_setup() local
260 if (trigger) in OPENSSL_cpuid_setup()
262 trigger = 1; in OPENSSL_cpuid_setup()
/openssl/doc/designs/quic-design/
H A Ddemuxer.md24 - optionally trigger sending stateless reset packets if a received packet
34 - trigger sending version negotiation packets if the server receives a packet
40 - if the packet is a well-formed Initial packet, trigger the creation of a
47 - optionally trigger sending stateless reset packets as above for client
H A Derror-handling.md51 Operations on QUIC streams (SSL_write(), SSL_read()) can also trigger errors,
H A Dstream-receive-buffers.md20 more data. Without the flow control limit a rogue peer could trigger
H A Dconnection-state-machine.md507 `ESTABLISHING.PROACTIVE_VER_NEG` state, which reenters that state to trigger
H A Dquic-api-ssl-funcs.md955 `SSL_key_update` can trigger a TX record layer key update, which will cause the
/openssl/.github/workflows/
H A Ddeploy-docs-openssl-org.yml12 trigger:
/openssl/doc/man3/
H A DSSL_stream_reset.pod41 It is also possible to trigger a stream reset by calling L<SSL_free(3)>; see the
H A DOSSL_SELF_TEST_new.pod9 OSSL_SELF_TEST_onend - functionality to trigger a callback during a self test
H A DSSL_key_update.pod85 causes a peer to also trigger a key update, passing
H A DSSL_read.pod52 buffer, the read functions will trigger the processing of the next record.
H A DSSL_get_error.pod102 that could trigger B<IO> other than to repeat the previous SSL_write() call.
/openssl/providers/
H A Dbuild.info105 # This is the trigger to actually build the FIPS module. Without these
/openssl/doc/man5/
H A Dfips_config.pod50 continuous test fails. The default value of C<1> will trigger the error mode.
/openssl/doc/designs/
H A Dfips_indicator.md160 // or trigger the indicator callback.
/openssl/doc/man7/
H A Dfips_module.pod571 The following algorithms use a unique indicator and do not trigger the
H A Dopenssl-quic.pod754 using L<SSL_set1_initial_peer_addr(3)>, and trigger the connection process by
/openssl/test/recipes/10-test_bn_data/
H A Dbnmod.txt2477 # The following inputs trigger an edge case between Montgomery reduction and the
/openssl/test/recipes/30-test_evp_data/
H A Devpciph_aes_common.txt648 # Self-generated vector to trigger false carry on big-endian platforms
/openssl/doc/man1/
H A Dopenssl-verification-options.pod557 Options like B<-purpose> and B<-verify_name> trigger the processing of specific
/openssl/
H A DCHANGES.md1173 also trigger an overly long computation during some of these checks.
1270 trigger a crash of an application using AES-XTS decryption if the memory
1736 may be able to trigger a remote code execution on the machine performing
7319 with missing content and trigger a NULL pointer dereference on parsing.
7448 missing content and trigger a NULL pointer dereference on parsing.
7461 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
8561 missing content and trigger a NULL pointer dereference on parsing.
8574 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
9626 missing content and trigger a NULL pointer dereference on parsing.
9639 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
[all …]

Completed in 189 milliseconds

12