Searched refs:trigger (Results 1 – 25 of 26) sorted by relevance
12
/openssl/crypto/ |
H A D | riscvcap.c | 123 static int trigger = 0; in OPENSSL_cpuid_setup() local 125 if (trigger != 0) in OPENSSL_cpuid_setup() 127 trigger = 1; in OPENSSL_cpuid_setup()
|
H A D | cpuid.c | 97 static int trigger = 0; in OPENSSL_cpuid_setup() local 103 if (trigger) in OPENSSL_cpuid_setup() 106 trigger = 1; in OPENSSL_cpuid_setup()
|
H A D | sparcv9cap.c | 90 static int trigger = 0; in OPENSSL_cpuid_setup() local 92 if (trigger) in OPENSSL_cpuid_setup() 94 trigger = 1; in OPENSSL_cpuid_setup()
|
H A D | ppccap.c | 146 static int trigger = 0; in OPENSSL_cpuid_setup() local 148 if (trigger) in OPENSSL_cpuid_setup() 150 trigger = 1; in OPENSSL_cpuid_setup()
|
H A D | armcap.c | 258 static int trigger = 0; in OPENSSL_cpuid_setup() local 260 if (trigger) in OPENSSL_cpuid_setup() 262 trigger = 1; in OPENSSL_cpuid_setup()
|
/openssl/doc/designs/quic-design/ |
H A D | demuxer.md | 24 - optionally trigger sending stateless reset packets if a received packet 34 - trigger sending version negotiation packets if the server receives a packet 40 - if the packet is a well-formed Initial packet, trigger the creation of a 47 - optionally trigger sending stateless reset packets as above for client
|
H A D | error-handling.md | 51 Operations on QUIC streams (SSL_write(), SSL_read()) can also trigger errors,
|
H A D | stream-receive-buffers.md | 20 more data. Without the flow control limit a rogue peer could trigger
|
H A D | connection-state-machine.md | 507 `ESTABLISHING.PROACTIVE_VER_NEG` state, which reenters that state to trigger
|
H A D | quic-api-ssl-funcs.md | 955 `SSL_key_update` can trigger a TX record layer key update, which will cause the
|
/openssl/.github/workflows/ |
H A D | deploy-docs-openssl-org.yml | 12 trigger:
|
/openssl/doc/man3/ |
H A D | SSL_stream_reset.pod | 41 It is also possible to trigger a stream reset by calling L<SSL_free(3)>; see the
|
H A D | OSSL_SELF_TEST_new.pod | 9 OSSL_SELF_TEST_onend - functionality to trigger a callback during a self test
|
H A D | SSL_key_update.pod | 85 causes a peer to also trigger a key update, passing
|
H A D | SSL_read.pod | 52 buffer, the read functions will trigger the processing of the next record.
|
H A D | SSL_get_error.pod | 102 that could trigger B<IO> other than to repeat the previous SSL_write() call.
|
/openssl/providers/ |
H A D | build.info | 105 # This is the trigger to actually build the FIPS module. Without these
|
/openssl/doc/man5/ |
H A D | fips_config.pod | 50 continuous test fails. The default value of C<1> will trigger the error mode.
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 160 // or trigger the indicator callback.
|
/openssl/doc/man7/ |
H A D | fips_module.pod | 571 The following algorithms use a unique indicator and do not trigger the
|
H A D | openssl-quic.pod | 754 using L<SSL_set1_initial_peer_addr(3)>, and trigger the connection process by
|
/openssl/test/recipes/10-test_bn_data/ |
H A D | bnmod.txt | 2477 # The following inputs trigger an edge case between Montgomery reduction and the
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_common.txt | 648 # Self-generated vector to trigger false carry on big-endian platforms
|
/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 557 Options like B<-purpose> and B<-verify_name> trigger the processing of specific
|
/openssl/ |
H A D | CHANGES.md | 1173 also trigger an overly long computation during some of these checks. 1270 trigger a crash of an application using AES-XTS decryption if the memory 1736 may be able to trigger a remote code execution on the machine performing 7319 with missing content and trigger a NULL pointer dereference on parsing. 7448 missing content and trigger a NULL pointer dereference on parsing. 7461 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in 8561 missing content and trigger a NULL pointer dereference on parsing. 8574 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in 9626 missing content and trigger a NULL pointer dereference on parsing. 9639 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in [all …]
|
Completed in 98 milliseconds
12