| /src/crypto/openssl/apps/ |
| H A D | dgst.c | 137 buf = app_malloc(BUFSIZE, "I/O buffer"); in dgst_main() 431 sigbuf = app_malloc(siglen, "signature buffer"); in dgst_main() 571 file_cpy = app_malloc(mem_len, file); in newline_escape_filename() 676 allocated_buf = app_malloc(len, "Signature buffer"); in do_fp() 688 allocated_buf = app_malloc(len, "Digest buffer"); in do_fp() 744 sig = app_malloc(len, "Signature buffer"); in do_fp_oneshot_sign()
|
| H A D | kdf.c | 67 res = app_malloc(len, "algorithm name"); in alloc_kdf_algorithm_name() 182 dkm_bytes = app_malloc(dkm_len, "out buffer"); in kdf_main()
|
| H A D | mac.c | 70 res = app_malloc(len, "algorithm name"); in alloc_mac_algorithm_name() 98 buf = app_malloc(BUFSIZE, "I/O buffer"); in mac_main()
|
| H A D | rsautl.c | 234 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 235 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main()
|
| H A D | engine.c | 70 p = *buf = app_malloc(*size, "engine buffer"); in append_buf() 186 name = app_malloc(len + 1, "name buffer"); in util_verbose() 197 desc = app_malloc(len + 1, "description buffer"); in util_verbose()
|
| H A D | pkeyutl.c | 588 buf_out = app_malloc(buf_outlen, "buffer output"); in pkeyutl_main() 590 secret = app_malloc(secretlen, "secret output"); in pkeyutl_main() 875 mbuf = app_malloc(filesize, "oneshot sign/verify buffer"); in do_raw_keyop() 893 *out = app_malloc(*poutlen, "buffer output"); in do_raw_keyop() 936 *out = app_malloc(*poutlen, "buffer output"); in do_raw_keyop()
|
| H A D | rehash.c | 134 bp = app_malloc(sizeof(*bp), "hash bucket"); in add_entry() 164 ep = app_malloc(sizeof(*ep), "collision bucket"); in add_entry() 398 buf = app_malloc(buflen, "filename buffer"); in do_dir()
|
| H A D | speed.c | 1564 unsigned char *sig = app_malloc(tempargs->sig_max_sig_len[testnum], in SIG_sign_loop() 2566 loopargs = app_malloc(loopargs_len * sizeof(loopargs_t), "array of loopargs"); in speed_main() 2586 loopargs[i].buf_malloc = app_malloc(buflen, "input buffer"); in speed_main() 2587 loopargs[i].buf2_malloc = app_malloc(buflen, "input buffer"); in speed_main() 2594 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a"); in speed_main() 2595 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b"); in speed_main() 2597 loopargs[i].secret_ff_a = app_malloc(MAX_FFDH_SIZE, "FFDH secret a"); in speed_main() 2598 loopargs[i].secret_ff_b = app_malloc(MAX_FFDH_SIZE, "FFDH secret b"); in speed_main() 2804 evp_hmac_name = app_malloc(hmac_name_len, "HMAC name"); in speed_main() 3059 loopargs[k].key = app_malloc(keylen, "evp_cipher key"); in speed_main() [all …]
|
| H A D | rand.c | 201 buf = app_malloc(buflen, "buffer for output file"); in rand_main()
|
| H A D | s_server.c | 297 wbuf = app_malloc(sizeof(*wbuf) + 1024, "ebcdic wbuf"); in ebcdic_new() 355 wbuf = app_malloc(sizeof(*wbuf) + num, "grow ebcdic wbuf"); in ebcdic_write() 2560 buf = app_malloc(bufsize, "server buffer"); in sv_body() 3229 exportedkeymat = app_malloc(keymatexportlen, "export key"); in print_connection_info() 3281 p = buf = app_malloc(bufsize + 1, "server www buffer"); in www_body() 3748 buf = app_malloc(bufsize + 1, "server rev buffer"); in rev_body() 3937 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() 3949 sess->der = app_malloc(sess->derlen, "get session buffer"); in add_session()
|
| H A D | ecparam.c | 86 curves = app_malloc((int)sizeof(*curves) * crv_len, "list curves"); in list_builtin_curves()
|
| H A D | enc.c | 415 strbuf = app_malloc(SIZE, "strbuf"); in enc_main() 416 buff = app_malloc(EVP_ENCODE_LENGTH(bsize), "evp buffer"); in enc_main()
|
| H A D | ca.c | 1947 row[DB_exp_date] = app_malloc(tm->length + 1, "row expdate"); in do_body() 1958 irow = app_malloc(sizeof(*irow) * (DB_NUMBER + 1), "row space"); in do_body() 2176 row[DB_exp_date] = app_malloc(tm->length + 1, "row exp_data"); in do_revoke() 2187 irow = app_malloc(sizeof(*irow) * (DB_NUMBER + 1), "row ptr"); in do_revoke() 2251 row[DB_serial] = app_malloc(serial_len + 2, "row serial#"); in get_certificate_status() 2452 str = app_malloc(i, "revocation reason"); in make_revocation_str()
|
| H A D | passwd.c | 236 passwd = passwd_malloc = app_malloc(passwd_malloc_size, "password buffer"); in passwd_main() 805 *salt_p = *salt_malloc_p = app_malloc(saltlen + 1, "salt buffer"); in do_passwd()
|
| H A D | ts.c | 546 *md_value = app_malloc(md_value_len, "digest buffer"); in create_digest() 597 nonce->data = app_malloc(nonce->length + 1, "nonce buffer"); in create_nonce()
|
| H A D | s_client.c | 347 unsigned char *ret = app_malloc(strlen(in) / 2, "hexdecode"); in hexdecode() 1074 cbuf = app_malloc(BUFSIZZ, "cbuf"); in s_client_main() 1075 sbuf = app_malloc(BUFSIZZ, "sbuf"); in s_client_main() 1076 mbuf = app_malloc(BUFSIZZ, "mbuf"); in s_client_main() 3688 exportedkeymat = app_malloc(keymatexportlen, "export key"); in print_stuff()
|
| H A D | srp.c | 98 irow = app_malloc(sizeof(*irow) * (DB_NUMBER + 1), "row pointers"); in update_index()
|
| H A D | fipsinstall.c | 857 read_buffer = app_malloc(BUFSIZE, "I/O buffer"); in fipsinstall_main()
|
| H A D | x509.c | 1205 buf = app_malloc(len + sizeof(POSTFIX), "serial# buffer"); in x509_load_serial()
|
| /src/crypto/openssl/test/testutil/ |
| H A D | apps_shims.c | 16 void *app_malloc(size_t sz, const char *what) in app_malloc() function
|
| /src/crypto/openssl/apps/lib/ |
| H A D | tlssrp_depr.c | 101 char *pass = app_malloc(PWD_STRLEN + 1, "SRP password buffer"); in ssl_give_srp_client_pwd_cb()
|
| H A D | s_cb.c | 390 groups = app_malloc(ngroups * sizeof(int), "groups to print"); in ssl_print_groups() 881 buffer = app_malloc(length, "cookie generate buffer"); in generate_stateless_cookie_callback() 1059 SSL_EXCERT *exc = app_malloc(sizeof(*exc), "prepend cert"); in ssl_excert_prepend() 1243 cp = out = app_malloc(ilen, "TLSA hex data buffer"); in hexencode()
|
| H A D | http_server.c | 95 kidpids = app_malloc(n_responders * sizeof(*kidpids), "child PID array"); in spawn_loop()
|
| H A D | apps.c | 634 void *app_malloc(size_t sz, const char *what) in app_malloc() function 1697 retdb = app_malloc(sizeof(*retdb), "new DB"); in load_index() 2128 out = app_malloc(len + 1, "NPN buffer"); in next_protos_parse() 3235 fds = app_malloc(sizeof(OSSL_ASYNC_FD) * numfds, "allocate async fds"); in wait_for_async()
|
| /src/crypto/openssl/apps/include/ |
| H A D | apps.h | 230 void *app_malloc(size_t sz, const char *what);
|