/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-cipher.7 | 76 .IP initialised 4 77 .IX Item "initialised" 79 input. There are three possible initialised states: 81 .IP "initialised using EVP_CipherInit" 4 82 .IX Item "initialised using EVP_CipherInit" 84 .IP "initialised for decryption using EVP_DecryptInit" 4 85 .IX Item "initialised for decryption using EVP_DecryptInit" 86 .IP "initialised for encryption using EVP_EncryptInit" 4 87 .IX Item "initialised for encryption using EVP_EncryptInit" 96 correspond to those for initialised above. The three different streams should [all …]
|
H A D | life_cycle-mac.7 | 76 .IP initialised 4 77 .IX Item "initialised" 107 +> | initialised | <+ 132 start newed initialised updated finaled freed 134 EVP_MAC_init initialised initialised initialised initialised 139 EVP_MAC_CTX_get_params newed initialised updated 140 EVP_MAC_CTX_set_params newed initialised updated 141 EVP_MAC_CTX_gettable_params newed initialised updated 142 EVP_MAC_CTX_settable_params newed initialised updated
|
H A D | life_cycle-digest.7 | 75 .IP initialised 4 76 .IX Item "initialised" 113 …+----+-------------------> ' initialised ' <+ EVP_DigestInit | … 156 … start newed initialised updated finaled squeezed freed 158 EVP_DigestInit initialised initialised initialised initialised initialised 165 EVP_MD_CTX_get_params newed initialised updated 166 EVP_MD_CTX_set_params newed initialised updated 167 EVP_MD_CTX_gettable_params newed initialised updated 168 EVP_MD_CTX_settable_params newed initialised updated 169 EVP_MD_CTX_copy_ex newed initialised updated squeezed
|
H A D | provider-signature.7 | 311 A previously initialised signature context is passed in the \fIctx\fR 363 A previously initialised signature context is passed in the \fIctx\fR parameter. 407 A previously initialised signature context is passed in the \fIctx\fR parameter. 429 parameter which should be of length \fIdatalen\fR. A previously initialised 436 added through \fBOSSL_FUNC_signature_digest_sign_update()\fR. A previously initialised 445 initialised signature context is passed in the \fIctx\fR parameter. The data to be 465 parameter which should be of length \fIdatalen\fR. A previously initialised 472 added through \fBOSSL_FUNC_signature_digest_verify_update()\fR. A previously initialised 478 initialised verification context is passed in the \fIctx\fR parameter. The data to be
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-cipher.pod | 23 =item initialised 26 input. There are three possible initialised states: 30 =item initialised using EVP_CipherInit 32 =item initialised for decryption using EVP_DecryptInit 34 =item initialised for encryption using EVP_EncryptInit 42 correspond to those for initialised above. The three different streams should 67 | ' any of the initialised ' 81 | initialised | | initialised | | initialised | 127 …start newed initialised updated finaled initialised updated initialised update… 130 …pherInit initialised initialised initialised initialised initialised initialise… [all …]
|
H A D | life_cycle-mac.pod | 23 =item initialised 63 +> | initialised | <+ 96 start newed initialised updated finaled freed 98 EVP_MAC_init initialised initialised initialised initialised 103 EVP_MAC_CTX_get_params newed initialised updated 104 EVP_MAC_CTX_set_params newed initialised updated 105 EVP_MAC_CTX_gettable_params newed initialised updated 106 EVP_MAC_CTX_settable_params newed initialised updated 118 <th style="border:1px solid" align="center">initialised</th> 131 <td style="border:1px solid" align="center">initialised</td> [all …]
|
H A D | life_cycle-digest.pod | 22 =item initialised 70 …+----+-------------------> ' initialised ' <+ EVP_DigestInit | … 121 … start newed initialised updated finaled squeezed freed 123 EVP_DigestInit initialised initialised initialised initialised initialised 130 EVP_MD_CTX_get_params newed initialised updated 131 EVP_MD_CTX_set_params newed initialised updated 132 EVP_MD_CTX_gettable_params newed initialised updated 133 EVP_MD_CTX_settable_params newed initialised updated 134 EVP_MD_CTX_copy_ex newed initialised updated squeezed 146 <th style="border:1px solid" align="center">initialised</th> [all …]
|
H A D | provider-signature.pod | 254 A previously initialised signature context is passed in the I<ctx> 308 A previously initialised signature context is passed in the I<ctx> parameter. 354 A previously initialised signature context is passed in the I<ctx> parameter. 377 parameter which should be of length I<datalen>. A previously initialised 384 added through OSSL_FUNC_signature_digest_sign_update(). A previously initialised 393 initialised signature context is passed in the I<ctx> parameter. The data to be 414 parameter which should be of length I<datalen>. A previously initialised 421 added through OSSL_FUNC_signature_digest_verify_update(). A previously initialised 427 initialised verification context is passed in the I<ctx> parameter. The data to be
|
/freebsd/contrib/libcxxrt/ |
H A D | guard.cc | 31 * Static values in C++ can be initialised lazily their first use. This file 40 * accessed far more times than they are initialised, this lock implementation 42 * initialised. 75 * locking by loading the guard word and, if it is not initialised, trying to 107 * indicate the initialised state is `1<<InitBit`. 119 * The value indicating that the initialised bit is set (and all other 122 static constexpr GuardWord initialised = static_cast<GuardWord>(1) member 132 * Release the lock and set the initialised state. In the single-word 137 val.store(isInitialised ? initialised : 0, memory_order::release); in unlock() 139 GuardWord init_state = initialised; in unlock() [all …]
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | cipher.dot | 7 initialised [fontcolor="#c94c4c"]; 12 d_initialised [label="initialised\n(decryption)", fontcolor="#c94c4c"]; 14 e_initialised [label="initialised\n(encryption)", fontcolor="#c94c4c"]; 18 newed -> initialised [label="EVP_CipherInit"]; 19 initialised -> initialised [label="EVP_CipherInit\n(not required but allowed)", 21 initialised -> updated [label="EVP_CipherUpdate", weight=2]; 41 most [label="any of the initialised\nupdated or finaled states", style=dashed, 51 initialised [fontcolor="#c94c4c"]; 57 newed -> initialised [label="EVP_CipherInit"]; 58 initialised -> initialised [label="EVP_CipherInit\n(not required but allowed)", [all …]
|
H A D | digest.dot | 6 initialised [label=initialised, fontcolor="#c94c4c"]; 13 newed -> initialised [label="EVP_DigestInit", weight=100]; 14 initialised -> updated [label="EVP_DigestUpdate", weight=100]; 25 updated -> initialised [label="EVP_DigestInit", style=dashed, 27 finaled -> initialised [label="EVP_DigestInit", style=dashed, 33 squeezed -> initialised [label="EVP_DigestInit", style=dashed,
|
H A D | mac.dot | 6 initialised [fontcolor="#c94c4c"]; 12 newed -> initialised [label="EVP_MAC_init"]; 13 initialised -> updated [label="EVP_MAC_update"]; 23 updated -> initialised [label="EVP_MAC_init", style=dashed, 25 finaled -> initialised [label="EVP_MAC_init", style=dashed,
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_block.h | 48 * initialised with the encryption key. 434 * \param ctx context structure (already initialised). 490 * \param ctx context structure (already initialised). 555 * \param ctx context structure (already initialised). 621 * \param ctx context structure (already initialised). 645 * \param ctx context structure (already initialised). 664 * \param ctx context structure (already initialised). 683 * \param ctx context structure (already initialised). 834 * \param ctx context (already initialised). 845 * \param ctx context (already initialised). [all …]
|
H A D | bearssl_hmac.h | 60 * The HMAC key context is initialised with a hash function implementation 133 * \param kc HMAC key context (already initialised with the key). 144 * MUST NOT be called on a non-initialised HMAC computation context. 151 * \param ctx the (already initialised) HMAC computation context. 225 * \param ctx the (already initialised) HMAC computation context.
|
H A D | bearssl_aead.h | 192 * This function resets an already initialised AEAD context for 374 * A block cipher implementation, with its initialised context structure, 384 * \param bctx block cipher context (already initialised with secret key). 393 * This function resets an already initialised GCM context for a new 612 * A block cipher implementation, with its initialised context 621 * \param bctx block cipher context (already initialised with secret key). 643 * This function resets an already initialised EAX context for a new 911 * A block cipher implementation, with its initialised context 920 * \param bctx block cipher context (already initialised with secret key). 927 * This function resets an already initialised CCM context for a new
|
/freebsd/crypto/openssl/test/ |
H A D | nodefltctxtest.c | 14 * Test that the default libctx does not get initialised when using a custom 33 * not have been initialised via config file, and so it is not too late to in test_no_deflt_ctx_init() 40 * have been initialised and the default provider loading will have been in test_no_deflt_ctx_init()
|
/freebsd/crypto/openssl/crypto/engine/ |
H A D | README.md | 91 EVP_CIPHER_CTX is actually initialised with an EVP_CIPHER method and is about to 147 functional reference to the first that successfully initialised. In the latter 154 try to initialise from the "pile" will be those that are already initialised 172 new ENGINE changes, an abstract ENGINE can be loaded and initialised, but that 173 is an algorithm-agnostic process. Even if initialised, it will not have 185 initialised state. So if RSA code asks for an ENGINE and no ENGINE has 194 initialised state, so only modification operations (not queries) will cause that
|
/freebsd/contrib/libfido2/regress/ |
H A D | dev.c | 26 static int initialised; variable 72 if (!initialised) { in dummy_read() 75 initialised = 1; in dummy_read() 114 if (!initialised) in dummy_write() 160 initialised = 0; in wiredata_clear()
|
/freebsd/sys/contrib/xen/ |
H A D | vcpu.h | 41 * Initialise a VCPU. Each VCPU can be initialised only once. A 42 * newly-initialised VCPU will not run until it is brought up by VCPUOP_up. 53 * if the VCPU has not been initialised (VCPUOP_initialise). 65 * 2. After a VCPU is initialised, there is currently no way to drop all its
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | ENGINE_add.3 | 267 initialised and able to use any of its cryptographic 276 ENGINE, you have a guarantee that the ENGINE has been initialised and 277 is ready to perform cryptographic operations, and will remain initialised 327 already operational and couldn't be successfully initialised (e.g. lack of 355 functional reference to an initialised ENGINE whose implementation should be 453 OpenSSL \- if there is an ENGINE that implements it and can be initialised, 489 so that it can be initialised for use. This could include the path to any
|
/freebsd/contrib/unbound/util/ |
H A D | random.h | 62 * @param state: must have been initialised with ub_initstate. 69 * @param state: must have been initialised with ub_initstate.
|
/freebsd/contrib/unbound/services/ |
H A D | outbound_list.h | 90 * @param e: entry to add, it is only half initialised at call start, fully 91 * initialised at call end.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_params.pod | 29 These functions must only be called after the EVP_PKEY_CTX has been initialised 39 These functions must only be called after the EVP_PKEY_CTX has been initialised
|
H A D | ENGINE_add.pod | 203 initialised and able to use any of its cryptographic 212 ENGINE, you have a guarantee that the ENGINE has been initialised and 213 is ready to perform cryptographic operations, and will remain initialised 263 already operational and couldn't be successfully initialised (e.g. lack of 292 functional reference to an initialised ENGINE whose implementation should be 389 OpenSSL - if there is an ENGINE that implements it and can be initialised, 424 so that it can be initialised for use. This could include the path to any
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 165 PAM_LOG("Context initialised"); in pam_sm_authenticate() 282 PAM_LOG("Credential options initialised"); in pam_sm_authenticate() 458 PAM_LOG("Context initialised"); in pam_sm_setcred() 565 PAM_LOG("Cache initialised"); in pam_sm_setcred() 681 PAM_LOG("Context initialised"); in pam_sm_acct_mgmt() 753 PAM_LOG("Context initialised"); in pam_sm_chauthtok() 793 PAM_LOG("Credentials options initialised"); in pam_sm_chauthtok()
|