/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-cipher.7 | 152 .IP "initialised" 4 153 .IX Item "initialised" 155 input. There are three possible initialised states: 157 .IP "initialised using EVP_CipherInit" 4 158 .IX Item "initialised using EVP_CipherInit" 160 .IP "initialised for decryption using EVP_DecryptInit" 4 161 .IX Item "initialised for decryption using EVP_DecryptInit" 162 .IP "initialised for encryption using EVP_EncryptInit" 4 163 .IX Item "initialised for encryption using EVP_EncryptInit" 172 correspond to those for initialised above. The three different streams should [all …]
|
H A D | life_cycle-mac.7 | 152 .IP "initialised" 4 153 .IX Item "initialised" 183 +> | initialised | <+ 208 start newed initialised updated finaled freed 210 EVP_MAC_init initialised initialised initialised initialised 215 EVP_MAC_CTX_get_params newed initialised updated 216 EVP_MAC_CTX_set_params newed initialised updated 217 EVP_MAC_CTX_gettable_params newed initialised updated 218 EVP_MAC_CTX_settable_params newed initialised updated
|
H A D | life_cycle-digest.7 | 151 .IP "initialised" 4 152 .IX Item "initialised" 182 +--> | initialised | <+ EVP_DigestInit | 207 start newed initialised updated finaled freed 209 EVP_DigestInit initialised initialised initialised initialised 215 EVP_MD_CTX_get_params newed initialised updated 216 EVP_MD_CTX_set_params newed initialised updated 217 EVP_MD_CTX_gettable_params newed initialised updated 218 EVP_MD_CTX_settable_params newed initialised updated
|
H A D | provider-signature.7 | 342 A previously initialised signature context is passed in the \fIctx\fR 363 A previously initialised signature context is passed in the \fIctx\fR parameter. 380 A previously initialised signature context is passed in the \fIctx\fR parameter. 402 parameter which should be of length \fIdatalen\fR. A previously initialised 409 added through \fBOSSL_FUNC_signature_digest_sign_update()\fR. A previously initialised 418 initialised signature context is passed in the \fIctx\fR parameter. The data to be 438 parameter which should be of length \fIdatalen\fR. A previously initialised 445 added through \fBOSSL_FUNC_signature_digest_verify_update()\fR. A previously initialised 451 initialised verification context is passed in the \fIctx\fR parameter. The data to be
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-cipher.pod | 23 =item initialised 26 input. There are three possible initialised states: 30 =item initialised using EVP_CipherInit 32 =item initialised for decryption using EVP_DecryptInit 34 =item initialised for encryption using EVP_EncryptInit 42 correspond to those for initialised above. The three different streams should 67 | ' any of the initialised ' 81 | initialised | | initialised | | initialised | 127 …start newed initialised updated finaled initialised updated initialised update… 130 …pherInit initialised initialised initialised initialised initialised initialise… [all …]
|
H A D | life_cycle-mac.pod | 23 =item initialised 63 +> | initialised | <+ 96 start newed initialised updated finaled freed 98 EVP_MAC_init initialised initialised initialised initialised 103 EVP_MAC_CTX_get_params newed initialised updated 104 EVP_MAC_CTX_set_params newed initialised updated 105 EVP_MAC_CTX_gettable_params newed initialised updated 106 EVP_MAC_CTX_settable_params newed initialised updated 118 <th style="border:1px solid" align="center">initialised</th> 131 <td style="border:1px solid" align="center">initialised</td> [all …]
|
H A D | life_cycle-digest.pod | 22 =item initialised 62 +--> | initialised | <+ EVP_DigestInit | 95 start newed initialised updated finaled freed 97 EVP_DigestInit initialised initialised initialised initialised 103 EVP_MD_CTX_get_params newed initialised updated 104 EVP_MD_CTX_set_params newed initialised updated 105 EVP_MD_CTX_gettable_params newed initialised updated 106 EVP_MD_CTX_settable_params newed initialised updated 118 <th style="border:1px solid" align="center">initialised</th> 131 <td style="border:1px solid" align="center">initialised</td> [all …]
|
H A D | provider-signature.pod | 209 A previously initialised signature context is passed in the I<ctx> 231 A previously initialised signature context is passed in the I<ctx> parameter. 249 A previously initialised signature context is passed in the I<ctx> parameter. 272 parameter which should be of length I<datalen>. A previously initialised 279 added through OSSL_FUNC_signature_digest_sign_update(). A previously initialised 288 initialised signature context is passed in the I<ctx> parameter. The data to be 309 parameter which should be of length I<datalen>. A previously initialised 316 added through OSSL_FUNC_signature_digest_verify_update(). A previously initialised 322 initialised verification context is passed in the I<ctx> parameter. The data to be
|
/freebsd/contrib/libcxxrt/ |
H A D | guard.cc | 31 * Static values in C++ can be initialised lazily their first use. This file 40 * accessed far more times than they are initialised, this lock implementation 42 * initialised. 75 * locking by loading the guard word and, if it is not initialised, trying to 107 * indicate the initialised state is `1<<InitBit`. 119 * The value indicating that the initialised bit is set (and all other 122 static constexpr GuardWord initialised = static_cast<GuardWord>(1) member 132 * Release the lock and set the initialised state. In the single-word 137 val.store(isInitialised ? initialised : 0, memory_order::release); in unlock() 139 GuardWord init_state = initialised; in unlock() [all …]
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | cipher.dot | 7 initialised [fontcolor="#c94c4c"]; 12 d_initialised [label="initialised\n(decryption)", fontcolor="#c94c4c"]; 14 e_initialised [label="initialised\n(encryption)", fontcolor="#c94c4c"]; 18 newed -> initialised [label="EVP_CipherInit"]; 19 initialised -> initialised [label="EVP_CipherInit\n(not required but allowed)", 21 initialised -> updated [label="EVP_CipherUpdate", weight=2]; 41 most [label="any of the initialised\nupdated or finaled states", style=dashed, 51 initialised [fontcolor="#c94c4c"]; 57 newed -> initialised [label="EVP_CipherInit"]; 58 initialised -> initialised [label="EVP_CipherInit\n(not required but allowed)", [all …]
|
H A D | digest.dot | 6 initialised [label=initialised, fontcolor="#c94c4c"]; 12 newed -> initialised [label="EVP_DigestInit"]; 13 initialised -> updated [label="EVP_DigestUpdate", weight=3]; 28 updated -> initialised [label="EVP_DigestInit", weight=0, style=dashed, 30 finaled -> initialised [label="EVP_DigestInit", style=dashed,
|
H A D | mac.dot | 6 initialised [fontcolor="#c94c4c"]; 12 newed -> initialised [label="EVP_MAC_init"]; 13 initialised -> updated [label="EVP_MAC_update"]; 23 updated -> initialised [label="EVP_MAC_init", style=dashed, 25 finaled -> initialised [label="EVP_MAC_init", style=dashed,
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_block.h | 48 * initialised with the encryption key. 434 * \param ctx context structure (already initialised). 490 * \param ctx context structure (already initialised). 555 * \param ctx context structure (already initialised). 621 * \param ctx context structure (already initialised). 645 * \param ctx context structure (already initialised). 664 * \param ctx context structure (already initialised). 683 * \param ctx context structure (already initialised). 834 * \param ctx context (already initialised). 845 * \param ctx context (already initialised). [all …]
|
H A D | bearssl_hmac.h | 60 * The HMAC key context is initialised with a hash function implementation 133 * \param kc HMAC key context (already initialised with the key). 144 * MUST NOT be called on a non-initialised HMAC computation context. 151 * \param ctx the (already initialised) HMAC computation context. 225 * \param ctx the (already initialised) HMAC computation context.
|
H A D | bearssl_aead.h | 192 * This function resets an already initialised AEAD context for 374 * A block cipher implementation, with its initialised context structure, 384 * \param bctx block cipher context (already initialised with secret key). 393 * This function resets an already initialised GCM context for a new 612 * A block cipher implementation, with its initialised context 621 * \param bctx block cipher context (already initialised with secret key). 643 * This function resets an already initialised EAX context for a new 911 * A block cipher implementation, with its initialised context 920 * \param bctx block cipher context (already initialised with secret key). 927 * This function resets an already initialised CCM context for a new
|
/freebsd/crypto/openssl/test/ |
H A D | nodefltctxtest.c | 14 * Test that the default libctx does not get initialised when using a custom 33 * not have been initialised via config file, and so it is not too late to in test_no_deflt_ctx_init() 40 * have been initialised and the default provider loading will have been in test_no_deflt_ctx_init()
|
/freebsd/crypto/openssl/crypto/engine/ |
H A D | README.md | 91 EVP_CIPHER_CTX is actually initialised with an EVP_CIPHER method and is about to 147 functional reference to the first that successfully initialised. In the latter 154 try to initialise from the "pile" will be those that are already initialised 172 new ENGINE changes, an abstract ENGINE can be loaded and initialised, but that 173 is an algorithm-agnostic process. Even if initialised, it will not have 185 initialised state. So if RSA code asks for an ENGINE and no ENGINE has 194 initialised state, so only modification operations (not queries) will cause that
|
/freebsd/contrib/libfido2/regress/ |
H A D | dev.c | 26 static int initialised; variable 72 if (!initialised) { in dummy_read() 75 initialised = 1; in dummy_read() 114 if (!initialised) in dummy_write() 160 initialised = 0; in wiredata_clear()
|
/freebsd/sys/contrib/xen/ |
H A D | vcpu.h | 41 * Initialise a VCPU. Each VCPU can be initialised only once. A 42 * newly-initialised VCPU will not run until it is brought up by VCPUOP_up. 53 * if the VCPU has not been initialised (VCPUOP_initialise). 65 * 2. After a VCPU is initialised, there is currently no way to drop all its
|
/freebsd/contrib/unbound/util/ |
H A D | random.h | 62 * @param state: must have been initialised with ub_initstate. 69 * @param state: must have been initialised with ub_initstate.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_params.pod | 29 These functions must only be called after the EVP_PKEY_CTX has been initialised 39 These functions must only be called after the EVP_PKEY_CTX has been initialised
|
H A D | ENGINE_add.pod | 203 initialised and able to use any of its cryptographic 212 ENGINE, you have a guarantee that the ENGINE has been initialised and 213 is ready to perform cryptographic operations, and will remain initialised 263 already operational and couldn't be successfully initialised (e.g. lack of 292 functional reference to an initialised ENGINE whose implementation should be 389 OpenSSL - if there is an ENGINE that implements it and can be initialised, 424 so that it can be initialised for use. This could include the path to any
|
/freebsd/contrib/unbound/services/ |
H A D | outbound_list.h | 90 * @param e: entry to add, it is only half initialised at call start, fully 91 * initialised at call end.
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | ENGINE_add.3 | 343 initialised and able to use any of its cryptographic 352 \&\s-1ENGINE,\s0 you have a guarantee that the \s-1ENGINE\s0 has been initialised and 353 is ready to perform cryptographic operations, and will remain initialised 402 already operational and couldn't be successfully initialised (e.g. lack of 430 functional reference to an initialised \s-1ENGINE\s0 whose implementation should be 528 OpenSSL \- if there is an \s-1ENGINE\s0 that implements it and can be initialised, 564 so that it can be initialised for use. This could include the path to any
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 165 PAM_LOG("Context initialised"); in pam_sm_authenticate() 282 PAM_LOG("Credential options initialised"); in pam_sm_authenticate() 458 PAM_LOG("Context initialised"); in pam_sm_setcred() 565 PAM_LOG("Cache initialised"); in pam_sm_setcred() 681 PAM_LOG("Context initialised"); in pam_sm_acct_mgmt() 753 PAM_LOG("Context initialised"); in pam_sm_chauthtok() 793 PAM_LOG("Credentials options initialised"); in pam_sm_chauthtok()
|