Home
last modified time | relevance | path

Searched refs:active (Results 1 – 14 of 14) sorted by relevance

/mbedtls/scripts/
A Dconfig.py35 self.active = active
128 self.settings[name].active = False
141 setting.active = adapter(setting.name, setting.active,
151 setting.active = enable
168 return active
246 def full_adapter(name, active, section): argument
249 return active
287 return active
332 return active
352 return active
[all …]
/mbedtls/library/
A Dssl_ticket.c123 mbedtls_ssl_ticket_key * const key = ctx->keys + ctx->active; in ssl_ticket_update_keys()
137 ctx->active = 1 - ctx->active; in ssl_ticket_update_keys()
140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys()
145 return ssl_ticket_gen_key(ctx, ctx->active); in ssl_ticket_update_keys()
159 const unsigned char idx = 1 - ctx->active; in mbedtls_ssl_ticket_rotate()
200 ctx->active = idx; in mbedtls_ssl_ticket_rotate()
339 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write()
/mbedtls/programs/ssl/
A Dssl_pthread_server.c89 int active; member
247 if (threads[i].active == 0) { in thread_create()
267 threads[i].active = 1; in thread_create()
/mbedtls/include/mbedtls/
A Dssl_ticket.h73 unsigned char MBEDTLS_PRIVATE(active); /*!< index of the currently active key */
/mbedtls/tests/suites/
A Dtest_suite_random.data25 #PSA classic wrapper: PSA not active
A Dtest_suite_psa_crypto.function37 /* Assert that an operation is (not) active.
/mbedtls/docs/
A Duse-psa-crypto.md138 All of these internal changes are active as soon as `MBEDTLS_USE_PSA_CRYPTO`
/mbedtls/
A DCONTRIBUTING.md33 …to work with a newer version of the library. Unless the user has made an active decision to use ne…
A DREADME.md35 There are currently three active build systems used within Mbed TLS releases:
A DChangeLog2357 those configurations, allowing an active network attacker to recover
3237 in (D)TLS 1.0 to 1.2, that allowed an active network attacker to
4480 * Removed helper script active-config.pl
5103 * Support for multiple active certificate / key pairs in SSL servers for
5371 * Fixed memory leak in ssl_free() and ssl_reset() for active session
/mbedtls/docs/architecture/
A Dpsa-storage-resilience.md301 …ion [“Recovery strategies”](#recovery-strategies), the information about active transactions is st…
468 In practice, there will rarely be more than one active transaction at a time, so the size of an ele…
/mbedtls/3rdparty/p256-m/p256-m/
A DREADME.md111 5. active physical attackers who can also inject faults in the computation.
/mbedtls/docs/architecture/testing/
A Dinvasive-testing.md109 Storage can fail, either due to hardware errors or to active attacks on trusted storage. How does t…
/mbedtls/docs/architecture/psa-thread-safety/
A Dpsa-thread-safety.md339 * By default, each driver only has at most one entry point active at any given time. In other words…

Completed in 46 milliseconds