Home
last modified time | relevance | path

Searched refs:active (Results 1 – 11 of 11) sorted by relevance

/mbedtls-3.4.0/scripts/
Dconfig.py45 def __init__(self, active, name, value='', section=None): argument
46 self.active = active
77 return name in self.settings and self.settings[name].active
128 self.settings[name].active = True
139 self.settings[name].active = False
152 setting.active = adapter(setting.name, setting.active,
162 setting.active = enable
168 def realfull_adapter(_name, active, section): argument
179 return active
246 def full_adapter(name, active, section): argument
[all …]
/mbedtls-3.4.0/library/
Dssl_ticket.c120 mbedtls_time_t key_time = ctx->keys[ctx->active].generation_time; in ssl_ticket_update_keys()
132 ctx->active = 1 - ctx->active; in ssl_ticket_update_keys()
135 if( ( status = psa_destroy_key( ctx->keys[ctx->active].key ) ) != PSA_SUCCESS ) in ssl_ticket_update_keys()
141 return( ssl_ticket_gen_key( ctx, ctx->active ) ); in ssl_ticket_update_keys()
156 const unsigned char idx = 1 - ctx->active; in mbedtls_ssl_ticket_rotate()
197 ctx->active = idx; in mbedtls_ssl_ticket_rotate()
328 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write()
/mbedtls-3.4.0/programs/ssl/
Dssl_pthread_server.c101 int active; member
271 if( threads[i].active == 0 ) in thread_create()
290 threads[i].active = 1; in thread_create()
/mbedtls-3.4.0/include/mbedtls/
Dssl_ticket.h83 unsigned char MBEDTLS_PRIVATE(active); /*!< index of the currently active key */
/mbedtls-3.4.0/tests/suites/
Dtest_suite_random.data25 #PSA classic wrapper: PSA not active
Dtest_suite_psa_crypto.function30 /* Assert that an operation is (not) active.
/mbedtls-3.4.0/docs/
Duse-psa-crypto.md82 All of these internal changes are active as soon as `MBEDTLS_USE_PSA_CRYPTO`
/mbedtls-3.4.0/
DCONTRIBUTING.md33 …to work with a newer version of the library. Unless the user has made an active decision to use ne…
DREADME.md35 There are currently three active build systems used within Mbed TLS releases:
DChangeLog1564 those configurations, allowing an active network attacker to recover
2444 in (D)TLS 1.0 to 1.2, that allowed an active network attacker to
3687 * Removed helper script active-config.pl
4310 * Support for multiple active certificate / key pairs in SSL servers for
4578 * Fixed memory leak in ssl_free() and ssl_reset() for active session
/mbedtls-3.4.0/docs/architecture/testing/
Dinvasive-testing.md109 Storage can fail, either due to hardware errors or to active attacks on trusted storage. How does t…