Home
last modified time | relevance | path

Searched refs:active (Results 1 – 14 of 14) sorted by relevance

/mbedtls-3.7.0/scripts/
Dconfig.py34 def __init__(self, active, name, value='', section=None): argument
35 self.active = active
66 return name in self.settings and self.settings[name].active
117 self.settings[name].active = True
128 self.settings[name].active = False
141 setting.active = adapter(setting.name, setting.active,
151 setting.active = enable
157 def realfull_adapter(_name, active, section): argument
168 return active
246 def full_adapter(name, active, section): argument
[all …]
/mbedtls-3.7.0/library/
Dssl_ticket.c123 mbedtls_ssl_ticket_key * const key = ctx->keys + ctx->active; in ssl_ticket_update_keys()
137 ctx->active = 1 - ctx->active; in ssl_ticket_update_keys()
140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys()
145 return ssl_ticket_gen_key(ctx, ctx->active); in ssl_ticket_update_keys()
159 const unsigned char idx = 1 - ctx->active; in mbedtls_ssl_ticket_rotate()
200 ctx->active = idx; in mbedtls_ssl_ticket_rotate()
339 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write()
/mbedtls-3.7.0/programs/ssl/
Dssl_pthread_server.c89 int active; member
247 if (threads[i].active == 0) { in thread_create()
267 threads[i].active = 1; in thread_create()
/mbedtls-3.7.0/include/mbedtls/
Dssl_ticket.h73 unsigned char MBEDTLS_PRIVATE(active); /*!< index of the currently active key */
/mbedtls-3.7.0/tests/suites/
Dtest_suite_random.data25 #PSA classic wrapper: PSA not active
Dtest_suite_psa_crypto.function37 /* Assert that an operation is (not) active.
/mbedtls-3.7.0/docs/
Duse-psa-crypto.md138 All of these internal changes are active as soon as `MBEDTLS_USE_PSA_CRYPTO`
/mbedtls-3.7.0/
DCONTRIBUTING.md33 …to work with a newer version of the library. Unless the user has made an active decision to use ne…
DREADME.md35 There are currently three active build systems used within Mbed TLS releases:
DChangeLog2357 those configurations, allowing an active network attacker to recover
3237 in (D)TLS 1.0 to 1.2, that allowed an active network attacker to
4480 * Removed helper script active-config.pl
5103 * Support for multiple active certificate / key pairs in SSL servers for
5371 * Fixed memory leak in ssl_free() and ssl_reset() for active session
/mbedtls-3.7.0/docs/architecture/
Dpsa-storage-resilience.md301 …ion [“Recovery strategies”](#recovery-strategies), the information about active transactions is st…
468 In practice, there will rarely be more than one active transaction at a time, so the size of an ele…
/mbedtls-3.7.0/docs/architecture/testing/
Dinvasive-testing.md109 Storage can fail, either due to hardware errors or to active attacks on trusted storage. How does t…
/mbedtls-3.7.0/3rdparty/p256-m/p256-m/
DREADME.md111 5. active physical attackers who can also inject faults in the computation.
/mbedtls-3.7.0/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md339 * By default, each driver only has at most one entry point active at any given time. In other words…