Searched refs:active (Results 1 – 14 of 14) sorted by relevance
/mbedtls-3.7.0/scripts/ |
D | config.py | 34 def __init__(self, active, name, value='', section=None): argument 35 self.active = active 66 return name in self.settings and self.settings[name].active 117 self.settings[name].active = True 128 self.settings[name].active = False 141 setting.active = adapter(setting.name, setting.active, 151 setting.active = enable 157 def realfull_adapter(_name, active, section): argument 168 return active 246 def full_adapter(name, active, section): argument [all …]
|
/mbedtls-3.7.0/library/ |
D | ssl_ticket.c | 123 mbedtls_ssl_ticket_key * const key = ctx->keys + ctx->active; in ssl_ticket_update_keys() 137 ctx->active = 1 - ctx->active; in ssl_ticket_update_keys() 140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys() 145 return ssl_ticket_gen_key(ctx, ctx->active); in ssl_ticket_update_keys() 159 const unsigned char idx = 1 - ctx->active; in mbedtls_ssl_ticket_rotate() 200 ctx->active = idx; in mbedtls_ssl_ticket_rotate() 339 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write()
|
/mbedtls-3.7.0/programs/ssl/ |
D | ssl_pthread_server.c | 89 int active; member 247 if (threads[i].active == 0) { in thread_create() 267 threads[i].active = 1; in thread_create()
|
/mbedtls-3.7.0/include/mbedtls/ |
D | ssl_ticket.h | 73 unsigned char MBEDTLS_PRIVATE(active); /*!< index of the currently active key */
|
/mbedtls-3.7.0/tests/suites/ |
D | test_suite_random.data | 25 #PSA classic wrapper: PSA not active
|
D | test_suite_psa_crypto.function | 37 /* Assert that an operation is (not) active.
|
/mbedtls-3.7.0/docs/ |
D | use-psa-crypto.md | 138 All of these internal changes are active as soon as `MBEDTLS_USE_PSA_CRYPTO`
|
/mbedtls-3.7.0/ |
D | CONTRIBUTING.md | 33 …to work with a newer version of the library. Unless the user has made an active decision to use ne…
|
D | README.md | 35 There are currently three active build systems used within Mbed TLS releases:
|
D | ChangeLog | 2357 those configurations, allowing an active network attacker to recover 3237 in (D)TLS 1.0 to 1.2, that allowed an active network attacker to 4480 * Removed helper script active-config.pl 5103 * Support for multiple active certificate / key pairs in SSL servers for 5371 * Fixed memory leak in ssl_free() and ssl_reset() for active session
|
/mbedtls-3.7.0/docs/architecture/ |
D | psa-storage-resilience.md | 301 …ion [“Recovery strategies”](#recovery-strategies), the information about active transactions is st… 468 In practice, there will rarely be more than one active transaction at a time, so the size of an ele…
|
/mbedtls-3.7.0/docs/architecture/testing/ |
D | invasive-testing.md | 109 Storage can fail, either due to hardware errors or to active attacks on trusted storage. How does t…
|
/mbedtls-3.7.0/3rdparty/p256-m/p256-m/ |
D | README.md | 111 5. active physical attackers who can also inject faults in the computation.
|
/mbedtls-3.7.0/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 339 * By default, each driver only has at most one entry point active at any given time. In other words…
|