Home
last modified time | relevance | path

Searched refs:attempt (Results 1 – 17 of 17) sorted by relevance

/mbedtls-latest/library/
Drsa_alt_helpers.c56 uint16_t attempt; /* Number of current attempt */ in mbedtls_rsa_deduce_primes() local
111 attempt = 0; in mbedtls_rsa_deduce_primes()
113 attempt = 1; in mbedtls_rsa_deduce_primes()
116 for (; attempt < num_primes; ++attempt) { in mbedtls_rsa_deduce_primes()
117 MBEDTLS_MPI_CHK(mbedtls_mpi_lset(&K, primes[attempt])); in mbedtls_rsa_deduce_primes()
/mbedtls-latest/tests/suites/
Dtest_suite_lms.data234 # not attempt to read invalidly outside the buffer.
240 # not attempt to read invalidly outside the buffer.
250 # LMS type to 0x7, and imports it. This should fail, and not attempt to read
261 # LMOTS type to 0x5, and imports it. This should fail, and not attempt to read
Dtest_suite_memory_buffer_alloc.data22 Memory buffer: attempt to allocate SIZE_MAX
Dtest_suite_lmots.data126 # not attempt to read invalidly outside the buffer.
136 # LMOTS type to 0x5, and imports it. This should fail, and not attempt to read
Dtest_suite_psa_crypto_slot_management.data258 # . An attempt to access a persistent key while all RAM key slots are occupied
261 # . With all key slot in use with one containing a persistent key, an attempt
Dtest_suite_psa_crypto_slot_management.function691 /* Make a copy attempt. */
Dtest_suite_rsa.function1449 * write attempt below. */
Dtest_suite_mps.function651 /* This test exercises the behaviour of the MPS reader when an attempt
Dtest_suite_pk.data1549 # any attempt to copy that key will fail.
Dtest_suite_psa_crypto.function400 /* Do not want to attempt to decrypt tag. */
1327 * threads attempt to load/destroy the key, exactly one thread succeeds. */
1643 /* Construct and attempt to import a large unstructured key. */
/mbedtls-latest/
DBRANCHES.md67 but always attempt to provide a compatibility option.
DLICENSE387 except as expressly provided under this License. Any attempt
DChangeLog1418 * Fix a TLS 1.3 handshake failure when the first attempt to send the client
2019 is not defined PSA will no longer attempt to use mbedtls_rsa_gen_key().
2387 but spurious and misleading since it looked like a mistaken attempt to
4093 peer after sending a fatal alert to refuse a renegotiation attempt.
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md69 > As an example of this rule: suppose two calls are executed concurrently which both attempt to cre…
119 …nagement API call the key can be used by any thread. If multiple threads attempt to load the same …
/mbedtls-latest/docs/architecture/
Dpsa-storage-resilience.md82 … has not changed at all. As far as the world is concerned, the key creation attempt never happened.
95 …s not changed at all. As far as the world is concerned, the key destruction attempt never happened.
Dpsa-shared-memory.md74 …ta by passing the ciphertext to the provisioning application, which will attempt to decrypt it wit…
239 It is unclear whether the compiler will attempt to optimize away copying operations.
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md107 However, p256-m makes no attempt to protect against: