Home
last modified time | relevance | path

Searched refs:last (Results 1 – 25 of 31) sorted by relevance

12

/mbedtls-latest/library/
Dssl_cache.c141 mbedtls_ssl_cache_entry *cur, *last; in ssl_cache_pick_writing_slot() local
151 last = NULL; in ssl_cache_pick_writing_slot()
158 last = cur; in ssl_cache_pick_writing_slot()
192 if (last == NULL) { in ssl_cache_pick_writing_slot()
195 last->next = cur; in ssl_cache_pick_writing_slot()
221 last->next = old; in ssl_cache_pick_writing_slot()
Dripemd160.c331 uint32_t last, padn; in mbedtls_ripemd160_finish() local
342 last = ctx->total[0] & 0x3F; in mbedtls_ripemd160_finish()
343 padn = (last < 56) ? (56 - last) : (120 - last); in mbedtls_ripemd160_finish()
/mbedtls-latest/programs/fuzz/
DREADME.md47 They also use the last bytes as configuration options.
54 * Finally, you can add the options by appending the last bytes to the file test.cor
/mbedtls-latest/tests/suites/
Dtest_suite_lms.function100 /* Altering last message byte must cause verification failure */
114 /* Altering last signature byte must cause verification failure */
Dtest_suite_psa_crypto_pake.function256 … !"One of the last psa_pake_input() calls should have returned the expected error.");
350 … !"One of the last psa_pake_input() calls should have returned the expected error.");
383 … !"One of the last psa_pake_input() calls should have returned the expected error.");
439 … !"One of the last psa_pake_input() calls should have returned the expected error.");
503 … !"One of the last psa_pake_input() calls should have returned the expected error.");
530 … !"One of the last psa_pake_input() calls should have returned the expected error.");
Dtest_suite_lmots.function100 /* Altering last message byte must cause verification failure */
113 /* Altering last signature byte must cause verification failure */
Dtest_suite_psa_crypto_slot_management.data242 Key slot count: try to overfill, destroy next-to-last
245 Key slot count: try to overfill, destroy last
Dtest_suite_psa_crypto_metadata.function49 #define ALG_FLAG_MASK_PLUS_ONE (1u << 30) /* must be last! */
63 #define KEY_TYPE_FLAG_MASK_PLUS_ONE (1u << 8) /* must be last! */
70 #define KEY_LIFETIME_FLAG_MASK_PLUS_ONE (1u << 2) /* must be last! */
Dtest_suite_psa_crypto_slot_management.function775 * all IDs are used up to the last one, so pick
877 * -1 means to destroy the last key that was created).
1035 * slots when creating the last key is restored in a RAM slot to export
1124 * Check we can export the volatile key created last and that it has the
Dtest_suite_cipher.padding.data168 Check one and zeros padding #8 (last byte 0x80 | x)
Dtest_suite_asn1write.data355 Store named data: last
Dtest_suite_asn1parse.data598 Find named data: last
Dtest_suite_ctr_drbg.function411 /* Take a last output for comparing and thus verifying the DRBG state */
Dtest_suite_ssl.function568 /* 4 pushes (last one with an error), 4 pops (last one with an error) */
793 /* Send three message to the server, last one with an error */
806 /* Read three messages from the server, last one with an error */
4905 * Finally, do a last writting to go past that maximum permitted size and
Dhost_test.function580 /* Initialize the struct that holds information about the last test */
Dtest_suite_psa_crypto.function840 … !"One of the last psa_pake_input() calls should have returned the expected error.");
946 … !"One of the last psa_pake_input() calls should have returned the expected error.");
1014 … !"One of the last psa_pake_input() calls should have returned the expected error.");
1081 … !"One of the last psa_pake_input() calls should have returned the expected error.");
1141 … !"One of the last psa_pake_input() calls should have returned the expected error.");
1181 … !"One of the last psa_pake_input() calls should have returned the expected error.");
7213 * because ECDSA may ignore the last few bits of the input. */
7375 * because ECDSA may ignore the last few bits of the input. */
7547 * ECDSA may ignore the last few bits of the input. */
8353 * because ECDSA may ignore the last few bits of the input. */
Dtest_suite_mps.function320 * uncommitted data together with the excess data missing in the last
/mbedtls-latest/docs/
D3.0-migration-guide.md74 As a last resort, you can access the field `foo` of a structure `bar` by writing `bar.MBEDTLS_PRIVA…
239 …ions had to pass inputs consisting of whole 16-byte blocks except for the last block (this limitat…
241last input is not a multiple of 16, alternative implementations may return the last partial block …
242 * `mbedtls_gcm_finish()` now takes an extra output buffer for the last partial block. This is neede…
251 …* Buffer the data for the last partial block, to be returned in the next call to `mbedtls_gcm_upda…
252 * `mbedtls_gcm_finish()` now takes an extra output buffer for the last partial block if needed.
411 the last call to `mbedtls_cipher_update()` — that is, without calling
808 the one that has been configured last. In Mbed TLS 3.0,
814 remove all but the last call, so that only one call to _either_
996 issuing only the very last call to `mbedtls_ssl_set_session()`.
/mbedtls-latest/tests/scripts/
Dtest_zeroize.gdb11 # breakpoint at the last return statement in main(). When the breakpoint is
/mbedtls-latest/
D.uncrustify.cfg239 # last lines are the same length
DCMakeLists.txt185 # Remove the last item if there are more than one
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md166 …read this slot. The slot must not be wiped until the last reader unregisters. It is during the las…
231 …nd the slot's registered reader counter is equal to 1. This implements a "last one out closes the …
/mbedtls-latest/docs/architecture/
Dtls13-support.md238 The two last types, `MBEDTLS_SSL_CHK_BUF_PTR` and
Dpsa-storage-resilience.md42 (This section was last updated for Mbed TLS 3.4.0 implementing PSA Crypto API 1.1.)
406 2. Remove the key identifier from the array. If it wasn't the last element in array, move array ele…
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md54 rigged RNG; the last branch could only be reached by computing a discrete log

12