Home
last modified time | relevance | path

Searched refs:next (Results 1 – 25 of 67) sorted by relevance

123

/mbedtls-latest/library/
Dssl_cache.c48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry()
152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot()
169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot()
195 last->next = cur; in ssl_cache_pick_writing_slot()
219 cache->chain = old->next; in ssl_cache_pick_writing_slot()
220 old->next = NULL; in ssl_cache_pick_writing_slot()
221 last->next = old; in ssl_cache_pick_writing_slot()
233 old = cur->next; in ssl_cache_pick_writing_slot()
235 cur->next = old; in ssl_cache_pick_writing_slot()
345 cache->chain = entry->next; in mbedtls_ssl_cache_remove()
[all …]
Dmemory_buffer_alloc.c38 memory_header *next; member
79 (size_t) hdr, (size_t) hdr->prev, (size_t) hdr->next, in debug_header()
100 cur = cur->next; in debug_chain()
136 if (hdr->prev != NULL && hdr->prev == hdr->next) { in verify_header()
173 cur = heap.first->next; in verify_chain()
193 cur = cur->next; in verify_chain()
302 new->next = cur->next; in buffer_alloc_calloc()
310 if (new->next != NULL) { in buffer_alloc_calloc()
311 new->next->prev = new; in buffer_alloc_calloc()
330 cur->next = new; in buffer_alloc_calloc()
[all …]
Dasn1parse.c296 mbedtls_asn1_sequence *next = seq->next; in mbedtls_asn1_sequence_free() local
298 seq = next; in mbedtls_asn1_sequence_free()
318 cur->next = in asn1_get_sequence_of_cb()
321 if (cur->next == NULL) { in asn1_get_sequence_of_cb()
325 cur = cur->next; in asn1_get_sequence_of_cb()
438 *head = cur->next; in mbedtls_asn1_free_named_data_list()
447 for (mbedtls_asn1_named_data *next; name != NULL; name = next) { in mbedtls_asn1_free_named_data_list_shallow() local
448 next = name->next; in mbedtls_asn1_free_named_data_list_shallow()
462 list = list->next; in mbedtls_asn1_find_named_data()
Dx509_crl.c267 cur_entry->next = mbedtls_calloc(1, sizeof(mbedtls_x509_crl_entry)); in x509_get_entries()
269 if (cur_entry->next == NULL) { in x509_get_entries()
273 cur_entry = cur_entry->next; in x509_get_entries()
306 while (crl->version != 0 && crl->next != NULL) { in mbedtls_x509_crl_parse_der()
307 crl = crl->next; in mbedtls_x509_crl_parse_der()
310 if (crl->version != 0 && crl->next == NULL) { in mbedtls_x509_crl_parse_der()
311 crl->next = mbedtls_calloc(1, sizeof(mbedtls_x509_crl)); in mbedtls_x509_crl_parse_der()
313 if (crl->next == NULL) { in mbedtls_x509_crl_parse_der()
318 mbedtls_x509_crl_init(crl->next); in mbedtls_x509_crl_parse_der()
319 crl = crl->next; in mbedtls_x509_crl_parse_der()
[all …]
Dx509_crt.c364 a = a->next; in x509_name_cmp()
365 b = b->next; in x509_name_cmp()
804 if (cur->next != NULL) { in x509_get_certificate_policies()
808 cur->next = mbedtls_calloc(1, sizeof(mbedtls_asn1_sequence)); in x509_get_certificate_policies()
810 if (cur->next == NULL) { in x509_get_certificate_policies()
815 cur = cur->next; in x509_get_certificate_policies()
848 cur->next = NULL; in x509_get_certificate_policies()
1330 while (crt->version != 0 && crt->next != NULL) { in mbedtls_x509_crt_parse_der_internal()
1332 crt = crt->next; in mbedtls_x509_crt_parse_der_internal()
1338 if (crt->version != 0 && crt->next == NULL) { in mbedtls_x509_crt_parse_der_internal()
[all …]
Dx509.c465 cur->next = NULL; in x509_get_attr_type_value()
531 cur->next = mbedtls_calloc(1, sizeof(mbedtls_x509_name)); in mbedtls_x509_get_name()
533 if (cur->next == NULL) { in mbedtls_x509_get_name()
538 cur = cur->next; in mbedtls_x509_get_name()
548 cur->next = mbedtls_calloc(1, sizeof(mbedtls_x509_name)); in mbedtls_x509_get_name()
550 if (cur->next == NULL) { in mbedtls_x509_get_name()
555 cur = cur->next; in mbedtls_x509_get_name()
560 mbedtls_asn1_free_named_data_list_shallow(head->next); in mbedtls_x509_get_name()
561 head->next = NULL; in mbedtls_x509_get_name()
834 name = name->next; in mbedtls_x509_dn_gets()
[all …]
Dpkcs7.c252 name_cur = signer->issuer.next; in pkcs7_free_signer_info()
255 name_cur = name_cur->next; in pkcs7_free_signer_info()
258 signer->issuer.next = NULL; in pkcs7_free_signer_info()
419 prev->next = signer; in pkcs7_get_signers_info_set()
428 mbedtls_pkcs7_signer_info *signer = signers_set->next; in pkcs7_get_signers_info_set()
431 signer = signer->next; in pkcs7_get_signers_info_set()
435 signers_set->next = NULL; in pkcs7_get_signers_info_set()
707 for (signer = &pkcs7->signed_data.signers; signer; signer = signer->next) { in mbedtls_pkcs7_data_or_hash_verify()
761 signer_cur = pkcs7->signed_data.signers.next; in mbedtls_pkcs7_free()
765 signer_cur = signer_prev->next; in mbedtls_pkcs7_free()
Dx509write.c52 for (cur = san_list; cur != NULL; cur = cur->next) { in mbedtls_x509_write_set_san_common()
76 chunk = chunk->next; in mbedtls_x509_write_set_san_common()
143 cur = cur->next; in mbedtls_x509_write_set_san_common()
Dconstant_time.c161 unsigned char next = buf[n+1]; in mbedtls_ct_memmove_left() local
162 buf[n] = mbedtls_ct_uint_if(no_op, current, next); in mbedtls_ct_memmove_left()
Dasn1write.c364 list = list->next; in asn1_find_named_data()
410 cur->next = *head; in mbedtls_asn1_store_named_data()
/mbedtls-latest/include/mbedtls/
Dx509.h305 struct mbedtls_x509_san_list *next; member
356 while (dn->MBEDTLS_PRIVATE(next_merged) && dn->next != NULL) { in mbedtls_x509_dn_get_next()
357 dn = dn->next; in mbedtls_x509_dn_get_next()
359 return dn->next; in mbedtls_x509_dn_get_next()
Dx509_crl.h56 struct mbedtls_x509_crl_entry *next; member
91 struct mbedtls_x509_crl *next; member
Dasn1.h171 struct mbedtls_asn1_sequence *next; member
189 struct mbedtls_asn1_named_data *next; member
Dssl_cache.h61 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(next); /*!< chain pointer */
/mbedtls-latest/tests/suites/
Dtest_suite_x509write.function181 san_mail.next = NULL;
186 san_dns.next = &san_mail;
192 san_dn.next = &san_dns;
197 san_ip.next = &san_dn;
202 san_uri.next = &san_ip;
392 san_mail.next = NULL;
397 san_dns.next = &san_mail;
403 san_dn.next = &san_dns;
408 san_ip.next = &san_dn;
413 san_uri.next = &san_ip;
[all …]
Dtest_suite_asn1parse.function588 TEST_ASSERT(head.next == NULL);
603 cur = cur->next;
611 mbedtls_asn1_sequence_free(head.next);
705 nd[i].next = pointers[i+1];
726 mbedtls_asn1_named_data next =
738 head.next = &next;
744 TEST_ASSERT(head.next == NULL);
745 TEST_ASSERT(next.val.len == 0xcafe);
762 new->next = head;
Dtest_suite_x509parse.function127 while (ca->next != NULL) {
128 ca = ca->next;
527 cur = cur->next;
735 } else if (strcmp(profile_str, "next") == 0) {
887 crt.subject.next->val.p = (unsigned char *) new_subject_ou;
888 crt.subject.next->val.len = strlen(new_subject_ou);
954 mbedtls_asn1_free_named_data_list_shallow(head.next);
1003 parsed_cur = parsed_cur->next;
1030 mbedtls_asn1_free_named_data_list_shallow(parsed.next);
1378 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) {
[all …]
Dtest_suite_ctr_drbg.function288 * 2 * reps so the next few calls should not use entropy */
302 /* There have been 2 * reps calls to random. The next call should reseed */
310 /* The next few calls should not reseed */
324 /* Now enable PR, so the next few calls should all reseed */
460 // test all increments from 2^n - 1 to 2^n (i.e. where we roll over into the next bit)
Dtest_suite_hmac_drbg.function74 * 2 * reps so the next few calls should not use entropy */
88 /* There have been 2 * reps calls to random. The next call should reseed */
104 /* Now enable PR, so the next few calls should all reseed */
/mbedtls-latest/docs/architecture/
Dtls13-support.md371 data are flushed before to call the next handler. That way, handlers do not
379 fields of the SSL context or based on the reading of the type of the next
380 message. The latter occurs when it is not known what the next handshake message
382 CertificateRequest message or not. The intent is, apart from the next record
384 next handshake message has not been received yet.
387 message we must receive next and we try to fetch it. If we did not go through
388 a coordination stage involving the next record type reading, the next
405 context to prepare for the next incoming and outgoing messages. This stage is
429 context to prepare for the next incoming and outgoing messages. This stage is
Dpsa-keystore-design.md161 …dex of a free slot in the slice. Each free slot contains the index of the next free slot in that s…
163next slot, but the index of the next free slot on the list _relative to the next slot in the array…
/mbedtls-latest/programs/ssl/
Dssl_server2.c756 sni_entry *next; member
761 sni_entry *cur = head, *next; in sni_free() local
776 next = cur->next; in sni_free()
778 cur = next; in sni_free()
866 new->next = cur; in sni_parse()
903 cur = cur->next; in sni_callback()
951 psk_entry *next; member
959 psk_entry *next; in psk_free() local
974 next = head->next; in psk_free()
976 head = next; in psk_free()
[all …]
/mbedtls-latest/programs/x509/
Dcert_req.c249 cur->next = NULL; in main()
303 prev->next = cur; in main()
506 cur = cur->next; in main()
/mbedtls-latest/
DBRANCHES.md9 this is where the next major version of Mbed TLS (version 4.0) is being
25 ABI compatibility within LTS branches; see the next section for details.
29 supported until March 2027. The next LTS release will be a 4.x release, which is
/mbedtls-latest/tests/docker/bionic/
DDockerfile136 # Build libnettle 3.7.3 (needed by gnutls next)
146 # Build gnutls next (3.7.2)

123