/mbedtls-latest/library/ |
D | ssl_cache.c | 48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry() 152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 195 last->next = cur; in ssl_cache_pick_writing_slot() 219 cache->chain = old->next; in ssl_cache_pick_writing_slot() 220 old->next = NULL; in ssl_cache_pick_writing_slot() 221 last->next = old; in ssl_cache_pick_writing_slot() 233 old = cur->next; in ssl_cache_pick_writing_slot() 235 cur->next = old; in ssl_cache_pick_writing_slot() 345 cache->chain = entry->next; in mbedtls_ssl_cache_remove() [all …]
|
D | memory_buffer_alloc.c | 38 memory_header *next; member 79 (size_t) hdr, (size_t) hdr->prev, (size_t) hdr->next, in debug_header() 100 cur = cur->next; in debug_chain() 136 if (hdr->prev != NULL && hdr->prev == hdr->next) { in verify_header() 173 cur = heap.first->next; in verify_chain() 193 cur = cur->next; in verify_chain() 302 new->next = cur->next; in buffer_alloc_calloc() 310 if (new->next != NULL) { in buffer_alloc_calloc() 311 new->next->prev = new; in buffer_alloc_calloc() 330 cur->next = new; in buffer_alloc_calloc() [all …]
|
D | asn1parse.c | 296 mbedtls_asn1_sequence *next = seq->next; in mbedtls_asn1_sequence_free() local 298 seq = next; in mbedtls_asn1_sequence_free() 318 cur->next = in asn1_get_sequence_of_cb() 321 if (cur->next == NULL) { in asn1_get_sequence_of_cb() 325 cur = cur->next; in asn1_get_sequence_of_cb() 438 *head = cur->next; in mbedtls_asn1_free_named_data_list() 447 for (mbedtls_asn1_named_data *next; name != NULL; name = next) { in mbedtls_asn1_free_named_data_list_shallow() local 448 next = name->next; in mbedtls_asn1_free_named_data_list_shallow() 462 list = list->next; in mbedtls_asn1_find_named_data()
|
D | x509_crl.c | 267 cur_entry->next = mbedtls_calloc(1, sizeof(mbedtls_x509_crl_entry)); in x509_get_entries() 269 if (cur_entry->next == NULL) { in x509_get_entries() 273 cur_entry = cur_entry->next; in x509_get_entries() 306 while (crl->version != 0 && crl->next != NULL) { in mbedtls_x509_crl_parse_der() 307 crl = crl->next; in mbedtls_x509_crl_parse_der() 310 if (crl->version != 0 && crl->next == NULL) { in mbedtls_x509_crl_parse_der() 311 crl->next = mbedtls_calloc(1, sizeof(mbedtls_x509_crl)); in mbedtls_x509_crl_parse_der() 313 if (crl->next == NULL) { in mbedtls_x509_crl_parse_der() 318 mbedtls_x509_crl_init(crl->next); in mbedtls_x509_crl_parse_der() 319 crl = crl->next; in mbedtls_x509_crl_parse_der() [all …]
|
D | x509_crt.c | 364 a = a->next; in x509_name_cmp() 365 b = b->next; in x509_name_cmp() 804 if (cur->next != NULL) { in x509_get_certificate_policies() 808 cur->next = mbedtls_calloc(1, sizeof(mbedtls_asn1_sequence)); in x509_get_certificate_policies() 810 if (cur->next == NULL) { in x509_get_certificate_policies() 815 cur = cur->next; in x509_get_certificate_policies() 848 cur->next = NULL; in x509_get_certificate_policies() 1330 while (crt->version != 0 && crt->next != NULL) { in mbedtls_x509_crt_parse_der_internal() 1332 crt = crt->next; in mbedtls_x509_crt_parse_der_internal() 1338 if (crt->version != 0 && crt->next == NULL) { in mbedtls_x509_crt_parse_der_internal() [all …]
|
D | x509.c | 465 cur->next = NULL; in x509_get_attr_type_value() 531 cur->next = mbedtls_calloc(1, sizeof(mbedtls_x509_name)); in mbedtls_x509_get_name() 533 if (cur->next == NULL) { in mbedtls_x509_get_name() 538 cur = cur->next; in mbedtls_x509_get_name() 548 cur->next = mbedtls_calloc(1, sizeof(mbedtls_x509_name)); in mbedtls_x509_get_name() 550 if (cur->next == NULL) { in mbedtls_x509_get_name() 555 cur = cur->next; in mbedtls_x509_get_name() 560 mbedtls_asn1_free_named_data_list_shallow(head->next); in mbedtls_x509_get_name() 561 head->next = NULL; in mbedtls_x509_get_name() 834 name = name->next; in mbedtls_x509_dn_gets() [all …]
|
D | pkcs7.c | 252 name_cur = signer->issuer.next; in pkcs7_free_signer_info() 255 name_cur = name_cur->next; in pkcs7_free_signer_info() 258 signer->issuer.next = NULL; in pkcs7_free_signer_info() 419 prev->next = signer; in pkcs7_get_signers_info_set() 428 mbedtls_pkcs7_signer_info *signer = signers_set->next; in pkcs7_get_signers_info_set() 431 signer = signer->next; in pkcs7_get_signers_info_set() 435 signers_set->next = NULL; in pkcs7_get_signers_info_set() 707 for (signer = &pkcs7->signed_data.signers; signer; signer = signer->next) { in mbedtls_pkcs7_data_or_hash_verify() 761 signer_cur = pkcs7->signed_data.signers.next; in mbedtls_pkcs7_free() 765 signer_cur = signer_prev->next; in mbedtls_pkcs7_free()
|
D | x509write.c | 52 for (cur = san_list; cur != NULL; cur = cur->next) { in mbedtls_x509_write_set_san_common() 76 chunk = chunk->next; in mbedtls_x509_write_set_san_common() 143 cur = cur->next; in mbedtls_x509_write_set_san_common()
|
D | constant_time.c | 161 unsigned char next = buf[n+1]; in mbedtls_ct_memmove_left() local 162 buf[n] = mbedtls_ct_uint_if(no_op, current, next); in mbedtls_ct_memmove_left()
|
D | asn1write.c | 364 list = list->next; in asn1_find_named_data() 410 cur->next = *head; in mbedtls_asn1_store_named_data()
|
/mbedtls-latest/include/mbedtls/ |
D | x509.h | 305 struct mbedtls_x509_san_list *next; member 356 while (dn->MBEDTLS_PRIVATE(next_merged) && dn->next != NULL) { in mbedtls_x509_dn_get_next() 357 dn = dn->next; in mbedtls_x509_dn_get_next() 359 return dn->next; in mbedtls_x509_dn_get_next()
|
D | x509_crl.h | 56 struct mbedtls_x509_crl_entry *next; member 91 struct mbedtls_x509_crl *next; member
|
D | asn1.h | 171 struct mbedtls_asn1_sequence *next; member 189 struct mbedtls_asn1_named_data *next; member
|
D | ssl_cache.h | 61 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(next); /*!< chain pointer */
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509write.function | 181 san_mail.next = NULL; 186 san_dns.next = &san_mail; 192 san_dn.next = &san_dns; 197 san_ip.next = &san_dn; 202 san_uri.next = &san_ip; 392 san_mail.next = NULL; 397 san_dns.next = &san_mail; 403 san_dn.next = &san_dns; 408 san_ip.next = &san_dn; 413 san_uri.next = &san_ip; [all …]
|
D | test_suite_asn1parse.function | 588 TEST_ASSERT(head.next == NULL); 603 cur = cur->next; 611 mbedtls_asn1_sequence_free(head.next); 705 nd[i].next = pointers[i+1]; 726 mbedtls_asn1_named_data next = 738 head.next = &next; 744 TEST_ASSERT(head.next == NULL); 745 TEST_ASSERT(next.val.len == 0xcafe); 762 new->next = head;
|
D | test_suite_x509parse.function | 127 while (ca->next != NULL) { 128 ca = ca->next; 527 cur = cur->next; 735 } else if (strcmp(profile_str, "next") == 0) { 887 crt.subject.next->val.p = (unsigned char *) new_subject_ou; 888 crt.subject.next->val.len = strlen(new_subject_ou); 954 mbedtls_asn1_free_named_data_list_shallow(head.next); 1003 parsed_cur = parsed_cur->next; 1030 mbedtls_asn1_free_named_data_list_shallow(parsed.next); 1378 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { [all …]
|
D | test_suite_ctr_drbg.function | 288 * 2 * reps so the next few calls should not use entropy */ 302 /* There have been 2 * reps calls to random. The next call should reseed */ 310 /* The next few calls should not reseed */ 324 /* Now enable PR, so the next few calls should all reseed */ 460 // test all increments from 2^n - 1 to 2^n (i.e. where we roll over into the next bit)
|
D | test_suite_hmac_drbg.function | 74 * 2 * reps so the next few calls should not use entropy */ 88 /* There have been 2 * reps calls to random. The next call should reseed */ 104 /* Now enable PR, so the next few calls should all reseed */
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 371 data are flushed before to call the next handler. That way, handlers do not 379 fields of the SSL context or based on the reading of the type of the next 380 message. The latter occurs when it is not known what the next handshake message 382 CertificateRequest message or not. The intent is, apart from the next record 384 next handshake message has not been received yet. 387 message we must receive next and we try to fetch it. If we did not go through 388 a coordination stage involving the next record type reading, the next 405 context to prepare for the next incoming and outgoing messages. This stage is 429 context to prepare for the next incoming and outgoing messages. This stage is
|
D | psa-keystore-design.md | 161 …dex of a free slot in the slice. Each free slot contains the index of the next free slot in that s… 163 …next slot, but the index of the next free slot on the list _relative to the next slot in the array…
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 756 sni_entry *next; member 761 sni_entry *cur = head, *next; in sni_free() local 776 next = cur->next; in sni_free() 778 cur = next; in sni_free() 866 new->next = cur; in sni_parse() 903 cur = cur->next; in sni_callback() 951 psk_entry *next; member 959 psk_entry *next; in psk_free() local 974 next = head->next; in psk_free() 976 head = next; in psk_free() [all …]
|
/mbedtls-latest/programs/x509/ |
D | cert_req.c | 249 cur->next = NULL; in main() 303 prev->next = cur; in main() 506 cur = cur->next; in main()
|
/mbedtls-latest/ |
D | BRANCHES.md | 9 this is where the next major version of Mbed TLS (version 4.0) is being 25 ABI compatibility within LTS branches; see the next section for details. 29 supported until March 2027. The next LTS release will be a 4.x release, which is
|
/mbedtls-latest/tests/docker/bionic/ |
D | Dockerfile | 136 # Build libnettle 3.7.3 (needed by gnutls next) 146 # Build gnutls next (3.7.2)
|