Searched refs:pointer (Results 1 – 6 of 6) sorted by relevance
145 void *pointer; in main() local152 memset( &pointer, 0, sizeof( void * ) ); in main()153 if( pointer != NULL ) in main()
105 static inline void coap_free(void *pointer) { in coap_free() argument
263 void *pointer;274 * of a NULL pointer. We do however use that in our code for initializing277 memset( &pointer, 0, sizeof( void * ) );278 if( pointer != NULL )280 mbedtls_fprintf( stderr, "all-bits-zero is not a NULL pointer\n" );
211 * If the size if zero, a pointer to a zeroized 1-byte buffer is returned.234 * If the size if zero, a pointer to a zeroized 1-byte buffer is returned.308 * rng_state shall be a pointer to a rnd_buf_info structure.360 * rng_state shall be a pointer to a rnd_pseudo_info structure.
77 …NDBG "-Werror -fsanitize=address -fno-common -O1 -g3 -fno-omit-frame-pointer -fno-optimize-sib…88 …ommon -fsanitize=undefined -fno-sanitize-recover -O1 -g3 -fno-omit-frame-pointer -fno-optimize-sib…90 …set(CMAKE_C_FLAGS_MEMSANDBG "-Werror -fsanitize=memory -O1 -g3 -fno-omit-frame-pointer -fno-opti…
115 * Fix bug in mbedtls_rsa_rsaes_pkcs1_v15_encrypt that made null pointer127 the need to pass -fomit-frame-pointer to avoid a build error with -O0.256 * Fix possible client-side NULL pointer dereference (read) when the client267 * Made X509 profile pointer const in mbedtls_ssl_conf_cert_profile() to allow381 pointer, parameters reordered).561 * Fix potential NULL pointer dereference (not trigerrable remotely) when605 * NULL pointer dereference in the buffer-based allocator when the buffer is609 * Fix remotely-triggerable uninitialised pointer dereference caused by855 * Prevent potential NULL pointer dereference in ssl_read_record() (found by934 * ssl_init() was leaving a dirty pointer in ssl_context if malloc of[all …]